Mostrando 3,021 - 3,040 Resultados de 4,948 Para Buscar '"Holding"', tiempo de consulta: 0.10s Limitar resultados
  1. 3021
    Publicado 2020
    Tabla de Contenidos: “…-- Three separate feedback conversations -- Part 3: Stories and top tips -- Language inspires us -- Language sells -- Headlines harness and hold attention -- Stories switch on our brain -- References for Chapter 5 -- Chapter 6 Our Brain and Visual Perception -- About this chapter -- Part 1: The science explained -- How do we see? …”
    Libro electrónico
  2. 3022
    por Bok, Kenneth
    Publicado 2023
    Tabla de Contenidos: “…5.6 Prudential Treatment of Crypto-asset Exposures -- 5.7 SSBs, United States and European Union -- 5.7.1 BCBS: Prudential Treatment on Banks' Crypto-asset Exposures -- 5.7.2 CPMI - IOSCO: PFMI and Stablecoins -- 5.7.3 IOSCO -- 5.7.4 FATF - AML / CFT -- 5.7.5 Survey of Jurisdictions on the State of Crypto-asset Regulation -- 5.8 European Union - MiCA -- 5.9 United States -- 5.10 DeFi Specific Regulation -- 5.10.1 DEXs -- 5.10.2 Stablecoins -- 5.11 Chapter Summary -- Notes -- Part II DLT in Traditional Finance -- Chapter 6 Central Bank Digital Currencies -- 6.1 Introduction -- 6.2 Prologue: Libra -- 6.3 Role of the Central Bank -- 6.4 Structure of the Monetary System and a View Towards the Future -- 6.5 Central Bank Motivations and Considerations around CBDCs -- 6.6 Retail vs Wholesale CBDCs -- 6.7 Wholesale CBDCs -- 6.7.1 Domestic W-CBDCs -- 6.7.2 Bilateral W-CBDCs -- 6.7.3 Multilateral CBDCs (mCBDCs) -- 6.8 Case Study: Project mBridge -- 6.9 Retail CBDCs -- 6.10 Benefits and Risks of R-CBDCs -- 6.11 R-CBDC Design Choices -- 6.11.1 Nature of Claims and Role of the Central Bank -- 6.11.2 DLT or Conventional Centralized Ledger -- 6.11.3 Token- or Account-based Access -- 6.11.4 Cross-border -- 6.11.5 Holding and Transaction Limits -- 6.11.6 Interest Yielding -- 6.12 Types of R-CBDCs -- 6.12.1 Direct -- 6.12.2 Two-tier Models: Hybrid and Intermediated -- 6.12.3 Indirect / Synthetic -- 6.13 Examples of R-CBDCs -- 6.14 Case Study: Nigerian eNaira -- 6.15 Case Study: United States -- 6.16 Case Study: eCNY -- 6.17 Chapter Summary -- Notes -- Chapter 7 Asset Tokenization -- 7.1 What Is Asset Tokenization? …”
    Libro electrónico
  3. 3023
    por Mathura, Sanya
    Publicado 2024
    Tabla de Contenidos: “…-- 11.5 Women in STEM as Drivers of Innovation -- About the Author -- References -- Chapter 12: Safety Boots to Break Glass CeilingsTM -- 12.1 Passions Collide -- 12.2 The Spark -- 12.3 A Sign -- 12.4 The Groundwork -- 12.5 The Design -- 12.6 Manufacturing -- 12.7 The Launch -- 12.8 Loyalty -- 12.9 Hazard Girls -- 12.10 Holding Our Breath -- 12.11 Customer Stories -- 12.12 Gratitude -- 12.13 Conclusion -- About the Author -- Note -- Chapter 13: Intersectionality: How to Transform Headwinds to Tailwinds -- 13.1 What Is Intersectionality?…”
    Libro electrónico
  4. 3024
  5. 3025
    Publicado 2022
    Libro
  6. 3026
    por Coben, Harlan, 1962-
    Publicado 2009
    Libro
  7. 3027
    Publicado 2022
    “…You will learn to plan a Sprint, hold a Sprint Planning meeting, estimate the backlog items, implement and hold Daily Sprints. …”
    Video
  8. 3028
    Publicado 2022
    “…The second domain, namely Security, holds 25% of the exam and consists of physical and logical security concepts, wireless security protocols, social engineering threats, attacks, and more. …”
    Video
  9. 3029
    Publicado 2022
    Libro
  10. 3030
    Publicado 2021
    Tabla de Contenidos: “…-- 3.2 Combining middleware in a pipeline -- 3.2.1 Simple pipeline scenario 1: A holding page…”
    Libro electrónico
  11. 3031
    Publicado 2002
    Tabla de Contenidos: “…La constitution de gigantesques holdings agricoles est-elle un phénomène... -- Soutien interne -- Soutien budgétaire -- Encadré II.2. …”
    Libro electrónico
  12. 3032
    Publicado 2018
    Tabla de Contenidos: “…Basics of Programming in MATLAB® -- 2.1 Introduction: Computer Programming in MATLAB -- 2.2 Programming Languages -- 2.3 Executed Commands -- 2.3.1 Error Statements -- 2.4 Mathematics -- 2.4.1 Operators -- 2.4.2 Variables -- Variable Naming Rules and Conventions -- 2.5 Data Types -- 2.5.1 Numbers -- 2.5.2 Characters -- 2.5.3 Strings -- String Concatenation -- 2.6 Arrays -- 2.6.1 Basic Array Creation -- 2.6.2 Plotting Arrays -- 2.7 Mathematical Functions -- 2.7.1 Plotting Mathematical Functions -- 2.8 APPENDIX: Additional Plotting Options -- 2.8.1 Line Specification -- Line Color and Style -- Line Width -- Stem Plot -- 2.8.2 Axis Labels -- 2.8.3 Figure Title -- 2.8.4 Figure Legend -- 2.8.5 Axis Scale -- 2.8.6 Axis Dimensions -- 2.8.7 Multiple Arrays -- Multiple Windows -- Identical Dimensions -- Figure Hold -- Subplot -- 3. Basics of Audio in MATLAB® -- 3.1 Introduction: Digital Audio Signals -- 3.2 MATLAB Audio Functions -- 3.2.1 audioread -- 3.2.2 sound -- 3.2.3 audiowrite -- 3.2.4 audioinfo -- 3.3 Working with Audio Signals in Arrays -- 3.3.1 Indexing Arrays -- Audio Edit Signal Splice -- 3.3.2 Array Reversal -- 3.3.3 Additional Methods to Create Arrays -- 3.3.4 Array Transposition -- 3.3.5 Determining Dimensions of Arrays -- 3.4 Visualizing the Waveform of an Audio Signal -- Bibliography -- 4. …”
    Libro electrónico
  13. 3033
    Publicado 2002
    Tabla de Contenidos: “…Work Management -- 5.1 Introduction -- 5.1.1 Work Management folder context sensitive menus -- 5.2 Active Jobs folder -- 5.2.1 Active Jobs: job management -- 5.3 Server Jobs folder -- 5.3.1 Managing server jobs -- 5.4 Job queues -- 5.4.1 Managing job queues -- 5.4.2 Managing waiting jobs on the job queue -- 5.5 Subsystems -- 5.5.1 Active Subsystem folder functions -- 5.5.2 Selected subsystem functions -- 5.6 Memory pools -- 5.6.1 Managing Active Pools -- 5.6.2 Managing Shared Pools -- 5.7 Operations Navigator Work Management tips -- 5.7.1 Use the menu bar cues Edit -&gt -- Find, Options -&gt -- Sort, Columns, Include -- 5.7.2 Use desktop shortcuts for frequently used active jobs, memory pools -- 5.7.3 Use the Server property of a server job to find the attached workstation -- 5.7.4 Set target job queue to hold status when moving jobs to that job queue -- 5.7.5 Consider using the system, job, and message monitors -- Chapter 6. …”
    Libro electrónico
  14. 3034
    Publicado 2019
    Tabla de Contenidos: “…-- 8.2 Using context to create and manage global state in a React application -- 8.3 Implementing Redux with a React Native app -- 8.4 Creating Redux reducers to hold Redux state -- 8.5 Adding the provider and creating the store -- 8.6 Accessing data using the connect function -- 8.7 Adding actions -- 8.8 Deleting items from a Redux store in a reducer -- Summary -- Part 3: API reference -- Chapter 9: Implementing cross-platform APIs -- 9.1 Using the Alert API to create cross-platform notifications -- 9.1.1 Use cases for alerts -- 9.1.2 Example of using alerts -- 9.2 Using the AppState API to detect the current application state…”
    Libro electrónico
  15. 3035
    Publicado 2018
    Tabla de Contenidos: “…8.5.2 Exploiting domain rules -- 8.6 Validating configuration -- 8.6.1 Causes for configuration-related security flaws -- 8.6.2 Automated tests as your safety net -- 8.6.3 Knowing your defaults and verifying them -- Summary -- 9 Handling failures securely -- 9.1 Using exceptions to deal with failure -- 9.1.1 Throwing exceptions -- 9.1.2 Handling exceptions -- 9.1.3 Dealing with exception payload -- 9.2 Handling failures without exceptions -- 9.2.1 Failures aren't exceptional -- 9.2.2 Designing for failures -- 9.3 Designing for availability -- 9.3.1 Resilience -- 9.3.2 Responsiveness -- 9.3.3 Circuit breakers and timeouts -- Always specify a timeout -- 9.3.4 Bulkheads -- 9.4 Handling bad data -- Cross-site scripting and second-order attacks -- 9.4.1 Don't repair data before validation -- 9.4.2 Never echo input verbatim -- Summary -- 10 Benefits of cloud thinking -- 10.1 The twelve-factor app and cloud-native concepts -- 10.2 Storing configuration in the environment -- 10.2.1 Don't put environment configuration in code -- 10.2.2 Never store secrets in resource files -- 10.2.3 Placing configuration in the environment -- 10.3 Separate processes -- 10.3.1 Deploying and running are separate things -- 10.3.2 Processing instances don't hold state -- 10.3.3 Security benefits -- 10.4 Avoid logging to file -- 10.4.1 Confidentiality -- 10.4.2 Integrity -- 10.4.3 Availability -- 10.4.4 Logging as a service -- 10.5 Admin processes -- 10.5.1 The security risk of overlooked admin tasks -- 10.5.2 Admin tasks as first-class citizens -- Admin of log files -- 10.6 Service discovery and load balancing -- 10.6.1 Centralized load balancing -- 10.6.2 Client-side load balancing -- 10.6.3 Embracing change -- 10.7 The three R's of enterprise security -- 10.7.1 Increase change to reduce risk -- 10.7.2 Rotate -- 10.7.3 Repave -- 10.7.4 Repair -- Summary…”
    Libro electrónico
  16. 3036
    Publicado 2019
    Tabla de Contenidos: “…6.4.2.1 Stake Size -- 6.4.2.2 Incomplete Information About Pie Size -- 6.4.2.3 Entitlements -- 6.4.2.4 Social Distance and Physiological Features -- 6.4.2.5 Procedural Fairness -- 6.5 Reciprocal Choice -- 6.5.1 Economic Incentives May Harm the Intrinsic Reciprocity -- 6.5.2 Wage Levels and Firm Profits Affect the Reciprocity -- 6.5.3 Worker's Population Affect the Degree of Reciprocity -- 6.5.4 Do the Experimental Results with Imitated Effort Hold When the Effort Is Real? -- 6.5.5 Maintaining Reputation Is One Motive to Trigger and Sustain Reciprocity -- 6.5.6 Institutional Tit for Tat -- 6.6 Trust and Trustworthiness -- 6.6.1 Building Blocks of Trust and Trustworthiness -- 6.6.2 Innate Triggers for Trust and Trustworthiness: Other‐regarding Preferences -- 6.7 Summary: The Empirical Nature of Fair Choice -- References -- Chapter 7 Behavioral Analysis of Strategic Interactions: Game Theory, Bargaining, and Agency -- 7.1 Behavioral Game Theory -- 7.1.1 Accurate Beliefs -- 7.1.2 Best Responses -- 7.1.3 Strategic Sophistication -- 7.1.4 Coordination Games and Equilibrium Selection -- 7.1.5 Repeated Games -- 7.1.6 Applications in Operations Management -- 7.2 Behavioral Analysis of Principal-Agent Problems -- 7.2.1 Response to Financial Incentives -- 7.2.2 Financial Incentives in Other Settings: Monitoring, Tournaments, and Teams -- 7.2.3 Reciprocity and Gift Exchange -- 7.2.4 Nonmonetary Incentives -- 7.2.5 Applications in Operations Management -- 7.3 Bargaining -- 7.3.1 Theoretical Approaches -- 7.3.2 Economics Experiments: Free‐form Bargaining -- 7.3.3 Economics Experiments: Structured Bargaining -- 7.3.4 Economics Experiments: Multiparty Negotiations -- 7.3.5 Psychology Experiments: Biases in Negotiations -- 7.3.6 Applications in Operations Management -- References -- Chapter 8 Integration of Behavioral and Operational Elements Through System Dynamics…”
    Libro electrónico
  17. 3037
    por Roeder, Larry W.
    Publicado 2013
    Tabla de Contenidos: “…-Chapter Ten: Meetings and Conferences -- Extract: -- 10.1 Why Hold Private Meetings and Attend Conferences? -- 10.2 Short Meetings: -- 10.3 International Conferences: -- 10.4 The Delegation Administrative and Protocol Officer -- 10.5 The Delegation Office: -- 10.6 Learn the Compound Layout in Advance: -- 10.7 Preconference Tactics -- 10.7.1 The Sequential Negotiation Technique -- 10.7.2 Building Allies in Advance -- 10.8 Stress Management -- 10.9 Outcome and Discussant Papers -- 10.9.1 Example of Outcome Documents: -- 10.10 Secretariat and Other Conference Bodies -- 10.10.1 The Secretariat -- 10.10.2 The Conference Chairperson -- 10.11 Credentials Committee and Rules of Procedure -- 10.12 Role of the Drafting Committee -- 10.13 Example of a mega- Conference: Rio - The Earth Summit -- Chapter Eleven: PROTOCOL -- Extract: -- 11.1 Introduction -- 11.2 Attending Social Events -- 11.3 Accreditation, Badges and Business Cards -- 11.4 Politeness, Trust, and Respect -- 11.5 Gifts: -- 11.6 Managing Perceptions -- 11.7 Receptions and Personal Entertaining -- 11.8 Ambassadors -- 11.9 Invitations and Greetings -- 11.10 Dress -- 11.11 Gender and Race -- 11.12 Speak Without Notes -- 11.13 Use of Language -- 11.14 Neutrality -- 11.15 Titles and Saying Hello and Goodnight -- 11.16 Letter Formats -- Chapter Twelve: Delegation Communications and the Media -- Extract: -- 12.1 Delegation Communications and the Media -- 12.2 The Delegation Communications (Public Affairs) Officer.-12.3 Are Media Events Needed? …”
    Libro electrónico
  18. 3038
    Publicado 2024
    Tabla de Contenidos: “…5.4 Healthcare Practitioners -- 5.4.1 Smart Medical Devices -- 5.4.2 Time to Diagnosis -- 5.4.3 Electronic Health Records (EHRs), the Electronic Medical Records (EMRs) -- 5.4.4 Using AI and Analytics to Determine Dental Group Practice Quality -- 5.4.5 Some Ways Various Healthcare Professionals Are Using Textual Analytics -- 5.5 Manufacturing Practitioners -- 5.5.1 Predictive Maintenance to Proactively Identify and Address Impending Equipment Failure -- 5.6 Retail Practitioners -- 5.7 Telecommunication Practitioners -- 5.8 Energy Practitioners -- 5.8.1 Major Energy Producer Unites Data Scientists and Subject Matter Experts -- 5.8.2 Large Utility Company Adds AI Project to Its Digital Transformation Project -- 5.9 Insurance Practitioners -- 5.9.1 CEO of Property and Casualty Insurance Company Delivers Analytics Mandate -- 5.10 Other Practitioners -- 5.11 Conclusion and Next Steps for Practitioners -- Reference -- 6 The Leaders -- 6.1 Introduction -- 6.2 Some Characteristics of Leaders -- 6.2.1 Organizational and Structural Differences -- 6.2.1.1 Notes on Organizational Structure and Design -- 6.2.2 Data Excellence -- 6.2.2.1 The Use of Unstructured Data-New Horizon Leaders Are Tapping Into -- 6.2.3 Self-Service That Enables Everyone in the Organization -- 6.3 Healthcare Leaders -- 6.3.1 Using Regulations and Mandates as a Catalyst for Innovation -- 6.4 Manufacturing Leaders -- 6.4.1 Smarter Identification of Defects with Text Analytics -- 6.5 Retail Leaders -- 6.5.1 Assortment -- 6.5.2 Right Value Proposition -- 6.5.3 Right Time/Location/Delivery -- 6.6 Energy Leaders -- 6.6.1 Global Top Five Oil Producer Manages Equipment with Text Analytics -- 6.7 Financial Services and Insurance Leaders -- 6.7.1 Insurance Holding Company Reduces Fraud Risk and Improves Operations with Text Mining (Analytics) -- 6.7.1.1 The Pilot -- 6.7.1.2 Results after Two Years…”
    Libro electrónico
  19. 3039
    Publicado 2009
    Libro
  20. 3040
    Publicado 1970
    Libro