Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 691
- Application software 556
- Management 480
- Engineering & Applied Sciences 453
- History 380
- Computer networks 299
- Computer programs 291
- Computer Science 278
- Data processing 255
- Design 238
- Photography 235
- Cloud computing 234
- Python (Computer program language) 234
- Leadership 233
- Digital techniques 217
- Programming 212
- Computer programming 202
- Taxation 196
- Security measures 193
- Computer software 192
- Computer security 188
- Web site development 187
- Examinations 186
- Historia 184
- Database management 180
- Artificial intelligence 178
- Business & Economics 177
- Operating systems (Computers) 175
- Web sites 166
- Machine learning 149
-
6161
-
6162
-
6163
-
6164Publicado 2023“…In a series of experiments, they posed a realistic question of strategy to ChatGPT, followed by iterative follow-up questions. In this article, they share three lessons that emerged from their experiments with generative AI…”
Libro electrónico -
6165Publicado 2018“…Each chapter follows the A and B structure developed by Professor Nechyba, allowing students to explore an intuitive approach in Part A and then focus on how the intuitive approach can be represented mathematically approach in Part B -- Editor…”
Libro -
6166Publicado 2006“…When he was a child, he found this world to be enormous big, wild and exiting. We follow this little boy’s fairytale of dreams and reality; when he is out fishing, playing and meeting with wild animals in the wilderness of Norway. …”
Ver más información
DVD -
6167
-
6168Publicado 2021Tabla de Contenidos: “…7.4 Efficiently building the bookings grid with useMemo -- 7.4.1 Generating a grid of sessions and dates -- 7.4.2 Generating a lookup for bookings -- 7.4.3 Providing a getBookings data-loading function -- 7.4.4 Creating the BookingsGrid component and calling useMemo -- 7.4.5 Coping with racing responses when fetching data in useEffect -- Summary -- 8 Managing state with the Context API -- 8.1 Needing state from higher up the component tree -- 8.1.1 Displaying a call-to-action message when the page first loads -- 8.1.2 Displaying booking information when a visitor selects a booking -- 8.1.3 Displaying an edit button for a user's bookings: The problem -- 8.1.4 Displaying an edit button for a user's bookings: The solution -- 8.2 Working with custom providers and multiple contexts -- 8.2.1 Setting an object as the context provider's value -- 8.2.2 Moving the state to a custom provider -- 8.2.3 Working with multiple contexts -- 8.2.4 Specifying a default value for a context -- Summary -- 9 Creating your own hooks -- 9.1 Extracting functionality into custom hooks -- 9.1.1 Recognizing functionality that could be shared -- 9.1.2 Defining custom hooks outside your components -- 9.1.3 Calling custom hooks from custom hooks -- 9.2 Following the Rules of Hooks -- 9.2.1 Call hooks only at the top level -- 9.2.2 Call hooks only from React functions -- 9.2.3 Using an ESLint plugin for the rules of hooks -- 9.3 Extracting further examples of custom hooks -- 9.3.1 Accessing window dimensions with a useWindowSize hook -- 9.3.2 Getting and setting values with a useLocalStorage hook -- 9.4 Consuming a context value with a custom hook -- 9.5 Encapsulating data fetching with a custom hook -- 9.5.1 Creating the useFetch hook -- 9.5.2 Using the data, status, and error values the useFetch hook returns -- 9.5.3 Creating a more specialized data-fetching hook: useBookings…”
Libro electrónico -
6169Publicado 2019Tabla de Contenidos: “…5.5.2 Message Log Prediction Using LSTM -- 5.5.2.1 Data interpretation and representation -- 5.5.2.1.1 Litronic dataset -- 5.5.2.1.2 Data representation -- 5.5.2.2 Predictive models -- 5.5.2.3 Results -- 5.5.2.3.1 Evaluation of predictive models on small number of samples -- 5.5.2.3.2 Evaluation of the ID-LSTM on OHE codes for more significant number of samples -- 5.5.2.4 Discussion -- 5.5.3 Metal-defect Classification -- 5.5.3.1 Data collection -- 5.5.3.2 Experiments -- 5.5.3.3 Discussion -- References -- Chapter 6 - From KPI Dashboards to Advanced Visualization -- 6.1 HMI Functional Specifications and Interaction Model -- 6.1.1 HMI Design Principle Followed in the MANTIS Project -- 6.1.2 MANTIS HMI Specifications -- 6.1.2.1 Functional specifications -- 6.1.2.2 General requirements -- 6.1.3 MANTIS HMI Model -- 6.1.3.1 Functionalities supporting high level tasks -- 6.1.4 HMI Design Recommendations -- 6.1.5 MANTIS Platform Interface Requirements -- 6.1.5.1 Analysis of different interface types -- 6.1.5.2 PC HMI -- 6.1.6 Recommendations for Platform Selection -- 6.1.6.1 Web-based HMI -- 6.1.6.2 Responsive design -- 6.1.7 Interface Design Recommendations for MANTIS Platform -- 6.2 Adaptive Interfaces -- 6.2.1 Context-awareness Approach -- 6.2.1.1 Context and context awareness fundamentals -- 6.2.1.2 Context lifecycle in context-aware applications -- 6.2.1.3 Adaptive and intelligent HMIs -- 6.2.1.4 Context awareness for fault prediction and maintenance optimisation -- 6.2.1.5 Context awareness for maintenance personalisation and decision-making -- 6.2.1.6 Context awareness approaches in a proactive collaborative maintenance platform -- 6.2.2 Interaction Based/Driven Approach -- 6.2.2.1 Introduction -- 6.2.2.2 Navigation tracking and storage -- 6.2.2.3 Action logs -- 6.3 Advanced Data Visualizations for HMIs -- 6.3.1 Visualization of Raw Data…”
Libro electrónico -
6170por Loth, AlexanderTabla de Contenidos: “…-- Kapitel 5: KI für Copywriting und Werbetexte -- 5.1 Effizientes Copywriting durch KI-Unterstützung -- 5.1.1 Kreative Slogans für Ihr Produkt -- 5.1.2 Radio-Werbung erstellen: Maximale Wirkung in minimaler Zeit -- 5.1.3 Online-Anzeige verfassen: Targeting durch präzise Zielgruppenansprache -- 5.1.4 Pressemitteilung schreiben: Präzise Kommunikation von Unternehmensnachrichten -- 5.1.5 Direct-Response-Werbung erstellen: Die Kunst der sofortigen Konversion -- 5.2 Werbetexte in Blogposts wandeln -- 5.2.1 Follow-up auf vorangegangenen Prompt…”
Publicado 2024
Libro electrónico -
6171por Putte, Geert van deTabla de Contenidos: “…Project Espresso: Planning phase -- 7.1 Company E planning overview -- 7.1.1 Task review -- 7.2 Requirements and follow-up meetings -- 7.3 Project plan -- 7.4 Installation and deployment plan -- 7.4.1 Firewall configuration plan -- 7.4.2 Reverse proxy configuration plan -- 7.4.3 Load balancer configuration plan -- 7.4.4 WebSphere MQ configuration -- 7.4.5 Database loader deployment plan -- 7.4.6 Product installation deployment plan -- 7.4.7 Product configuration plan -- 7.4.8 Community manager configuration plan -- 7.4.9 Community participant configuration plan -- 7.4.10 Certificate deployment plan -- 7.5 Testing plan -- 7.6 Training plan -- 7.7 Support plan…”
Publicado 2005
Libro electrónico -
6172Publicado 2023Tabla de Contenidos: “…4.4.3 Priority 3: Identity and Access Governance -- 4.4.3.1 Control 3.1: Automate Provisioning and De-Provisioning -- 4.4.3.2 Control 3.2: Access Lifecycle Management and Separation of Duties -- 4.4.3.3 Control 3.3: Follow the Least Privilege Principle -- 4.4.4 Priority 4: Integrate and Monitor -- 4.4.4.1 Control 4.1: Log and Operationalize Identity Monitoring -- 4.4.4.2 Control 4.2: Integrate Identity for Auto Detection and Response -- 4.5 Chapter Summary -- 5 Zero Trust Architecture Components -- 5.1 Zero Trust Components Overview -- 5.2 Implementation Approach and Objectives -- 5.3 Protect the Data -- 5.4 Zero Trust in Multi-Cloud and Hybrid Environments -- 5.4.1 Customer Case Study: Zero Trust in the Hybrid Environment -- 5.4.1.1 About the Organization -- 5.4.1.2 Current Challenges -- 5.4.1.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture -- 5.4.1.4 Impact and Benefits Achieved by a Zero Trust Project -- 5.5 Secure Access Service Edge and Zero Trust -- 5.5.1 Secure Access Service Edge Architecture Overview -- 5.5.1.1 Policy Evaluation and Enforcement Points -- 5.5.1.2 Microsoft Capabilities -- 5.5.2 Customer Case Study: Secure Access Service Edge Implementation -- 5.5.2.1 Current Situation and Current Challenges -- 5.5.2.2 Technology Solutions Used to Overcome the Challenges -- 5.5.2.3 Impact and Benefits Achieved -- 5.6 Identity Component -- 5.6.1 Identity Architecture Overview -- 5.6.1.1 Silverfort and Azure AD Integrated Identity Zero Trust Solution -- 5.6.1.2 Unification -- 5.6.1.3 Silverfort's "Bridging" Capability -- 5.6.1.4 Context -- 5.6.1.5 Enforcement -- 5.6.1.6 Granularity -- 5.6.1.7 Illustrative Example: Protecting PowerShell to Domain Controller Access -- 5.6.2 Customer Case Study: Unified Identity Management with Zero Trust -- 5.6.2.1 About the Organization -- 5.6.2.2 Current Challenges…”
Libro electrónico -
6173Publicado 2021“…Existing literature argues that because they rest on unmediated, emotional attachments between leaders and followers, these movements either fade quickly after their leaders disappear or transform into routinized parties. …”
Libro electrónico -
6174Publicado 2022“…In this report, we look at the data generated by the O'Reilly online learning platform to discern trends in the technology industry: trends technology leaders need to follow…”
Libro electrónico -
6175Publicado 2003“…A great deal of a 360-degree-feedback program's success depends on responsible planning, use, and follow-up…”
Libro electrónico -
6176
-
6177
-
6178Publicado 2015“…Thus the name of "natriuretic hormone" was coined. In the years that followed several investigators pursued the search for the hormone. …”
Libro electrónico -
6179por Leuven University Press“…The Handbook for Ethiopian public administration program accreditation is a follow-up to the first handbook on Ethiopian Public Administration. …”
Publicado 2022
Libro electrónico -
6180por Ruiz, Nicolas“…Almost all of these methods make use of the critical assumption that the original datasets follow a normal distribution and/or that the noise has such a distribution. …”
Publicado 2011
Capítulo de libro electrónico