Mostrando 881 - 900 Resultados de 908 Para Buscar '"Phoenix"', tiempo de consulta: 0.10s Limitar resultados
  1. 881
    por Acksel, Britta
    Publicado 2024
    Tabla de Contenidos: “…-- 1.2 Fälle, Felder, Forschung -- 1.3 Konzeption: Policies und Policy‐Instrumente -- 1.3.1 Policies &gt -- Policy‐Instrumente &gt -- Transformationsinstrumente -- 1.3.2 Policies als Assemblagen und aus einer praxistheoretisch informierten Perspektive -- 1.4 Agenda -- 2. »Das ist eben ne schöne Geschichte« -- 2.1 Drei Transformationsgeschichten -- 2.1.1 Malmö - »This story we tell all the time« -- 2.1.2 Essen - »Von (grün zu) grau zu grün« -- 2.1.3 Almada - gesucht und gefunden -- 2.2 ›Nachhaltigkeit‹ in den Transformationsgeschichten -- 2.3 Enaktierung der Transformationsgeschichten -- 2.3.1 Malmö - »like the bird phoenix« -- 2.3.2 Essen - Ansätze einer Transformationsgeschichte -- 2.3.3 Almada - keine Transformationsgeschichte? …”
    Libro electrónico
  2. 882
    Publicado 2013
    Tabla de Contenidos: “…56LocalizadorYucca recurvifolia Salisb.57LocalizadorChamaerops humilis L.; 58LocalizadorPhoenix canariensis Chabaud; 59LocalizadorTrachycarpus fortunei (Hook.) …”
    Libro electrónico
  3. 883
    por Uva, Michael
    Publicado 2002
    Tabla de Contenidos: “…Electra Ii/nikeAtb Ii Sport Package; Olympian; Olympian Ii Hydraulic Lift Vehicle; Cranes Mounted on Wheel Bases; Egripment; Felix; Piccolo; Mini Skyking; Tulip; Super Maxi-jib; Piccolo and Extension; Super Technocrane; Super Skyking/super Skymote; Phoenix; Strada; Jibs; Mini-jib Liberty; Mini-jib Classic; Mini-jib Long; Euro-jib; Ez Fx Jib; Jf Crossarm; Lenny Mini; Lenny Arm Plus; Lenny Arm II; Lenny Arm II Plus; Lenny Arm III; Dollies; Doorway Dolly; Western Dolly; Tube Dolly; Fisher #11 Crab Dolly; Fisher #11 Dolly Order; Fisher #10 Crab Dolly; Fisher #10 Dolly Order; Fisher #9 Crab Dolly…”
    Libro electrónico
  4. 884
    Publicado 2019
    Tabla de Contenidos: “…Traces, effacement, réinscriptions / Raphaël Ricaud -- La résilience de la mémoire dans "This Is What It Means To Say Phoenix, Arizona" de Sherman Alexie / Marc Michaud -- L'histoire au défi de la mémoire dans la Trilogia Americana de José Sanchis Sinisterra, El retablo de Eldorado, Lope de Aguirre, traidor, Naufragios de Álvar Núñez / Émilie Lumière -- La cartographie et la réinvention du héros dans The Colony of Unrequited Dreams (1998) de Wayne Johnston / André Dodeman -- La fiction comme outil de mémoire dans La constellation du Lynx de Louis Hamelin / Alex Demeulenaere -- Écrire sa vie. …”
    Libro
  5. 885
    Publicado 2003
    Tabla de Contenidos: “…Installing applications -- 8.1 Phoenix system discussion -- 8.2 Current Phoenix Software installation instructions -- 8.3 Changing the installation to a non-switchable disk pool…”
    Libro electrónico
  6. 886
    Publicado 1893
    Artículo
  7. 887
    Publicado 2000
    Tabla de Contenidos: “…Conté "Artificial landscape": Phoenix Resort Seagaia / Yoshinobu Ashihara ; Huis Ten Bosch / Nihon Sekkei ; Meteor Plaza / Shin Takamatsu ; Humäx Pavilion Shibuya / Hiroyuki Wakabayashi ; Nanohanakan Community Center / Takasaki Masaharu ; Minatosakai Community Center / Shin Takamatsu ; Kamocho Culture Hall 'La Mer'/ Toyokazu Watanabe ; Awaji-Yumebutai / Tadao Ando…”
    Libro
  8. 888
    por Smith, Elizabeth A. T., 1958-
    Publicado 2002
    Tabla de Contenidos: “…Emmons -- CSH #25: Frank House, 1962, 82 Rivo Alto Canal, Long Beach, Killingsworth, Brady, Smith & Associates -- CSH #26: 1962, unbuilt, Killingsworth, Brady, Smith & Associates -- CSH #26: Harrison House, 1962-63, San Marino Drive, San Rafael, Beverley Thorne -- CSH #27: 1963, unbuilt, Campbell and Wong -- CSH #28: 1965-66, 91 Inverness Road, Thousand Oaks, Buff & Hensman -- CSA #1: 1963-64, 4402 28th Street, Phoenix, Arizona, Alfred N. Beadle and Alan A. Dailey -- CSA #2: 1964, unbuilt, Killingsworth-Brady & Associates -- Biographies of the architects -- Epilogue / Julius Shulman. -- OCLC…”
    Libro
  9. 889
    por Saroinsong, Wulan Patria
    Publicado 2023
    Tabla de Contenidos: “…: EFL Student Teachersa^€TM Emotions in Online Teaching Practicum</P><P>Fanfiction as Literacy Practices in Rainbow Rowella^€TMs "Fangirl"</P><P>Source Language in Third Language Acquisition for BIPA Students</P><P>Multilingual Children's Language Use: The case of "The Return of Superman" Show</P><P>Language used in "Indonesia's Next Top Model Cycle 2" TV Show</P><P>People's Perception towards the Use of English in a Multilingual Community</P><P>The Language Norms Used by a Korean-Indonesian Mixed-Married Family Living in Korea</P><P>Archiving Indonesian Online Literature Magazine as a Data Resource</P><P>Analyzing Educational Language Policy Using Zone of Mediation Framework</P><P>A Javanese Wordplay Using Affixation and Truncation Processes in Northern Surabaya: Narrative Inquiry</P><P>Translation Procedures of CSIs in Indonesian version of Legend of the Phoenix</P><P>The Discourse of Environment in Indonesian Tourism Website: A<BR>Corpus-Assisted Study</P><P>Robot to Develop Autistic Children's Social Communication Skills</P><P>Developing Global Collaboration Skills in the Era of Unlimited Learning</P><P>Virtual Math Lab: A Guide to Compiling Math Word Problems</P><P>Development of Islamic Guidance and Counselling Applications to Improve Self-Efficacy of Students</P><P></P><P><P>Non-Locomotor Movement Manipulatives in Bocce Sports Learning for Students with Intellectual Disabilities</P><P>Social Media Engagements in the Education Industry for Effective Communication Channel</P><P>Does Education Expenditure Promote Long-run Economic Growth? …”
    Libro electrónico
  10. 890
    Publicado 2008
    Tabla de Contenidos: “…The Munros - Caledonia 19. Glasgow Phoenix Choir - Auld Lang Syne 20. The Lone Piper - Lord Lovats Lament…”
    Disco musical
  11. 891
    Publicado 2024
    Tabla de Contenidos: “…Chapter 7 Risk Management -- Risk Management in the Business -- Understanding the Risk Management Life Cycle -- FFIEC Handbooks and Risk Management Guidance -- Governance and Risk Management Framework -- Risk Approvals and the Role of Committees -- Risk Identification and Analysis -- Third-Party Risk Management -- Regulatory Expectations For third-party Risk Management -- Compliance and Legal Risk Management -- Monitoring and Reporting -- Chapter Conclusion -- Case Study: Navigating Risk Management at Phoenix Innovations -- Chapter 8 The NIST Risk Management Framework -- The NIST Risk Management Framework -- Understanding RMF's Authorization Process -- NIST RMF in Practice: Step-by-Step Analysis -- Applicability to Regulatory Expectations -- Integrating NIST RMF into an Organization -- Using NIST RMF for Risk Assessment and Management -- NIST RMF and Technology Implementation -- Challenges and Solutions in Implementing NIST RMF -- NIST RMF and Third-Party Risk Management -- Chapter Conclusion -- Case Study: OmniTech Corporation and NIST RMF Implementation -- Sample RMF Authorization Document Package -- Chapter 9 Cybersecurity Metrics -- Understanding Cybersecurity Metrics -- The Importance of Metrics in cybersecurity -- The Role of Metrics in Decision-making and Resource Allocation -- Differentiating Between KPIs and KRIs -- The Role of Metrics in Compliance -- Challenges and Considerations -- Key Performance Indicators (KPIs) -- Key Risk Indicators (KRIs) -- Integrating KPIs and KRIs into Cybersecurity Strategy -- Chapter Conclusion -- Case Study: Transforming TechNova's Defense Landscape -- Chapter 10 Risk Assessments -- The Importance of Risk Assessments -- The FFIEC's Perspective on Risk Assessments -- NIST's Approach to Risk Assessments -- Risk Assessment Frameworks -- Conducting a Cybersecurity Risk Assessment -- Managing Third-Party Risks…”
    Libro electrónico
  12. 892
    Publicado 2024
    Tabla de Contenidos: “…Kanban -- Understand the Change Request Process -- Need for On-Boarding Training -- Get Licensing and IP Issues Resolved as Early as Possible -- Project Owner and Communicating with Other Teams -- Project Team Capacity Planning -- Working Groups -- Conclusion -- Acknowledgments -- References -- Biographical Sketches -- Chapter 11 System Behavior Specification Verification and Validation (V&amp -- V) -- Introduction -- Background -- Monterey Phoenix -- Emergent Behavior Analysis -- Search and Rescue Examples -- Select the Behavior Model to V&amp -- V -- Prepare Models for V&amp -- V -- Expand the Model with Alternative Flows -- Probe the Model for Emergent Behaviors -- Conclusions -- References -- Biographical Sketches -- Chapter 12 Digital Engineering Transformation: : A Case Study -- Case Study of Digital Engineering from Scratch: a DoD and JPEO Journey -- Understanding the Needs -- Tailoring Products for User's Needs -- State-of-the-Art in Digital Transformation and "Clash with Reality" -- Digital Engineering Transformation and Directives (DE for AM) -- Additive Manufacturing - Technical Analysis: Additive Manufacturing (AM) vs. …”
    Libro electrónico
  13. 893
    por Merkow, Mark S.
    Publicado 2019
    Libro electrónico
  14. 894
    por Schwartz, Randal L.
    Publicado 2009
    Libro electrónico
  15. 895
    Publicado 2023
    Tabla de Contenidos: “…7.5.1 Parameter Estimation for the HPP -- 7.5.2 Data Analysis for the NHPP -- 7.5.2.1 Maximum Likelihood Procedures -- 7.5.2.2 Laplace Test -- 7.6 Availability of Repairable Systems -- 7.6.1 Instantaneous (Point) Availability of Revealed-Fault Items -- 7.6.2 Instantaneous (Point) Availability of Periodically-Tested Items -- 7.6.3 Limiting Point Availability -- 7.6.4 Average Availability -- 7.6.5 Other Average Measures of Availability -- 7.6.5.1 Inherent Availability -- 7.6.5.2 Achieved Availability -- 7.6.5.3 Operational Availability -- 7.7 Markov Processes for System Availability -- 7.8 Availability of Complex Systems -- 7.9 Exercises -- References -- Chapter 8 Selected Advanced Topics in Reliability and Risk Analysis -- 8.1 Uncertainty Analysis -- 8.1.1 Steps in Uncertainty Analysis for Risk and Reliability Models -- 8.1.2 Uncertainty Propagation Methods -- 8.1.2.1 Method of Moments for Propagation of Uncertainties -- 8.1.2.2 Monte Carlo Methods for Propagation of Uncertainties -- 8.2 Analysis of Dependent Failures -- 8.2.1 Single-Parameter Models -- 8.2.2 Multiple-Parameter Models -- 8.2.3 Data Analysis for CCFs -- 8.3 Importance Measures -- 8.3.1 Birnbaum Importance -- 8.3.2 Criticality Importance -- 8.3.3 Fussell-Vesely Importance -- 8.3.4 Risk Reduction Worth Importance -- 8.3.5 Risk Achievement Worth Importance -- 8.4 Human Reliability Analysis -- 8.4.1 The HRA Process -- 8.4.2 Identifying Human Failure Events -- 8.4.2.1 THERP -- 8.4.2.2 SPAR-H -- 8.4.2.3 IDAC and Phoenix -- 8.4.2.4 IDHEAS -- 8.4.3 Representing and Quantifying HFEs -- 8.4.3.1 THERP -- 8.4.3.2 SPAR-H -- 8.4.3.3 IDAC and Phoenix -- 8.4.3.4 IDHEAS -- 8.5 Exercises -- References -- Chapter 9 Risk Analysis -- 9.1 QRA Defined -- 9.2 QRA Process -- 9.2.1 Initiating Event -- 9.2.2 Hazard Exposure Scenarios -- 9.2.3 Identification of Hazards -- 9.2.4 Identification of Barriers…”
    Libro electrónico
  16. 896
    Publicado 2017
    Tabla de Contenidos: “…-- The Art (and Craft) of Restoration -- Restoring Tone -- Restoring Color -- Fine-Detail Repairs and Cleanup -- Major Damage Repairs -- Repairing Uneven Damage -- Fooling Around -- A Modest Taxonomy of Restoration -- Prints -- Slides -- Negatives -- Newspaper Clippings -- Take Your Time -- Chapter 2: Hardware for Restoration -- The "Bottom" Line -- The Computer -- Memory -- Hard Drives -- Display -- Laptops and iMacs -- Graphics Tablets -- Color Management and ColorMunki -- Backup and Long-Term Storage -- Scanners -- Printers -- Chapter 3: Software for Restoration -- Image Processing Programs -- Photoshop CC and CS6 -- Maximizing Photoshop Performance -- Avoiding Photoshop -- Alternatives to Photoshop -- Photoshop Elements 14 -- Elements XXL -- Affinity Photo -- Photoline 19 -- Plug-in and Stand-Alone Tools -- AKVIS Retoucher -- Polaroid Dust &amp -- Scratch Removel -- Focus Magic -- Noise Ninja/Photo Ninja -- Topaz Labs DeNoise 6 -- Topaz Labs InFocus -- Topaz Labs Detail 3 -- Topaz Labs Clarity -- Repair and Recover Tools -- CD/DVD Diagnostic -- JPEG Recovery Pro 5.0 -- Stellar Phoenix JPEG Repair -- RS File Repair -- Picture Doctor 2 -- Chapter 4: Getting the Photo into the Computer -- How-Tos in This Chapter…”
    Libro electrónico
  17. 897
    Publicado 2024
    Tabla de Contenidos: “…-- Leveraging the Plug and Play convenience of using Llama Packs -- Using the Llama CLI -- Using advanced tracing and evaluation techniques -- Tracing our RAG workflows using Phoenix -- Evaluating our RAG system -- Introduction to deployment with Streamlit -- HANDS-ON - a step-by-step deployment guide -- Deploying our PITS project on Streamlit Community Cloud -- Summary -- Chapter 10: Prompt Engineering Guidelines and Best Practices -- Technical requirements -- Why prompts are your secret weapon -- Understanding how LlamaIndex uses prompts -- Customizing default prompts -- Using advanced prompting techniques in LlamaIndex -- The golden rules of prompt engineering -- Accuracy and clarity in expression -- Directiveness -- Context quality -- Context quantity -- Required output format -- Inference cost -- Overall system latency -- Choosing the right LLM for the task -- Common methods used for creating effective prompts -- Summary -- Chapter 11: Conclusion and Additional Resources -- Other projects and further learning -- The LlamaIndex examples collection -- Moving forward - Replit bounties -- The power of many - the LlamaIndex community -- Key takeaways, final words, and encouragement -- On the future of RAG in the larger context of generative AI -- A small philosophical nugget for you to consider -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  18. 898
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Overview -- Chapter 1: Truth and Dare - The CxO Challenges -- The market -- Uncertainty about the future -- Trends -- Glocalization -- The supply chain -- Financial challenges -- CapEx versus OpEx -- Maintenance costs -- The cost of living -- Lack of investment -- Recession -- Return on investment -- Accuracy cost estimation -- Regulation compliance -- GDPR -- The CCPA -- Industry regulations -- Data residency -- Technology evolution -- Flexible adoption of new technology -- Technology strategy -- Emerging new technologies -- Evolving customer perspectives -- Consistent customer service -- Operational challenges -- Sustainable supply chain pressures -- Resourcing issues regarding raw materials, people, and skill gaps -- The multi-vendor model -- Choosing a SAP service provider -- Key considerations for businesses when opting for a cloud provider -- Keeping the lights on -- Organizational challenges -- Transformation challenges - business- or IT-driven -- Factors affecting transformation -- Environmental challenges -- Sustainability challenges -- COVID-19 -- Political polarization -- Impact of the war in Ukraine -- Summary -- Chapter 2: Faith of Four - Vision of the Masters -- The four masters -- Chief Executive Officer (CEO) -- Chief Finance Officer (CFO) -- Chief Information/Technology Officer (CIO/CTO) -- Chief Sustainability Officer (CSO) -- The business challenge -- Top-line growth -- Bottom-line growth -- Green-line growth -- Other focus areas -- The way forward -- Uncertainty -- Insights -- Yesterday's ERP -- Sustainability insight -- The next steps -- The phoenix transformation -- How does Spark4Life Ltd take the first step? …”
    Libro electrónico
  19. 899
    Publicado 2017
    “…Diese Unternehmen verbindet eins: Sie arbeiten nach DevOps-Prinzipien.Die Autoren des Romans »Projekt Phoenix« zeigen in diesem Handbuch, wie die DevOps-Philosophie praktisch implementiert wird und Unternehmen dadurch umgestaltet werden können. …”
    Libro electrónico
  20. 900
    Publicado 2024
    Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
    Libro electrónico