Mostrando 20,881 - 20,900 Resultados de 22,093 Para Buscar '"The Masters"', tiempo de consulta: 0.11s Limitar resultados
  1. 20881
  2. 20882
  3. 20883
    Publicado 2020
    Libro electrónico
  4. 20884
    Publicado 2022
    “…Domain 1: Data Engineering 1.0 course intro 1.1 technology prerequisite 1.2 sagemaker studio lab 1.3 learn aws cloudshell 1.4 cloud developer workspace advantage 1.5 prototyping ai apis aws cloudshell bash 1.6 cloud9 with codewhisperer 1.7 domain one intro 1.8 data storage 1.9 determine storage medium 1.10 using s3 demo 1.11 job styles batch vs streaming 1.12 data ingestion pipelines 1.13 aws batch demo 1.14 step function demo Domain 2: Exploratory Data Analysis 2.0 domain intro Sanitize and prepare data for modeling 2.1 cleanup data 2.2 scaling data 2.3 labeling data 2.4 mechanical turk labeling Perform feature engineering 2.5 identify extract features 2.6 feature engineering concepts Analyze and visualize data for machine learning 2.7 graphing data 2.9 clustering Conclusion 2.10 conclusion Domain 3: Modeling 3.0 domain intro Frame business problems as machine learning problems 3.1 when to use ml 3.2 supervised vs unsupervized 3.3 selection right ml solution Select the appropriate model(s) for a given machine learning problem 3.4 select models 3.5 sagemaker canvas demo Train machine learning models 3.6 train test split 3.7 optimization 3.8 compute choice Perform hyperparameter optimization 3.14 neural network architecture Evaluate machine learning models 3.18 overfitting vs underfitting 3.19 selecting metrics 3.22 compare models experiment tracking Conclusion 3.23 Conclusion Domain 4: Machine Learning Implementation and Operations 4.0 course intro Build machine learning solutions for performance, availability, scalability, resiliency, and fault 4.1 logging monitoring 4.2 multiple regions 4.3 reproducible workflow 4.4 aws flavored devops Recommend and implement the appropriate machine learning services and features for a given 4.5 provisioning ec2 4.5 compute choices 4.6 provisioning ebs 4.7 aws ai ml services Apply basic AWS security practices to machine learning solutions. 4.9 plp aws lambda 4.10 integrated security Deploy and operationalize machine learning solutions 4.13 sagemaker workflow 4.14 doing predictions with sagemaker canvas 4.16 retrain models Conclusion 5.0 course conclusion Topics Covered Include: Domain 1: Data Engineering Domain 2: Exploratory Data Analysis Domain 3: Modeling Domain 4: Machine Learning Implementation and Operations Additional Popular Resources Pytest Master Class AWS Solutions Architect Professional Course Github Actions and GitOps in One Hour Video Course Jenkins CI/CD and Github in One Hour Video Course AWS Certified Cloud Practitioner Video Course Advanced Testing with Pytest Video Course AWS Solutions Architect Certification In ONE HOUR Python for DevOps Master Class 2022: CI/CD, Github Actions, Containers, and Microservices MLOPs Foundations: Chapter 2 Walkthrough of Practical MLOps Learn Docker containers in One Hour Video Course Introduction to MLOps Walkthrough AZ 900 (Azure Fundamentals) Quick reference guide 52 Weeks of AWS Episode 8: Infrastructure as Code with CDK and AWS Lambda Learn GCP Cloud Functions in One Hour Video Course Python Devops in TWO HOURS! …”
    Video
  5. 20885
    por Colodrón Sánchez, María
    Publicado 2012
    “…Y esto porque descubrir claridad, innovación, profundidad, sentido común y pedagogía para aplicar en la vida cotidiana tan bien hilvanadas en un mismo texto, es como hallar el cofre del verdadero tesoro cuando sólo estábamos jugando a seguir las pistas de un plano por el simple hecho de divertirnos.Alfonso Colodrón - Psicoterapeuta transpersonalMaría Colodrón, Psicóloga. CAP. Master en Dirección y Gestión de Servicios Sociales. …”
    Texto completo en Odilo
    Otros
  6. 20886
    por Castillo Ceballos, Gerardo
    Publicado 2016
    “…Ha sido profesor en el Máster sobre Matrimonio y Familia de la misma Universidad y pionero en la formación de Orientadores Familiares en España y otros países.Sus principales temas de investigación siguen siendo el trabajo Intelectual, la creatividad, la adolescencia y la educación familiar. …”
    Texto completo en Odilo
    Otros
  7. 20887
    por López González, Luis
    Publicado 2017
    “…Director del Programa TREVA de relajación y meditación escolar y del Máster en Relajación, Meditación y Mindfulness del ICE de la Universidad de Barcelona. …”
    Texto completo en Odilo
    Otros
  8. 20888
    por Begoña Torres Gallardo
    Publicado 2014
    “…Es profesor de Canto en la Escuela Luthier de Barcelona, profesor de Canto en el Máster en Interpretación musical de la Escuela Luthier y Facultad de Psicología, Ciencias de la Educación y del Deporte de la Universidad Ramon Llull (Barcelona-España)…”
    Texto completo en Odilo
    Otros
  9. 20889
    por Hernández Montes, Enrique
    Publicado 2014
    “…Estos apéndices van más allá de lo que se puede estudiar en los cursos de grado o master en la universidad pero son muy interesantes a los profesionales y estudiantes de doctorado dedicados al hormigón estructural. …”
    Libro
  10. 20890
    por Torres Gallardo, Begoña
    Publicado 2008
    “…Es profesor de Canto en la Escuela Luthier de Barcelona, profesor de Canto en el Máster en Interpretación musical de la Escuela Luthier y Facultad de Psicología, Ciencias de la Educación y del Deporte de la Universidad Ramon Llull (Barcelona-España)…”
    Libro electrónico
  11. 20891
    Publicado 2017
    “…This book gives you in-depth training along with access to complete online ancillaries and case studies so you can master the little skill that makes a big difference. …”
    Libro electrónico
  12. 20892
    Publicado 2017
    “…You'll hone your analytical edge and master the essentials of report writing, leaving you fully equipped to conduct a thorough investigation and deliver your findings clearly, comprehensively, and authoritatively. …”
    Libro electrónico
  13. 20893
    Publicado 2020
    “…The authors have done a masterful job of linking together emerging cutting-edge biology with case-based discussions and practical treatment suggestions to aid the development of a mind-body program. …”
    Libro electrónico
  14. 20894
    Publicado 2011
    “…Prix Mariano Garcia Rubio 2010 du meilleur mémoire de Master en droit international. The adoption of the Vienna Convention on the Law of Treaties in 1969 introduced the concept of jus cogens into the realm of the international legal order. …”
    Libro electrónico
  15. 20895
    Publicado 2010
    “…., Gallaudet University, Washington, DC "This ground-breaking text provides the reader with an excellent and comprehensive overview of the existing field of trauma rehabilitation. It also masterfully navigates the intricate relationships among theory, research, and practice leaving the reader with immense appreciation for its subject matter." …”
    Libro electrónico
  16. 20896
    Publicado 2016
    “…Not only can this book be used as a reference source for a scientist who is interested in fuzzy neural networks and their real-time implementations but also as a course book of fuzzy neural networks or artificial intelligence in master or doctorate university studies. We hope that this book will serve its main purpose successfully. …”
    Libro electrónico
  17. 20897
    Publicado 2020
    “…Understand networking fundamentals concepts, including network components, network topology architectures, physical interfaces and cabling types, TCP and UDP, wireless principals, switching concepts, and virtualization fundamentals Master IPv4 addressing and subnetting and configure IPv6 Configure and verify VLANs, interswitch connectivity, and Layer 2 discovery protocols Describe Rapid PVST+ Spanning Tree Protocol Compare Cisco Wireless Architectures and AP Modes Enable security technologies including device access control, site-to-site and remote access VPNs, ACLs, Layer 2 security features, and wireless security protocols Configure and verify IPv4 and IPv6 static routing and single area OSPF Understand DHCP, DNS, and other networking services like SNMP, syslog, SSH, and TFTP/FTP Configure and verify inside source NAT and NTP Understand how automation affects network management, controller-based and software-defined architectures, and Cisco DNA Center-enabled device management Understand network programmability concepts, including characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding); configuration management mechanisms such as Puppet, Chef, and Ansible; and learn to Interpret JSON encoded data…”
    Libro electrónico
  18. 20898
    Publicado 2019
    “…The authoritative guide to the effective design and production of reliable technology products, revised and updated While most manufacturers have mastered the process of producing quality products, product reliability, software quality and software security has lagged behind. …”
    Libro electrónico
  19. 20899
    Publicado 2020
    “…Review the problems LISP solves, its current use cases, and powerful emerging applications Gain in-depth knowledge of LISP’s core architecture and components, including xTRs, PxTRs, MR/MS, ALT, and control plane message exchange Understand LISP software architecture on Cisco platforms Master LISP IPv4 unicast routing, LISP IPv6 routing, and the fundamentals of LISP multicast routing Implement LISP mobility in traditional data center fabrics, and LISP IP mobility in modern data center fabrics Plan for and deliver LISP network virtualization and support multitenancy Explore LISP in the Enterprise multihome Internet/WAN edge solutions Systematically secure LISP environments Troubleshoot LISP performance, reliability, and scalability…”
    Libro electrónico
  20. 20900
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico