Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 48
- Engineering & Applied Sciences 40
- Application software 37
- Computer Science 29
- Management 29
- Python (Computer program language) 29
- Operating systems (Computers) 27
- Finance 26
- Investments 26
- Business & Economics 24
- Database management 23
- Computer networks 22
- History 22
- Cloud computing 21
- Computer software 20
- Examinations 20
- Microsoft Windows (Computer file) 20
- Programming 20
- Computer programming 19
- Computer security 19
- Economic conditions 19
- Security measures 18
- Computer programs 16
- Crisis económicas 16
- Financial crises 16
- Data processing 15
- Design 15
- Web site development 15
- Web sites 15
- JavaScript (Computer program language) 14
-
741Publicado 2018Tabla de Contenidos: “…Disk throughput in case of sequential read and write -- Bonnie++ -- Bonnie++ 2.0 -- Bonnie++ ZCAV -- sysbench -- pgbench -- Seek rate -- Removing test files -- fsync commit rate -- Complicated disk benchmarks -- Sample disk results -- Disk performance expectations -- Sources of slow disk and array performance -- Summary -- Chapter 4: Disk Setup -- Maximum filesystem sizes -- Filesystem crash recovery -- Journaling filesystems -- Linux filesystems -- ext2 -- ext3 -- ext4 -- XFS -- Benchmarks -- Other Linux filesystems -- Write barriers -- Drive support for barriers -- Filesystem support for barriers -- General Linux filesystem tuning -- Read-ahead -- File access times -- Read caching and swapping -- Write cache sizing -- I/O scheduler elevator -- Solaris and FreeBSD filesystems -- Solaris UFS -- FreeBSD UFS2 -- ZFS -- Windows filesystems -- FAT32 -- NTFS -- Adjusting mounting behavior -- Disk layout for PostgreSQL -- Symbolic links -- Tablespaces -- Database directory tree -- Temporary files -- Disk arrays, RAID, and disk layout -- Disk layout guidelines -- Summary -- Chapter 5: Memory for Database Caching -- Memory units in postgresql.conf -- Increasing Unix shared memory parameters for larger buffer sizes -- Kernel semaphores -- Estimating shared memory allocation -- Inspecting the database cache -- Installing pg_buffercache into a database -- Database disk layout -- Creating a new block in a database -- Writing dirty blocks to disk -- Crash recovery and the buffer cache -- Checkpoint processing basics -- Write-ahead log and recovery processing -- Checkpoint timing -- Checkpoint spikes -- Spread checkpoints -- Database block life cycle -- Dirty block write paths -- Database buffer cache versus operating system cache -- Doubly cached data -- Inspecting the OS cache -- Checkpoint overhead -- Starting size guidelines…”
Libro electrónico -
742Publicado 2024Tabla de Contenidos: “…-- Syntax errors -- Runtime errors -- Exercise 6.01 - runtime errors while adding numbers -- Semantic errors -- Exercise 6.02 - a semantic error with walking distance -- Error handling using other programming languages -- Error interface type -- Creating error values -- Exercise 6.03 - creating an application to calculate pay for the week -- Panic -- Exercise 6.04 - Crashing the program on errors using a panic -- Recover -- Exercise 6.05 - recovering from a panic -- Guidelines when working with errors and panics -- Error wrapping -- Activity 6.01 - creating a custom error message for a banking application -- Activity 6.02 - validating a bank customer's direct deposit submission -- Activity 6.03 - panic on invalid data submission -- Activity 6.04 - preventing a panic from crashing the app…”
Libro electrónico -
743Publicado 2022Tabla de Contenidos: “…Chapter Summary -- References and Further Reading -- Chapter 17 Principles of Corporate Governance1 -- Effective Bank Corporate Governance: Conclusions from the 2008 Bank Crash -- Market Observations -- Conclusion -- Policy Recommendations -- Management Structure -- Governance and Sustainable Banking -- Chapter Summary -- References -- PART V Principles of Risk Management and Regulation -- Chapter 18 The Risk Management Framework -- Risk Exposures in Banking -- Macro-Level Risk Management and Strategy -- Risk Management Framework Template -- Example of Board-Level Ras -- A Final Word -- Chapter Summary -- Reference -- Chapter 19 Credit Risk Assessment and Reporting Principles -- Drivers of Credit Risk -- Portfolio Risk Reporting -- Risk Policy -- Product Line Risk Reporting -- Business Line Reporting -- Chapter Summary -- Reference -- Chapter 20 Stress Testing, ICAAP, ILAAP and Reverse Stress Testing1 -- Stress Testing Policy -- Sample Stress Test Results -- Scenario Analysis: Economic Downturn Stress Test Report -- Liquidity Stress Test Reports -- Internal Capital Adequacy Assessment Process (ICAAP) -- Internal Liquidity Adequacy Assessment (ILAAP) -- Reverse Stress Testing: Definition, Approach and Relevance -- Chapter Summary -- Reference -- Chapter 21 Recovery Planning and Resolution Planning -- Recovery Planning and Resolution Planning1 -- Conclusion -- Chapter Summary -- Reference -- Chapter 22 Sustainable Banking and Climate Change Risk Management -- Sustainable Banking and Green Banking -- Climate Change Risk Management -- Chapter Summary -- Reference -- Chapter 23 Case Studies: Analysis, Problem Solving and Decision Making -- Coherent Advice and Problem Solving: Case Studies -- Appendix 23.1 -- Chapter 24 Everything Changes, and Nothing Changes: Excerpts from a Timeless Work1 -- Core Principles of Banking -- The Balance Sheet is Everything…”
Libro electrónico -
744Publicado 2017Tabla de Contenidos: “…. -- Chapter 0: A Shell Scripts Crash Course -- What Is a Shell Script, Anyway? -- Running Commands -- Configuring Your Login Script -- Running Shell Scripts -- Making Shell Scripts More Intuitive -- Why Shell Scripts? …”
Libro electrónico -
745Publicado 2013Tabla de Contenidos: “…ASM and OS Migration -- Important Points on ASM Rebalance -- Summary -- Chapter 9: ASM Operations -- ASM Instance Discovery -- RDBMS Operations on ASM Files -- File Create -- File Open -- File I/O -- File Close -- File Delete -- ASM File Allocation -- External Redundancy Disk Groups -- Variable-Sized Extents -- ASM Striping -- ASM Redundancy -- Failure Groups -- Disk Partners -- Allocation with ASM Redundancy -- I/O to ASM Mirrored Files -- Rebalance -- Resync -- Relocation -- ASM Instance Recovery and Crash Recovery -- Disk Discovery -- Mount Disk Group -- Create Disk Group -- Add Disk -- Online Disk -- Select from VASM_DISK and VASM_DISKGROUP -- Summary -- Chapter 10: ACFS Design and Deployment -- ASM Cluster File System Overview -- ACFS File System Design -- ACFS File I/O -- ACFS Space Allocation -- Distributed Lock Manager (DLM) -- Metadata Buffer Cache -- Recovery -- ADVM Design -- ACFS Configuration and Deployment -- Configuring the Environment for ACFS -- ACFS Deployment -- CRS Managed ACFS File Systems -- Managing ACFS and ADVM -- ACFS File System Resize -- Unmounting File Systems -- Deleting File Systems -- ADVM Management -- ACFS Management -- Summary -- Chapter 11: ACFS Data Services -- ACFS Snapshots -- ACFS Read-Only Snapshots -- ACFS Read-Write Snapshots -- ACFS Snapshot by Example -- ACFS Tagging -- ACFS Replication Overview -- Primary File System -- Current Restrictions (11.2.0.3) -- Standby File System -- Planning for ACFS Replication -- Tagging Considerations -- Setting Up Replication -- Replication Configuration and Initiation -- Pause and Resume Replication -- Sizing ACFS File Systems -- ACFS Compare Command -- Termination of Replication -- ACFS Security and Encryption -- Databases and Security -- ACFS Security -- Databases and Encryption -- ACFS and File Encryption -- ACFS Encryption Key Management…”
Libro electrónico -
746Publicado 2022Tabla de Contenidos: “…-- Top 10 Reasons to Be a Member of a Professional Association(s) -- Use Collaboration to Exponentially Increase Your Productivity -- Mentoring Pays Boomerang Dividends -- The Clydesdale Teamwork Analogy -- Chapter 11 Be a People Person: A Crash Course and Self-Help Guide…”
Libro electrónico -
747Publicado 2021Tabla de Contenidos: “…-- Partition Problem and Solve Sequentially -- Building the Menu -- Use the Strictest Assertions Possible -- Use the Clearest Assertion Possible -- Don't Let the Tests Crash -- Test Naming Conventions -- Red, Green, and Don't Forget Refactor -- Wiring Up the UI -- Pure Functions -- Key Takeaways -- Chapter 5: Changing Tests with Fixtures -- The Hidden Cost of Source Changes -- Fixtures -- Fixtures vs. …”
Libro electrónico -
748por Viega, JohnTabla de Contenidos: “…Disabling Memory Dumps in the Event of a Crash; 1.9.2. Solution; 1.9.3. Discussion…”
Publicado 2003
Libro electrónico -
749por Burleson, Donald K.Tabla de Contenidos: “…Remove a Held Semaphore After a Crash; 1.9. System Log Messages; 1.9.2. Show Server Log in AIX; 1.10. …”
Publicado 2001
Libro electrónico -
750por Peterson, Steven P.Tabla de Contenidos: “…Machine generated contents note: Preface Acknowledgments Chapter 1: Discount Rates and Returns Estimating Returns Geometric and Arithmetic Averages Caveats to Return Extrapolation Discounting Present Values of Cash Flow Streams Internal Rate of Return and Yield to Maturity Real and Nominal Returns Summary Chapter 2: Fixed Income Securities Coupon Bearing Bonds Infinite Cash Flow Streams (Perpetuities) General Pricing Formulas for Finite Cash Flow Streams Interest Rate Risk Analysis of Duration Interest Rate Risk Dynamics Immunization and Duration Applications - Liability Discounting and Cash Matching Pension Logic Risky Coupons Inflation Risk and TIPS A Bond Portfolio Strategy (Optional) Summary Appendix 2.1: Solving Infinite and Finite Power Series References Chapter 3: Term Structure Discounting Using Spot Rates Forward Rates NPV revisited Short Rates The Bootstrap Method Duration Redux Summary Chapter 4: Equity The Determination of Stock Prices Discount Rates Redux Price and Dividend Multiples Extrapolating Multiples to Forecast Returns Pitfalls of Trend Analysis The Gordon Growth Model Sources of Return Summary References Chapter 5: Portfolio Construction Stochastic Returns and Risk Diversification The Efficient Frontier Markowitz Portfolio Selection Criteria Capital Market Line and the CAPM Performance Evaluation Summary Appendix 5.1: Statistical Review Appendix 5.2: Risk Adjusted Performance References Chapter 6: Optimal Portfolios Portfolio 1: Minimum Variance Portfolio (Fully Invested) Portfolio 2: Minimum Variance Portfolios with Targeted Return Portfolio 3: Minimum Variance Portfolios with No Short Sales Portfolio 4: Minimum Variance Portfolios with Capped Allocations Portfolio 5: Maximum Risk-Adjusted Return Performance Attribution The Efficient Frontier (Again) Summary Appendix 6.1: Matrix Operations Chapter 7: Data and Applications Analyzing Returns on a Ten Asset Portfolio Performance Attribution Changing the Investment Horizon Benchmarking to the Market Portfolio The Cost of Constraints A Bond Strategy Summary Chapter 8: Anomalies Deviations from the CAPM Behavioral Finance Summary References Chapter 9: Factor Models Arbitrage Pricing Theory (APT) Factor Selection Model Estimation Principal Components Applications and Examples Summary References Chapter 10: Active Portfolio Management Active Portfolio Construction and Attribution Analysis Performance Attribution Summary Appendix 10.1: Active Space Chapter 11: Risk The Failure of VaR Taxonomy of Risk Visualizing Risk Estimating Volatilities Maximum Likelihood Estimation (Optional) Credit Risk Adjusting for Leverage Adjusting for Illiquidity Other Risks Summary References Chapter 12: Monte Carlo Methods Example 1: Generating Random Numbers - Estimating pi Example 2: Confirming the Central Limit Theorem Example 3: Credit Default Risk Non-Normal Distributions The Gaussian Copula Summary References Chapter 13: Systemic Risk Extreme Value Theory Estimating the Hazards of Downside Risks A Systemic Risk Indicator Summary References Chapter 14: Incorporating Subjective Views Methodological Concepts An Example using Black-Litterman Active Space Risk Attribution Summary References Chapter 15: Futures, Forwards, and Swaps Institutional Detail and Futures Mechanics The Relationship between Spot Prices and Forward (Futures) Prices Hedging Basis Risk Hedging Portfolio Risk Futures Pricing Swaps Summary References Chapter 16: Introduction to Options Option Payoffs and Put-Call Parity Pricing European Call Options Pricing European Put Options Option Strategies Real Options Summary References Chapter 17: Models of Stock Price Dynamics Stock Price Dynamics Ito Processes Lognormal Stock Prices Deriving the Parameters of the Binomial Lattice Black-Scholes-Merton Model The Greek Letters Monte Carlo Methods Summary Appendix 17.1: Derivation of Ito's Lemma Chapter 18: Hedging Portfolio Risk Simple Hedging Strategies S&P 500 Index Puts Selling Volatility VIX Calls Liability Driven Investment Summary References Chapter 19: Private Equity The Private Equity Model Return and Risk Methodology Summary Appendix 19.1: CAPM References Chapter 20: Structured Credit Securitization Credit Enhancement Basics of Pricing Interest Rate Derivatives Interest Rate Dynamics CDO Valuation The Crash of the Housing Bubble Summary References Chapter 21: Optimal Rebalancing Trigger Strategies and No-trade Regions An Optimal Control Problem Implications Optimal Rebalancing in a Static Optimization Model The Comparative Statics of Transactions Costs References Chapter 22: Data Problems* Covariance Estimation An Example Empirical Results Overlapping Observations Conclusions Appendix 22.1: Covariance Matrix Estimation Removing the effects of smoothing References About the Author Index…”
Publicado 2012
Libro electrónico -
751Publicado 2019Tabla de Contenidos: “…7.2 Managing multiple to-do lists -- 7.2.1 Implementing a cache -- 7.2.2 Writing tests -- 7.2.3 Analyzing process dependencies -- 7.3 Persisting data -- 7.3.1 Encoding and persisting -- 7.3.2 Using the database -- 7.3.3 Analyzing the system -- 7.3.4 Addressing the process bottleneck -- 7.3.5 Exercise: pooling and synchronizing -- 7.4 Reasoning with processes -- Summary -- 8 Fault-tolerance basics -- 8.1 Runtime errors -- 8.1.1 Error types -- 8.1.2 Handling errors -- 8.2 Errors in concurrent systems -- 8.2.1 Linking processes -- 8.2.2 Monitors -- 8.3 Supervisors -- 8.3.1 Preparing the existing code -- 8.3.2 Starting the supervisor process -- 8.3.3 Child specification -- 8.3.4 Wrapping the supervisor -- 8.3.5 Using a callback module -- 8.3.6 Linking all processes -- 8.3.7 Restart frequency -- Summary -- 9 Isolating error effects -- 9.1 Supervision trees -- 9.1.1 Separating loosely dependent parts -- 9.1.2 Rich process discovery -- 9.1.3 Via tuples -- 9.1.4 Registering database workers -- 9.1.5 Supervising database workers -- 9.1.6 Organizing the supervision tree -- 9.2 Starting processes dynamically -- 9.2.1 Registering to-do servers -- 9.2.2 Dynamic supervision -- 9.2.3 Finding to-do servers -- 9.2.4 Using temporary restart strategy -- 9.2.5 Testing the system -- 9.3 "Let it crash" -- 9.3.1 Processes that shouldn't crash -- 9.3.2 Handling expected errors -- 9.3.3 Preserving the state -- Summary -- 10 Beyond GenServer -- 10.1 Tasks -- 10.1.1 Awaited tasks -- 10.1.2 Non-awaited tasks -- 10.2 Agents -- 10.2.1 Basic use -- 10.2.2 Agents and concurrency -- 10.2.3 Agent-powered to-do server -- 10.2.4 Limitations of agents -- 10.3 ETS tables -- 10.3.1 Basic operations -- 10.3.2 ETS powered key/value store -- 10.3.3 Other ETS operations -- 10.3.4 Exercise: process registry -- Summary -- 11 Working with components -- 11.1 OTP applications…”
Libro electrónico -
752por Hart-Davis, GuyTabla de Contenidos: “…Using Dictation and Spoken Content -- Using Dictation -- Make the Spoken Content Feature Read Text Aloud -- Hear Alerts from Spoken Content -- Configure and Invoke Siri -- Configure and Invoke Siri -- Configure Siri -- Invoke Siri -- Perform Tasks with Siri -- Remove Apps -- Remove Apps -- Remove an App Using Launchpad -- Remove an App Using the Applications Folder -- Identify Problem Apps -- Identify Problem Apps -- Force a Crashed App to Quit -- Force a Crashed App to Quit -- Force Quit an App from the Dock -- Force Quit an App from the Force Quit Applications Dialog -- Revert to an Earlier Version of a Document -- Revert to an Earlier Version of a Document -- Chapter 5 Managing Your Files and Folders -- Explore Your MacBook's File System -- Explore Your MacBook's File System -- Using the Finder's Views -- Using the Finder's Views -- Using Icon View -- Using List View -- Using Column View -- Using Gallery View -- Work with Finder Tabs -- Work with Finder Tabs -- View a File with Quick Look -- View a File with Quick Look -- Organize Your Desktop Files with Stacks -- Organize Your Desktop Files with Stacks -- Turn On Stacks and Choose the Grouping -- Browse a Stack and Open a File -- Search for a File or Folder -- Search for a File or Folder -- Search Quickly from the Desktop -- Search from a Finder Window -- Create a New Folder -- Create a New Folder -- Rename a File or Folder -- Rename a File or Folder -- Copy a File -- Copy a File -- Copy a File by Clicking and Dragging -- Copy a File Using Copy and Paste -- Move a File -- Move a File -- Move a File Between Folders on the Same Drive -- Move a File from One Drive to Another -- View the Information About a File or Folder -- View the Information About a File or Folder -- Organize Your Files with Tags -- Organize Your Files with Tags -- Customize Your Tags -- Apply Tags to Files and Folders…”
Publicado 2024
Libro electrónico -
753Publicado 2022Tabla de Contenidos: “…Exercise 4-1: Summary -- Joins -- Exercise 4-2: Expanding Data Through Joins -- Inner Join -- Right Join -- Left Join -- Semi-Join -- Anti-Join -- Semi-Join and Anti-Join Aliases -- Using the IN Operator -- Negating the IN Operator -- Full Join -- Exercise 4-2: Summary -- Putting It All Together -- Exercise 4-3: Problem Solving with SQL Expressions and Conditional Queries -- Expressions as Columns -- Using an Inner Query -- Using Conditional Select Expressions -- Exercise 4-3: Summary -- Summary -- Chapter 5: Bridging Spark SQL with JDBC -- Overview -- MySQL on Docker Crash Course -- Starting Up the Docker Environment -- Docker MySQL Config -- Exercise 5-1: Exploring MySQL 8 on Docker -- Working with Tables -- Connecting to the MySQL Docker Container -- Using the MySQL Shell -- The Default Database -- Creating the Customers Table -- Inserting Customer Records -- Viewing the Customers Table -- Exercise 5-1: Summary -- Using RDBMS with Spark SQL and JDBC -- Managing Dependencies -- Exercise 5-2: Config-Driven Development with the Spark Shell and JDBC -- Configuration, Dependency Management, and Runtime File Interpretation in the Spark Shell -- Runtime Configuration -- Local Dependency Management -- Runtime Package Management -- Dynamic Class Compilation and Loading -- Spark Config: Access Patterns and Runtime Mutation -- Viewing the SparkConf -- Accessing the Runtime Configuration -- Iterative Development with the Spark Shell -- Describing Views and Tables -- Writing DataFrames to External MySQL Tables -- Generate Some New Customers -- Using JDBC DataFrameWriter -- SaveMode -- Exercise 5-2: Summary -- Continued Explorations -- Good Schemas Lead to Better Designs -- Write Customer Records with Minimal Schema -- Deduplicate, Reorder, and Truncate Your Table -- Drop Duplicates -- Sorting with Order By -- Truncating SQL Tables -- Stash and Replace…”
Libro electrónico -
754por Mueller, John PaulTabla de Contenidos: “…Considering the Art of Feature Creation -- Defining feature creation -- Combining variables -- Understanding binning and discretization -- Using indicator variables -- Transforming distributions -- Performing Operations on Arrays -- Using vectorization -- Performing simple arithmetic on vectors and matrices -- Performing matrix vector multiplication -- Performing matrix multiplication -- Part 3 Visualizing Information -- Chapter 10 Getting a Crash Course in MatPlotLib -- Starting with a Graph -- Defining the plot -- Drawing multiple lines and plots -- Saving your work to disk -- Setting the Axis, Ticks, Grids -- Getting the axes -- Formatting the axes -- Adding grids -- Defining the Line Appearance -- Working with line styles -- Using colors -- Adding markers -- Using Labels, Annotations, and Legends -- Adding labels -- Annotating the chart -- Creating a legend -- Chapter 11 Visualizing the Data -- Choosing the Right Graph -- Showing parts of a whole with pie charts -- Creating comparisons with bar charts -- Showing distributions using histograms -- Depicting groups using boxplots -- Seeing data patterns using scatterplots -- Creating Advanced Scatterplots -- Depicting groups -- Showing correlations -- Plotting Time Series -- Representing time on axes -- Plotting trends over time -- Plotting Geographical Data -- Using an environment in Notebook -- Getting the Basemap toolkit -- Dealing with deprecated library issues -- Using Basemap to plot geographic data -- Visualizing Graphs -- Developing undirected graphs -- Developing directed graphs -- Part 4 Wrangling Data -- Chapter 12 Stretching Python's Capabilities -- Playing with Scikit-learn -- Understanding classes in Scikit-learn -- Defining applications for data science -- Performing the Hashing Trick -- Using hash functions -- Demonstrating the hashing trick -- Working with deterministic selection…”
Publicado 2019
Libro electrónico -
755Publicado 2018“…"Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. …”
Libro electrónico -
756Publicado 2023“…This book will give Android rookies a crash-course in how to use these popular phones. …”
Libro electrónico -
757por Orzach, YoramTabla de Contenidos: “…Layer 5-based vulnerabilities -- Layer 6-based vulnerabilities -- Layer 7-based vulnerabilities -- Fuzzing tools -- Basic fuzzing -- Breaking usernames and passwords (brute-force attacks) -- Fuzzing network protocols -- Crash analysis - what to do when we find a bug -- Summary -- Questions -- Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks -- Chapter 6: Finding Network-Based Attacks -- Planning a network-based attack -- Gathering information from the network -- Stealing information from the network -- Preventing users from using IT resources -- Active and passive attacks -- Active attacks -- Passive attacks -- Reconnaissance and information gathering -- Listening to network broadcasts -- Listening on a single device/port-mirror -- Network-based DoS/DDoS attacks and flooding -- Flooding through scanning attacks -- Random traffic generation flooding -- Generating and defending against flooding and DoS/DDoS attacks -- L2-based attacks -- MAC flooding -- STP, RSTP, and MST attacks -- L3- and ARP-based attacks -- ARP poisoning -- DHCP starvation -- Summary -- Questions -- Chapter 7: Detecting Device-Based Attacks -- Network devices' structure and components -- The functional structure of communications devices -- The physical structure of communications devices -- Attacks on the management plane and how to defend against them -- Brute-force attacks on console, Telnet, and SSH passwords -- Brute-force attacks against SNMP passwords (community strings) -- Brute-force attacks against HTTP/HTTPS passwords -- Attacks on other ports and services -- SYN-scan and attacks targeting the management plane processes' availability -- Attacks on the control plane and how to defend against them -- Control plane-related actions that influence device resources -- Attacks on the data plane and how to defend against them…”
Publicado 2022
Libro electrónico -
758por Krajewski, Lee J.Tabla de Contenidos: “…Critical Path -- Project Schedule -- Activity Slack -- Analyzing Cost-Time Trade‐Offs -- Cost to Crash -- Minimizing Costs -- Assessing and Analyzing Risks -- Risk‐Management Plans -- Managerial Practice 7.1 San Francisco-Oakland Bay Bridge -- Statistical Analysis -- Analyzing Probabilities -- Near‐Critical Paths -- Monitoring and Controlling Projects -- Monitoring Project Status -- Monitoring Project Resources -- Controlling Projects -- Learning Goals in Review -- MyLab Operations Management Resources -- Key Equations -- Key Terms -- Solved Problems -- Discussion Questions -- Problems -- Active Model Exercise -- Video Case Project Management at Choice Hotels International -- Case The Pert Mustang -- PART 2 Managing Customer Demand -- 8 FORECASTING -- Kimberly‐Clark -- Managing Demand -- Demand Patterns -- Demand Management Options -- Key Decisions on Making Forecasts -- Deciding What to Forecast -- Choosing the Type of Forecasting Technique -- Forecast Error -- Cumulative Sum of Forecast Errors -- Dispersion of Forecast Errors -- Mean Absolute Percent Error -- Computer Support -- Judgment Methods -- Causal Methods: Linear Regression -- Time‐Series Methods -- NaÏve Forecast -- Horizontal Patterns: Estimating the Average -- Trend Patterns: Using Regression -- Seasonal Patterns: Using Seasonal Factors -- Criteria for Selecting Time‐Series Methods -- Insights into Effective Demand Forecasting -- Big Data -- Managerial Practice 8.1 Big Data and Health Care Forecasting -- A Typical Forecasting Process -- Using Multiple Forecasting Methods -- Adding Collaboration to the Process -- Forecasting as a Nested Process -- Learning Goals in Review -- MyLab Operations Management Resources -- Key Equations -- Key Terms -- Solved Problems -- Discussion Questions -- Problems -- Video Case Forecasting and Supply Chain Management at Deckers Outdoor Corporation…”
Publicado 2019
Libro electrónico -
759Publicado 2024Tabla de Contenidos: “…Considering the Art of Feature Creation -- Defining feature creation -- Combining variables -- Understanding binning and discretization -- Using indicator variables -- Transforming distributions -- Performing Operations on Arrays -- Using vectorization -- Performing simple arithmetic on vectors and matrices -- Performing matrix vector multiplication -- Performing matrix multiplication -- Part 3 Visualizing Information -- Chapter 10 Getting a Crash Course in Matplotlib -- Starting with a Graph -- Defining the plot -- Drawing multiple lines and plots -- Saving your work to disk -- Setting the Axis, Ticks, and Grids -- Getting the axes -- Formatting the axes -- Adding grids -- Defining the Line Appearance -- Working with line styles -- Using colors -- Adding markers -- Using Labels, Annotations, and Legends -- Adding labels -- Annotating the chart -- Creating a legend -- Chapter 11 Visualizing the Data -- Choosing the Right Graph -- Creating comparisons with bar charts -- Showing distributions using histograms -- Depicting groups using boxplots -- Seeing data patterns using scatterplots -- Creating Advanced Scatterplots -- Depicting groups -- Showing correlations -- Plotting Time Series -- Representing time on axes -- Plotting trends over time -- Plotting Geographical Data -- Using an environment in Notebook -- Using Cartopy to plot geographic data -- Avoiding outdated libraries: The Basemap Toolkit -- Visualizing Graphs -- Developing undirected graphs -- Developing directed graphs -- Part 4 Wrangling Data -- Chapter 12 Stretching Python's Capabilities -- Playing with Scikit-learn -- Understanding classes in Scikit-learn -- Defining applications for data science -- Using Transformative Functions -- Chaining estimators -- Transforming targets -- Composing features -- Handling heterogeneous data -- Considering Timing and Performance…”
Libro electrónico -
760por Bartneck, Christoph, 1973- author, Lütge, Christoph. author, Wagner, Alan. author, Welsh, Sean. authorTabla de Contenidos: “…-- 3.1 Descriptive Ethics -- 3.2 Normative Ethics -- 3.2.1 Deontological Ethics -- 3.2.2 Consequentialist Ethics -- 3.2.3 Virtue Ethics -- 3.3 Meta-ethics -- 3.4 Applied Ethics -- 3.5 Relationship Between Ethics and Law -- 3.6 Machine Ethics -- 3.6.1 Machine Ethics Examples -- 3.6.2 Moral Diversity and Testing -- 4 Trust and Fairness in AI Systems -- 4.1 User Acceptance and Trust -- 4.2 Functional Elements of Trust -- 4.3 Ethical Principles for Trustworthy and Fair AI -- 4.3.1 Non-maleficence -- 4.3.2 Beneficence -- 4.3.3 Autonomy -- 4.3.4 Justice -- 4.3.5 Explicability -- 4.4 Conclusion -- 5 Responsibility and Liability in the Case of AI Systems -- 5.1 Example 1: Crash of an Autonomous Vehicle -- 5.2 Example 2: Mistargeting by an Autonomous Weapon -- 5.2.1 Attribution of Responsibility and Liability -- 5.2.2 Moral Responsibility Versus Liability -- 5.3 Strict Liability -- 5.4 Complex Liability: The Problem of Many Hands -- 5.5 Consequences of Liability: Sanctions -- 6 Risks in the Business of AI -- 6.1 General Business Risks -- 6.1.1 Functional Risk -- 6.1.2 Systemic Risk -- 6.1.3 Risk of Fraud -- 6.1.4 Safety Risk -- 6.2 Ethical Risks of AI -- 6.2.1 Reputational Risk -- 6.2.2 Legal Risk -- 6.2.3 Environmental Risk -- 6.2.4 Social Risk -- 6.3 Managing Risk of AI -- 6.4 Business Ethics for AI Companies -- 6.5 Risks of AI to Workers -- 7 Psychological Aspects of AI -- 7.1 Problems of Anthropomorphisation…”
Publicado 2021
Libro electrónico