Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11061From categories to categorization studies in sociology, organizations and strategy at the crossroadsPublicado 2017Tabla de Contenidos: “…-- Purity for a Purpose: Categorization as a Theoretical Tool -- It's All about Those Tips -- Three General Principles -- The Basis for the Categorical Imperative -- Nature of the Categorical Imperative -- Variation and Change in Category Schemes and Associated Imperatives -- Variation in Objectives -- Variation in Theories of Value -- Variation in Code -- Why Some Audiences Appear to Tolerate Impurity -- Demand-Side Processes Determining the Categorical Imperative -- Slow Learning -- Social Risks from Coordination and Commitment -- Screening on Performance and Status Rather Than Purity -- Three Caveats on Candidate Identity -- Conclusion -- Coda: The Tricky Legacy of Zuckerman (1999, 2000) -- Notes…”
Libro electrónico -
11062por Holland, Margaret B.Tabla de Contenidos: “…-- Conclusions -- References -- 6: People-Land Relationships on the Path to Sustainable Food Security -- LTS and Sustainable Food Security in the Global Development Rhetoric -- Storylines and Evidence Emerge from a Look at the Literature -- Aggregate Land Scarcity Exacerbated by Population Growth, Unsustainable Land Use, and Climate Change -- Land Access and Inequality -- Incentives and Risks -- Gender -- Shocks and Hazards -- Illustrating the Case: Food Security Challenges and Patterns of Land Tenure in South Asia -- Connecting the Dots between the LTS and Food Security in South Asia -- From Global to Local: Evidence Supports Linking Efforts on LTS and Food Security -- References -- 7: A Complex Relationship: Large-Scale Land Acquisitions and Land Tenure Security -- Land Tenure Security and Large-Scale Land Acquisitions -- Global Overview -- Large-Scale Land Acquisitions and Tenure Security Contextualized: A Case of Zambia -- Does Weak Land Tenure Security Attract Investors in the Zambian Context? …”
Publicado 2022
Libro electrónico -
11063Publicado 2023Tabla de Contenidos: “…Med. 2022, 12, 1494, doi:10.3390/jpm12091494 179 -- Keh-Sen Liu, Yao-Shen Tong, Ming-Tsung Lee, Hung-Yu Lin and Min-Chi Lu -- Risk Factors of 30-Day All-Cause Mortality in Patients with Carbapenem-Resistant Klebsiella -- pneumoniae Bloodstream Infection -- Reprinted from: J. …”
Libro electrónico -
11064Publicado 2024Tabla de Contenidos: “…Character and improvisation: A recursive relationship -- Introduction -- Leader character -- Leader character development -- How character influences improvisation -- Improvisation as a practice to develop character -- Yes-And -- Risking comfort -- State of play -- Character contagion -- Shifting core beliefs -- Application -- Improvisation workshop training -- Extending character-based improvisation into the workplace -- Embedding character-based improvisation into practices -- Conclusion -- References -- 8. …”
Libro electrónico -
11065por Singh, PaulTabla de Contenidos: “…-- Understanding TPM, RPM, and PTUs -- Scaling Design patterns -- Retries with exponential backoff - the scaling special sauce -- Rate Limiting Policy in Azure API Management -- Monitoring, logging, and HTTP return codes -- Monitoring and logging -- HTTP return codes -- Costs, training and support -- Costs -- Training -- Support -- Summary -- References -- Part 4: Building Safe and Secure AI - Security and Ethical Considerations -- Chapter 8: Security and Privacy Considerations for Gen AI - Building Safe and Secure LLMs -- Understanding and mitigating security risks in generative AI -- Emerging security threats - a look at attack vectors and future challenges -- Model denial of service (DoS) -- Jailbreaks and prompt injections -- Training data poisoning -- Insecure plugin (assistant) design -- Insecure output handling -- Applying security controls in your organization -- Content filtering -- Managed identities -- Key management system -- What is privacy? …”
Publicado 2024
Libro electrónico -
11066por Verham, DominiekTabla de Contenidos: “…-- Summary -- Chapter 3: Modern Security Risks -- What are bad actors? -- Types of cyberattacks -- Phishing attack -- Ransomware -- Distributed denial of service -- Man in the middle attacks -- SQL injections -- Cross-site scripting -- Zero-day exploits -- Social engineering attacks -- Recovering from a cyberattack -- A cyber incident response plan -- Virtual desktops to the rescue -- Summary -- Part 3: Security Controls for W365 and AVD -- Chapter 4: Securing User Sessions -- CA and MFA -- Security defaults -- Per-user MFA -- CA policy -- Configuring RDP device and resource redirections for Windows 365 -- Device and resource redirections with Intune -- Device and resource redirections with group policy -- Configuring RDP properties for Azure Virtual Desktop -- Drive and storage redirection -- Clipboard redirection -- COM port redirection -- Printer redirection -- Smartcard redirection -- USB device redirection -- RDP session limit timeouts -- Summary…”
Publicado 2024
Libro electrónico -
11067Publicado 2022Tabla de Contenidos: “…Understanding frequencies and percentages -- Frequencies -- Percentages -- Calculating percent change and percent difference -- Percent change -- Percent difference -- Discovering confidence intervals -- Understanding z-scores -- Summary -- Practice questions -- Questions -- Answers -- Chapter 9: Hypothesis Testing -- Understanding hypothesis testing -- Why use hypothesis testing -- Hypothesis testing process -- Differentiating null hypothesis and alternative hypothesis -- Null hypothesis ( ) -- Alternative hypothesis ( ) -- Null hypothesis versus alternative hypothesis -- Learning about p-value and alpha -- p-value -- Alpha -- Alpha and tails -- Understanding type I and type II errors -- Type I error -- Type II error -- How type I and type II errors interact with alpha -- Writing the right questions -- The parts of a good question -- Qualities of a good question -- What to do about bad questions -- Summary -- Practice questions -- Questions -- Answers -- Chapter 10: Introduction to Inferential Statistics -- Technical requirements -- Understanding t-tests -- What you need to know about t-tests -- T-test practice -- Knowing chi-square -- What you need to know about chi-square -- Chi-square practice -- Calculating correlations -- Correlation -- Correlation practice -- Understanding simple linear regression -- What you need to know about simple linear regression -- Simple linear regression practice -- Summary -- Practice questions -- Questions -- Answers -- Part 3: Reporting Data -- Chapter 11: Types of Reports -- Distinguishing between static and dynamic reports -- Point-in-time reports -- Real-time reports -- Static versus dynamic reports -- Understanding ad hoc and research reports -- Ad hoc reports -- Research reports -- Knowing about self-service reports -- Understanding recurring reports -- Compliance reports -- Risk and regulatory reports…”
Libro electrónico -
11068por Institute of Medicine (U.S.).Tabla de Contenidos: “…-- Prior Review -- High-Cost Case Management -- Retrospective Utilization Review -- Other Cost-Containment Methods -- TWO NOTES OF CAUTION -- Obstacles To Evaluation -- Intrinsic Conceptual and Methodological Problems -- Common Behavioral Biases Against Evaluation -- Competition and Evaluation -- Forces Behind Rising Health Care Costs -- REFERENCES -- 2 Origins of Utilization Management -- THE GROWTH OF THIRD-PARTY FINANCING OF HEALTH CARE -- EARLY COST-MANAGEMENT EFFORTS BY THIRD PARTIES -- Management of the Risk Pool -- Design of the Benefit Plan -- Controls On Payments To Providers -- Constraints On Supply -- Utilization Review -- GOVERNMENT AND EMPLOYER INVOLVEMENT -- Federal Government Initiatives -- Private Purchasers Become an Force -- OTHER FACTORS GIVING RISE TO UTILIZATION MANAGEMENT -- Inappropriate Utilization as an Cost-Containment Target -- Variations in Utilization -- Inappropriate Utilization -- Linking Cost and Quality -- Improving the Tools and Structures for Utilization Management -- Information Resources -- Assessment and Education Strategies -- New Organizations -- CONCLUSION -- REFERENCES…”
Publicado 1989
Libro electrónico -
11069por Bansal, VeenaTabla de Contenidos: “…Implementation Strategy -- 8.8 Gap Analysis -- 8.9 AHP for ERP Selection -- Conclusion -- Case Study -- Exercises -- Endnotes -- Chapter 9 : Managing an ERP Project -- 9.1 Introduction -- 9.2 Success of an ERP System is Multi-dimensional -- 9.3 Critical Success Factors -- 9.4 Risk Associated with an ERP Project -- 9.5 Measuring Performance of ERP System Using Balanced Scorecard -- Conclusion -- Exercises -- Endnotes -- Chapter 10 : ERP and Related Technologies -- 10.1 Introduction -- 10.2 Electronic Data Interchange -- 10.2.1 EDI Standards -- 10.2.2 EDI Architecture -- 10.3 Supply Chain Management -- 10.3.1 Role of IT in SCM -- 10.4 Customer Relationship Management -- 10.5 Data Warehouse -- 10.5.1 Architecture of Data Warehouse -- 10.5.2 Process of Creating a Data Warehouse -- 10.6 Data Mining -- Conclusion -- Exercises -- Endnote -- Chapter 11 : Introduction to Commercial ERP Softwares -- 11.1 Introduction -- 11.2 Indian Market -- 11.3 SAP -- 11.3 Oracle -- 11.4 Oracle Peoplesoft -- 11.5 JD Edwards -- 11.6 MS Dynamics -- 11.7 Baan -- 11.8 Ramco -- 11.9 QAD -- 11.10 Conclusion…”
Publicado 2012
Libro electrónico -
11070Publicado 2024Tabla de Contenidos: “…5.4 Assessing the usability of AR interfaces for path planning -- 5.4.1 Usability evaluation -- 5.5 Conclusions -- References -- Part 3: Crafting the future: System design and applications -- Chapter 6: Unveiling the future of medical imaging: Scan to VR pipeline for visualization -- 6.1 Introduction -- 6.2 Case study -- 6.3 Methodology -- 6.4 Results -- 6.5 Discussion -- 6.6 Summary and conclusion -- Acknowledgements -- References -- Chapter 7: Accelerating rehabilitation through AR/VR solutions -- 7.1 Introduction -- 7.1.1 Brief explanation of the state of the art of VR/AR systems -- 7.2 Search strategy -- 7.3 Existing AR/VR technologies for physical rehabilitation -- 7.4 AR/VR technology as healthcare treatment options -- 7.4.1 Upper limb -- 7.4.2 Lower limb -- 7.4.3 Parkinson's Disease -- 7.4.4 Stroke -- 7.4.5 Sclerosis -- 7.4.6 Pain management -- 7.5 State of art review (top 5 articles) -- 7.6 Design and development approaches for Physical Rehabilitation -- 7.6.1 Traditional research and development of AR/VR devices -- 7.6.1.1 Patient side -- 7.6.1.2 Physician/physiotherapist -- 7.6.1.3 Software -- 7.6.1.4 Limitations of AR/VR usability -- 7.6.2 FDA regulations for AR/VR product development -- 7.7 Discussion -- 7.7.1 Application and benefits -- 7.7.1.1 Mental health and concerned disorders -- 7.7.1.2 Surgical limitations and pediatric diagnosis -- 7.7.2 Emerging risks -- 7.7.3 Design standard requirements -- 7.7.4 Future research directions -- 7.8 Conclusion -- Acknowledgements -- References -- Chapter 8: Overcoming phobias: Harnessing the power of immersive virtual reality therapy -- 8.1 Introduction -- 8.1.1 Background and driving forces -- 8.2 Various types of phobias -- 8.3 Available treatments for phobias -- 8.4 Virtual reality in the treatment of phobias -- 8.5 Virtual reality systems…”
Libro electrónico -
11071por Lovelace, MaryTabla de Contenidos: “…Planning for conversion -- 2.1 Planning considerations -- 2.1.1 Software maintenance levels -- 2.1.2 Timing of events in your installation -- 2.1.3 Change management -- 2.1.4 Limiting business risk -- 2.2 Conversion process -- 2.3 Conversion stages -- 2.3.1 Preparing a conversion plan -- 2.3.2 Learning about DFSMSrmm -- 2.3.3 Starting DFSMSrmm -- 2.3.4 Analyzing the current environment -- 2.3.5 Extracting data for conversion -- 2.3.6 Completing conversion -- 2.3.7 Parallel running and validation -- 2.3.8 Cutover to production -- 2.3.9 Measuring success -- 2.3.10 Full exploitation -- 2.3.11 Uninstall all vendor tape management code from your system -- Chapter 3. …”
Publicado 2003
Libro electrónico -
11072por Ebel, NadinTabla de Contenidos: “…7.1 Practices als Teil des Service-Wertsystems -- 7.1.1 Practices in vier Dimensionen -- 7.1.2 Einteilung der Practices -- 7.2 General Management Practices -- 7.2.1 Architecture Management -- 7.2.2 Continual Improvement -- 7.2.3 Information Security Management -- 7.2.4 Knowledge Management -- 7.2.5 Measurement and Reporting -- 7.2.5.1 Einfluss von Kennzahlen auf das Verhalten -- 7.2.5.2 Berichtswesen -- 7.2.6 Organizational Change Management -- 7.2.6.1 Aktivitäten des organisatorischen Veränderungsmanagements -- 7.2.7 Portfolio Management -- 7.2.8 Project Management -- 7.2.9 Relationship Management -- 7.2.10 Risk Management -- 7.2.11 Service Financial Management -- 7.2.12 Strategy Management -- 7.2.13 Supplier Management -- 7.2.13.1 Sourcing, Lieferantenstrategie und -beziehungen -- 7.2.13.2 Bewertung und Auswahl von Lieferanten -- 7.2.13.3 Aktivitäten -- 7.2.13.4 Service-Integration -- 7.2.14 Workforce and Talent Management -- 7.2.14.1 Aktivitäten -- 7.3 Service Management Practices -- 7.3.1 Availability Management -- 7.3.2 Business Analysis -- 7.3.3 Capacity and Performance Management -- 7.3.4 Change Enablement -- 7.3.5 Incident Management -- 7.3.6 IT Asset Management -- 7.3.7 Monitoring and Event Management -- 7.3.8 Problem Management -- 7.3.8.1 Problemidentifizierungsphase -- 7.3.8.2 Problem-Control-Phase -- 7.3.8.3 Error-Control-Phase -- 7.3.8.4 Schnittstellen -- 7.3.9 Release Management -- 7.3.10 Service Catalogue Management -- 7.3.11 Service Configuration Management -- 7.3.12 Service Continuity Management -- 7.3.13 Service Design -- 7.3.13.1 Design Thinking -- 7.3.13.2 Customer und User Experience -- 7.3.14 Service Desk -- 7.3.15 Service Level Management -- 7.3.15.1 Service Level Agreements -- 7.3.16 Service Request Management -- 7.3.17 Service Validation and Testing -- 7.3.17.1 Service Validation -- 7.3.17.2 Testing…”
Publicado 2021
Libro electrónico -
11073por IARC Working Group on the Evaluation of Carcinogenic Risks to Humans
Publicado 1990Libro electrónico -
11074por OECDTabla de Contenidos: “…Use of digital geographic information systems (GIS) -- E-health services -- Digital services in education -- Digital portals -- Electronic payments for subnational services and transfers -- E-procurement -- Digital information systems -- Open government and transparency -- Use of social media -- Challenges -- Human resource constraints -- Physical constraints -- Funding constraints -- Other challenges -- The role of inter-governmental co-operation -- Conclusions -- References -- Notes -- 6 Can subnational accounting give an early warning of fiscal risks? -- Introduction -- The subnational context -- The role of national governments -- Approaches to standard-setting -- Accounting standards are generally harmonised -- The means for imposing common standards are country-specific -- Accounting basis for subnational accounts -- A large majority of subnationals prepare accrual accounts -- There is no shared definition or framework for accrual accounting -- Timeliness and reliability of subnational accounts -- Annual reporting is a basic requirement in virtually all countries -- Independent audit is not yet a standard practice -- Monitoring -- Monitoring systems -- In the EU, some federal countries have developed innovative kinds of monitoring -- The nature of the monitoring varies widely -- Indicators used for the monitoring -- Monitoring of debt and cash deficits is often supplemented by monitoring of accrual-based indicators -- Progress is still possible -- Benchmarking -- References -- Notes -- 7 Insolvency frameworks for state and local governments -- Introduction and main findings -- The case for subnational insolvency frameworks -- Subnational finances -- Drivers of subnational debt: The problem of soft budget constraints -- Options for preventing excessive subnational debt -- Strengthening budgetary institutions…”
Publicado 2022
Libro electrónico -
11075Publicado 2017Tabla de Contenidos: “…-- When to Use Digitization -- How to Digitize -- Step 1: Analyze and Prioritize Requirements -- Step 2: Simplify Processes and Rules -- Step 3: Blueprint Technology Choices -- Step 4: Implement to Deliver Value from the Start -- Step 5: Manage Risks -- Part III: Coping with Cost Restructuring: How to Manage and Sustain the Change -- Chapter 14: Running a Cost Transformation: Mobilizing, Scaling, and Sustaining -- Phase 1: Diagnostic and Case for Change -- How It Is Governed -- The Transformation Team -- The Working Process -- Phase 2: Detailed Design -- How It Is Governed -- The Transformation Team -- The Working Process -- Phase 3: Execution -- How It Is Governed -- The Transformation Team -- The Working Process…”
Libro electrónico -
11076Publicado 2023Tabla de Contenidos: “…Looking into the different options available for data migration -- Summary -- Further reading -- Part 3: The Way Forward: The Art of Possible -- Chapter 9: The Pilot: High Stakes -- Accelerating your transition -- S/4HANA public cloud/new implementations (greenfield) -- System conversions (brownfield) -- The Readiness Check tool -- The Custom Code Migration app -- Selective Data Transition -- Iterative data loads -- Mitigating the risks by starting earlier -- An Agile approach to data conversion and integration testing -- SAP Activate -- SAP's EML -- The UX strategy -- Importance of a UX strategy -- Change management -- Getting ready for the pilot -- Scenarios for the use of TMS + CTS for on-prem deployments -- Transport management with SAP CALM -- Bringing it all together and the pilot rollout -- Summary -- Chapter 10: Going All In: A Leap of Faith -- S/4HANA deployment patterns -- Focusing on defining the Global Template -- Defining the instance strategy -- Methodology -- The rollout approach -- Deployment -- Release management -- Cutover management -- Solution readiness -- People readiness -- Business operational readiness -- The readiness of AMS for deployment and transition -- Monitoring progress to go-live -- Go-live -- Hypercare -- Stabilization and Hypercare - post-go-live support and incident management -- Rollout post go-live -- Summary -- Chapter 11: Innovation Unleashed: The Hunger Games -- The cultural shift to innovation -- Sponsored innovation hackathons -- Innovation awards -- Rewiring the enterprise for agility and scale -- Citizen developers -- Multi-layered APIs -- Security-as-a-Service -- LCNC in SAP (SAP Build) -- SAP Graph and SAP One Domain Model (ODM) -- Web 3.0 -- The future of work -- The spectrum of automation and digitalization -- Digital employees -- Brand ambassadors -- Futuristic retail experiences…”
Libro electrónico -
11077Publicado 2024Tabla de Contenidos: “…-- Knowing When to Take the Initiative or Follow -- When Everyone on the Team Is Aware That Their Efforts Matter -- Experiencing the Joys and Suffering of Accomplishment Together -- Keep an Eye on the Team's Flow -- There Is a Tie of Dedication and Trust -- Risk-Taking Is a Common Practice -- Nobody Quits -- Key Takeaways -- Coaching and Developmental Questions -- Recommended Supporting Resources -- 10 Implementing Coaching Programs -- Introduction -- Defining Key Terms -- Coaching in Organizations -- Coaching as Process -- Types of Coaching -- Using Coaching Skills and Coaching Skills Training -- The Organization as System and the Coaching Culture…”
Libro electrónico -
11078Publicado 2018Tabla de Contenidos: “…Dot-walking and GlideElement -- Script includes -- Server-side GlideAjax -- Business rules -- After business rules -- Asynchronous business rules -- Display business rules and g_scratchpad -- Default versus calculated field values -- Default values -- Calculated values -- Summary -- Chapter 12: Client-Side Scripting -- Client scripts -- Client script types -- onLoad -- onChange -- onSubmit -- onCellEdit -- Security -- Compatibility -- Build for performance -- Reference fields -- GlideAjax and asynchronous GlideRecord -- g_scratchpad -- UI scripts -- Running only necessary scripts -- Scripts from the server -- Summary -- Chapter 13: Service Portal Scripting -- Setting up appointments -- URLs in the service portal -- Creating the meeting widget -- Aesthetic changes -- Option schema -- Troubleshooting widgets -- Summary -- Chapter 14: Debugging -- Logging -- Client-side debugging -- Debugging field visibility -- Server-side debugging -- Reference versus value -- Debugging security -- JavaScript debugger -- Debugger interface -- Breakpoints -- General debugging -- Summary -- Chapter 15: Pro Tips -- Admin pro tips -- List personalization -- Update set selector -- Reference field background color -- List v3 rendering -- List, form, and new window shortcuts -- Adding the ServiceNow frame by URL -- Impersonation simplification -- Derived field risks -- Finding derived fields and other field data -- Dictionary overrides -- Scripting pro tips -- Avoiding nested loops -- Limit logging -- Always use getters and setters -- What the pros wish they knew -- Field case -- Generating encoded query strings -- How to modify OOB scripts -- Other technical best practices -- Summary -- Index…”
Libro electrónico -
11079Publicado 2018Tabla de Contenidos: “…Trust creates energyTrust is worth exploringTrust in competence is easily detectedTrust in agreement means integrityCommunication styles build trustFour dimensions of behaviourOpen communication styleStraightforward communication styleReliable communication styleAccepting communication styleTrust as regards attitude is perceivableIndividual tendency to trustTo trust requires the courage to take risksCan you accelerate trust formation?1. Relation factors2. …”
Libro electrónico -
11080por Bhattacharyya, Dipak KumarTabla de Contenidos: “…Process of Building PMS -- Dimensions of PMS -- Output or Result Dimensions -- Input Dimension -- Time Dimension -- Focus Dimension -- Conceptual Framework of PMS -- PMS and Organizational Strategy -- Organizational and Social Perspectives of PMS -- Performance Consulting -- Role of Performance Consultants -- The Four Pillars of PMS -- Performance Management Theatre -- Annual Stock-taking of Performance -- E-performance Management -- Performance Prism -- Summary -- Key Words -- General Review Questions -- Critical Review Question -- References -- Case Study -- Chapter 6: Strategic Performance Management -- Introduction -- Definition -- Evolution of Strategic Performance Management -- Characteristics of SPM -- SPM and Generic Strategies -- Performance and Strategy Linkage -- Reward Practices -- Firm Performance -- Purpose of Performance Management Strategy -- The Process of Performance Management Strategy -- Components of Strategic Performance Management Process -- Strategy and Performance Management Cycle -- Dimensions of Linkage Between Individual Performances and Strategy -- Benefits of SPM -- Advantages and Disadvantages of SPM -- Disadvantages of SPM -- SPM and the Balanced Scorecard -- SPM and Metrics -- SPM for Environmental Threats and Risks -- Summary -- Key Words -- General Review Questions -- Critical Review Question -- Further Reading -- Case Study -- Chapter 7: Competency-based Performance Management Systems -- Introduction -- Managerial Skills and Competencies -- Skill Inventories -- Multi-skilling -- Skills for the New Millennium -- Developing Competencies for Effective Performance Management -- Types of Competencies -- Competency Characteristics -- Competency Identification and Assessment Process -- Steps of a Competency Identification Process -- Steps to Introduce Competency-based System -- Advantages of a Competency-based Approach…”
Publicado 2011
Libro electrónico