Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 494
- Management 352
- Historia 313
- Development 307
- Engineering & Applied Sciences 275
- Application software 234
- Social aspects 231
- Computer programs 183
- Data processing 180
- Photography 174
- Computer Science 172
- Computer networks 171
- Filosofía 169
- Leadership 163
- Philosophy 161
- Design 151
- Digital techniques 149
- RELIGION 149
- Artificial intelligence 144
- History and criticism 138
- Business & Economics 135
- Technological innovations 134
- Politics and government 118
- Education 117
- Business 114
- Information technology 113
- Web sites 112
- Crítica e interpretación 106
- Computer software 105
- Java (Computer program language) 104
-
7501Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- Editors and Contributors -- Chapter 1: Space, education, and inclusion: An introduction to the volume -- Note -- References -- Chapter 2: Exploring dimensions of access within restrictive spaces of schooling -- Disability, schooling, and spaces -- Critical spatial theory -- Disability studies in education (DSE) framework -- Loosening the boundaries of learning spaces -- Method -- Description of the Saturn School -- Description of the research participants -- Data collection and analysis -- Achieving accessibility: Beyond physical boundaries -- Disruptions -- Conflicting ideologies of ability from within a schooling space -- Notes -- References -- Chapter 3: From excluding schools to excluding spaces: Spatial and postcolonial reflections on inclusive education in Africa -- Introduction -- Understanding education as Third Space -- The coloniality of modern education -- Inclusive education and its roots -- Inclusive education as Third Space: Transgressing the global North context and the African context -- Inclusive education as Third Space: Transgressing the special school and the mainstream school -- Conclusion -- References -- Chapter 4: Evaluating education policies through a spatial lens: Uncovering the ability-space-regimes of Austrian new middle schools -- Introduction: The new middle school policy in Austria -- Merging theoretical perspectives: Combining space and ability -- Researching space and ability in school: Methodological aspects -- Ethnographic case study: The ability-space regime of Inessa Armand School -- A space within a space: The micro-spaces of support during subsidiary subjects -- In the spheres of the grammar school: The break room as space of drill and elitism…”
Libro electrónico -
7502por Mazibuko-Makena, ZamanzimaTabla de Contenidos: “…From science, technology and innovation to Fourth Industrial Revolution strategies in Africa: The case for indigenous knowledge systems -- INTRODUCTION -- STI POLICY LANDSCAPE IN AFRICA - A FORETASTE OF EMERGENT 4IR STRATEGY -- MEASURING STI READINESS IN AFRICA: THE CASE OF NIGERIA AND KENYA -- BEYOND STI: SOUTH AFRICA'S 4IR STRATEGY -- SOUTH AFRICA'S PROGRAMME ON INDIGENOUS KNOWLEDGE SYSTEMS (IKS) -- IKS MISSING IN THE 4IR STRATEGY -- INDIGENOUS KNOWLEDGE AND INDIGENOUS KNOWLEDGE SYSTEMS: SCOPE AND SCALE -- TK/IK: INTELLECTUAL PROPERTY, BIOPIRACY, ACCESS AND BENEFIT SHARING -- SAMPLES OF SECTORAL SITES WHERE 4IR TECHNOLOGIES INTERFACE WITH IKS -- CONCLUSION -- REFERENCES -- THREE. …”
Publicado 2021
Libro electrónico -
7503Publicado 2023Tabla de Contenidos: “…Options to Improve Efficiency -- Improve Ways to Manage and Improve Profit Structures -- 6 Summarizing Strategic Options -- Organizing All Available Options -- Coming Up with Growth Options and Scenarios by Organizing Strategic Options -- STEP 3: Review and Select Options -- STORY 4: All for One, One for All -- 1 Reviewing Options -- How to Review Options -- Three Perspectives in Reviewing Options -- Reviewing with Both a Cool Head and a Burning Passion -- 2 Reviewing and Selecting Options 1: Rationality -- The Main Points in Reviewing Rationally -- How to Review Each Point -- 3 Reviewing and Selecting Options 2: Feasibility -- The Main Points in Reviewing the Feasibility -- How to Review Each Point -- 4 Reviewing and Selecting Options 3: The Intents and Expectations of the Parties Involved -- Fostering Agreement and Understanding with "Face‐to‐face Discussions" -- The Groundwork for Discussions: Situation Analysis and Strategic Options -- Which Reviewed Points to Prioritize -- How to Understand and Decide on the Results -- How to Expand Options -- Making Decisions Based on What You Want to Do -- Always Have a Plan B Ready -- STEP 4: How to Translate Options into Plans and Actions -- STORY 5: What Becomes of a Strategy -- 1 How to Translate Strategic Options into a Plan -- The Necessary Process in Executing the Strategy -- 2 How to Apply Strategy to Execution -- How to Apply Strategy to Execution -- Setting Priorities -- 3 How to Carry Out Strategic Options -- Beyond the Possibility: Feeling and Determining -- The First Step in Strategic Execution -- 4 Create a Plan of Action -- The Master Plan: The Plan of Action for Strategic Execution -- Coming Up with a Realistically Applicable Plan -- 5 How to Execute with Certainty -- Establish a Driving Force -- Implement a Thorough PDCA -- Postscript -- Author and Editor -- Author -- About Roland Berger…”
Libro electrónico -
7504Publicado 2023Tabla de Contenidos: “…Chapter 18 The Ecosystem: Surprising and Remarkable Partnerships -- Designing for Inevitability: An Ecosystemic Discipline -- Building an Ecosystem -- Maintaining versus Sustaining an Ecosystem -- Surprising and Remarkable Partnerships within an Organization -- Part Seven Create a More Human Future -- Chapter 19 Beyond Pilot Purgatory -- Pilots within Social Systems -- Riskless Experimentation -- Piloting the Path to Promotion -- Human-Centered Transformation -- Note -- Chapter 20 Storytelling: Leading Social Systems -- Storytelling as a Strategic Organizational Imperative -- Closing the Story Circle -- Storytelling as an Agent for Change -- Chapter 21 A More Human Organization -- Notes -- Part Eight Autonomous Transformation Technologies -- Chapter 22 Autonomous Transformation Technologies: A Leader's Guide -- Autonomous Transformation Example 1: Product Development -- Autonomous Transformation Example 2: Global Logistics -- Autonomous Transformation Example 3: Health Care -- A Note on Blockchain -- Notes -- Chapter 23 A Deeper Dive into Artificial Intelligence -- The Components of Artificial Intelligence -- Analytics -- Descriptive Analytics: What does my data tell me has happened/is happening? …”
Libro electrónico -
7505Publicado 2023Tabla de Contenidos: “…Insulating Myself and Taking On a College-Based Administrative Role (2006-2012) -- The Final Period at CityU (2013-2020) -- Professional Growth in the Field of Business Communication -- Professional Recognition Beyond the Department and the University -- ABC Support Network -- Stage 3: Maturity Stage (2020 Onwards) -- Concluding Remarks and Suggestions for Young Scholars -- Perseverance, Determination, and Focus -- Flexibility -- Networking -- References -- Acknowledgments -- Index…”
Libro electrónico -
7506Publicado 2023Tabla de Contenidos: “…-- Summary -- Questions -- Chapter 9: Shor's Algorithm -- Technical requirements -- A popular encryption scheme -- An example of RSA encryption -- How Shor's algorithm works -- The role of a period in factoring a number -- Repeated squaring -- Complex numbers -- Complex number basics -- Unitary matrices -- The connection between complex numbers and circles -- Finding a sequence's period -- The QFT matrix -- Shoring up your knowledge -- Illustrating Shor's algorithm with Qiskit code -- Testing the QFT -- Another implementation of Shor's algorithm -- Summary -- Further reading -- Questions -- Part 4: Beyond Gate-Based Quantum Computing -- Chapter 10: Some Other Directions for Quantum Computing -- What is reducibility? …”
Libro electrónico -
7507por Tezuysal, AlkinTabla de Contenidos: “…Part 3: Core Concepts in Database Design -- Chapter 4: Mastering the Building Blocks of Database Design and Modeling -- Understanding database objects -- Understanding data types and constraints -- Keys and how to use them -- Database checks and constraints -- Check constraint -- Default constraint -- Not null constraint -- Checking data quality with constraints -- No date in the future -- Value within a specific range -- How to avoid redundancy -- Database consistency and beyond -- Transactions - ensuring data integrity -- Concurrency control - managing multiple users -- PostgreSQL -- MySQL -- Summary -- Part 4: Advanced Database Techniques -- Chapter 5: Advanced Techniques for Advanced Databases -- Creating custom views of your data -- Understanding the purpose of views -- The advantages of using views in database management -- Indexing - how to find data faster -- Understanding indexing -- Types of indexes -- How indexing works -- PostgreSQL indexes -- MySQL indexes -- Stored procedures - reusable code for your database -- UDFs -- The essence of UDFs -- Efficiency through reusability - the role of UDFs in code optimization -- UDFs and performance optimization in database operations -- Using UDFs to enrich SQL queries for expressive interactions -- Practical insights into UDFs in MySQL and PostgreSQL -- Understanding CTEs -- The role of CTEs in code modularity -- Components and integration of CTEs -- Guidelines for efficient CTE usage -- Advanced strategies with CTEs -- Case studies in action - real-world examples of CTE transformations -- Summary -- Chapter 6: Understanding Database Scalability -- Introducing database scaling -- Challenges in database scaling -- Primary methods of database scaling -- Vitess - a horizontal scaling solution for MySQL -- Citus - a horizontal scaling solution for PostgreSQL…”
Publicado 2024
Libro electrónico -
7508Publicado 2018Tabla de Contenidos: “….: approaching Butoh at sites of personal and cultural resistance / Jeremy Neideck --Butoh's genders: dressed men, girly women, and skinny drag / Katherine Mezur -- Death rituals and survival acts: Hata-Kanoko's "Butoh action" and alternative Inter-Asian transnationalism / Chiayi Seetoo-- When the revolt of the flesh becomes political protest: the Nomadic tactics of Butoh-inspired interventions / Carla Melo -- Butoh beyond the body: an interview with Shakina Nayfack On transition, evolution and the spirit at war / Jacqueline Marie Shannon -- Critical Butoh and the colonial matrix of power / Miki Seifert -- The daily practice of Hijikata Tatsumi's apprentices from 1969 to 1978 / Caitlin Coker -- Butoh pedagogy in historical and contemporary practice / Tanya Calamoneri -- Waguri Yukio's Butoh Kaden: taking stock of Hijikata's Butoh notation / Rosa van Hensbergen -- A flower of butoh: my daily dance with Kazuo Ohno (1995-2012) / Maureen Momo Freehill -- On and through the Butoh body / Katherine Adamenko -- My Dairakudakan experience / Julia A. …”
Libro electrónico -
7509Publicado 1996Tabla de Contenidos: “…-- IMPLICATIONS FOR HEALTHCARE AND OTHER POLICIES -- QUESTIONS FOR FUTURE RESEARCH -- References -- I Overview of Demographic and Health Conditions -- 2 The Size and Distribution of the American Indian Population: Fertility, Mortality, Migration, and Residence -- REVIEW OF THE LITERATURE -- Fertility -- Mortality -- Migration -- SOME OBSERVATIONS ABOUT THE DATA -- Fertility and Mortality Data -- Migration Data -- FERTILITY -- Age at First Birth -- Children Ever Born -- Tribal Differences in Children Ever Born -- Residential Differences in Children Ever Born -- MORTALITY -- Summary Measures of Mortality -- Infant Mortality -- Leading Causes of Death -- POPULATION DISTRIBUTION AND MIGRATION -- Regional Distribution -- Place of Residence: Urban and Rural Population -- Place of Residence: Reservation Populations -- Migration -- CONCLUDING REMARKS -- References -- 3 Recent Health Trends In The Native American Population -- INTRODUCTION -- METHODOLOGICAL ISSUES -- OVERALL TRENDS -- RELATIVE RISKS -- REGIONAL VARIATIONS -- HEALTH DETERMINANTS -- CONCLUSIONS -- References -- II Identification: Indications and Consequences -- 4 The Growing American Indian Population, 1960-1990: Beyond Demography -- INTRODUCTION -- Data Collection Methods -- Overview of the Chapter -- NATIONAL DEMOGRAPHIC FACTORS -- Population Size and Growth Rate -- Error of Closure -- SOURCES OF NONDEMOGRAPHIC INCREASE -- Ancestry and Race…”
Libro electrónico -
7510Publicado 2018Tabla de Contenidos: “…Machine generated contents note: Dedication 6 Preface to the Second Edition 7 PART 1: Introduction: Lessons from Top Tech Companies 9 Chapter 1: Behind Every Great Product 11 Chapter 2: Technology-Powered Products and Services 12 Chapter 3: Startups: Getting to Product/Marketing Fit 13 Chapter 4: Growth-Stage Companies: Scaling to Success 14 Chapter 5: Enterprise Companies: Consistent Product Innovation 15 Chapter 6: The Root Causes of Failed Product Efforts 16 Chapter 7: Beyond Lean and Agile 21 Chapter 8: Key Concepts 23 Breakout: Minimum Viable Product 26 PART 2: The Right People 27 Product Teams 28 Chapter 9: Principles of Strong Product Teams 29 Breakout: Principles and Techniques 35 Chapter 10: The Product Manager 36 Breakout: Product Manager vs. …”
Libro electrónico -
7511Publicado 2022Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
Libro electrónico -
7512Publicado 2022Tabla de Contenidos: “…-- 5.3 Avoiding copying using remote DMA -- 5.3.1 Avoiding copying in a cluster -- 5.3.2 Modern-day incarnations of RDMA -- Fiber channel -- Infiniband -- iSCSI via iWarp and RoCE -- 5.4 Broadening to file systems -- 5.4.1 Shared memory -- 5.4.2 IO-lite: A unified view of buffering -- 5.4.3 Avoiding file system copies via I/O splicing -- 5.5 Broadening beyond copies -- 5.6 Broadening beyond data manipulations -- 5.6.1 Using caches effectively -- Data Cache Optimization -- Code arrangement -- Locality-driven layer processing -- Software engineering considerations -- 5.6.2 Direct memory access versus programmed I/O -- 5.7 Conclusions -- 5.8 Exercises -- 6 Transferring control -- 6.1 Why control overhead? …”
Libro electrónico -
7513Publicado 2023Tabla de Contenidos: “…-- 1.5.1 Speed -- 1.5.2 Resilience -- 1.5.3 Scale -- 1.5.4 Cost -- 1.6 Cloud native topologies -- 1.6.1 Containers -- 1.6.2 Orchestration -- 1.6.3 Serverless -- 1.7 Architectures for cloud native applications -- 1.7.1 From multi-tiered to microservices architectures and beyond -- 1.7.2 Service-based architecture for cloud native applications -- Summary -- 2 Cloud native patterns and technologies -- 2.1 Cloud native development principles: 12 Factors and beyond -- 2.1.1 One codebase, one application -- 2.1.2 API first -- 2.1.3 Dependency management -- 2.1.4 Design, build, release, run -- 2.1.5 Configuration, credentials, and code -- 2.1.6 Logs -- 2.1.7 Disposability -- 2.1.8 Backing services -- 2.1.9 Environment parity -- 2.1.10 Administrative processes -- 2.1.11 Port binding -- 2.1.12 Stateless processes…”
Libro electrónico -
7514Publicado 2023Tabla de Contenidos: “…-- 10.3 Variance of the Solvency Position -- 10.4 Characteristics of Various Asset Classes and Liabilities -- 10.5 Our Scenarios -- 10.6 Results -- 10.7 Simulations -- 10.8 Exercise and Discussion - an Insurer With Predominately Short-Term Liabilities -- 10.9 Potential Exercise -- 10.10 Conclusions -- 10.11 Recommended Reading -- 11 Hedging: Protecting Against a Fall in Equity Markets -- 11.1 Introduction -- 11.2 Our Example -- 11.2.1 Futures Contracts - A Brief Explanation -- 11.2.2 Our Task -- 11.3 Adopting a Better Hedge -- 11.4 Allowance for Contract and Portfolio Sizes -- 11.5 Negative Hedge Ratio -- 11.6 Parameter and Model Risk -- 11.7 A Final Reminder on Hedging -- 11.8 Recommended Reading -- 12 Immunisation - Redington and Beyond -- 12.1 Introduction -- 12.2 Outline of Redington Theory and Alternatives -- 12.3 Redington's Theory of Immunisation -- 12.4 Changes in the Shape of the Yield Curve -- 12.5 A More Realistic Example -- 12.5.1 Determining a Suitable Bond Allocation -- 12.5.2 Change in Yield Curve Shape -- 12.5.3 Liquidity Risk -- 12.6 Conclusion -- 12.7 Recommended Reading -- 13 Copulas -- 13.1 Introduction -- 13.2 Copula Theory - The Basics -- 13.3 Commonly Used Copulas -- 13.3.1 The Independent Copula -- 13.3.2 The Gaussian Copula -- 13.3.3 Archimedian Copulas -- 13.3.4 Clayton Copula -- 13.3.5 Gumbel Copula -- 13.4 Copula Density Functions…”
Libro electrónico -
7515Publicado 2017Tabla de Contenidos: “…-- Five Dilemmas to Be Managed during Exchanges -- Starting and Stopping the Exchange Process -- After the Exchange: Checking Out the Process -- Making Satisfactory Exchanges and Avoiding Self-Traps -- Note -- Part III: Practical Applications of Influence -- Chapter 8: Gender and Influence: Beyond Stereotypes (Coauthor, Nan Langowitz) -- Introduction -- Conclusions -- Notes -- Chapter 9: Influencing Your Boss -- The Approach…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
7516Publicado 2017Tabla de Contenidos: “…A Final Word on Analytics -- Next -- Notes -- Part TWO Agile Methods and Analytics -- Chapter 4: A Better Way to Work: The Benefits and Core Values of Agile Development -- The Case against Traditional Analytics Projects -- Understandable but Pernicious -- A Different Mind-Set at Netflix -- Proving the Superiority of Agile Methods -- The Case for Guidelines over Rules -- Scarcity and Trade-Offs on Agile Projects -- The Specific Tenets of Agile Analytics -- Next -- Notes -- Chapter 5: Introducing Scrum: Looking at One of Today's Most Popular Agile Methods -- A Very Brief History -- Scrum Teams -- Product Owner -- Scrum Master -- Team Member -- User Stories -- Epics: Too Broad -- Too Narrow/Detailed -- Just Right -- The Spike: A Special User Story -- Backlogs -- Sprints and Meetings -- Sprint Planning -- Daily Stand-Up -- Story Time -- Demo -- Sprint Retrospective -- Releases -- Estimation Techniques -- On Lawns and Relative Estimates -- Fibonacci Numbers -- T-Shirt Sizes -- When Teams Disagree -- Other Scrum Artifacts, Tools, and Concepts -- Velocities -- Burn-Down Charts -- Definition of Done and Acceptance Criteria -- Kanban Boards -- Next -- Chapter 6: A Framework for Agile Analytics: A Simple Model for Gathering Insights -- Perform Business Discovery -- Perform Data Discovery -- Prepare the Data -- Model the Data* -- The Power of a Simple Model -- Forecasting and the Human Factor -- Understanding Superforecasters -- Score and Deploy -- Evaluate and Improve -- Next -- Notes -- Part THREE: Analytics in Action -- Chapter 7: University Tutoring Center: An In-Depth Case Study on Agile Analytics -- The UTC and Project Background -- Project Goals and Kickoff -- User Stories -- Business and Data Discovery -- Iteration One -- Iteration Two -- Analytics Results in a Fundamental Change -- Moving Beyond Simple Tutor Utilization…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
7517Publicado 2018Tabla de Contenidos: “…About the Authors xvii -- Preface xix -- Acknowledgments xxi -- 1 LTE and LTE-A Overview 1 -- 1.1 Introduction 1 -- 1.2 Link Spectrum Efficiency 3 -- 1.3 LTE-Advanced and Beyond 4 -- 1.4 Evolved Packet System (EPS) Overview 9 -- 1.5 Network Architecture Evolution 11 -- 1.6 LTE UE Description 14 -- 1.7 EPS Bearer Procedures 15 -- 1.8 Access and Non-access Stratum Procedures 20 -- 1.9 LTE Air Interface 26 -- 1.10 OFDM Signal Generation 32 -- 1.11 LTE Channels and Procedures 34 -- 1.12 Uplink Physical Channels 43 -- 1.13 Physical Layer Procedures 45 -- 1.14 RRC Layer and Mobility Procedures 51 -- 1.15 LTE Idle Mode Mobility Procedures 60 -- 1.16 LTE Connected Mode Mobility Procedures 68 -- 1.17 Interworking with Other 3GPP Radio Access 76 -- References 86 -- 2 Introduction to the IP Multimedia Subsystem (IMS) 87 -- 2.1 Introduction 87 -- 2.2 IMS Network Description 91 -- 2.3 IMS Identities and Subscription 131 -- 2.4 IMS Architecture and Interfaces 134 -- 2.5 MMTel (Multimedia Telephony) Services 136 -- 2.6 Service Centralization and Continuity AS (SCC AS) 141 -- 2.7 Operator X IMS-VoLTE Architecture 145 -- 3 VoLTE/CSFB Call Setup Delay and Handover Analysis 158 -- 3.1 Overview 158 -- 3.2 Introduction 158 -- 3.3 CSFB Call Flow and Relevant KPIs 160 -- 3.4 VoLTE Call Flow and Relevant KPIs 162 -- 3.5 VoLTE Handover and Data Interruption Time 166 -- 3.6 Single Radio Voice Call Continuity (SRVCC) 169 -- 3.7 Performance Analysis 171 -- 3.8 Latency Reduction During Handover 182 -- 3.9 Practical Use Cases and Recommendations 187 -- 3.10 Conclusions 190 -- References 195 -- 4 Comprehensive Performance Evaluation of VoLTE 197 -- 4.1 Overview 197 -- 4.2 Introduction 197 -- 4.3 VoLTE Principles 198 -- 4.4 Main VoLTE Features 200 -- 4.5 Testing Environment and Main VoLTE KPIs 203 -- 4.6 VoLTE Performance Evaluation 204 -- 4.7 EVS Coding and Voice Evolution 214 -- 4.8 TTI Bundling Performance Evaluation 219 -- 4.9 BLER Impact on Voice Quality 220 -- 4.10 Scheduler Performance 220.…”
Libro electrónico -
7518Publicado 2021Tabla de Contenidos: “…-- A New Approach -- Beyond JDBC -- R2DBC Implementations -- Embracing Reactive Programming -- Enabling Vendor Creativity -- Enforcing Compliance -- Reactive Streams -- Another Specification -- API Fundamentals -- Processors -- JVM Interfaces -- Implementations -- Summary -- Part II: The R2DBC Service-Provider Interface -- Chapter 3: The Path to Implementation -- The Database Landscape -- Power in Simplicity -- R2DBC Compliance -- Guiding Principles -- Specification Implementation Requirements -- Specification Extensions -- Wrapped Interfaces -- Closeable Interfaces -- Testing and Validation -- Summary -- Chapter 4: Connections -- Establishing Connections -- The Anatomy -- R2DBC Hindsight -- Connection Factory -- Driver Implementations -- Exposing Metadata -- ConnectionFactories -- Discovery -- Bringing It All Together -- Connections -- Obtaining Connections -- Acquiring Metadata -- Validating Connections -- Closing Connections -- Summary -- Chapter 5: Transactions -- Transaction Fundamentals -- The Need for Transactions -- ACID Compliance -- Methods of Control -- Committing Transactions -- Rolling Back Transactions -- Savepoints -- R2DBC Transaction Management -- Auto-commit Mode -- Explicit Transactions -- Committing Transactions -- Rolling Back Transactions -- Managing Savepoints -- Releasing Savepoints…”
Libro electrónico -
7519Publicado 2021Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with the Samsung Galaxy S21 -- Chapter 1 Exploring What You Can Do with Your Phone -- Discovering the Basics of Your Phone -- Taking Your Phone to the Next Level: The Smartphone Features -- Internet access -- Photos -- Wireless email -- Multimedia -- Customizing Your Phone with Games and Applications -- Downloading games -- Downloading applications -- What's cool about the Android platform -- Surviving Unboxing Day -- Chapter 2 Beginning at the Beginning -- First Things First: Turning On Your Phone -- Charging Your Phone and Managing Battery Life -- Navigating the Galaxy S21 -- The phone's hardware buttons -- The touchscreen -- The extended Home screen -- The notification area and screen -- The Device Function keys -- The keyboard -- The orientation of the phone -- Going to Sleep Mode/Turning Off the Phone -- Part 2 Communicating with Other People -- Chapter 3 Calling People -- Making Calls -- Answering Calls -- Keeping Track of Your Calls: The Recents -- Making an Emergency Call: The 411 on 911 -- Syncing a Bluetooth Headset -- Options Other than Headsets -- Chapter 4 Discovering the Joy of Text -- Sending the First Text Message -- Carrying on a Conversation via Texting -- Sending an Attachment with a Text -- Receiving Text Messages -- Managing Your Text History -- Chapter 5 Sending and Receiving Email -- Setting Up Your Email -- Getting ready -- Setting up your existing Gmail account -- Setting up a new Gmail account -- Working with non-Gmail email accounts -- Setting up a corporate email account -- Reading Email on Your Phone -- Writing and Sending Email -- Replying to and Forwarding Email -- Chapter 6 Managing Your Contacts…”
Libro electrónico -
7520Publicado 2022Tabla de Contenidos: “…-- 1.4 Trade Too Can Harm the Environment -- 1.5 Assessing Environmental Impacts -- 1.6 Maquiladoras, Hazardous Waste, and the Pollution Haven Package -- 1.7 This Is Not Solely an International Story -- 2 Finding Balance -- 2.1 Free Traders and Environmentalists: Together at Last -- 2.2 The Committee on Trade and Environment: wto's 'Softer' Version of Institutional Integration -- 2.3 Seven 'Faceless Foreign Judges' -- 2.4 Finding Balance through Interpretation -- 2.5 ftas and the Introduction of 'Updated' Exceptions -- 2.6 An Exception and Nothing More -- 3 Beyond Exceptions -- 3.1 The (Not So) Thin Line between Exceptions and Exemptions -- 3.2 The Right to Protect the Environment -- 3.3 fta s' Environmental Framework -- 3.3.1 Environmental Principles -- 3.3.2 Environmental Obligations -- 3.3.3 Dispute Settlement -- 3.4 The Road Ahead -- 5 Can Trade Work for the Environment? …”
Libro electrónico