Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 6,016
- Engineering & Applied Sciences 2,191
- Development 2,038
- Application software 1,621
- Database management 1,556
- Computer Science 1,474
- Computer networks 1,467
- Information technology 1,313
- Business & Economics 1,220
- Leadership 1,198
- Cloud computing 1,134
- Data processing 1,091
- Computer programs 1,003
- Industrial management 976
- Security measures 972
- Business 898
- Computer security 839
- Examinations 831
- Operating systems (Computers) 790
- Computer software 788
- Project management 784
- Direcció i administració 773
- Marketing 737
- Personnel management 725
- Technological innovations 723
- Empreses 706
- Finance 700
- Electrical & Computer Engineering 646
- Certification 637
- Economics, finance, business & management 636
-
66561Publicado 2021“…Moreover, the discussions touch on the strengths and weaknesses related to managing urban growth and the rapid expansion of cities. …”
Libro electrónico -
66562Publicado 2022“…What's Inside Application security tools for the whole development life cycle Finding and fixing web application vulnerabilities Creating a DevSecOps pipeline Setting up your security program for continuous improvement About the Reader For software developers, architects, team leaders, and project managers. About the Author Derek Fisher has been working in application security for over a decade, where he has seen numerous security successes and failures firsthand. …”
Libro electrónico -
66563Publicado 2022“…Almost 75% of the people in the workforce get stuck at the mid-management level in the organization. These people have the best skills and abilities, yet aren't able to move the needle significantly. …”
Libro electrónico -
66564Publicado 2023“…Inside you'll find strategies for delivering successful API integrations, implementing services with clear boundaries, managing cloud deployments, and handling microservices security. …”
Libro electrónico -
66565Publicado 2018“…L'estudi conclou que l'estratègia de comunicació de la nova economia segueix els prin-cipis de la direcció per objectius del management establerts per Drucker el 1954, que el 1968 Marston va aplicar a la comunicació en el seu model d'espiral en quatre fases (investiga-ció , planificació, execució i avaluació), encara que en la seva aplicació mostra destacades particularitats derivades dels aquests condicionants, entre les quals destaca la planificació flexible ia curt termini i la presa de decisions basada en dades, procedents de la in-vestigació i del seguiment constant. …”
Accés lliure
Tesis -
66566Publicado 2023“…About the Instructor: Shaun Wassell is a Senior Software Developer who specializes in full-stack development and software architecture. He manages teams of developers, as well as teaches many hundreds of thousands more how to create enterprise-ready applications. …”
Video -
66567Publicado 2024“…Related Learning: Watch and learn from Shaun's other videos: Functional Programming Projects with Python 3 About the Instructor: Shaun is a Senior Software Developer who specializes in Full-stack development and Software Architecture. He manages teams of developers, as well as teaches many hundreds of thousands more how to create enterprise-ready applications. …”
Video -
66568Publicado 2020“…The papers selected exhibit latest advancements in a variety of topics in physical design, including emerging challenges for current and future process technologies, FPGA architectures, placement, detailed routing, floorplanning and interconnect planning, partitioning techniques, manufacturability and yield optimization, timing and crosstalk issues, analysis and management of power dissipation, hardware security, placement and routing approaches of networks on chips, gate sizing and clock skew scheduling, and application of machine-learning based techniques to physical design. …”
Libro electrónico -
66569Publicado 2022“…The first keynote on Monday is presented by Dean Drako, CEO of Eagle Eye Networks, IC Manage, and Drako Motors. Mr. Drako will deliver the Monday morning keynote address entitled "The Need for Speed: From Electric Supercars to Cloud Bursting for Design," which will compare our industry's drive for speed to electric supercars, then delve into key elements that design and verification teams use to speed the delivery of their products to market. …”
Libro electrónico -
66570Publicado 2022“…– Rick McGuire, Senior Application Development Manager, Microsoft “Phil is a journeyman programmer who brings years of experience and a passion for teaching to make this fully revised and modernized ‘classic’ a ‘must-have’. …”
Libro electrónico -
66571Publicado 2022“…He is additionally a regular Shopify user in creating and managing online stores and editing/creating custom liquid templates…”
Video -
66572Publicado 2023“…What You Will Learn Build a fully functional web server using Actix Web framework in Rust Create an AutoGPT agent "Auto-Gippity" to generate, test, and optimize code Implement AI functions for precise responses from large-language-models Understand Rust's memory management and performance advantages Explore the creation of specialized AutoGPT agents for various tasks Master unit testing, error handling, and lifetimes in Rust Audience This course is designed for intermediate programmers looking to enhance their programming skills and venture into the world of Rust and AI-driven code generation. …”
Video -
66573Publicado 2022“…Crack open this one-of-a-kind guide, and you'll soon be working in the professional manner that software managers expect. About the Technology Success as a software engineer requires technical knowledge, flexibility, and a lot of persistence. …”
Grabación no musical -
66574por Lewis, Mark, CCIE“…Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. …”
Publicado 2004
Libro electrónico -
66575Publicado 2007“…Intelligent Monitor Management 18. Smoother Media Playback 19. Accessible Software Authors 20. …”
Libro electrónico -
66576Publicado 2014“…Provides both an introduction for students in the field and an in-depth reference for antenna/RF engineers who work on the development of CP antennas.Circularly Polarized Antennas will be an invaluable guide for researchers in R&D organizations; system engineers (antenna, telecom, space and satellite); postgraduates studying the subjects of antenna and propagation, electromagnetics, RF/microwave/millimetre-wave systems, satellite communications and so on; technical managers and professionals in the areas of antennas and propagation…”
Libro electrónico -
66577Publicado 2020“…By the end, you will be proficient in translating ML model predictions into a trading strategy that operates at daily or intraday horizons, and in evaluating its performance.What you will learnLeverage market, fundamental, and alternative text and image dataResearch and evaluate alpha factors using statistics, Alphalens, and SHAP valuesImplement machine learning techniques to solve investment and trading problemsBacktest and evaluate trading strategies based on machine learning using Zipline and BacktraderOptimize portfolio risk and performance analysis using pandas, NumPy, and pyfolioCreate a pairs trading strategy based on cointegration for US equities and ETFsTrain a gradient boosting model to predict intraday returns using AlgoSeek s high-quality trades and "es dataWho this book is forIf you are a data analyst, data scientist, Python developer, investment analyst, or portfolio manager interested in getting hands-on machine learning knowledge for trading, this book is for you. …”
Libro electrónico -
66578Publicado 2020“…Organize Your Music: Make a simple playlist of romantic songs, workout songs, or whatever theme you like. Manage and Share Media Files: Whether you want to casually share a playlist from your laptop when visiting a friend or you want to make all your media available on al..…”
Libro electrónico -
66579por Rhodes, Jeffrey M. author“…You end the InfoPath set of chapters with a highly useful application for signing up for and managing attendance for training and other classes. …”
Publicado 2019
Libro electrónico -
66580Publicado 2011“…Téléchargez les fichiers des fiches pratiques et des outils depuis www.editions-organisation.com Au sommaire La démarche générale de mise sous contrôle des risques d'un projet Préalable à la mise en oeuvre de la démarche Identification des risques Evaluation de la criticité des risques Evaluation de l'efficacité du dispositif de maîtrise des risques Détermination des plans d'action en vue de renforcer le dispositif de maîtrise des risques Suivi du portefeuille de risques Application de la démarche aux différentes phases d'un projet Etude Initialisation Conception Réalisation Mise en oeuvre Exploitation Application de la démarche aux différents processus support d'un projet Management et coordination du projet Gestion du contenu Gestion des délais Gestion des coûts Gestion de la qualité Gestion des ressources humaines Conduite du changement et communication Gestion des prestataires et des approvisionnements…”
Libro electrónico