Mostrando 4,481 - 4,500 Resultados de 5,366 Para Buscar '"Journey"', tiempo de consulta: 0.13s Limitar resultados
  1. 4481
    Publicado 2022
    Tabla de Contenidos: “…-- 1.2.1 Imagination -- 1.2.2 Implementation -- 1.2.3 The value of testing -- 1.2.4 Being strategic with API testing -- Summary -- 2 Beginning our testing journey -- 2.1 Introducing our product -- 2.1.1 Introducing our sandbox API -- 2.2 Familiarizing ourselves with restful-booker-platform -- 2.2.1 Researching the product -- 2.2.2 Researching beyond the product -- 2.3 Capturing our understanding -- 2.3.1 The power of models -- 2.3.2 Building our own models -- 2.4 Congratulations-you're testing! …”
    Libro electrónico
  2. 4482
    Publicado 2023
    “…This book takes developers on a journey into the cloud with Docker and Kubernetes. …”
    Libro electrónico
  3. 4483
    por Denault, Jean-François
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Cover Page -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Preface -- About the Authors -- 1 Overview of the Entrepreneur's Journey -- 2 Basics of Market Research -- 2.1 Basic Market Research Concepts -- 2.1.1 Primary and Secondary Market Research -- 2.1.2 Quantitative and Qualitative Data -- 2.1.3 "Miles Wide" versus "Deep Dives" Research -- 2.1.4 Types of Market Research -- 2.2 Preparing Your Market Research Plan -- 2.3 Collecting Data - Primary Research -- 2.3.1 Data Collection Methods -- 2.4 Secondary Research -- 2.4.1 Active Secondary Research -- 2.4.2 Passive Secondary Research -- 2.4.3 Internal Secondary Data -- 2.5 A Few Words on Ethics and Market Research -- 3 Basics of a Product-Market Fit -- 3.1 Getting Your Data -- 3.1.1 Conducting Conversations -- 3.1.2 Collecting Online Reviews -- 3.1.3 Organizing Online Surveys -- 3.2 Evaluating PMF -- 3.3 The Final Word -- 4 Basics of Intellectual Property Strategy -- 4.1 The IP Portfolio -- 4.1.1 Patents -- 4.1.2 Trademarks -- 4.1.3 Copyrights -- 4.1.4 Trade Secrets -- 4.2 Activities That Enhance the Value of Your IP Portfolio -- 4.2.1 Patentability Assessment -- 4.2.2 Freedom to Operate Search -- 4.3 Theranos and the Limits of the IP Portfolio -- 4.4 Final Thoughts -- 5 Developing a Customer-Centric Approach -- 5.1 Introduction to the Healthcare Ecosystem -- 5.1.1 Overview of the Healthcare Ecosystem -- 5.1.2 A Transforming Healthcare Ecosystem -- 5.2 Different Ecosystems, Different Payer Models -- 5.2.1 Single-Payer Healthcare -- 5.2.2 The Social Insurance Model -- 5.2.3 National Health Insurance Model -- 5.2.4 The Out-of-Pocket Model -- 5.2.5 Standing on Its Own: The United States -- 5.3 Correctly Identifying Your Client -- 5.3.1 Building Customer Profiles -- 5.4 Developing a Customer-Centric Approach -- 5.5 Closing Words -- 6 Developing Your Business Model…”
    Libro electrónico
  4. 4484
    Publicado 2004
    Tabla de Contenidos: “…Process choreographer: developing a complex process -- 8.1 Introduction -- 8.2 Preparation -- 8.2.1 Importing the prepared NiceJourney…”
    Libro electrónico
  5. 4485
    Publicado 2015
    Tabla de Contenidos: “…Taking DaaS from Concept to Reality 280 -- Topics Covered in this Chapter 280 -- Service Performance Measurement Using the Balanced Scorecard 284 -- Implementing the Performance Scorecard to Improve Data Services 286 -- Embarking on the DaaS Journey with a Vision 287 -- Using AGILE Principles for New Data Services Development 290.…”
    Libro electrónico
  6. 4486
    Publicado 2024
    Tabla de Contenidos: “…Chapter 11: Shield Right for APIs with Runtime Protection -- Technical requirements -- Securing and hardening environments -- Container images -- Operating systems -- Using WAFs -- Understanding the Next-Generation Firewall (NGWAF) and Web Application API Protection (WAAP) products -- Using API gateways and API management -- Implementing security patterns in the Kong API gateway -- Best practices for API gateway protection -- Deploying API firewalls -- API monitoring and alerting -- Selecting the correct protections for your APIs -- Summary -- Further reading -- Chapter 12: Securing Microservices -- Technical requirements -- Understanding microservices -- Securing the foundations of microservices -- Securing the connectivity of microservices -- Access control for microservices -- Running secure microservices in practice -- Summary -- Further reading -- Chapter 13: Implementing an API Security Strategy -- Ownership of API security -- Understanding your stakeholders -- Roles and responsibilities -- The 42Crunch maturity model -- Inventory -- Design -- Development -- Testing -- Protection -- Governance -- Planning your program -- Establishing your objectives -- Assessing your current state -- Building a landing zone for APIs -- Running your program -- Building your teams -- Tracking your progress -- Integrating with your existing AppSec program -- Your personal API security journey -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  7. 4487
    Publicado 2022
    Tabla de Contenidos: “…Organizational Adaptation of Statewide Parties -- Conclusion: Summary and Future Agenda -- Notes -- References -- Part 2 Case Studies -- 8 The Åland Islands: 100 Years of Stability -- Introduction -- Demographics -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Conclusion -- Further Readings -- References -- 9 Aceh: Fading Autonomy -- Introduction -- Demographics -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Conclusion -- References -- 10 The Basque Country: History and Autonomy -- Introduction -- Demographics -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Conclusion -- Notes -- Further Readings -- References -- 11 Catalonia: From Autonomy to Self-Determination -- Introduction -- Demographics -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Recent Developments -- Conclusion -- Notes -- Further Readings -- References -- 12 Gibraltar: Democracy Without Decolonization -- Introduction -- History -- Status -- Location -- Demographics -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Conclusion -- Further Readings -- References -- 13 Greenland: Autonomy in the Arctic Region -- Introduction -- Historical Background -- Demographics -- From Colony to County to Self-Government -- Indigeneity -- Language Politics -- Executive-legislative Politics -- Global Connectedness -- Conclusion -- References -- 14 Guam: The Place Where America's Day Begins -- Introduction -- Geographic Information of Guam -- Socioeconomic Characteristics of Guam -- Demographics -- Language Politics -- Executive-legislature Politics -- Global Connectedness -- Recent Developments -- Conclusion -- The COVID-19 Pandemic -- The Journey for Self-Determination -- Notes -- Further Readings -- References…”
    Libro electrónico
  8. 4488
    Publicado 2023
    Tabla de Contenidos: “…-- The Adversary Intelligence Trifecta: Kill Chain, ATT&amp -- CK, and Diamond -- Security Operations Centers: A Tactic for Intrusion Kill Chain Prevention -- Orchestrating the Security Stack: An Intrusion Kill Chain Prevention Tactic -- Cyber Threat Intelligence: A Tactic for All First Principles Strategies but Primarily for Intrusion Kill Chain Prevention -- Cyber Threat Intelligence Operations As a Journey…”
    Libro electrónico
  9. 4489
    Publicado 2024
    Tabla de Contenidos: “…Use cases for Entra ID Protection -- Case study analysis -- Extending XDR capabilities to on-premises and hybrid cloud by leveraging MDC -- MDC key features -- Benefits of using unified XDR for on-premises, multi-cloud, or hybrid cloud scenarios -- Case study analysis -- Microsoft Sentinel - SIEM and SOAR -- Sentinel key features -- Microsoft Sentinel versus Microsoft Defender XDR -- Case study analysis -- XDR and beyond - exploring commonly used security solutions -- Microsoft Defender for IoT -- EASM -- MDTI -- Microsoft Copilot for Security -- Case study analysis -- Microsoft's unified XDR and SIEM solution's benefits over non-MS solutions -- The future - Microsoft's influence in cybersecurity -- The graphical Windows OS revolution -- Reshaping server technology with Windows NT -- Outlook and the transformation of email communication -- MS Office - standard in productivity software -- Internet Explorer - a chapter in web browsing -- The future - Microsoft's rising influence in cybersecurity -- Summary -- Further reading -- Part 2 - Microsoft's Unified Approach to Threat Detection and Response -- Chapter 4: Power of Investigation with Microsoft Unified XDR and SIEM Solution -- Understanding the basics of SOC -- Typical SOC roles -- Avengers of cybersecurity -- Traditional versus modern SOC operations -- SOC journey with Microsoft's unified security operations platform -- Investigation in Microsoft Sentinel -- Investigation in Microsoft Defender XDR -- Microsoft Copilot for Security -- Integrations with other Microsoft security solutions and third-party tools -- Microsoft Defender XDR platform - Single pane of glass -- Microsoft Sentinel -- Third Party integrations -- Case study analysis -- Summary -- Further reading -- Chapter 5: Defend Attacks with Microsoft XDR and SIEM -- An attack kill chain in XDR and SIEM…”
    Libro electrónico
  10. 4490
    Publicado 2024
    Tabla de Contenidos: “…-- Check points are important during the delivery -- Anticipation of likely questions and any required support material -- Delivering the final presentation to SmartStream -- Challenging situations when delivering a story -- Continuous interruptions from the audience -- Reacting to strong disagreement -- A conflict between two audience participants -- Hostile objections and political agendas -- Chapter summary -- Master a robust set of presentation mechanics -- When delivering the story, take your audience on a journey -- Be aware of common challenges and strategies for handling them -- Next steps -- Notes -- Completion checklist…”
    Libro electrónico
  11. 4491
    por Cameron, Brian H.
    Publicado 2024
    Tabla de Contenidos: “…-- The Contemporary Practice of Business Architecture -- Traditional Execution-Level Business Architecture versus Strategic Business Architecture -- Strategy and Enterprise Architecture -- The Role of Strategic Business Architecture in Strategy Execution -- Challenges with Strategic Planning -- Strategic Business Architecture as a Bridge between Strategy and Execution -- The Role of Strategic Business Architecture in the Develop/Adjust Strategy Stage -- The Role of Business Architecture in the Plan/Adjust Portfolios/Projects Stage -- Capability Portfolio Management -- Project Portfolio Management -- The Journey to Leverage Strategic Business Architecture for Value -- The Role of Strategic Business Architecture in Design -- The Role of Strategic Business Architecture in Agile Enterprise Transformation…”
    Libro electrónico
  12. 4492
    Publicado 2013
    Tabla de Contenidos: “…7.4.3 Criteria for Preferred Material in Ecolabels -- 7.5 Conclusion -- References -- DSM's Sustainability Journey Towards a Proactive Ingredient Policy for Gaining Effectiveness in the Design of Better Products -- 8.1 General Introduction: Sustainability as Business Growth Driver Opportunity and Global Trends -- 8.1.1 Ecological Benefits: Transparent Assessment with Life-cycle Assessment (LCA) -- 8.1.2 Importance of Global Platforms and Partnerships -- 8.1.3 The Challenges Ahead for a Life Sciences and Materials Sciences Company -- 8.2 A Brighter Future with Composites -- 8.2.1 Leading-edge Performance -- 8.2.2 Lower Eco-footprint -- 8.2.3 Elimination of Substances of hazardous concern -- 8.2.4 BluCureTM Cobalt-free Curing Systems -- 8.2.5 Alternatives to Styrene Reactive Diluents -- 8.2.6 Introduction of Good Manufacturing Practice (GMP) -- 8.3 Facing the Technical, Performance and Cost Challenges: the Introduction of Halogen-free Flame Retardants -- 8.3.1 Overcoming Technical Challenges -- 8.3.2 Moving Forward -- 8.4 Conclusion -- References -- US Environmental Protection Agency's Design for the Environment (DfE) Alternatives Assessment Program -- 9.1 Introduction -- 9.2 Selecting an Approach for Chemical Substitution -- 9.3 PentaBDE Case Study -- 9.3.1 How DfE Conducted CAA for PentaBDE -- 9.3.2 Limitations of Original Methodology and Criteria -- 9.4 New CAA Methodology and Criteria: Steps to Conducting a CAA -- 9.4.1 Step 1: Determine Feasibility -- 9.4.2 Step 2: Collect Information on Chemical Alternatives -- 9.4.3 Step 3: Convene Stakeholders -- 9.4.4 Step 4: Identify Alternatives -- 9.4.5 Step 5: Conduct the Hazard Assessment -- 9.4.6 Step 6: Apply Economic and Life-cycle Context -- 9.4.7 Step 7: Apply the Results in Decision-making for Safer Chemical Substitutes -- 9.5 Application of New CAA Criteria…”
    Libro electrónico
  13. 4493
    Publicado 2015
    Tabla de Contenidos: “…Teaching and Learning: A Journey from the Margins to the Core in European Higher Education Policy. …”
    Libro electrónico
  14. 4494
    por Naylor, David
    Publicado 2023
    Tabla de Contenidos: “…-- Broadening Our Perspective on Ourselves -- Understanding the Aspects of "You" That Evolution Cares About -- Your Survivor Brain -- The Oldest and Most Intelligent Part of You -- The Intelligence of Our Survivor Brain -- Your Communicator Brain -- The First Form of Communication -- The Intelligence of Our Communicator Brain -- Your Solver/Critical Brain -- The Troublemaker of the Mind -- The Intelligence of Our Solver/Critical Brain -- What Evolution Handed You and Me -- Chapter 5 Modern Life with Our Ancient Mind -- Part 2 Becoming the New You: Your Mental Reboot -- Chapter 6 For Your Reboot: The Power of Choice Is Your Most Important Asset -- The Power of What We Choose to Believe -- The Challenge with Choice -- The Journey Ahead: Making Our Most Important Choices -- Chapter 7 Rebooting Your Control of You -- Recognizing When Victim Thinking Knocks at the Door -- What Is Ultimate Responsibility? …”
    Libro electrónico
  15. 4495
    Publicado 2023
    Tabla de Contenidos: “…Qualitative versus quantitative methods -- Sample size and sampling methods -- Sample size example -- Understanding user motivation and behavior -- Triangulating insights and bridging the qualitative-quantitative divide -- Applying market research insights to drive product excellence -- Creating user personas and Jobs to Be Done -- Personas -- JTBD -- Summary -- Chapter 5: Game Mechanics and Psychology -- Reward systems -- Point redemption -- Punch cards -- Referral systems -- Content unlocks -- Memberships -- Community recognition -- Purchase matching -- Random loot -- Progress tracking -- Points -- Leveling -- Badges -- Achievements -- Completion scores -- Step counters -- Completion rewards -- Tests of knowledge -- Accomplishment splashes -- Save points -- Anniversary call-out -- Narrative and storytelling -- Customer reviews -- Environmental, Social, and Governance -- Year in review -- Inventory systems -- User profiles -- Avatars -- Mentor -- Abandonment capture -- User research artifacts -- Social engagement -- High scores -- Leaderboards -- Live collaboration -- Share button -- Voting -- Reactions -- Chat -- Friends and follow -- Game psychology -- Clues -- Layering -- Experimentation -- Ambiance -- Repetition -- Landmarking -- Easter eggs -- Emergent behavior -- Boss fights -- Combos -- Summary -- Further reading -- Chapter 6: Designing a Gamification Strategy -- Setting goals and objectives -- Defining OKRs -- Defining success metrics -- Selecting your personas and JTBD to design around -- Choosing the right game mechanics -- Hi-Z Fitness -- PMM -- Creating a game loop -- Create progression systems -- Encourage social interaction -- Include challenges and variety -- Incorporating gamification into the user experience -- Creating a user journey map -- Creating a user flow diagram -- Wireframes -- Summary…”
    Libro electrónico
  16. 4496
    Publicado 2024
    Tabla de Contenidos: “…Raymond -- Your system programming journey -- Appendix -- Hardware Automation -- Automation in system programming -- USB -- Application -- The goal -- The /proc/mounts file -- Reading the files on the flash drive -- Partitions versus blocks versus devices versus disks -- Open source to the rescue! …”
    Libro electrónico
  17. 4497
    Publicado 2021
    Tabla de Contenidos: “…Team Recognition -- Work Relationships Before and After Office Hours -- Food As an Elixir of Trust -- Takeaways About the Difference in Cultures -- Trust: The Basic Building Block of Agile Teams -- Scene 1 -- Scene 2 -- The Lessons -- Agile Community Events and Meetups -- Chapter 7: Indonesia -- History -- Insights -- The Impact of Book Reports: A Story on Continuous Learning -- Some Ideas to Spark Self-Learning -- Personal Retrospective -- Change the Environment -- Experiences of a Dutch Guy Building an Agile Company in Indonesia -- Agile Communities and Coaching in Indonesia -- Bank Central Asia, Jakarta - A Journey to Agility -- Getting On and Around -- Agile Community Events and Meetups -- Chapter 8: Japan -- History -- The Toyota Takaoka Plant Tour6 -- Insights -- Mob Programming in Japan -- KDDI: Designing the Future Using Scrum11 -- Getting On and Around…”
    Libro electrónico
  18. 4498
    Tabla de Contenidos: “…In-company trainers need to be able to support students' learning journeys in the workplace -- 1.1.3. Shortages of teachers and trainers in VET are common -- 1.2. …”
    Libro electrónico
  19. 4499
    Publicado 2023
    Tabla de Contenidos: “…-- Picking a model -- Understanding loss functions -- Gradient descent -- Getting in the (Tensor)Flow -- Training the model -- Binary classifier performance -- Quantum-classical models -- Summary -- Chapter 9: Quantum Support Vector Machines -- Support vector machines -- The simplest classifier you could think of -- How to train support vector machines: the hard-margin case -- Soft-margin training -- The kernel trick -- Going quantum -- The general idea behind quantum support vector machines -- Feature maps -- Quantum support vector machines in PennyLane -- Setting the scene for training a QSVM -- PennyLane and scikit-learn go on their first date -- Reducing the dimensionality of a dataset -- Implementing and using custom feature maps -- Quantum support vector machines in Qiskit -- QSVMs on Qiskit Aer -- QSVMs on IBM quantum computers -- Summary -- Chapter 10: Quantum Neural Networks -- Building and training a quantum neural network -- A journey from classical neural networks to quantum neural networks -- Variational forms -- A word about measurements -- Gradient computation and the parameter shift rule -- Practical usage of quantum neural networks -- Quantum neural networks in PennyLane…”
    Libro electrónico
  20. 4500
    por Room, Stewart
    Publicado 2021
    Tabla de Contenidos: “…INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? …”
    Libro electrónico