Mostrando 6,921 - 6,940 Resultados de 9,485 Para Buscar '"In Celebration"', tiempo de consulta: 0.25s Limitar resultados
  1. 6921
    por Klidas, Angelika
    Publicado 2022
    Tabla de Contenidos: “…Learning levels -- Covering all moments of need -- Learning methodologies -- Including all knowledge types -- Learning elements -- Organizing content -- Searching for content -- Measuring success -- Celebrating successes -- Summary -- Further reading -- Chapter 5: Managing Your Data Environment -- Introducing data management -- Understanding your data quality -- Intermezzo - Starting to improve data quality in a small-scaled healthcare environment -- Delivering a data management future -- Data strategy -- Taking care of your data strategy -- Creating a data vision -- Identifying your data -- Discovering where your data is stored -- Retrieving your data -- Combining and enriching data -- Setting the standard -- Processes -- Control -- IT -- Summary -- Part 2: Understanding How to Measure the Why, What, and How -- Chapter 6: Aligning with Organizational Goals -- Understanding the types of indicators -- Identifying KPIs -- Characteristics of KPIs -- Leading and lagging indicators -- Reviewing for unintended consequences -- Applying Goodhart's law to KPIs -- Defining what to track -- Activity system maps -- Logic models -- Summary -- References -- Chapter 7: Designing Dashboards and Reports -- The importance of visualizing data -- Deceiving with bad visualizations -- Using our eyes and the usage of colors -- Introducing the DAR(S) principle -- Defining your dashboard -- Choosing the right visualization -- Understanding some basic visualizations -- Bar chart (or column chart or bar graph) -- Line chart -- Pie chart -- Heatmap -- Radar chart -- Geospatial charts -- KPIs in various ways -- Tables -- Presenting some advanced visualizations -- Bullet charts -- Addressing contextual analysis -- Summary -- Chapter 8: Questioning the Data -- Being curious and critical by asking questions -- Starting with the problem - not the data…”
    Libro electrónico
  2. 6922
    Publicado 2022
    Tabla de Contenidos: “…Adjust the Design of a Report -- Work with Dashboards -- Create a New Report or Dashboard -- Print a Report -- Key Terms -- Review Questions -- Part IV Close Your Project -- Lesson 13 Obtain Project Acceptance -- Present the Project to the Sponsor -- Secure Official Project Sign-Off -- Complete Final Refinements -- Have the Sponsor Sign Off on the Project -- Celebrate With Your Team -- Key Terms -- Review Questions -- Lesson 14 Retain Project History -- Document Lessons Learned -- Identify the Information You Can Use -- Gather Lessons Learned -- Document and Share the Lessons Learned -- Archive Project History -- Clean Up Your Project Plan -- Add Key Documents to the Project Plan -- Organize the Archive File Structure -- Key Terms -- Review Questions -- Appendix Answers to the Review Questions -- Lesson 1. …”
    Libro electrónico
  3. 6923
    por Reijnders, Stijn
    Publicado 2024
    Tabla de Contenidos: “…Master Historical Narrative -- Walking in Laura's Footsteps: The Homesites' History -- Indigenous Resurgence, New Western Historiography, and Culture Wars -- Wilder's Stories and the New West Histories -- Little Houses in the Classroom and Library -- Wilder Homesites, the New West Histories, and Culture Wars -- Conclusion -- Notes -- References -- 11 Popular Music Heritage in Ekaterinburg: From Seeking Authorisation and Nostalgia for Soviet Rock to Participatory Place-Making -- Popular Music Heritage Between Fan Communities and Cultural Economy -- Ekaterinburg -- Methodology -- Sverdlovsk Rock: Authorisation and Contested Memorial Sites -- Nostalgic Exploration of the City Through Soviet Rock Music History -- Celebrating Internationally Famous Musicians in Ekaterinburg -- Playful and Affective Practices: Paying Tribute, Performing, Taking Pictures -- Conclusion -- Note -- References -- 12 Negotiating Dark and Light Magic: Witch-Themed Tourism in Harz, Germany, in a Transcultural Context -- Introduction -- Literature Review -- Witch-themed Tourism and Media of the Harz Region -- Witch-themed Tourism in Salem and a Critical Consideration of Dark Tourism -- Methodology -- Findings…”
    Libro electrónico
  4. 6924
    Publicado 1610
    Tabla de Contenidos: “…Breve Descripcion dela Magestuosa Pompa y celebre Aparato, con que la siempre M.N . y M . Leal Ciudad de Sevilla levantó el Real Pendon y Estandarte por el Rey N.S . …”
    Manuscrito
  5. 6925
    Tabla de Contenidos: “….: Dam = Que apasible y fresca / está esta celebre Alameda (h. 88r.). 19. Paso de Galan y dama (h. 94r.-101r.) …”
    Manuscrito
  6. 6926
    Publicado 2019
    Tabla de Contenidos: “…Consumer Response -- Promotional Tactics -- Advantages and Shortcomings -- Desktop versus Mobile Devices -- The Future -- Advertising's Reach and Efficacy -- Analyzing Website Visits -- Gauging Influence within Social Network -- Google Analytics -- Online Fraud and Unseen Ads -- Pirated Content -- Nielsen -- Time‐Shifted Viewing -- Facebook, Google, and Twitter -- Skipping and Blocking -- Improved Measures of Social Activity -- Traditional Media's Evolution -- Television -- Radio -- Print Media -- Out‐of‐Home Media -- Branded Content -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- 9 Reference Groups and Communities, Opinion Leaders, and Word‐of‐Mouth -- The Credibility and Persuasive Power of Reference Groups -- Consumption‐Related Reference Group -- Friends -- Fellow Shoppers -- Virtual Communities -- Advocacy Groups -- Factors Affecting Reference Group Influence -- Conformity -- Group Power -- Product Expertise -- Product Conspicuousness -- Endorsers and Spokespersons -- Celebrities -- Salesperson Credibility -- Vendor Credibility -- Medium Credibility -- Opinion Leaders and Word‐of‐Mouth -- Characteristics of Opinion Leaders -- Measuring Opinion Leadership -- Questioning -- Social Interactions -- Identifying Experts -- Online Influence -- Word‐of‐Mouth's Strategic Applications -- Online Reference Groups -- Stimulating Word‐of‐Mouth -- Going Viral -- Managing Negative Rumors -- Innovations' Adopters as Reference Groups -- The First Buyers -- The Followers -- The Somewhat Risk‐Averse -- The Highly Risk‐Averse -- The Last to Purchase -- The Nonadopters -- Summary -- Review and Discussion Questions -- Hands-on Assignments -- Key Terms -- PART IV Social and Cultural Settings -- 10 The Family and Its Social Standing -- Family and Consumer Socialization -- Parental Styles and Consumer Socialization…”
    Libro electrónico
  7. 6927
    Publicado 2011
    Tabla de Contenidos: “…Recovery -- Rebaselining Strategies -- Consultants' Tips -- 17 Closing the Project -- The Project Close Process Group -- Performing Final Reporting -- Performing a Project Retrospective (Lessons Learned) -- Archiving Your Schedule -- Celebrating Your Project Results -- Consultants' Tips -- IV: Tailoring Microsoft Office Project 2010 to Your Needs…”
    Libro electrónico
  8. 6928
    Publicado 2023
    Tabla de Contenidos: “…-- Chapter 25 Pick Up The Phone -- Chapter 26 Conversation To Opportunity -- Part 9 Bonus Chapters -- Chapter 27 Pipeline Will always Be KING -- 1) They don't find Enough opportunities to hit target -- 2) They live in pipeline Denial -- 3) They celebrate the Opportunity over the sale -- 4) They Stop Prospecting when they've Got enough Opportunities -- Chapter 28 Ten Big Linkedin &amp -- Sales Navigator Tips -- 1) Set An Away Message On Linkedin (Sales Nav Tip) -- 2) Add A Cover Story Video To Your Linkedin Profile (Linkedin Tip) -- 3) Share A Testimonial Post This Week (Linkedin Tip) -- 4) Make Your Subject Line On Inmail About Them (Sales Nav Tip)…”
    Libro electrónico
  9. 6929
    Publicado 2023
    Tabla de Contenidos: “…Documenting Change Recommendations -- Determining Decision-Makers -- Managing the Change Control Board -- Documenting Approval Status in the Change Control Log -- Communicating Change Status -- Updating the Project Management Plan -- Implementing the Change -- Validating the Change and Perform a Quality Check -- Communicating Change Deployment -- Other Change Requests -- Project Change Management -- Implementing Organizational Change -- Types of Organizational Change -- Implementing Organizational Change -- Operational Change Control on an IT Project -- IT Infrastructure Control -- Software Change Control -- Other IT Change Processes -- Agile Frameworks -- Scaling Frameworks -- Projects in Control (PRINCE2) -- Summary -- Exam Essentials -- Key Terms -- Review Questions -- Chapter 10 Managing Quality and Closing Out the Project -- Controlling Quality -- Inspecting and Testing -- Using Quality Charts -- Common Causes of Variances -- Taking Action on Quality Control -- Managing Issues -- Roles and Responsibilities -- Issue Tracking -- Resolution Plan -- Resolution Techniques -- Outcome Documentation -- Action Items -- Using Performance Measures -- Key Performance Indicators -- Balanced Scorecard -- Key Objectives and Results -- Cost and Schedule Performance -- Project Endings -- Characteristics of Closing -- Types of Project Endings -- Steps in Closing Out a Project -- Verification and Validation of Deliverables -- Obtaining Sign-Off -- Developing a Transition Plan and Operational Handoff -- Removing Access -- Releasing Team Members -- Closing Out the Contract -- Archiving Documentation -- Documenting Lessons Learned and Project Evaluation -- Project Closure Meeting -- Project Closeout Report -- Rewards and Celebrations -- Postimplementation Support and Warranty Period -- Summary -- Exam Essentials -- Key Terms -- Review Questions…”
    Libro electrónico
  10. 6930
    por Rydin, Thor
    Publicado 2023
    Tabla de Contenidos: “…Another example of Dutch internationalist culture at the beginning of the twentieth century: several board games celebrating peace and cooperation were brought onto the market in the 1900s and 1910s, both by commercial and public institutions…”
    Libro electrónico
  11. 6931
    por Burrows, Mike
    Publicado 2020
    Tabla de Contenidos: “…-- 5.2 Das Outside-in Service Delivery Review (OI-SDR) -- 5.2.1 Grund 1: Kontext -- 5.2.2 Grund 2: Alignment -- 5.2.3 Grund 3: Beteiligung -- 5.2.4 Grund 4: Daten -- 5.2.5 Grund 5: Lernen -- 5.2.6 Grund 6: Fertigstellung -- 5.3 Das Outside-in Strategy Review (OI-SR) -- 5.3.1 Teil 1: Einigung auf einen Zeitrahmen -- Abb. 5-1 Eine Vorlage für das Celebration-5W -- 5.3.2 Teil 2: Die Outside-in-Fragen -- 5.3.3 Teil 3: Von Hindernissen zu Ergebnissen -- Abb. 5-2 15-Minuten-Cue-Card -- 5.3.4 Teil 4: Einen Plan strukturieren -- Abb. 5-3 Eine Vorlage für ein OI-SR -- 5.3.5 Teil 5: Optionen entwickeln…”
    Libro electrónico
  12. 6932
    por AA., VV
    Publicado 2018
    Tabla de Contenidos: “…MELANCOLÍA -- FRASES CÉLEBRES -- PARA LAS DAMAS -- SOCIALES Y PERSONALES -- VAYA, VAYA CON -- RETORIALES -- A PROPÓSITO DE LAS FIESTAS PATRIAS -- SECCIÓN BIBLIOGRÁFICA -- TEATROS -- NÚMERO 12, 17 DE OCTUBRE DE 1918 -- EL DESPERTAR DE UNA GENERACIÓN -- LA FILOSOFÍA CIENTÍFICA EN LA ORGANIZACIÓN -- EL CARÁCTER DE MÉRIGO -- YO COMENTO EN VOZ BAJA -- SORPRENDÍ AL SOL ... -- CUANDO LLEGO EL AMOR -- CUESTIONES DE ESTÉTICA. …”
    Libro electrónico
  13. 6933
    Publicado 2022
    Tabla de Contenidos: “…Remove Online Distractions -- Kill the Bandwidth Eaters -- Test Your Audio -- Eliminate Background Noise -- Krisp -- SoliCall Pro -- Change Audio Settings -- Adjust Your Camera -- Prepare Yourself -- Dress for the Meeting -- Posture -- Know Your Attendees -- Get Some Clarity: Quiet Your Mind -- Etiquette -- Check Your Tech -- Arrive Early -- Make Eye Contact -- Cut the Mic -- Use Their Names -- Pay Attention -- When You Are the Presenter -- When You Are an Attendee -- Make Use of Whiteboards -- Bluescape -- Conceptboard -- Draw.Chat -- Hoylu -- Miro -- Engagement and Communication -- Chapter 8 The Watercooler Has Moved-Engagement and Socializing Remotely -- The Impact of Social Isolation -- It's Far More Than Loneliness -- Safety and Security -- Love and Belonging -- Esteem -- The Need for Social Interactions -- Avoiding Social Isolation -- Be on the Lookout for Isolation -- What to Look For -- It's Preventable -- Changes in Appearance -- Changes in Communication Habits -- Changes in Quality of Work -- Cancellations or Lateness -- Overproductivity -- High Levels of Distractability -- Don't Make Poor Assumptions -- Self-Assessment -- Negative Thoughts and Feelings -- Change in Sleep Patterns -- Fatigue -- Disinterest -- Lowered Motivation -- Irritability -- Trouble Maintaining Focus -- Depression -- Combating Isolation -- Structural Changes -- Make Work Accessible -- Visibility and Transparency -- Communication -- Check-In -- Feedback -- Recognition -- Mental Health Support -- Mental Health Toolkits -- Encourage Physical Fitness -- Engagement -- Showing Up and Staying -- Not Out of Mind -- Engagement Aligned with Other Values -- Foster Openness -- Listening Actively and Empathetically -- Social Needs -- Creating Non-Work Spaces -- Virtual Lunches, Coffee Breaks, and Happy Hours -- Make Pre-Meeting Time -- Celebrations…”
    Libro electrónico
  14. 6934
    Publicado 2019
    Tabla de Contenidos: “…Reducing the problem to statistics -- Understanding that deep learning doesn't create -- Mimicking an Artist -- Defining a new piece based on a single artist -- Combining styles to create new art -- Visualizing how neural networks dream -- Using a network to compose music -- Chapter 16 Building Generative Adversarial Networks -- Making Networks Compete -- Finding the key in the competition -- Achieving more realistic results -- Considering a Growing Field -- Inventing realistic pictures of celebrities -- Enhancing details and image translation -- Chapter 17 Playing with Deep Reinforcement Learning -- Playing a Game with Neural Networks -- Introducing reinforcement learning -- Simulating game environments -- Presenting Q-learning -- Explaining Alpha-Go -- Determining if you're going to win -- Applying self-learning at scale -- Part 4 The Part of Tens -- Chapter 18 Ten Applications that Require Deep Learning -- Restoring Color to Black-and-White Videos and Pictures -- Approximating Person Poses in Real Time -- Performing Real-Time Behavior Analysis -- Translating Languages -- Estimating Solar Savings Potential -- Beating People at Computer Games -- Generating Voices -- Predicting Demographics -- Creating Art from Real-World Pictures -- Forecasting Natural Catastrophes -- Chapter 19 Ten Must-Have Deep Learning Tools -- Compiling Math Expressions Using Theano -- Augmenting TensorFlow Using Keras -- Dynamically Computing Graphs with Chainer -- Creating a MATLAB-Like Environment with Torch -- Performing Tasks Dynamically with PyTorch -- Accelerating Deep Learning Research Using CUDA -- Supporting Business Needs with Deeplearning4j -- Mining Data Using Neural Designer -- Training Algorithms Using Microsoft Cognitive Toolkit (CNTK) -- Exploiting Full GPU Capability Using MXNet -- Chapter 20 Ten Types of Occupations that Use Deep Learning -- Managing People…”
    Libro electrónico
  15. 6935
    Publicado 2023
    Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
    Libro electrónico
  16. 6936
    Publicado 2023
    Tabla de Contenidos: “…Refreshment breaks -- Lunch -- Dinner -- Receptions -- Parties -- Banquets -- Serving Drinks at Your Event -- Working with the Catering Manager -- Getting It All in Writing -- Guaranteeing guests -- Setting up the room -- Chapter 8 Selecting Great Speakers -- Understanding Types of Presentation -- Selecting Good Speakers -- Know the program objectives -- Understand audience needs -- Check for reputation -- See a demo -- Watch out for celebrity speakers -- Be wary of grandiose claims -- Provide and ask for good information -- Ask for an outline, handouts, and promotional material -- Maximize opportunities -- Trust your instincts -- Using Help to Find a Speaker -- Understanding Fees -- Confirming Arrangements in Writing -- Chapter 9 It's the Extras That Count -- Helping Guests Get a Good Meal -- Showing Off the Location to Your Guests -- Putting Sports and Exercise on the Menu -- Welcoming Spouses and Partners -- Chapter 10 Lights, Camera, Action! …”
    Libro electrónico
  17. 6937
    Publicado 2017
    Tabla de Contenidos: “…. -- Learning to forge Celebrity Faces and other datasets with DCGAN -- Getting ready -- How to do it... -- How it works... -- There's more... -- Implementing Variational Autoencoders -- Getting ready... -- How to do it... -- How it works... -- There's More... -- See also... -- Learning to beat the previous MNIST state-of-the-art results with Capsule Networks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 12: Distributed TensorFlow and Cloud Deep Learning -- Introduction -- Working with TensorFlow and GPUs -- Getting ready -- How to do it... -- How it works... -- Playing with Distributed TensorFlow: multiple GPUs and one CPU -- Getting ready -- How to do it... -- How it works... -- Playing with Distributed TensorFlow: multiple servers -- Getting ready -- How to do it... -- How it works... -- There is more... -- Training a Distributed TensorFlow MNIST classifier -- Getting ready -- How to do it... -- How it works... -- Working with TensorFlow Serving and Docker…”
    Libro electrónico
  18. 6938
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  19. 6939
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
    Libro electrónico
  20. 6940
    Publicado 2023
    Tabla de Contenidos: “…Drive Further Improvements -- 13. Celebrate Successes -- 14. Align the Plant to the Wheel Rhythm -- Step 4: Take Stock -- 15. …”
    Libro electrónico