Mostrando 11,361 - 11,380 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.12s Limitar resultados
  1. 11361
    Publicado 2020
    “…With this report, developers and site reliability engineers will explore the basic components of Google’s launch plan and learn practical methods to reduce risks when introducing your company’s products. These lessons are adaptable for consumer-oriented services regardless of company size or product user base. …”
    Libro electrónico
  2. 11362
    Publicado 2013
    “…Companies face a variety of risks resulting from cost reduction strategies, rationalization measures, global sourcing, and outsourcing activities. …”
    Libro electrónico
  3. 11363
    Publicado 2022
    “…It presents a socio-technical framework, which includes the key aspects of supply chain relationships, the supply chain business environment, overall supply chain competitiveness, supply chain sustainability, and supply chain risks. The book works through the recruitment, training and development of leaders as well as obstacles and risks, to offer a fresh, people-centred approach. …”
    Libro electrónico
  4. 11364
    por Woloshin/Schwartz, author
    Publicado 2009
    “…Every day we are bombarded by television ads, public service announcements, and media reports warning of dire risks to our health and offering solutions to help us lower those risks. …”
    Libro electrónico
  5. 11365
    Publicado 2022
    “…Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. …”
    Video
  6. 11366
    Publicado 2023
    “…This title reviews and synthesizes the research on economic methods for evaluating regulations that improve air quality, save energy, and reduce climate risks. It also offers perspective on the relevance and limitations of current research for applied benefit-cost analysis…”
    Libro electrónico
  7. 11367
    por Barré-Sinoussi, Françoise
    Publicado 2021
    “…Due to the numerous factors involved in the risks of transmission, and the social and cultural complexity of maternity in India, all these contributions show the necessity of initiating and conducting research in the fields of the social sciences. …”
    Electrónico
  8. 11368
    Publicado 2015
    “…Offers tips on how to minimize the risk of investment gambles Covers the FCA's more stringent risk analysis for investors using advisers Contains new sections on pensions, ISAs, the DIY/self-directed investor, and ultra-low interest rates Includes new online templates to help simplify the investing process If you want to go it alone in the investment arena, but need the support of a straightforward, reassuring guide to help you make the best decisions—and get the highest returns from your investments—this is the book for you…”
    Libro electrónico
  9. 11369
    “…This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks…”
    Libro electrónico
  10. 11370
    Publicado 2010
    “…This title considers the risks of tears in public and private spaces; the way tears implicate us in tragedy, comedy, and horror…”
    Libro
  11. 11371
    Publicado 2015
    “…This work presents the outcome of fifteen years of research financed by the French Ministry of Ecology on the reduction in environmental risks from using pesticides. It emphasises especially the transfer of results to support public decisions…”
    Libro electrónico
  12. 11372
    Publicado 2015
    “…SOIs seek new opportunities, risks, and operational behavior that needs to be reported or have action taken to optimize business outcomes. …”
    Libro electrónico
  13. 11373
    por Al-Turjman, Fadi
    Publicado 2021
    Tabla de Contenidos: “…1.8.1 Customer Verifications -- 1.8.2 Safeguarding Data -- 1.8.3 Data Violation, Loss, and Destruction -- 1.8.4 Storage Topography -- 1.8.5 Public Cloud versus Private Cloud -- 1.8.6 Version Awareness and Backup Execution -- 1.8.7 Security of Data and Encoding -- 1.9 Potential Hazards of Cloud BI Adoption -- 1.9.1 Security Difficulties -- 1.9.2 Threats and Risks in Cloud Computing -- 1.9.3 Privacy and Security -- 1.10 Discussion and Open Research -- 1.11 Conclusion -- Acknowledgments -- References -- Chapter 2 Resource Allocation in Volunteered Cloud Computing and Battling COVID-19 -- 2.1 Introduction -- 2.1.1 Comparison to Other Surveys -- 2.1.2 Scope of the Paper and Contributions -- 2.2 Roles of Any Entity in the Cloud -- 2.2.1 Provider -- 2.2.2 User -- 2.2.3 Vendor -- 2.3 Resources in Cloud Volunteer Computing -- 2.3.1 Storage-Based Resource -- 2.3.1.1 Network Storage -- 2.3.1.2 Hard Disk -- 2.3.2 Network-Based Resource -- 2.3.2.1 Reliable Communications -- 2.3.2.2 Efficient Communications -- 2.3.2.3 Virtual Networking -- 2.3.3 Service Model as a Resource -- 2.3.3.1 Infrastructure as a Service (IaaS) -- 2.3.3.2 Software as a Service (IaaS) -- 2.3.3.3 Platform as a Service (PaaS) -- 2.3.4 Server as a Resource -- 2.3.4.1 Cloud Server -- 2.3.4.2 Dedicated Server -- 2.3.5 MapReduce as a Resource -- 2.3.6 Intelligence and Resource Allocation -- 2.3.6.1 Supervised Learning -- 2.3.6.2 Unsupervised Learning -- 2.3.6.3 Reinforcement Learning (Semi-Supervised) -- 2.4 Scheduling of Resources in the Cloud -- 2.4.1 Cloud Service Scheduling -- 2.4.2 Customer Side Scheduling -- 2.4.3 Static and Dynamic Scheduling -- 2.4.4 Heuristic Scheduling -- 2.4.5 Workflow Scheduling -- 2.4.6 Real-Time Scheduling -- 2.4.7 Dynamic Dedicated Server Scheduling (DDSS) -- 2.5 Algorithms of Resource Allocation -- 2.5.1 Ant Colony Optimization Algorithm -- 2.5.2 Bees Algorithm…”
    Libro electrónico
  14. 11374
    Publicado 2019
    Tabla de Contenidos: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN AUTOMATION, CONTROL AND ROBOTICS -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Acknowledgments -- Foreword -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- Chapter 1 - Introduction -- 1.1 Maintenance Today -- 1.2 The Path to Proactive Maintenance -- 1.3 Why to Read this Book -- References -- Chapter 2 - Business Drivers of a Collaborative, Proactive Maintenance Solution -- 2.1 Introduction -- 2.1.1 CBM-based PM in Industry -- 2.1.2 CBM-based PM in Service Business -- 2.1.3 Life Cycle Cost and Overall Equipment Effectiveness -- 2.1.4 Integrating IoT with Old Equipment -- 2.1.5 CBM Strategy as a Maintenance Business Driver -- 2.2 Optimization of Maintenance Costs -- 2.3 Business Drivers for Collaborative Proactive Maintenance -- 2.3.1 Maintenance Optimisation Models -- 2.3.2 Objectives and Scope -- 2.3.3 Maintenance Standards -- 2.3.4 Maintenance-related Operational Planning -- 2.4 Economic View of CBM-based PM -- 2.5 Risks in CBM Plan Implementation -- 2.5.1 Technology -- 2.5.2 People -- 2.5.3 Processes -- 2.5.4 Organizational Culture -- References -- Chapter 3 - The MANTIS Reference Architecture -- 3.1 Introduction -- 3.1.1 MANTIS Platform Architecture Overview -- 3.2 The MANTIS Reference Architecture -- 3.2.1 Related Work and Technologies -- 3.2.1.1 Reference architecture for the industrial internet of things -- 3.2.1.2 Data processing in Lambda -- 3.2.1.3 Maintenance based on MIMOSA -- 3.2.2 Architecture Model and Components -- 3.2.2.1 Edge tier -- 3.2.2.2 Platform tier -- 3.2.2.3 Enterprise tier -- 3.2.2.4 Multi stakeholder interactions -- 3.3 Data Management -- 3.3.1 Data Quality Considerations -- 3.3.2 Utilization of Cloud Technologies -- 3.3.3 Data Storages in MANTIS -- 3.3.4 Storage Types -- 3.3.4.1 Big data file systems…”
    Libro electrónico
  15. 11375
    Publicado 2015
    Tabla de Contenidos: “…. -- 3.8.3 Components of a QoS Security Framework -- 3.8.3.1 Authentication -- 3.8.3.2 Authorization -- 3.8.3.3 Network -- 3.8.3.4 Trust Management -- 3.9 Discussion -- Acknowledgments -- Bibliography -- Chapter 4 - Internet of Things Application Scenarios, Pilots and Innovation -- 4.1 Introduction -- 4.2 IoT Projects -- 4.2.1 ALMANAC -- 4.2.1.1 Application Areas -- 4.2.1.2 Pilots and Demonstrators -- 4.2.1.2.1 SmartWaste Collection Field Trial -- 4.2.1.2.2 SmartWater Capillary Network -- 4.2.1.2.3 Collaborative Citizen-centric application -- 4.2.2 ClouT -- 4.2.2.1 Application Areas -- 4.2.2.2 Pilots and Demonstrators -- 4.2.2.2.1 Fujisawa field trial: Surfboard + Smile Coupon -- 4.2.2.2.2 Mitaka field trial: Paw collection -- 4.2.2.2.3 Genova field trial: "I don't risk" (SEM1 application context) -- 4.2.2.2.4 Santander field trial:Traffic Mobility Management -- 4.2.2.2.5 Sensorized garbage collection cars -- 4.2.2.2.6 Pace of the city -- 4.2.3 OSMOSE -- 4.2.3.1 Application Areas -- 4.2.3.2 Pilots and Demonstrators -- 4.2.3.2.1 OSMOsis applications for Aerospace Domain -- 4.2.3.2.2 OSMOsis applications for Automotive Domain -- 4.2.4 RERUM -- 4.2.4.1 Application Areas…”
    Libro electrónico
  16. 11376
    Publicado 2019
    Tabla de Contenidos: “…Front Cover -- Software Engineering for Embedded Systems -- Copyright -- Contents -- Contributors -- Acknowledgments -- 1 Software Engineering for Embedded and Real-Time Systems -- 1 Software Engineering -- 2 Embedded Systems -- 2.1 Embedded Systems Are Reactive Systems -- 3 Real-Time Systems -- 3.1 Types of Real-Time Systems-Soft and Hard -- 3.2 Differences Between Real-Time and Time-Shared Systems -- 4 Example of a Hard Real-Time System -- 4.1 Based on Signal Sample, Time to Perform Actions Before Next Sample Arrives -- 4.2 Hard Real-Time Systems -- 5 Real-Time Event Characteristics -- 5.1 Real-Time Event Categories -- 5.2 Efficient Execution and the Execution Environment -- 5.2.1 Efficiency Overview -- 5.2.2 Resource Management -- 6 Challenges in Real-Time System Design -- 6.1 Response Time -- 6.2 Recovering From Failures -- 7 The Embedded System's Software Build Process -- 8 Distributed and Multiprocessor Architectures -- 9 Software for Embedded Systems -- 9.1 Super Loop Architecture -- 9.2 Power-Saving Super Loop -- 9.3 Window Lift Embedded Design -- 10 Hardware Abstraction Layers for Embedded Systems -- 2 Software Development Process -- 1 Getting Started -- 1.1 Project Planning -- 1.2 Risk Management -- 1.3 Kicking Off the Project -- 2 Requirements -- 2.1 User Requirements -- 2.2 System Requirements -- 3 Architecture -- 3.1 Safety-Critical Elements -- 3.2 Operating Performance -- 3.3 Security -- 3.4 Reliability and Availability -- 4 Design -- 4.1 Object-Oriented Programming -- 4.1.1 System Context -- 4.1.2 Class Identification -- 4.1.3 Design Modeling -- 4.2 Real-Time Design -- 5 Implementation -- 6 Testing -- 6.1 Validation and Verification -- 6.2 Integration Testing -- 6.3 Release Testing -- 6.4 Performance Testing -- 7 Rolling It Together: Agile Development…”
    Libro electrónico
  17. 11377
    por Prakash, Kolla Bhanu
    Publicado 2024
    Tabla de Contenidos: “…-- 9.2 Model Selection Strategies -- 9.3 Types of Model Selection -- 9.3.1 Methods of Re-Sampling -- 9.3.2 Random Separation -- 9.3.3 Time Divide -- 9.3.4 K-Fold Cross-Validation -- 9.3.5 Stratified K-Fold -- 9.3.6 Bootstrap -- 9.3.7 Possible Steps -- 9.3.8 Akaike Information Criterion (AIC) -- 9.3.9 Bayesian Information Criterion (BIC) -- 9.3.10 Minimum Definition Length (MDL) -- 9.3.11 Building Risk Reduction (SRM) -- 9.3.12 Excessive Installation (Overfitting) -- 9.4 The Principle of Parsimony -- 9.5 Examples of Model Selection Criterions -- 9.6 Other Popular Properties -- 9.7 Key Considerations -- 9.8 Model Validation -- 9.8.1 Why is Model Validation Important? …”
    Libro electrónico
  18. 11378
    por Allison, Steve
    Publicado 2005
    Tabla de Contenidos: “…Security design -- 2.1 Overview of security challenges -- 2.1.1 Assessing and managing security risks -- 2.1.2 Evolving with emerging technologies and trends -- 2.2 Finding the right level of security for your enterprise…”
    Libro electrónico
  19. 11379
    por Putte, Geert van de
    Publicado 2005
    Tabla de Contenidos: “…Implementing a firewall -- 13.1 Network services and vulnerability -- 13.1.1 Minimizing security risk: Introducing the firewall…”
    Libro electrónico
  20. 11380
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface to the Second Edition -- Author -- Part I Introduction to Cellular and Molecular Biology -- 1 The Cellular System and the Code of Life -- 1.1 The Cellular Challenge -- 1.2 How Cells Meet the Challenge -- 1.3 Molecules in Cells -- 1.4 Intracellular Structures Or Spaces -- 1.4.1 Nucleus -- 1.4.2 Cell Membrane -- 1.4.3 Cytoplasm -- 1.4.4 Endosome, Lysosome, and Peroxisome -- 1.4.5 Ribosome -- 1.4.6 Endoplasmic Reticulum -- 1.4.7 Golgi Apparatus -- 1.4.8 Cytoskeleton -- 1.4.9 Mitochondrion -- 1.4.10 Chloroplast -- 1.5 The Cell as a System -- 1.5.1 The Cellular System -- 1.5.2 Systems Biology of the Cell -- 1.5.3 How to Study the Cellular System -- References -- 2 DNA Sequence: The Genome Base -- 2.1 The DNA Double Helix and Base Sequence -- 2.2 How DNA Molecules Replicate and Maintain Fidelity -- 2.3 How the Genetic Information Stored in DNA Is Transferred to Protein -- 2.4 The Genomic Landscape -- 2.4.1 The Minimal Genome -- 2.4.2 Genome Sizes -- 2.4.3 Protein-Coding Regions of the Genome -- 2.4.4 Non-Coding Genomic Elements -- 2.5 DNA Packaging, Sequence Access, and DNA-Protein Interactions -- 2.5.1 DNA Packaging -- 2.5.2 Sequence Access -- 2.5.3 DNA-Protein Interactions -- 2.6 DNA Sequence Mutation and Polymorphism -- 2.7 Genome Evolution -- 2.8 Epigenome and DNA Methylation -- 2.9 Genome Sequencing and Disease Risk -- 2.9.1 Mendelian (Single-Gene) Diseases -- 2.9.2 Complex Diseases That Involve Multiple Genes -- 2.9.3 Diseases Caused By Genome Instability -- 2.9.4 Epigenomic/Epigenetic Diseases -- References -- 3 RNA: The Transcribed Sequence -- 3.1 RNA as the Messenger -- 3.2 The Molecular Structure of RNA -- 3.3 Generation, Processing, and Turnover of RNA as a Messenger -- 3.3.1 DNA Template -- 3.3.2 Transcription of Prokaryotic Genes…”
    Libro electrónico