Mostrando 21 - 30 Resultados de 30 Para Buscar '"The Four Tops"', tiempo de consulta: 0.15s Limitar resultados
  1. 21
    Publicado 2023
    Tabla de Contenidos: “…5.6.2.3 Technology Solutions Used to Overcome Existing Challenges -- 5.6.2.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture -- 5.6.2.5 Benefits Achieved by Implementing Zero Trust Architecture -- 5.7 Endpoint or Devices Component -- 5.7.1 Endpoint or Devices Architecture Overview -- 5.7.1.1 Customer Case Study: Unified Endpoint or Device Management with Zero Trust -- 5.7.1.1.1 About the Organization -- 5.7.1.1.2 Current Challenges -- 5.7.1.1.3 Technology Solutions Used to Over the Challenges -- 5.7.1.1.4 Top 5 Challenges Faced While Implementing New Zero Trust Architecture -- 5.7.1.1.5 Impact and Benefits Achieved with Zero Trust Architecture -- 5.8 Application Component (on Prem, Legacy, Cloud, Mobile App) -- 5.8.1 Application Architecture Overview -- 5.9 Data Component -- 5.9.1 Data Architecture Overview -- 5.9.1.1 Mobile Application Management -- 5.9.1.2 End-to-End Encryption for Data Protection -- 5.9.2 Customer Case Study: Data Loss Prevention and Data Security Zero Trust -- 5.9.2.1 About the Organization -- 5.9.2.2 Current Situation Before the Zero Trust Model -- 5.9.2.3 Technology Solutions Used for Zero Trust Architecture -- 5.9.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture -- 5.9.4 Impact and Benefits with Zero Trust Architecture -- 5.10 Infrastructure Component -- 5.10.1 Infrastructure Deployment Objectives -- 5.10.2 Network Component -- 5.10.3 Network Architecture Overview -- 5.10.3.1 Segment and Enforce the External Boundaries -- 5.10.3.2 Network Segmentation -- 5.10.3.3 Threat Protection -- 5.10.3.4 Encryption -- 5.11 Zero Trust and Operational Technology Component -- 5.11.1 A Practical Approach for Deploying Zero Trust for Operational Technology -- 5.11.2 Internet of Things and Operational Technology Architecture with Zero Trust Principles…”
    Libro electrónico
  2. 22
    por Gucer, Vasfi
    Publicado 2005
    Tabla de Contenidos: “…Troubleshooting -- 9.1 Overview -- 9.2 Tracing -- 9.2.1 Enabling trace settings for the CNPS -- 9.2.2 Enabling trace settings for the CMS -- 9.3 Logs -- 9.3.1 CNPS and CNP -- 9.3.2 CMS -- 9.3.3 Agents -- 9.4 Top issues -- 9.4.1 Installation -- 9.4.2 Configuration -- 9.4.3 Maintenance -- 9.5 Miscellaneous tips and tools -- 9.5.1 Changing the JRE version of the CNPS -- 9.5.2 Using the digup tool on UNIX -- 9.5.3 Mutex and shared memory cleanup -- 9.5.4 WebSphere MQ Configuration problem determination -- Appendix A. …”
    Libro electrónico
  3. 23
    Publicado 2005
    Tabla de Contenidos: “…TOPs con pronombre demostrativo -- 4.2.4. TOPs sin pronombre demostrativo -- 4.3. CARACTERÍSTICAS ENTONATIVAS DE LAS TOPS -- 4.3.1. …”
    Libro electrónico
  4. 24
    Publicado 2018
    Tabla de Contenidos: “…3.3.3 INTERFACES ARE ANOTHER CONCERN -- 3.3.4 SUMMARY -- Part One References -- 2 - Ontology and System-Interactive Environment Ontology -- 4 - Ontology-Oriented Interactive Environment Modeling -- 4.1 ONTOLOGY AND ONTOLOGIES -- 4.1.1 BACKGROUND -- 4.1.2 DIFFERENT VIEWPOINTS ON ONTOLOGY -- 4.1.3 COMMON STRUCTURE OF ONTOLOGY -- 4.2 TYPES OF ONTOLOGIES -- 4.3 ONTOLOGY-ORIENTED DOMAIN MODELING -- 4.3.1 THE PROCESS FOR ONTOLOGY-ORIENTED DOMAIN MODELING -- 4.3.2 THE STRUCTURE FOR DOMAIN ONTOLOGY -- 4.4 TOP-LEVEL ENVIRONMENT ONTOLOGY -- 4.4.1 SOFTWARE SYSTEM PROBLEM AND ITS LOCATION -- 4.4.2 CONCEPT CATEGORIES AND ASSOCIATIONS OF SYSTEM ENVIRONMENT -- 4.5 DOMAIN ENVIRONMENT ONTOLOGY -- 4.5.1 CONCEPTUALIZATION OF ENVIRONMENT ENTITIES -- 4.5.2 FORMALIZATION OF ENVIRONMENT ENTITY -- 4.5.3 DEPENDENCY BETWEEN ENVIRONMENT ENTITIES -- 5 - Domain Environment Ontology Construction -- 5.1 DOMAIN ENVIRONMENT MODELING VIA KNOWLEDGE ENGINEERING -- 5.2 DOMAIN ENVIRONMENT ONTOLOGY CONSTRUCTION -- 5.3 AUTOMATIC DOMAIN ENVIRONMENT ONTOLOGY CONSTRUCTION -- ALGORITHM 5.1. …”
    Libro electrónico
  5. 25
    Publicado 2015
    “…Developing the theories at the heart of game theory has resulted in 8 Nobel Prizes and insights that researchers in many fields continue to develop. In Volume 4, top scholars synthesize and analyze mainstream scholarship on games and economic behavior, providing an updated account of developments in game theory since the 2002 publication of Volume 3, which only covers work through the mi…”
    Libro electrónico
  6. 26
    por Sharma, Renuka
    Publicado 2024
    Tabla de Contenidos: “…12.10 Conclusion -- 12.11 Future Scope -- References -- Chapter 13 Systematic Literature Review and Bibliometric Analysis on Fundamental Analysis and Stock Market Prediction -- 13.1 Introduction -- 13.2 Fundamental Analysis -- 13.3 Machine Learning and Stock Price Prediction/Machine Learning Algorithms -- 13.4 Related Work -- 13.5 Research Methodology -- 13.6 Analysis and Findings -- 13.6.1 Publication Activity of Fundamental Analysis and Stock Price Prediction -- 13.6.2 Top Authors, Countries, and Institutions of Fundamental Analysis and Stock Market Prediction -- 13.6.3 Top Journals for Fundamental Analysis and Stock Market Prediction Research -- 13.6.4 Top Articles in Fundamental Analysis and Stock Market Prediction -- 13.6.5 Keyword Occurrence Analysis in Stock Price Prediction Research -- 13.6.6 Thematic Clusters of Stock Market Prediction Through Bibliographic Coupling -- 13.6.7 List of Machine Learning Algorithms Used -- 13.6.8 List of Training and Testing Dataset Criteria Used -- 13.6.9 List of Evaluation Metrics Used -- 13.6.10 List of Factors Used in Fundamental Analysis -- 13.6.11 List of Technical Indicators Used -- 13.6.12 List of Feature Selection Criteria -- 13.7 Discussion and Conclusion -- References -- Chapter 14 Impact of Emotional Intelligence on Investment Decision -- 14.1 Introduction -- 14.2 Literature Review -- 14.3 Research Methodology -- 14.4 Data Analysis -- 14.4.1 Reliability Analysis -- 14.4.2 Factors Naming -- 14.4.3 Multiple Regression Analysis -- 14.5 Discussion, Implications, and Future Scope -- 14.6 Conclusion -- References -- Chapter 15 Influence of Behavioral Biases on Investor Decision-Making in Delhi-NCR -- 15.1 Introduction -- 15.2 Literature Review -- 15.2.1 Overconfidence Bias -- 15.2.2 Illusion of Control Bias -- 15.2.3 Optimism Bias -- 15.3 Research Hypothesis -- 15.4 Methodology -- 15.4.1 Result…”
    Libro electrónico
  7. 27
    Publicado 2003
    Tabla de Contenidos: “…-- 10.11.2 Organizations visiting the site -- 10.11.3 Competitors visiting the site -- 10.11.4 Determining visitor origin by subdomain -- 10.12 Site activity distribution pattern -- 10.12.1 Hits activities by hour of the day -- 10.12.2 Sessions distribution by hour of the day -- 10.12.3 Page view distribution by hour of the day -- 10.12.4 Traffic volume (bytes) distribution by hour of the day -- 10.13 Strategic alliances -- 10.13.1 Site referrals -- 10.13.2 Referrals -- 10.13.3 Top referring URLs -- 10.13.4 Top referring subdomains -- 10.13.5 Top referring Web sites -- 10.13.6 Traffic trend for referrals -- 10.13.7 Referrer host key/value pair ranking -- 10.13.8 Referrer Host Key/Value Pair Trend…”
    Libro electrónico
  8. 28
    “…By focusing on equal opportunities for students to achieve strong academic outcomes, countries can provide a pathway for more students to continue on to higher levels of education and eventually secure good jobs – two outcomes that are likely to lessen income inequality in the future. Four top performers on the 2009 PISA assessment – Canada, Finland, Japan, and Korea – show the potential of this approach. …”
    Capítulo de libro electrónico
  9. 29
    por Press, Posts & Telecom
    Publicado 2024
    Tabla de Contenidos: “…10.8.2 统 信息指标 -- 10.8.3 估 一些比 处理的 域 -- 10.9 其他一些查 划参数 -- 10.9.1 effective_cache_size -- 10.9.2 work_mem -- 10.9.3 constraint_exclusion -- 10.9.4 cursor_tuple_fraction -- 10.10 执 其他的 句类型 -- 10.11 改 查 -- 10.11.1 对完全缓存的数据 优化 -- 10.11.2 查 等价测 -- 10.11.3 禁止优化器功 -- 10.11.4 绕开优化器 -- 10.11.5 免 划使用OFFSET 组 -- 10.11.6 外 故 点 -- 10.12 SQL 制 -- 10.12.1 在SQL 当中对数据 编号 -- 10.12.2 使用窗口函数 编号 -- 10.12.3 使用窗口函数 累 -- 10.13 小结 -- 第11 章数据库活动和统 信息 -- 11.1 统 信息 图 -- 11.2 渐增 图以及实时 图 -- 11.3 统 信息 -- 11.4 索引统 信息 -- 11.5 数据库 围内的总 -- 11.6 接及活动 -- 11.7 -- 11.7.1 拟事务 -- 11.7.2 码 信息 -- 11.7.3 事务 等待 -- 11.7.4 等待 -- 11.7.5 录 定信息 -- 11.8 磁盘使用 -- 11.9 缓冲区、后台写入器以及检查点活动 -- 11.9.1 保存pg_stat_bgwriter 快照信息 -- 11.9.2 使用后台写入器统 信息 整 -- 11.10 小结 -- 第12 章监控与 势 测 -- 12.1 UNIX 监控工具 -- 12.1.1 样例安 -- 12.1.2 vmstat -- 12.1.3 iosta -- 12.1.4 top -- 12.1.5 sysstat 及sar -- 12.2 Windows 监控工具 -- 12.2.1 任务管理器 -- 12.2.2 Windows 系统监 器 -- 12.3 势 测 件 -- 12.3.1 监控以及 势 测 件的类型 -- 12.3.2 Nagios -- 12.3.3 Cacti -- 12.3.4 Munin -- 12.3.5 其他的一些 势 测程序包 -- 12.4 小结 -- 第13 章池化与 缓存 -- 13.1 接池 -- 13.1.1 接池 数 -- 13.1.2 pgpool-II -- 13.1.3 pgBouncer -- 13.2 数据库 缓存 -- 13.2.1 memcached -- 13.2.2 pgmemcache -- 13.3 小结 -- 第14 章扩展复制 -- 14.1 完全热备 Hot Standby -- 14.1.1 术 -- 14.1.2 置WAL 文件传 -- 14.1.3 流复制 -- 14.1.4 完全热备的 整 -- 14.2 复制 列管理器 -- 14.2.1 Slony -- 14.2.2 Londiste -- 14.2.3 从扩展复制 列 件当中 取信息 -- 14.3 特殊的应用程序 求 -- 14.3.1 Bucardo -- 14.3.2 pgpool-II -- 14.4 其他一些有 的与复制有关的开源 目 -- 14.5 小结 -- 第15 章数据分区 -- 15.1 围分区 -- 15.1.1 确定 分区的关 字段 -- 15.1.2 整分区大小 -- 15.1.3 创建分区 -- 15.1.4 定向INSERT 句 分区 -- 15.1.5 空分区的查 划 -- 15.1.6 修改日期的update 发器 -- 15.1.7 实时 移分区 -- 15.1.8 分区查 -- 15.1.9 创建新的分区 -- 15.1.10 分区的优势 -- 15.1.11 分区当中的一些常 -- 15.2 使用 PL/Proxy 水平分区 -- 15.2.1 Hash 生成 -- 15.2.2 使用PL/Proxy 扩展 -- 15.2.3 使用GridSQL 扩展 -- 15.3 小结 -- 第16 章应 免的一些常 -- 16.1 批 -- 16.1.1 方法 -- 16.1.2 批 的 整 -- 16.1.3 略 WAL 加…”
    Libro electrónico
  10. 30
    Publicado 2017
    Tabla de Contenidos: “…386 -- 22.4 Hadoop Architecture 388 -- 22.5 HDFS: What and how to use it 391 -- 22.6 YARN: What and how to use it 392 -- 22.7 Mapreduce: What and how to use it 394 -- 22.8 Apache: what and how to use it 395 -- 22.9 Future Trend and Conclusion 396 -- 23 Security of IoT Data: Context, Depth, and Breadth Across Hadoop 399 /Pratik Verma -- 23.1 Introduction 399 -- 23.2 IoT Data in Hadoop 402 -- 23.3 Security in IoT Platforms Built on Hadoop 402 -- 23.4 Architectural Considerations for Implementing Security in Hadoop 403 -- 23.5 Breadth of Control 403 -- 23.6 Context for Security 404 -- 23.7 Security Policies and Rules Based on Pxp Architecture 404 -- 23.8 Conclusion 405 -- Part Iv SMART EVERYTHING 407 -- 24 Connected Vehicle 409 /Adrian Pearmine -- 24.1 Introduction 409 -- 24.2 Connected, Automated, and Autonomous Vehicle Technologies 410 -- 24.3 Connected Vehicles from the Department of Transportation Perspective 413 -- 24.4 Policy Issues Around DSRC 414 -- 24.5 Alternative forms of V2X Communications 414 -- 24.6 DOT Connected Vehicle Applications 415 -- 24.7 Other Connected Vehicle Applications 418 -- 24.8 Migration Path from Connected and Automated to Fully Autonomous Vehicles 419 -- 24.9 Autonomous Vehicle Adoption Predictions 419 -- 24.10 Market Growth for Connected and Autonomous Vehicle Technology 422 -- 24.11 Connected Vehicles in the Smart City 423 -- 24.12 Issues not Discussed in this Chapter 423 -- 24.13 Conclusion 425 -- 25 In-Vehicle Health and Wellness: An Insider Story 427 /Pramita Mitra, Craig Simonds, Yifan Chen and Gary Strumolo -- 25.1 Introduction 427 -- 25.2 Health and Wellness Enabler Technologies inside the Car 429 -- 25.3 Health and Wellness as Automotive Features 435 -- 25.4 Top Challenges for Health and Wellness 440.…”
    Libro electrónico