Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Personajes célebres 880
- Historia 459
- History 255
- Biblia 144
- Procesos célebres 125
- Biografías 119
- Història 101
- Prosa griega 89
- Crítica e interpretación 82
- Música 76
- Liturgia 75
- Litúrgia 71
- Personas célebres 71
- Iglesia Católica 62
- Mujeres célebres 61
- Biografia 60
- Església Catòlica 59
- Leadership 59
- Management 53
- Filosofía 52
- Social aspects 51
- History and criticism 45
- Philosophy 43
- Mujeres 40
- Bíblia 39
- Biblia- 38
- Historia y crítica 38
- Política y gobierno 38
- Santos- 37
- RELIGION 36
-
6921por Klidas, AngelikaTabla de Contenidos: “…Learning levels -- Covering all moments of need -- Learning methodologies -- Including all knowledge types -- Learning elements -- Organizing content -- Searching for content -- Measuring success -- Celebrating successes -- Summary -- Further reading -- Chapter 5: Managing Your Data Environment -- Introducing data management -- Understanding your data quality -- Intermezzo - Starting to improve data quality in a small-scaled healthcare environment -- Delivering a data management future -- Data strategy -- Taking care of your data strategy -- Creating a data vision -- Identifying your data -- Discovering where your data is stored -- Retrieving your data -- Combining and enriching data -- Setting the standard -- Processes -- Control -- IT -- Summary -- Part 2: Understanding How to Measure the Why, What, and How -- Chapter 6: Aligning with Organizational Goals -- Understanding the types of indicators -- Identifying KPIs -- Characteristics of KPIs -- Leading and lagging indicators -- Reviewing for unintended consequences -- Applying Goodhart's law to KPIs -- Defining what to track -- Activity system maps -- Logic models -- Summary -- References -- Chapter 7: Designing Dashboards and Reports -- The importance of visualizing data -- Deceiving with bad visualizations -- Using our eyes and the usage of colors -- Introducing the DAR(S) principle -- Defining your dashboard -- Choosing the right visualization -- Understanding some basic visualizations -- Bar chart (or column chart or bar graph) -- Line chart -- Pie chart -- Heatmap -- Radar chart -- Geospatial charts -- KPIs in various ways -- Tables -- Presenting some advanced visualizations -- Bullet charts -- Addressing contextual analysis -- Summary -- Chapter 8: Questioning the Data -- Being curious and critical by asking questions -- Starting with the problem - not the data…”
Publicado 2022
Libro electrónico -
6922Publicado 2022Tabla de Contenidos: “…Adjust the Design of a Report -- Work with Dashboards -- Create a New Report or Dashboard -- Print a Report -- Key Terms -- Review Questions -- Part IV Close Your Project -- Lesson 13 Obtain Project Acceptance -- Present the Project to the Sponsor -- Secure Official Project Sign-Off -- Complete Final Refinements -- Have the Sponsor Sign Off on the Project -- Celebrate With Your Team -- Key Terms -- Review Questions -- Lesson 14 Retain Project History -- Document Lessons Learned -- Identify the Information You Can Use -- Gather Lessons Learned -- Document and Share the Lessons Learned -- Archive Project History -- Clean Up Your Project Plan -- Add Key Documents to the Project Plan -- Organize the Archive File Structure -- Key Terms -- Review Questions -- Appendix Answers to the Review Questions -- Lesson 1. …”
Libro electrónico -
6923por Reijnders, StijnTabla de Contenidos: “…Master Historical Narrative -- Walking in Laura's Footsteps: The Homesites' History -- Indigenous Resurgence, New Western Historiography, and Culture Wars -- Wilder's Stories and the New West Histories -- Little Houses in the Classroom and Library -- Wilder Homesites, the New West Histories, and Culture Wars -- Conclusion -- Notes -- References -- 11 Popular Music Heritage in Ekaterinburg: From Seeking Authorisation and Nostalgia for Soviet Rock to Participatory Place-Making -- Popular Music Heritage Between Fan Communities and Cultural Economy -- Ekaterinburg -- Methodology -- Sverdlovsk Rock: Authorisation and Contested Memorial Sites -- Nostalgic Exploration of the City Through Soviet Rock Music History -- Celebrating Internationally Famous Musicians in Ekaterinburg -- Playful and Affective Practices: Paying Tribute, Performing, Taking Pictures -- Conclusion -- Note -- References -- 12 Negotiating Dark and Light Magic: Witch-Themed Tourism in Harz, Germany, in a Transcultural Context -- Introduction -- Literature Review -- Witch-themed Tourism and Media of the Harz Region -- Witch-themed Tourism in Salem and a Critical Consideration of Dark Tourism -- Methodology -- Findings…”
Publicado 2024
Libro electrónico -
6924Publicado 1610Tabla de Contenidos: “…Breve Descripcion dela Magestuosa Pompa y celebre Aparato, con que la siempre M.N . y M . Leal Ciudad de Sevilla levantó el Real Pendon y Estandarte por el Rey N.S . …”
Manuscrito -
6925
Manuscrito -
6926Publicado 2019Tabla de Contenidos: “…Consumer Response -- Promotional Tactics -- Advantages and Shortcomings -- Desktop versus Mobile Devices -- The Future -- Advertising's Reach and Efficacy -- Analyzing Website Visits -- Gauging Influence within Social Network -- Google Analytics -- Online Fraud and Unseen Ads -- Pirated Content -- Nielsen -- Time‐Shifted Viewing -- Facebook, Google, and Twitter -- Skipping and Blocking -- Improved Measures of Social Activity -- Traditional Media's Evolution -- Television -- Radio -- Print Media -- Out‐of‐Home Media -- Branded Content -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- 9 Reference Groups and Communities, Opinion Leaders, and Word‐of‐Mouth -- The Credibility and Persuasive Power of Reference Groups -- Consumption‐Related Reference Group -- Friends -- Fellow Shoppers -- Virtual Communities -- Advocacy Groups -- Factors Affecting Reference Group Influence -- Conformity -- Group Power -- Product Expertise -- Product Conspicuousness -- Endorsers and Spokespersons -- Celebrities -- Salesperson Credibility -- Vendor Credibility -- Medium Credibility -- Opinion Leaders and Word‐of‐Mouth -- Characteristics of Opinion Leaders -- Measuring Opinion Leadership -- Questioning -- Social Interactions -- Identifying Experts -- Online Influence -- Word‐of‐Mouth's Strategic Applications -- Online Reference Groups -- Stimulating Word‐of‐Mouth -- Going Viral -- Managing Negative Rumors -- Innovations' Adopters as Reference Groups -- The First Buyers -- The Followers -- The Somewhat Risk‐Averse -- The Highly Risk‐Averse -- The Last to Purchase -- The Nonadopters -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- PART IV Social and Cultural Settings -- 10 The Family and Its Social Standing -- Family and Consumer Socialization -- Parental Styles and Consumer Socialization…”
Libro electrónico -
6927Publicado 2011Tabla de Contenidos: “…Recovery -- Rebaselining Strategies -- Consultants' Tips -- 17 Closing the Project -- The Project Close Process Group -- Performing Final Reporting -- Performing a Project Retrospective (Lessons Learned) -- Archiving Your Schedule -- Celebrating Your Project Results -- Consultants' Tips -- IV: Tailoring Microsoft Office Project 2010 to Your Needs…”
Libro electrónico -
6928Publicado 2023Tabla de Contenidos: “…-- Chapter 25 Pick Up The Phone -- Chapter 26 Conversation To Opportunity -- Part 9 Bonus Chapters -- Chapter 27 Pipeline Will always Be KING -- 1) They don't find Enough opportunities to hit target -- 2) They live in pipeline Denial -- 3) They celebrate the Opportunity over the sale -- 4) They Stop Prospecting when they've Got enough Opportunities -- Chapter 28 Ten Big Linkedin & -- Sales Navigator Tips -- 1) Set An Away Message On Linkedin (Sales Nav Tip) -- 2) Add A Cover Story Video To Your Linkedin Profile (Linkedin Tip) -- 3) Share A Testimonial Post This Week (Linkedin Tip) -- 4) Make Your Subject Line On Inmail About Them (Sales Nav Tip)…”
Libro electrónico -
6929Publicado 2023Tabla de Contenidos: “…Documenting Change Recommendations -- Determining Decision-Makers -- Managing the Change Control Board -- Documenting Approval Status in the Change Control Log -- Communicating Change Status -- Updating the Project Management Plan -- Implementing the Change -- Validating the Change and Perform a Quality Check -- Communicating Change Deployment -- Other Change Requests -- Project Change Management -- Implementing Organizational Change -- Types of Organizational Change -- Implementing Organizational Change -- Operational Change Control on an IT Project -- IT Infrastructure Control -- Software Change Control -- Other IT Change Processes -- Agile Frameworks -- Scaling Frameworks -- Projects in Control (PRINCE2) -- Summary -- Exam Essentials -- Key Terms -- Review Questions -- Chapter 10 Managing Quality and Closing Out the Project -- Controlling Quality -- Inspecting and Testing -- Using Quality Charts -- Common Causes of Variances -- Taking Action on Quality Control -- Managing Issues -- Roles and Responsibilities -- Issue Tracking -- Resolution Plan -- Resolution Techniques -- Outcome Documentation -- Action Items -- Using Performance Measures -- Key Performance Indicators -- Balanced Scorecard -- Key Objectives and Results -- Cost and Schedule Performance -- Project Endings -- Characteristics of Closing -- Types of Project Endings -- Steps in Closing Out a Project -- Verification and Validation of Deliverables -- Obtaining Sign-Off -- Developing a Transition Plan and Operational Handoff -- Removing Access -- Releasing Team Members -- Closing Out the Contract -- Archiving Documentation -- Documenting Lessons Learned and Project Evaluation -- Project Closure Meeting -- Project Closeout Report -- Rewards and Celebrations -- Postimplementation Support and Warranty Period -- Summary -- Exam Essentials -- Key Terms -- Review Questions…”
Libro electrónico -
6930por Rydin, ThorTabla de Contenidos: “…Another example of Dutch internationalist culture at the beginning of the twentieth century: several board games celebrating peace and cooperation were brought onto the market in the 1900s and 1910s, both by commercial and public institutions…”
Publicado 2023
Libro electrónico -
6931por Burrows, MikeTabla de Contenidos: “…-- 5.2 Das Outside-in Service Delivery Review (OI-SDR) -- 5.2.1 Grund 1: Kontext -- 5.2.2 Grund 2: Alignment -- 5.2.3 Grund 3: Beteiligung -- 5.2.4 Grund 4: Daten -- 5.2.5 Grund 5: Lernen -- 5.2.6 Grund 6: Fertigstellung -- 5.3 Das Outside-in Strategy Review (OI-SR) -- 5.3.1 Teil 1: Einigung auf einen Zeitrahmen -- Abb. 5-1 Eine Vorlage für das Celebration-5W -- 5.3.2 Teil 2: Die Outside-in-Fragen -- 5.3.3 Teil 3: Von Hindernissen zu Ergebnissen -- Abb. 5-2 15-Minuten-Cue-Card -- 5.3.4 Teil 4: Einen Plan strukturieren -- Abb. 5-3 Eine Vorlage für ein OI-SR -- 5.3.5 Teil 5: Optionen entwickeln…”
Publicado 2020
Libro electrónico -
6932por AA., VVTabla de Contenidos: “…MELANCOLÍA -- FRASES CÉLEBRES -- PARA LAS DAMAS -- SOCIALES Y PERSONALES -- VAYA, VAYA CON -- RETORIALES -- A PROPÓSITO DE LAS FIESTAS PATRIAS -- SECCIÓN BIBLIOGRÁFICA -- TEATROS -- NÚMERO 12, 17 DE OCTUBRE DE 1918 -- EL DESPERTAR DE UNA GENERACIÓN -- LA FILOSOFÍA CIENTÍFICA EN LA ORGANIZACIÓN -- EL CARÁCTER DE MÉRIGO -- YO COMENTO EN VOZ BAJA -- SORPRENDÍ AL SOL ... -- CUANDO LLEGO EL AMOR -- CUESTIONES DE ESTÉTICA. …”
Publicado 2018
Libro electrónico -
6933Publicado 2022Tabla de Contenidos: “…Remove Online Distractions -- Kill the Bandwidth Eaters -- Test Your Audio -- Eliminate Background Noise -- Krisp -- SoliCall Pro -- Change Audio Settings -- Adjust Your Camera -- Prepare Yourself -- Dress for the Meeting -- Posture -- Know Your Attendees -- Get Some Clarity: Quiet Your Mind -- Etiquette -- Check Your Tech -- Arrive Early -- Make Eye Contact -- Cut the Mic -- Use Their Names -- Pay Attention -- When You Are the Presenter -- When You Are an Attendee -- Make Use of Whiteboards -- Bluescape -- Conceptboard -- Draw.Chat -- Hoylu -- Miro -- Engagement and Communication -- Chapter 8 The Watercooler Has Moved-Engagement and Socializing Remotely -- The Impact of Social Isolation -- It's Far More Than Loneliness -- Safety and Security -- Love and Belonging -- Esteem -- The Need for Social Interactions -- Avoiding Social Isolation -- Be on the Lookout for Isolation -- What to Look For -- It's Preventable -- Changes in Appearance -- Changes in Communication Habits -- Changes in Quality of Work -- Cancellations or Lateness -- Overproductivity -- High Levels of Distractability -- Don't Make Poor Assumptions -- Self-Assessment -- Negative Thoughts and Feelings -- Change in Sleep Patterns -- Fatigue -- Disinterest -- Lowered Motivation -- Irritability -- Trouble Maintaining Focus -- Depression -- Combating Isolation -- Structural Changes -- Make Work Accessible -- Visibility and Transparency -- Communication -- Check-In -- Feedback -- Recognition -- Mental Health Support -- Mental Health Toolkits -- Encourage Physical Fitness -- Engagement -- Showing Up and Staying -- Not Out of Mind -- Engagement Aligned with Other Values -- Foster Openness -- Listening Actively and Empathetically -- Social Needs -- Creating Non-Work Spaces -- Virtual Lunches, Coffee Breaks, and Happy Hours -- Make Pre-Meeting Time -- Celebrations…”
Libro electrónico -
6934Publicado 2019Tabla de Contenidos: “…Reducing the problem to statistics -- Understanding that deep learning doesn't create -- Mimicking an Artist -- Defining a new piece based on a single artist -- Combining styles to create new art -- Visualizing how neural networks dream -- Using a network to compose music -- Chapter 16 Building Generative Adversarial Networks -- Making Networks Compete -- Finding the key in the competition -- Achieving more realistic results -- Considering a Growing Field -- Inventing realistic pictures of celebrities -- Enhancing details and image translation -- Chapter 17 Playing with Deep Reinforcement Learning -- Playing a Game with Neural Networks -- Introducing reinforcement learning -- Simulating game environments -- Presenting Q-learning -- Explaining Alpha-Go -- Determining if you're going to win -- Applying self-learning at scale -- Part 4 The Part of Tens -- Chapter 18 Ten Applications that Require Deep Learning -- Restoring Color to Black-and-White Videos and Pictures -- Approximating Person Poses in Real Time -- Performing Real-Time Behavior Analysis -- Translating Languages -- Estimating Solar Savings Potential -- Beating People at Computer Games -- Generating Voices -- Predicting Demographics -- Creating Art from Real-World Pictures -- Forecasting Natural Catastrophes -- Chapter 19 Ten Must-Have Deep Learning Tools -- Compiling Math Expressions Using Theano -- Augmenting TensorFlow Using Keras -- Dynamically Computing Graphs with Chainer -- Creating a MATLAB-Like Environment with Torch -- Performing Tasks Dynamically with PyTorch -- Accelerating Deep Learning Research Using CUDA -- Supporting Business Needs with Deeplearning4j -- Mining Data Using Neural Designer -- Training Algorithms Using Microsoft Cognitive Toolkit (CNTK) -- Exploiting Full GPU Capability Using MXNet -- Chapter 20 Ten Types of Occupations that Use Deep Learning -- Managing People…”
Libro electrónico -
6935Publicado 2023Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
Libro electrónico -
6936Publicado 2023Tabla de Contenidos: “…Refreshment breaks -- Lunch -- Dinner -- Receptions -- Parties -- Banquets -- Serving Drinks at Your Event -- Working with the Catering Manager -- Getting It All in Writing -- Guaranteeing guests -- Setting up the room -- Chapter 8 Selecting Great Speakers -- Understanding Types of Presentation -- Selecting Good Speakers -- Know the program objectives -- Understand audience needs -- Check for reputation -- See a demo -- Watch out for celebrity speakers -- Be wary of grandiose claims -- Provide and ask for good information -- Ask for an outline, handouts, and promotional material -- Maximize opportunities -- Trust your instincts -- Using Help to Find a Speaker -- Understanding Fees -- Confirming Arrangements in Writing -- Chapter 9 It's the Extras That Count -- Helping Guests Get a Good Meal -- Showing Off the Location to Your Guests -- Putting Sports and Exercise on the Menu -- Welcoming Spouses and Partners -- Chapter 10 Lights, Camera, Action! …”
Libro electrónico -
6937Publicado 2017Tabla de Contenidos: “…. -- Learning to forge Celebrity Faces and other datasets with DCGAN -- Getting ready -- How to do it... -- How it works... -- There's more... -- Implementing Variational Autoencoders -- Getting ready... -- How to do it... -- How it works... -- There's More... -- See also... -- Learning to beat the previous MNIST state-of-the-art results with Capsule Networks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 12: Distributed TensorFlow and Cloud Deep Learning -- Introduction -- Working with TensorFlow and GPUs -- Getting ready -- How to do it... -- How it works... -- Playing with Distributed TensorFlow: multiple GPUs and one CPU -- Getting ready -- How to do it... -- How it works... -- Playing with Distributed TensorFlow: multiple servers -- Getting ready -- How to do it... -- How it works... -- There is more... -- Training a Distributed TensorFlow MNIST classifier -- Getting ready -- How to do it... -- How it works... -- Working with TensorFlow Serving and Docker…”
Libro electrónico -
6938Publicado 2012Tabla de Contenidos:Libro electrónico
-
6939CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
Libro electrónico -
6940Publicado 2023Tabla de Contenidos: “…Drive Further Improvements -- 13. Celebrate Successes -- 14. Align the Plant to the Wheel Rhythm -- Step 4: Take Stock -- 15. …”
Libro electrónico