Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 87
- Application software 79
- Cloud computing 67
- Engineering & Applied Sciences 63
- Database management 58
- Java (Computer program language) 58
- Computer Science 48
- Management 47
- Virtual computer systems 45
- Machine learning 37
- Python (Computer program language) 34
- Computer networks 32
- Electronic data processing 28
- Economics 27
- Programming 27
- Computer programming 26
- Computer programs 26
- Artificial intelligence 25
- Web servers 24
- Data processing 23
- Operating systems (Computers) 23
- Examinations 22
- Oracle (Computer file) 22
- Finance 21
- Design 20
- Security measures 20
- Client/server computing 19
- VMware 19
- History 18
- Microsoft .NET Framework 18
-
941Publicado 2014Tabla de Contenidos: “…-- BPMS AND BAM -- BPMS, SOA, AND THE CLOUD -- CHOOSING A BPMS PRODUCT -- THE CURRENT BPMS MARKET -- SOME LEADING BPMS VENDORS -- MARKET TRENDS -- PROCESS MODELING TOOLS VS BPMS SUITES -- CREATING A BPMS APPLICATION -- NOTES AND REFERENCES -- Chapter Seventeen - ERP-Driven Redesign -- PROCESSES, PACKAGES, AND BEST PRACTICES -- A CLOSER LOOK AT SAP -- IMPLEMENTING AN ERP-DRIVEN DESIGN -- CASE STUDY: NESTLÉ USA INSTALLS SAP -- USING BPMS TO IMPROVE ERP INSTALLATIONS -- ENTERPRISE RESOURCE PLANNING AND BUSINESS PROCESS MANAGEMENT SUITE -- ERP VS BPMS APPLICATIONS -- NOTES AND REFERENCES -- Chapter Eighteen - The Future of Business Process Management -- Appendix 1 - Business Problem Analysis Checklist -- OUTPUT PROBLEMS -- INPUT PROBLEMS -- GUIDE PROBLEMS -- ENABLER PROBLEMS -- PROCESS ACTIVITY AND FLOW PROBLEMS -- PROBLEMS WITH THE MANAGEMENT OF A PROCESS -- Appendix 2 - Core Business Process Modeling Notation -- AN OVERVIEW OF A BPMN DIAGRAM USED FOR BUSINESS PROCESS ANALYSIS AND REDESIGN -- AN ACTIVITY -- AN EVENT -- A GATEWAY -- A SEQUENCE FLOW -- A MESSAGE FLOW -- A DATA OBJECT -- AN ASSOCIATION -- A POOL WITH SWIMLANES…”
Libro electrónico -
942Publicado 2017Tabla de Contenidos: “…-- Your Trading System -- Frequently Asked Questions -- FAQ 1 : Starting Capital -- FAQ 2: Trend Following for Stocks -- FAQ 3: Computers and Curve Fitting -- FAQ 4: Day Trading Limits -- FAQ 5: Wrong Way to View a Trade -- 11 The Game -- Acceptance -- Don't Blame Me -- Decrease Leverage, Decrease Return -- Fortune Favors the Bold -- Section II Trend Following Interviews -- 12 Ed Seykota -- 13 Martin Lueck -- 14 Jean-Philippe Bouchaud -- 15 Ewan Kirk -- 16 Alex Greyserman -- 17 Campbell Harvey -- 18 Lasse Heje Pedersen -- Section III Trend Following Research -- 19 A Multicentennial View of Trend Following -- The Tale of Trend Following: A Historical Study -- Return Characteristics over the Centuries -- Interest Rate Regime Dependence -- Inflationary Environments -- Financial Bubbles and Crisis -- Market Divergence -- Risk Characteristics over the Centuries -- Portfolio Benefits over the Centuries -- Summary -- Assumptions and Approximations -- 20 Two Centuries of Trend Following -- Introduction -- Trend Following on Futures since 1960 -- Measuring Trends -- The Pool of Assets -- The Results…”
Libro electrónico -
943Publicado 2003Tabla de Contenidos: “…Tape in the SAN environment -- 2.1 Terminology -- 2.2 LAN backup model -- 2.3 SAN backup model -- 2.3.1 LAN-free backup -- 2.3.2 Server-free backup -- 2.4 Sharing and pooling -- 2.4.1 Economics of sharing -- 2.5 Remote tape vaulting and disaster tolerance -- 2.5.1 Fully redundant, disaster tolerant tape solutions -- 2.6 Storage virtualization -- Chapter 3. …”
Libro electrónico -
944Publicado 2013Tabla de Contenidos: “…ACFS Encryption Configuration and Use -- ACFS Snapshots, Security, and Encryption -- ACFS Security and Encryption Implementation -- Summary -- Chapter 12: ASM Optimizations in Oracle Engineered Solutions -- Overview of Exadata -- Exadata Components -- 11gR2 Database Optimizations for Exadata -- ASM Optimizations for Exadata -- ODA Overview -- ODA Components -- ASM Optimizations for ODA -- ODA and NFS -- Summary -- Chapter 13: ASM Tools and Utilities -- ASMCA -- ASMCMD -- Renamedg -- ASM Storage Reclamation Utility (ASRU) -- Overview of ASRU Operation -- When to Use ASRU to Reclaim Storage -- Using ASRU to Reclaim Storage on 3Par: Use Cases -- KFOD -- AMDU -- Summary -- Chapter 14: Oracle 12c ASM: A New Frontier -- Password Files in ASM -- Disk Management and Rebalance New Features -- Fast Disk Resync and Checkpoints -- Fast Disk Replacement -- Failure Group Repair Timer -- Rebalance Time Estimations -- File Priority Rebalance -- Flex ASM -- Flex ASM Clustering -- Flex ASM Listeners -- Flex ASM Network -- Remote ASM Access -- ASM Optimizations on Engineered Systems -- Error Checking and Scrubbing -- Other Miscellaneous Flex ASM Features -- Summary -- Appendix: Best Practices for Database Consolidation in Private Clouds -- Private Database Cloud Consolidation: The Business Drivers -- Initial Server Pool Sizing -- CPU -- Partitioning vs. Overprovisioning -- Memory -- Storage -- Complementary Workloads -- Isolation -- Database Consolidation -- Schema Consolidation -- Summary -- Index…”
Libro electrónico -
945Publicado 2018Tabla de Contenidos: “…Die Lösung mit der Extra-Nonce -- Mining-Pools -- Konsensangriffe -- Die Konsensregeln ändern -- Hard Forks -- Hard Forks: Software, Netzwerk, Mining und die Chain -- Divergierende Miner und Difficulty -- Umstrittene Hard Forks -- Soft Forks -- Kritik an Soft Forks -- Soft-Fork-Signalisierung mittels Blockversion -- BIP-34-Signalisierung und -Aktivierung -- BIP-9-Signalisierung und -Aktivierung -- Entwicklung von Konsenssoftware -- Kapitel 11: Bitcoins und Sicherheit -- Sicherheitsgrundsätze -- Bitcoin-Systeme sicher entwickeln -- Die Wurzel des Vertrauens -- Best Practices für den Nutzer -- Physische Speicherung von Bitcoins -- Hardware-Wallets -- Risiken abwägen -- Risiken verteilen -- Multisignaturen und Kontrolle -- Überlebensfähigkeit -- Fazit -- Kapitel 12: Blockchain-Anwendungen -- Einführung -- Grundbausteine (Primitive) -- Anwendungen aus Grundbausteinen -- Colored Coins -- Colored Coins nutzen -- Colored Coins ausstellen -- Colored-Coins-Transaktionen -- Counterparty -- Zahlungs- und Zustandskanäle -- Zustandskanäle - grundlegende Konzepte und Terminologie -- Einfaches Zahlungskanalbeispiel -- Vertrauensfreie Kanäle aufbauen -- Asymmetrisch widerrufliche Commitments -- Hash Time Lock Contracts (HTLC) -- Geroutete Zahlungskanäle (Lightning Network) -- Einfaches Lightning-Network-Beispiel -- Lightning Network - Transport und Routing -- Vorteile des Lightning Network -- Fazit -- Anhang A: Das Bitcoin-Whitepaper von Satoshi Nakamoto -- Anhang B: Operatoren, Konstanten und Symbole der Transaktions-Skriptsprache -- Anhang C: Bitcoin Improvement Proposals -- Anhang D: Segregated Witness -- Anhang E: Bitcore -- Anhang F: pycoin, ku und tx -- Anhang G: Bitcoin-Explorer-(bx-)Befehle -- Index -- Über den Autor -- Kolophon…”
Libro electrónico -
946Publicado 2004Tabla de Contenidos: “…3.1.4 Storage Networking Industry Association -- 3.1.5 Different virtualization products -- 3.2 SAN Volume Controller -- 3.2.1 Compass architecture -- 3.2.2 SAN Volume Controller logical configuration -- 3.2.3 SAN Volume Controller compatibility -- 3.2.4 Software licensing -- 3.2.5 FlashCopy -- 3.2.6 FlashCopy indirection layer -- 3.2.7 FlashCopy rules -- 3.2.8 Peer-to-Peer Remote Copy -- 3.2.9 PPRC configuration limits -- 3.3 SAN File System -- 3.3.1 File systems general terminology -- 3.3.2 Filesets and the global namespace -- 3.3.3 SAN File System product overview -- 3.3.4 SAN File System architecture -- 3.3.5 SAN File System product components -- 3.3.6 SAN File System engines -- 3.3.7 Master Console -- 3.3.8 Global namespace -- 3.3.9 Filesets -- 3.3.10 Storage Pools -- 3.3.11 Policy based storage and data management -- 3.3.12 Clients -- 3.3.13 FlashCopy -- 3.3.14 Reliability and availability -- 3.3.15 Summary of major features -- Chapter 4. …”
Libro electrónico -
947Publicado 2019Tabla de Contenidos: “…-- History of Ecological Momentary Assessment -- Autobiographical Memory and Limitations of Recall -- Strengths and Weaknesses of Retrospective and Real-Time Reports -- The Uses of Ecological Momentary Assessment -- Ecological Momentary Assessment Designs and Approaches -- Measurement Considerations for EMA Self-Reports -- Methodological Considerations in EMA Studies -- Analysis of EMA Data -- Conclusion -- Notes -- References -- Chapter 15: Eye Tracking Methodology for Research in Consumer Psychology -- Introduction and History -- Vision and Attention Processes -- Stationary Eye Movement Recording -- Mobile Eye Movement Recording -- Video-Based Eye Tracking -- Computing Fixations and Saccades -- Pupil Dilation and Facial Recognition -- Experimental Setup -- Eye Movement Metrics -- Analysis of Eye Movements -- Outlook -- References -- Chapter 16: Neuroscientific Methods and Tools in Consumer Research -- Measurement Techniques -- Manipulation Techniques -- Conclusion -- References -- PART III: Online Research Methods -- Chapter 17: Common Concerns with MTurk as a Participant Pool: Evidence and Solutions -- Concern 1: MTurkers Do Not Invest Sufficient Effort in Answering Questions -- Concern 2: MTurkers Cannot Speak English -- Concern 3: MTurkers Are Experienced/Non-naive…”
Libro electrónico -
948Publicado 2023Tabla de Contenidos: “…Understanding the Collections Framework -- Using sequential implementations and interfaces -- ArrayList -- LinkedList -- ArrayDeque -- The Collection interface -- How to declare a collection -- Understanding Generics in the Collections Framework -- Using sequential implementations and interfaces with Generics -- Understanding Collections Framework map structures -- HashMap -- LinkedHashMap -- TreeMap -- Understanding functions in Java -- Using streams in collections -- Summary -- Further reading -- Chapter 9: Using Threads in Java -- Technical requirements -- Creating Java native OS threads -- Extending the Thread class -- Implementing the Runnable interface -- Creating a thread pool with ExecutorService -- Implementing the Callable interface -- Managing threads -- Daemon and non-daemon threads -- Thread priority -- Preventing race and deadlock conditions in threads -- Race condition -- Deadlock condition -- Creating new virtual threads -- Summary -- Further reading -- Chapter 10: Implementing Software Design Principles and Patterns in Java -- Technical requirements -- SOLID software design principles -- S - Separation of concerns/single responsibility -- O - Open/closed -- L - Liskov substitution -- I - Interface segregation -- D - Dependency inversion -- Software design patterns -- Singleton -- Factory -- Adapter -- Observer -- Summary -- Further reading -- Chapter 11: Documentation and Logging -- Technical requirements -- Creating documentation -- Comments -- Javadocs -- Using logging -- java.util.logging -- Log4j2 -- Summary -- Further reading -- Chapter 12: BigDecimal and Unit Testing -- Technical requirements -- Using BigDecimal -- What is JUnit 5? …”
Libro electrónico -
949por Verham, DominiekTabla de Contenidos: “…Configuring Role-Based Access Control (RBAC) -- RBAC for AVD -- Management group RBAC assignment -- Subscription RBAC assignment -- Resource group RBAC assignment -- RBAC for Windows 365 -- Azure Bastion -- Azure Bastion custom role -- Using Azure Bastion -- Configuring JIT -- Microsoft Privileged Identity Management -- Windows Local Administrator Password Solution (LAPS) -- Windows LAPS Azure Virtual Desktop -- Windows LAPS for Cloud PCs -- Summary -- Part 4: Additional Security Controls per Solution -- Chapter 9: Securing Windows 365 -- Introducing the Windows 365 advanced deployment guide -- Deployment options -- Pre-deployment options -- Security guidelines for Windows 365 -- Local admin rights -- Endpoint Privilege Management -- Creating an elevation settings policy -- Creating an elevation rules policy -- Acquiring the file hash -- Creating and exporting Cloud PC restore points -- Creating a restore point -- Exporting a restore point -- Placing a Cloud PC under review -- Tips and tricks -- Tip 1 - Use Windows 365 Boot with multiple Cloud PCs -- Tip 2 - Make sure that users always have to sign in to the Cloud PC -- Summary -- Chapter 10: Securing Azure Virtual Desktop -- Configuring backups -- Creating a Recovery Services vault -- Backup policy session hosts -- Restoring session hosts -- Backup policy for FSLogix -- Restoring an FSLogix profile -- Securing AVD with private endpoints -- Host pool private endpoints -- Workspace private endpoints -- Trusted launch and confidential computing -- Trusted launch -- Confidential computing -- Configuring AppLocker -- Securing OneDrive -- Securing OneDrive with a GPO -- Securing OneDrive with Intune -- Active Directory structure and security -- Separated OU -- Separated GPO for each environment -- Dedicated service account to domain join -- Summary -- Chapter 11: Securing Azure Infrastructure…”
Publicado 2024
Libro electrónico -
950por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- Prior Review -- High-Cost Case Management -- Retrospective Utilization Review -- Other Cost-Containment Methods -- TWO NOTES OF CAUTION -- Obstacles To Evaluation -- Intrinsic Conceptual and Methodological Problems -- Common Behavioral Biases Against Evaluation -- Competition and Evaluation -- Forces Behind Rising Health Care Costs -- REFERENCES -- 2 Origins of Utilization Management -- THE GROWTH OF THIRD-PARTY FINANCING OF HEALTH CARE -- EARLY COST-MANAGEMENT EFFORTS BY THIRD PARTIES -- Management of the Risk Pool -- Design of the Benefit Plan -- Controls On Payments To Providers -- Constraints On Supply -- Utilization Review -- GOVERNMENT AND EMPLOYER INVOLVEMENT -- Federal Government Initiatives -- Private Purchasers Become an Force -- OTHER FACTORS GIVING RISE TO UTILIZATION MANAGEMENT -- Inappropriate Utilization as an Cost-Containment Target -- Variations in Utilization -- Inappropriate Utilization -- Linking Cost and Quality -- Improving the Tools and Structures for Utilization Management -- Information Resources -- Assessment and Education Strategies -- New Organizations -- CONCLUSION -- REFERENCES…”
Publicado 1989
Libro electrónico -
951Publicado 2018Tabla de Contenidos: “…-- Open questions and practical challenges -- Open questions -- Practical challenges for robotic reinforcement learning -- Key takeaways -- Summary -- Chapter 12: Deep Reinforcement Learning in Ad Tech -- Computational advertising challenges and bidding strategies -- Business models used in advertising -- Sponsored-search advertisements -- Search-advertisement management -- Adwords -- Bidding strategies of advertisers -- Real-time bidding by reinforcement learning in display advertising -- Summary -- Chapter 13: Reinforcement Learning in Image Processing -- Hierarchical object detection with deep reinforcement learning -- Related works -- Region-based convolution neural networks -- Spatial pyramid pooling networks -- Fast R-CNN -- Faster R-CNN -- You Look Only Once -- Single Shot Detector -- Hierarchical object detection model -- State -- Actions -- Reward -- Model and training -- Training specifics -- Summary -- Chapter 14: Deep Reinforcement Learning in NLP -- Text summarization -- Deep reinforced model for Abstractive Summarization -- Neural intra-attention model -- Intra-temporal attention on input sequence while decoding -- Intra-decoder attention -- Token generation and pointer -- Hybrid learning objective -- Supervised learning with teacher forcing -- Policy learning -- Mixed training objective function -- Text question answering -- Mixed objective and deep residual coattention for Question Answering -- Deep residual coattention encoder -- Mixed objective using self-critical policy learning -- Summary -- Appendix : Further topics in Reinforcement Learning…”
Libro electrónico -
952Publicado 2018Tabla de Contenidos: “…Stage 4 - self-build security services -- Stage 5 - big data security analysis and automation -- Role of a security team in an organization -- Security office under a CTO -- Dedicated security team -- Case study - a matrix, functional, or taskforce structure -- Security resource pool -- Security technical committee (taskforce) -- Summary -- Questions -- Further reading -- Chapter 4: Security Requirements and Compliance -- Security requirements for the release gate -- Release gate examples -- Common Vulnerability Scoring System (CVSS) -- Security requirements for web applications -- OWASP Application Security Verification Standard (ASVS) -- Security knowledge portal -- Security requirements for big data -- Big data security requirements -- Big data technical security frameworks -- Privacy requirements for GDPR -- Privacy Impact Assessment (PIA) -- Privacy data attributes -- Example of a data flow assessment -- GDPR security requirements for data processor and controller -- Summary -- Questions -- Further reading -- Chapter 5: Case Study - Security Assurance Program -- Security assurance program case study -- Microsoft SDL and SAMM -- Security training and awareness -- Security culture -- Web security frameworks -- Baking security into DevOps -- Summary -- Questions -- Further reading -- Chapter 6: Security Architecture and Design Principles -- Security architecture design principles -- Cloud service security architecture reference -- Security framework -- Java web security framework -- Non-Java web security frameworks -- Web readiness for privacy protection -- Login protection -- Cryptographic modules -- Input validation and sanitization -- Data masking -- Data governance - Apache Ranger and Atlas -- Third-party open source management -- Summary -- Questions -- Further reading -- Chapter 7: Threat Modeling Practices and Secure Design…”
Libro electrónico -
953Publicado 2018Tabla de Contenidos: “…Understanding the various loss functions -- Softmax activation -- Building a more complex network in Keras -- Activation functions -- Optimizers -- Increasing the depth of network -- Impact on change in batch size -- Implementing neural networks in TensorFlow -- Using premade estimators -- Creating custom estimators -- Summary -- Chapter 10: Evaluating Results with TensorBoard -- Setting up TensorBoard -- Overview of summary operations -- Ways to debug the code -- Setting up TensorBoard from TensorFlow -- Summaries from custom estimator -- Summary -- Chapter 11: Optimizing the Model through Hyperparameter Tuning -- The intuition of hyperparameter tuning -- Overview of hyperparameter tuning -- Hyperparameter tuning in Google Cloud -- The model file -- Configuration file -- Setup file -- The __init__ file -- Summary -- Chapter 12: Preventing Overfitting with Regularization -- Intuition of over/under fitting -- Reducing overfitting -- Implementing L2 regularization -- Implementing L1 regularization -- Implementing dropout -- Reducing underfitting -- Summary -- Chapter 13: Beyond Feedforward Networks - CNN and RNN -- Convolutional neural networks -- Convolution layer -- Rectified Linear Units -- Pooling layers -- Fully connected layer -- Structure of a CNN -- TensorFlow overview -- Handwriting Recognition using CNN and TensorFlow -- Run Python code on Google Cloud Shell -- Recurrent neural network -- Fully recurrent neural networks -- Recursive neural networks -- Hopfield recurrent neural networks -- Elman neural networks -- Long short-term memory networks -- Handwriting Recognition using RNN and TensorFlow -- LSTM on Google Cloud Shell -- Summary -- Chapter 14: Time Series with LSTMs -- Introducing time series -- Classical approach to time series -- Estimation of the trend component -- Estimating the seasonality component -- Time series models…”
Libro electrónico -
954Publicado 2018Tabla de Contenidos: “…Network training -- Evaluating the model -- Frequently asked questions (FAQs) -- Summary -- Answers to questions -- Chapter 3: Multi-Label Image Classification Using Convolutional Neural Networks -- Image classification and drawbacks of DNNs -- CNN architecture -- Convolutional operations -- Pooling and padding operations -- Fully connected layer (dense layer) -- Multi-label image classification using CNNs -- Problem description -- Description of the dataset -- Removing invalid images -- Workflow of the overall project -- Image preprocessing -- Extracting image metadata -- Image feature extraction -- Preparing the ND4J dataset -- Training, evaluating, and saving the trained CNN models -- Network construction -- Scoring the model -- Submission file generation -- Wrapping everything up by executing the main() method -- Frequently asked questions (FAQs) -- Summary -- Answers to questions -- Chapter 4: Sentiment Analysis Using Word2Vec and LSTM Network -- Sentiment analysis is a challenging task -- Using Word2Vec for neural word embeddings -- Datasets and pre-trained model description -- Large Movie Review dataset for training and testing -- Folder structure of the dataset -- Description of the sentiment labeled dataset -- Word2Vec pre-trained model -- Sentiment analysis using Word2Vec and LSTM -- Preparing the train and test set using the Word2Vec model -- Network construction, training, and saving the model -- Restoring the trained model and evaluating it on the test set -- Making predictions on sample review texts -- Frequently asked questions (FAQs) -- Summary -- Answers to questions -- Chapter 5: Transfer Learning for Image Classification -- Image classification with pretrained VGG16 -- DL4J and transfer learning -- Developing an image classifier using transfer learning -- Dataset collection and description -- Architecture choice and adoption…”
Libro electrónico -
955por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Measuring creative thinking in the PISA test: task design and scoring approach -- The competency model of creative thinking -- Generate diverse ideas -- Generate creative ideas -- Evaluate and improve ideas -- Domains of creative thinking -- Written expression -- Visual expression -- Social problem solving -- Scientific problem solving -- Scoring the tasks -- Scoring of 'generate diverse ideas' items -- Scoring of 'generate creative ideas' items -- Scoring of 'evaluate and improve ideas' items -- Assembling the test -- Test and unit design -- Refining the item pool for the PISA 2022 Main Survey -- Validating the tasks and scoring methods -- Optimising cross-cultural validity and comparability of the construct (construct equivalence) -- Ensuring cross-cultural validity and comparability of the tasks (test equivalence) -- The PISA background questionnaires for creative thinking -- Curiosity and exploration -- Creative self-efficacy -- Beliefs about creativity -- Creative activities in the classroom and at school -- Social environment -- References -- Notes -- 5 PISA 2022 Context Questionnaire Framework: Balancing Trends and Innovation -- Glossary -- Introduction -- Aims of the PISA Questionnaires -- Outline of the PISA 2022 Context Questionnaire Framework -- Balancing re-administration of questions from previous cycles with new development -- Guidelines for re-administration of questions from previous years -- Guidelines for new development -- PISA 2022 Context Questionnaire Framework taxonomy -- Classification based on relationships to PISA content domains -- Domain-specific constructs -- General constructs -- Classification based on Educational Policy Areas -- Student background -- Student beliefs, attitudes, feelings, and behaviours -- Teaching practices and learning opportunities -- School practices, policies, and infrastructure…”
Publicado 2023
Libro electrónico -
956por Galic, MicheleTabla de Contenidos: “…Portal application design and development guidelines -- 8.1 Introduction -- 8.2 WebSphere Portal -- 8.3 Introduction to object-oriented design patterns -- 8.3.1 Singleton -- 8.3.2 Factory -- 8.3.3 Abstract Factory -- 8.3.4 Proxy -- 8.3.5 Decorator -- 8.3.6 Command -- 8.3.7 Facade -- 8.3.8 Model-View-Controller (MVC) -- 8.3.9 Summary -- 8.4 Introduction to the Portlet framework -- 8.4.1 Background on Portlets -- 8.4.2 Navigational schema -- 8.4.3 General approach to Portlet development -- 8.4.4 State Pattern Portlet framework -- 8.4.5 Struts -- 8.5 Collaborative Portals -- 8.5.1 People awareness -- 8.5.2 Collaborative Components -- 8.5.3 How to add people awareness to your portlet -- 8.5.4 Advanced Domino database access -- 8.5.5 Reference material -- 8.6 Portlet development guidelines -- 8.7 Performance considerations -- 8.7.1 Performance analysis -- 8.8 Performance guidelines -- 8.8.1 Caching -- 8.8.2 Object pooling -- 8.8.3 Performance pitfalls -- 8.9 Portalization approach for existing applications -- 8.9.1 The portalization process -- 8.9.2 The portalizing challenge -- 8.9.3 Business applications -- 8.9.4 Performance considerations -- 8.9.5 Integration types -- 8.9.6 Considerations -- 8.9.7 Summary -- 8.9.8 Where to find more information: -- Appendix A. …”
Publicado 2004
Libro electrónico -
957Publicado 2017Tabla de Contenidos: “…Committing the changes in Git -- Undoing the changes -- Branches -- Merging codes -- The mergetool command -- The pull command -- Using venv to create a stable and isolated work area -- Creating a virtual environment -- Activating a virtual environment -- pip in virtual environments -- Getting the most out of docstrings -- PEP 257 and docutils -- Sphinx -- Turning docstrings into HTML -- Using doctest to test documentation examples -- Testing examples using doctest -- What it means when a code example fails -- Summary -- Chapter 5: Making a Command-Line Utility -- Making a package executable via Python -m -- Pipeline program -- Handling command-line arguments with argparse -- Creating an ArgumentParser object -- Setting the name of argument -- nargs -- Python tools to interact with the user -- Python's built-in functions - print and input -- The getpass package -- The pprint package -- The cmd class -- The Pipeline user interface -- Executing other programs with subprocess -- Subprocess and its variants -- Using the Popen subprocess -- The PIPE constant -- The wait method -- Finishing up our code example -- Setting up a shell script or batch file to launch the program -- Creating launches for our program -- Summary -- Chapter 6: Parallel Processing -- Using the concurrent.futures package -- The concurrent.futures module -- Calling ProcessPoolExecutor -- Using the map method -- Using the submit method -- The done and result methods -- The wait and as_completed functions -- The add done callback function -- The cancel method -- Using the multiprocessing packages -- Process class in the multiprocessing module -- Queues -- Pipes -- Manager -- The lock object -- The event object -- The condition object -- The semaphore object -- Summary -- Chapter 7: Coroutines and Asynchronous I/O -- The difference between asynchronous processing and parallel processing…”
Libro electrónico -
958por Alur, NagrajTabla de Contenidos: “…WebSphere Information Integrator Content Edition V8.2.1 architecture -- 1.1 Introduction -- 1.2 WebSphere II Content Edition V8.2.1 architecture -- 1.2.1 Integration services -- 1.2.2 Federation services -- 1.2.3 Developer and end user services -- 1.3 WebSphere II Content Edition services -- 1.3.1 Configuration server -- 1.3.2 Logging server -- 1.3.3 RMI Proxy Connector server -- 1.3.4 Multi-Query Agent server -- 1.3.5 Session Pool server -- 1.3.6 Single Sign-On server -- 1.3.7 Service Monitor Web application -- 1.4 Typical federated query flow -- 1.4.1 Step 1: Provide query parameters -- 1.4.2 Step 2: Access SSO Server -- 1.4.3 Step 3: Access virtual repository or real data source -- 1.4.4 Step 4: Server result set created -- 1.4.5 Step 5: Post processing of server result set -- 1.5 Monitoring tools -- 1.5.1 Operating system -- 1.5.2 WebSphere Application Server -- 1.5.3 WebSphere Information Integrator Content Edition -- Chapter 2. …”
Publicado 2005
Libro electrónico -
959Publicado 2024Tabla de Contenidos: “…The power of resize() -- Enter reserve() -- Optimizing with shrink_to_fit() -- Real-world relevance -- Custom allocator basics -- The role and responsibility of an allocator -- Under the hood - the allocator interface -- Trade-offs and the need for custom allocators -- Choosing std::allocator over new, delete, and managed pointers -- Creating a custom allocator -- Custom allocators - the heart of memory flexibility -- Understanding the motivation behind custom allocators -- Memory pools - a popular custom allocator strategy -- Unlocking the potential of custom allocators -- Allocators and container performance -- Why allocators matter in performance -- The performance characteristics of std::allocator -- When to consider alternative allocators -- Profiling - the key to making informed decisions -- Summary -- Chapter 4: Mastering Algorithms with std::vector -- Technical requirements -- Sorting a vector -- Getting started with std::sort -- The engine under the hood - introsort -- Efficiency unparalleled - O(n log n) -- Sorting in descending order -- Sorting custom data types -- Pitfalls and precautions -- Searching elements -- Linear search with std::find -- Binary search techniques -- Using std::lower_bound and std::upper_bound -- Binary search versus linear search - efficiency and versatility -- Manipulating vectors -- Transforming with std::copy -- Reversing elements with std::reverse -- Rotating vectors with std::rotate -- Filling a vector with std::fill -- Putting manipulation to use -- Considerations in manipulation -- Custom comparators and predicates -- Understanding comparators -- The power of predicates -- Crafting effective comparators and predicates -- User-defined structs and classes -- Understanding container invariants and iterator invalidation -- Understanding iterator invalidation -- Strategies to counteract invalidation…”
Libro electrónico -
960Publicado 2024Tabla de Contenidos: “…Document classification -- N-grams -- Selecting a subset of n-grams -- Using genetic algorithms to search for a fixed-size subset -- Python implementation -- Summary -- Further reading -- Chapter 12: Explainable AI, Causality, and Counterfactuals with Genetic Algorithms -- Technical requirements -- Unlocking the black box - XAI -- Unraveling cause and effect - causality in AI -- What-if scenarios - counterfactuals -- Genetic algorithms in counterfactual analysis - navigating alternative scenarios -- The German Credit Risk dataset -- Exploring counterfactual scenarios for credit risk prediction -- The Applicant class -- The CreditRiskData class -- Counterfactuals with genetic algorithms -- The genetic algorithm solution -- More "what-if" scenarios -- Extending to other datasets -- Summary -- Further reading -- Part 4: Enhancing Performance with Concurrency and Cloud Strategies -- Chapter 13: Accelerating Genetic Algorithms - the Power of Concurrency -- Technical requirements -- Long runtimes in real-world genetic algorithms -- Parallelizing genetic algorithms -- Multithreading -- Multiprocessing -- Back to the OneMax problem -- A baseline benchmark program -- Simulating computational intensity -- Multiprocessing using the Pool class -- Increasing the number of processes -- Multiprocessing using the SCOOP library -- Distributed computing with SCOOP -- Summary -- Further reading -- Chapter 14: Beyond Local Resources - Scaling Genetic Algorithms in the Cloud -- Technical requirements -- The next level in genetic algorithm performance -embracing a client-server architecture -- Implementing a client-server model -- Using a separate environment -- Revisiting the One-Max problem, yet again -- Creating the server component -- Creating the client component -- Running the asynchronous client -- Using a production-grade app server…”
Libro electrónico