Mostrando 285,641 - 285,660 Resultados de 286,064 Para Buscar '"S. J."', tiempo de consulta: 0.71s Limitar resultados
  1. 285641
    Publicado 2004
    “…What outstanding leaders do, and how they do it Actionable insights for achieving your own form of greatness Building corporate culture that can withstand anything What you can learn from Southwest's Herb Kelleher and J&J's James Burke Key attributes of lasting leadership Giving voice to customers , giving voice to truth Getting smarter, faster Case studies in building organizations that learn-- and act Reinventing your business: when it's time, how to do it Lessons from the master: Steve Jobs Discovering underserved markets--and serving them profitably Mohammed Yunus: Profiting from entrepreneurship in the world's poorest communities The greatest business leaders of our generation How they achieved the impossible What you can learn from them How to use those lessons to supercharge your career 25 compelling profiles from two of the world's leading sources of business insight: Nightly Business Report and The Wharton School's Knowledge@Wharton 25 extraordinary leaders, 25 incisive profiles: Andy Grove, Intel Bill Gates, Microsoft John Bogle, The Vanguard Group Steve Jobs, Apple & Pixar Warren Buffett, Berkshire Hathaway Herb Kelleher, Southwest Airlines Sam Walton, Wal-Mart Jack Welch, GE Jeff Bezos, Amazon Mary Kay Ash, Mary Kay Michael Dell, Dell Peter F. …”
    Libro electrónico
  2. 285642
    Publicado 2018
    “…Highlights include: Keynote speeches, including Eva Kaili (European Parliament) on data protection and innovation; Christine Foster (Alan Turing Institute) on building the data-driven future we want to live in; and Pierre Romera (ICIJ) on the challenges of sifting through 1.4 TB of data to produce journalism's headline generating "Paradise Papers" Sessions on Data Science and Machine Learning, including Jaya Mathew and Francesca Lazzeri (Microsoft) on using deep learning models for fraud detection; Ted Dunning (MapR Technologies) on AI Rendezvous technology; Paco Nathan (O'Reilly Media) and Ihab Ilyas (University of Waterloo) on HITL/human guided machine learning; Elisa Celis (EPFL) on fairness and diversity in online social systems; and David Talby (Pacific AI) on natural language understanding at scale with spaCy and Spark NLP Sessions on Data Engineering and Architecture, including Jim Webber (Neo4j) on Neo4j's new causal clustering architecture; Dean Wampler (Lightbend) on streaming microservices with Akka Streams and Kafka Streams; Flavio Junqueira (Dell EMC) on building stream pipelines with Pravega; and Jacques Nadeau (Dremio) on using Apache Arrow for high-speed data access The Strata Business Summit, including Executive Briefings on key issues such as predictive analytics and machine learning, Cloud strategy, governance security and privacy, and AI by luminaries such as Audrey Lobo-Pulo (The Australian Treasury), Kim Nilsson (Pivigo), Martin Goodson (Evolution AI), Simon Chan (Salesforce), and Ira Cohen (Anodot) FinData Day with sessions on using big da..…”
    Video
  3. 285643
    Publicado 2023
    “…As well as learning how to manage a persistent graph database using Neo4j, you’ll also get to grips with adapting your network model to evolving data requirements. …”
    Libro electrónico
  4. 285644
    Publicado 2022
    Tabla de Contenidos: “…Brown y su comentario al EvJn -- b) La hipótesis de J. L. Martyn -- 2. El autor del EvJn -- 3. La comunidad joánica -- 4. …”
    Libro electrónico
  5. 285645
    por Roith, Christian
    Publicado 2021
    Tabla de Contenidos: “…KRAUSE Y SU DESCUBRIMIENTO POR J. SANZ DEL RÍO -- 15.5. UN PROYECTO DE REFORMA EDUCATIVA -- 15.6. …”
    Libro electrónico
  6. 285646
    Publicado 2010
    Tabla de Contenidos: “…18.2 Differences in the Network-Level Architecture 497 -- 18.3 TD-SCDMA Physical Layer 497 -- 18.4 TD-SCDMA Data Rates 504 -- 18.5 TD-SCDMA Physical Layer Procedures 505 -- 18.6 TD-SCDMA Interference and Co-existence Considerations 508 -- 18.7 Conclusion and Future Outlook on TD-SCDMA 512 -- References 512 -- 19 Home Node B and Femtocells 515 /Troels Kolding, Hanns-JŠurgen Schwarzbauer, Johanna Pekonen, Karol Drazynski, Jacek Gora, Maciej Pakulski, Patryk Pisowacki, Harri Holma and Antti Toskala -- 19.1 Introduction 515 -- 19.2 Home Node B Specification Work 517 -- 19.3 Technical Challenges of Uncoordinated Mass Deployment 518 -- 19.4 Home Node B Architecture 519 -- 19.5 Closed Subscriber Group 523 -- 19.6 Home Node B-Related Mobility 524 -- 19.7 Home Node B Deployment and Interference Mitigation 529 -- 19.8 Home Node B Evolution 545 -- 19.9 Conclusion 545 -- References 546 -- 20 Terminal RF and Baseband Design Challenges 547 /Laurent Noël, Dominique Brunel, Antti Toskala and Harri Holma -- 20.1 Introduction 547 -- 20.2 Transmitter Chain System Design Challenges 549 -- 20.3 Receiver Chain Design Challenges 555 -- 20.4 Improving Talk-Time with DTX/DRX 567 -- 20.5 Multi-Mode/Band Challenges 582 -- 20.6 Conclusion 590 -- References 590 -- Index 593.…”
    Libro electrónico
  7. 285647
    Publicado 2004
    Tabla de Contenidos: “…Post-migration steps -- 7.1 Setting up aliases -- 7.2 Migrating custom code -- 7.2.1 Access control -- 7.2.2 Command parameter validation -- 7.2.3 User registration -- 7.2.4 Logon command -- 7.2.5 Calculation usage framework -- 7.2.6 Configuration and code changes for migrated EJBs -- 7.2.7 J2EE Connector Architecture -- 7.2.8 Pricing -- 7.2.9 Product Advisor -- 7.2.10 Rule server administration commands -- 7.2.11 JSP and property file changes -- Part 3 Production environment -- Chapter 8. …”
    Libro electrónico
  8. 285648
    Publicado 2002
    Tabla de Contenidos: “…Java enhancements for IMS and WebSphere -- 9.1 WebSphere 4.0.1 support -- 9.2 J2EE architecture -- 9.3 DataSource -- 9.4 Enterprise Archive (.ear) -- 9.5 Deploying the ear file -- 9.5.1 Configure the WebSphere server region for IMS access -- 9.5.2 Obtain the WebSphere for z/OS System Administration tool -- 9.5.3 Install an IMS JDBC Resource Adapter into a WebSphere server region. -- 9.5.4 Configure and deploy an instance of the IMS JDBC Resource Adapter -- 9.6 Configure and deploy an Enterprise Archive -- 9.7 IVP for WebSphere for z/OS -- 9.7.1 Untar the IVP Enterprise Archive -- 9.7.2 Configure an IMS JDBC Resource Adapter instance for the IVP EJB -- 9.7.3 Import, deploy and export the IVP application -- 9.7.4 Deploy and configure the Enterprise Archive (imsjavaIVP.ear) -- 9.7.5 Update the HTTP Server for access to the IVP Web application -- 9.8 Test the IVP application -- 9.9 Error logging and tracing in WebSphere for z/OS -- 9.9.1 Sample trace outputs -- Part 3 IMS Version 8 Parallel Sysplex enhancements…”
    Libro electrónico
  9. 285649
    por Steegmans, Bart
    Publicado 2002
    Tabla de Contenidos: “…Cloning a database or a table -- 8.1 Scenario J: Cloning a database…”
    Libro electrónico
  10. 285650
    Publicado 2011
    Tabla de Contenidos: “…References 598 -- 26 LTE System Performance 599 / Tetsushi Abe -- 26.1 Introduction 599 -- 26.2 Factors Contributing to LTE System Capacity 599 -- 26.3 LTE Capacity Evaluation 603 -- 26.4 LTE Coverage and Link Budget 608 -- 26.5 Summary 610 -- References 611 -- Part V LTE-Advanced 613 -- 27 Introduction to LTE-Advanced 615 / Dirk Gerstenberger -- 27.1 Introduction and Requirements 615 -- 27.2 Overview of the Main Features of LTE-Advanced 618 -- 27.3 Backward Compatibility 619 -- 27.4 Deployment Aspects 620 -- 27.5 UE Categories for LTE-Advanced 621 -- References 622 -- 28 Carrier Aggregation 623 / Juan Montojo and Jelena Damnjanovic -- 28.1 Introduction 623 -- 28.2 Protocols for Carrier Aggregation 624 -- 28.3 Physical Layer Aspects 631 -- 28.4 UE Transmitter and Receiver Aspects 648 -- 28.5 Summary 650 -- References 650 -- 29 Multiple Antenna Techniques for LTE-Advanced 651 / Alex Gorokhov, Amir Farajidana, Kapil Bhattad, Xiliang Luo and Stefan Geirhofer -- 29.1 Downlink Reference Signals 651 -- 29.2 Uplink Reference Signals 657 -- 29.3 Downlink MIMO Enhancements 659 -- 29.4 Uplink Multiple Antenna Transmission 666 -- 29.5 Coordinated MultiPoint (CoMP) Transmission and Reception 669 -- 29.6 Summary 671 -- References 671 -- 30 Relaying 673 / Eric Hardouin, J. Nicholas Laneman, Alexander Golitschek, Hidetoshi Suzuki, Osvaldo Gonsa -- 30.1 Introduction 673 -- 30.2 Theoretical Analysis of Relaying 679 -- 30.3 Relay Nodes in LTE-Advanced 684 -- 30.4 Summary 699 -- References 699 -- 31 Additional Features of LTE Release 10 701 / Teck Hu, Philippe Godin and Sudeep Palat -- 31.1 Introduction 701 -- 31.2 Enhanced Inter-Cell Interference Coordination 701 -- 31.3 Minimization of Drive Tests 710 -- 31.4 Machine-Type Communications 712 -- References 714 -- 32 LTE-Advanced Performance and Future Developments 715 / Takehiro Nakamura and Tetsushi Abe -- 32.1 LTE-Advanced System Performance 715 -- 32.2 Future Developments 718 -- References 720 -- Index 721.…”
    Libro electrónico
  11. 285651
    Publicado 2017
    Tabla de Contenidos: “…9.1.3 Why Testing Assumptions Can Be Unsatisfactory -- 9.1.4 Interpreting Student's T When It Rejects -- 9.1.5 Dealing with Unequal Variances: Welch's Test -- 9.1.6 R Function t.test -- 9.1.7 Student's T versus Welch's Test -- 9.1.8 The Impact of Outliers When Comparing Means -- 9.2 Comparing Medians -- 9.2.1 A Method Based on the McKean-Schrader Estimator -- 9.2.2 A Percentile Bootstrap Method -- 9.2.3 R Functions msmed, medpb2, split, and fac2list -- 9.2.4 An Important Issue: The Choice of Method can Matter -- 9.3 Comparing Trimmed Means -- 9.3.1 R Functions yuen, yuenbt, and trimpb2 -- 9.3.2 Skipped Measures of Location and Deleting Outliers -- 9.3.3 R Function pb2gen -- 9.4 Tukey's Three-Decision Rule -- 9.5 Comparing Variances -- 9.5.1 R Function comvar2 -- 9.6 Rank-Based (Nonparametric) Methods -- 9.6.1 Wilcoxon-Mann-Whitney Test -- 9.6.2 R Function wmw -- 9.6.3 Handling Heteroscedasticity -- 9.6.4 R Functions cid and cidv2 -- 9.7 Measuring Effect Size -- 9.7.1 Cohen's d -- 9.7.2 Concerns about Cohen's d and How They Might Be Addressed -- 9.7.3 R Functions akp.effect, yuenv2, and med.effect -- 9.8 Plotting Data -- 9.8.1 R Functions ebarplot, ebarplot.med, g2plot, and boxplot -- 9.9 Comparing Quantiles -- 9.9.1 R Function qcomhd -- 9.10 Comparing Two Binomial Distributions -- 9.10.1 Improved Methods -- 9.10.2 R Functions twobinom and twobicipv -- 9.11 A Method for Discrete or Categorical Data -- 9.11.1 R Functions disc2com, binband, and splotg2 -- 9.12 Comparing Regression Lines -- 9.12.1 Classic ANCOVA -- 9.12.2 R Function CLASSanc -- 9.12.3 Heteroscedastic Methods for Comparing the Slopes and Intercepts -- 9.12.4 R Functions olsJ2 and ols2ci -- 9.12.5 Dealing with Outliers among the Dependent Variable -- 9.12.6 R Functions reg2ci, ancGpar, and reg2plot -- 9.12.7 A Closer Look at Comparing Nonparallel Regression Lines -- 9.12.8 R Function ancJN…”
    Libro electrónico
  12. 285652
    Publicado 2021
    Tabla de Contenidos: “…Les charbons de bois (J-M. Pernaud) -- 2.1.1. Matériel et méthode -- 2.1.2. …”
    Libro electrónico
  13. 285653
    por Lakner, Gary
    Publicado 2004
    Tabla de Contenidos: “…Other scenarios -- 8.1 The Bike Shop scenario -- 8.1.1 EIM solution overview -- 8.1.2 The components -- 8.1.3 The J2EE application in more detail -- 8.1.4 The EIS applications -- 8.1.5 Notes about setting up and compiling the example code -- 8.1.6 Compiling files and setting up the physical file and logical file authorities -- 8.1.7 Compiling the RPGLE examples -- 8.1.8 Compiling and deploying the Java examples -- 8.2 Using remote SQL with single signon -- 8.3 Enabling another iSeries server for single signon -- 8.3.1 Before you begin -- 8.3.2 Configuring the Network Authentication Service -- 8.3.3 Adding the iSeries server to the EIM domain -- 8.3.4 Adding associations -- 8.3.5 Verify single signon for your new iSeries server -- 8.4 Enabling NetServer for single signon -- 8.4.1 Getting ready…”
    Libro electrónico
  14. 285654
    Publicado 2023
    Tabla de Contenidos: “…5.7 Exercises -- References -- Chapter 6 System Reliability Analysis -- 6.1 Important Notes and Assumptions -- 6.2 Reliability Block Diagram Method -- 6.2.1 Series System -- 6.2.2 Parallel Systems -- 6.2.3 k-Out-of-n Redundant Systems -- 6.2.4 Standby Systems -- 6.2.5 Load-Sharing Systems -- 6.3 Complex System Evaluation Methods -- 6.3.1 Decomposition Method -- 6.3.2 Path Tracing Methods (Path Sets, Cut Sets) -- 6.4 Fault Tree and Success Tree Methods -- 6.4.1 Fault Tree Method -- 6.4.2 Evaluation of Fault Trees -- 6.4.2.1 Analysis of Logic Trees Using Boolean Algebra -- 6.4.2.2 Combinatorial (Truth Table) Technique for Evaluation of Logic Trees -- 6.4.2.3 Binary Decision Diagrams -- 6.4.3 Success Tree Method -- 6.5 Event Tree Method -- 6.5.1 Construction of Event Trees -- 6.5.2 Evaluation of Event Trees -- 6.6 Event Sequence Diagram Method -- 6.7 Failure Modes and Effects Analysis -- 6.7.1 Objectives of FMEA -- 6.7.2 FMEA/FMECA Procedure -- 6.7.3 FMEA Implementation -- 6.7.3.1 FMEA Using MIL-STD-1629A -- 6.7.3.2 FMEA Using SAE J1739 -- 6.7.4 FMECA Procedure: Criticality Analysis -- 6.7.4.1 Failure Probability Failure Rate Data Source -- 6.7.4.2 Failure Effect Probability β -- 6.7.4.3 Failure Rate λ[sub(p)] -- 6.7.4.4 Failure Mode Ratio α -- 6.7.4.5 Operating Time T -- 6.7.4.6 Failure Mode Criticality Number C[sub(m)] -- 6.7.4.7 Item Criticality Number C[sub(r)] -- 6.8 Exercises -- References -- Chapter 7 Reliability and Availability of Repairable Components and Systems -- 7.1 Definition of Repairable System and Types of Repairs -- 7.2 Variables of Interest: Availability, ROCOF, MTBF -- 7.3 Repairable System Data -- 7.4 Stochastic Point Processes (Counting Processes) -- 7.4.1 Homogeneous Poisson Process -- 7.4.2 Renewal Process -- 7.4.3 Nonhomogeneous Poisson Process -- 7.4.4 Generalized Renewal Process -- 7.5 Data Analysis for Point Processes…”
    Libro electrónico
  15. 285655
    Publicado 2024
    Tabla de Contenidos: “…9.1.1.6 Slammer and Sobig - Business Systems, Nuclear Power Plants, and Train Signaling (2003) -- 9.1.1.7 Conficker (2008-2011) -- 9.1.1.8 Wikileaks (2006 to present) -- 9.1.2 Hackers in the Russo-Ukraine War (2022+) -- 9.1.2.1 Independent Operations and the Russo-Ukraine War (2022+) -- 9.1.2.2 Killnet - Pro-Russian Operations -- 9.1.3 Independent Cyber Operations Wrap-up -- Bibliography -- Section I Cyber Operations Summary -- I.1 Introduction -- I.2 Phases of Cyber Operations -- I.2.1 1980s-2002 -- I.2.2 2003-2012 -- I.2.3 2013-present -- Bibliography -- Section II Introduction to Cyber Effects -- II.1 Cyber Effects Introduction -- II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects -- II.1.1.1 Strategic Cyber Effects -- II.1.1.2 Tactical Cyber Effects -- II.1.1.3 Criminal Cyber Effects -- II.1.2 Wrap-up -- Bibliography -- Chapter 10 Strategic Cyber Effects -- 10.1 Strategic Cyber Effects -- 10.1.1 STUXNET (2010) - Delaying a Nation-State's Nuclear Program -- 10.1.2 STUXNET Versus Operation Desert Fox Wrap-up -- Bibliography -- Chapter 11 Strategic Cyber Effects (2) -- 11.1 Critical Infrastructure Strategic Cyber Effects -- 11.1.1 Critical Infrastructure -- 11.1.1.1 Energy Sector -- 11.1.1.2 Telecommunications -- 11.1.1.3 Water -- 11.1.1.4 Agriculture -- 11.1.1.5 Rail -- 11.1.1.6 Election Attacks (IO) (2011s) -- 11.1.2 Media-Based Cyber Operations -- 11.1.3 Cyber Espionage Effects -- 11.1.3.1 Using Cyber to Speed Up the Development of a Fifth-Generation Fighter (e.g., J-31 from F-35 Drawings) -- 11.1.4 Cyber Strategic Effects' Wrap-up -- 11.A Strategic Effect Examples -- Bibliography -- Chapter 12 Tactical Cyber Effects -- 12.1 Cyber Tactical Effects -- 12.1.1 Conventional Example - Denying the Syrian Air Force's Ability to Operate -- 12.1.2 Russian Uses of Cyber (From 2007) -- 12.1.3 ISIS and the Cost of Suppressing a Cyber Entity…”
    Libro electrónico
  16. 285656
    por Velamuri, Vivek K.
    Publicado 2013
    “…Contents · The Relevance of Hybrid Value Creation · The Four Different Clusters of Hybrid Value Creation · The Cluster of Embedded Products · The Cluster of Solutions · Managerial Implications · Directions for Future Research Target Groups · Researchers in the field of innovation management · Practitioners interested in the phenomenon of integrating products and services into customer-oriented offerings About the Author J.-Prof. Dr. Vivek K. Velamuri is the Schumpeter Junior Professor of Entrepreneurship and Technology Transfer at HHL Leipzig Graduate School of Management…”
    Libro electrónico
  17. 285657
    Publicado 2013
    “…—John Heinzl, Toronto Globe & Mail “All investors and corporate leaders can benefit from Peris’s simple insight.” —J. Christopher Donahue, CEO, Federated Investors…”
    Libro electrónico
  18. 285658
    “…The dominant impression is of the authors' mastery of their material, and of their confident insight into its underlying structure. ..." J.F.C. Kingman in Bulletin of the London Mathematical Society, 1977.…”
    Libro electrónico
  19. 285659
    Publicado 2020
    “…Contributors: Christina Fredengren, Cecilia Åsberg, Anna Bohlin, Adrian Van Allen, Esther Breithoff, Rodney Harrison, Colin Sterling, Joanna Zylinska, Denis Byrne, J. Kelechi Ugwuanyi, Caitlin DeSilvey, Anatolijs Venovcevs, Anna Storm and Claire Colebrook…”
    Libro electrónico
  20. 285660
    por Bampi, Massimiliano
    Publicado 2019
    “…In particular, the literary and cultural interchange of models and ideas between the North and other areas is investigated in a number of essays devoted to numerous authors, including, among others, Klaus Böldl, Carmen de Burgos, Carlo Emilio Gadda, Gerhart Hauptmann, Henrik Ibsen, Stieg Larsson, Carl von Linné, Rainer Maria Rilke, J.D. Salinger, Henryk Sienkiewicz, Mme de Staël, August Strindberg, and Tomas Tranströmer…”
    Electrónico