Mostrando 8,381 - 8,400 Resultados de 13,297 Para Buscar '"The Mechanic"', tiempo de consulta: 0.19s Limitar resultados
  1. 8381
    Publicado 2019
    Tabla de Contenidos: “…Myoglobin and Hemoglobin as Examples of the Evolution of Protein Function -- The Structure of Eukaryotic Genes: Exons and Introns -- 7.13. Mechanisms of Protein Mutation -- Substitution of DNA Nucleotides -- Nucleotide Deletions or Insertions -- Gene Duplications and Rearrangements…”
    Libro electrónico
  2. 8382
    Publicado 2021
    Tabla de Contenidos: “…Transformation Journey's Second Stage: Rethinking the Business -- Understanding J&amp -- S Food's Current Business -- Capturing the Current Business Model -- Understanding Use Cases -- Understanding Actors -- Understanding Links -- The Current Business Model Captured -- Buy -- Fulfill Order -- Pay -- Perform Customer Service -- Manage Supply Chain -- Maintain Website -- Develop Food Product -- Understanding J&amp -- S Food's Current Data Model -- Assessing the As-Is Operational Model -- Digital Food Experience Defined -- Assessing J&amp -- S Food's Operational Model -- Defining the Digital Smart Shopping Bag -- Optimizing the Fulfill Order Experience Based on a Two-Sided Marketplace Platform -- Enhancing Online Order Experience Using a Mobile App -- Implementing a Digital Products and Services Development Platform -- Defining the Future Digital Business Model -- Reconfiguring J&amp -- S Food's Operational Model -- Understanding Michael Porter's Value Chain -- The Value Chain for Digital Business Defined -- J&amp -- S Food's Digital Business Model Defined -- Understanding J&amp -- S Food's Next Digital Value Chain -- Support Digital Business Activities -- Primary Digital Business Activities -- Understanding J&amp -- S Food's AWS Cloud Platform -- J&amp -- S Food's AWS Software as a Service -- The J&amp -- S Food's Platform as a Service -- The J&amp -- S Food's AWS Virtual Infrastructure -- Integrating J&amp -- S Food's Digital Operational Model with the Organization -- The Digital Business Value Chain: A Shortcut to the Digital Business Organization -- Digital Business Organizational Model Defined -- Developing the Digital Business Organizational Model -- The J&amp -- S Organizational Model Defined -- Roles and Responsibilities -- Interaction and Collaboration Mechanisms -- Key Takeaways -- References -- Chapter 7 Digitizing J&amp…”
    Libro electrónico
  3. 8383
    Publicado 2022
    Tabla de Contenidos: “…. -- Part 3 Call Tactics, Mechanics, and Strategies -- Chapter 14 How Proactive Calls Can Fit into Your Sales Process -- What Proactive Calls Can Do for You -- Building Relationships with Prospects Before Your Sales Conversation Begins -- Start New Sales Conversations with New Prospects -- Progress Existing Opportunities Toward a Quote or Proposal -- Follow Up on Quotes and Proposals to Close Them -- Begin Discussions about Additional Products or Services for Your Existing Customers -- Note: You Know These People -- Chapter 15 Pre- and Post-Call Communi-cations…”
    Libro electrónico
  4. 8384
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…Government support for implementation -- 2.3.1. Mechanisms enhancing implementation of frameworks to pursue RBC objectives in public procurement -- 2.3.2. …”
    Libro electrónico
  5. 8385
    Publicado 2009
    Tabla de Contenidos: “…Data Modification -- SELECT INTO -- BULK Rowset Provider -- Minimally Logged Operations -- Testing Insert Scenarios -- Scenario 2: SELECT INTO, Non-FULL Recovery -- Scenario 3: INSERT SELECT, Empty Heap, TABLOCK -- Scenario 4: INSERT SELECT, Nonempty Heap, TABLOCK -- Scenario 5: INSERT SELECT, Empty Heap, Without TABLOCK -- Scenario 6: INSERT SELECT, Empty B-Tree, TABLOCK -- Scenario 7: INSERT SELECT, Nonempty B-Tree, TABLOCK, TF-610 Off, New Key Range -- Scenario 8: INSERT SELECT, Nonempty B-Tree, TABLOCK, TF-610 On, New Key Range -- Scenario 9: INSERT SELECT, Nonempty B-Tree, TABLOCK, Merged Key Range -- Scenario 10: INSERT SELECT, Empty B-Tree, Without TABLOCK, TF-610 Off -- Scenario 11: INSERT SELECT, Empty B-Tree, Without TABLOCK, TF-610 On -- Scenario 12: INSERT SELECT, Nonempty B-Tree, without TABLOCK, TF-610 Off, New Key Range -- Scenario 13: INSERT SELECT, Nonempty B-Tree, without TABLOCK, TF-610 On, New Key Range -- Scenario 14: INSERT SELECT, Nonempty B-Tree, without TABLOCK, Merged Key Range -- Summary of Minimal Logging -- INSERT EXEC -- Sequence Mechanisms -- Custom Sequences -- Single Sequence Value -- Block of Sequence Values -- Nonblocking Sequences -- GUIDs -- Deleting Data -- Removing Rows with Duplicate Data…”
    Libro electrónico
  6. 8386
    Publicado 2017
    Tabla de Contenidos: “…3.2.2.1 Adaptive interpolation -- 3.2.2.2 Dynamic LUT inversion -- 3.2.3 Analysis of the Quantization Effects -- 3.3 Predistortion Self-Calibration -- 3.3.1 Effect of Temperature Variations on Predistortion -- 3.4 Interpolative Filter -- 3.5 Polar Bandwidth Expansion -- Chapter 4: RF front-end (RFDAC) of the polar transmitter -- 4.1 Overview of the RF Front-End -- 4.2 Σ∆ Amplitude Modulation -- 4.2.1 Σ∆ Overview -- 4.2.2 Digital Design -- 4.2.3 Transfer Function and Spectrum -- 4.3 Digital Pre-PA -- 4.3.1 Overview of DPA Functionality -- 4.3.2 Analysis of DPA Quantization Noise -- 4.3.3 DPA Structural Design -- 4.4 DPA Transistor Mismatches -- 4.4.1 Amplitude Mismatch -- 4.4.2 Phase Mismatch -- 4.5 Key Categories of Mismatches and DEM -- 4.5.1 Key Categories -- 4.5.1.1 MSB (4x) transistor mismatch -- 4.5.1.2 Unit (1x) transistor mismatch -- 4.5.1.3 Systematic mismatch between 1x and 4x transistors -- 4.5.2 Simulation-Based Specifications -- 4.5.3 Dynamic Element Matching -- 4.5.4 Measurement Results -- 4.6 Clock Delay Alignment -- 4.6.1 Explanation of the Problem -- 4.6.2 Self-Calibration and Compensation Mechanism -- 4.7 Analysis of Parasitic Coupling -- 4.7.1 Possible Coupling Paths -- 4.7.2 A Novel Method of Characterizing Σ∆ Parasitic Coupling Using Idle-Tones -- 4.7.3 Relationship Between Idle Tones and Σ∆ Parasitic Coupling -- Chapter 5: Simulation and measurement results of the polar transmitter -- 5.1 Simulation Results -- 5.2 Measurement Results -- 5.2.1 Predistortion -- 5.2.2 Transmitter Close-In Performance -- 5.2.3 Transmitter Wideband Noise Performance -- 5.2.4 Performance Comparison -- 5.3 Conclusion -- Chapter 6: Idea of all-digital I/Q modulator -- 6.1 Concept of Digital I/Q Transmitter -- 6.2 Orthogonal Summing Operation of RFDAC -- 6.3 Conclusion -- Chapter 7: Orthogonal summation: A 2x3-bit all-digital I/Q RFDAC…”
    Libro electrónico
  7. 8387
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The First Step - Concurrency Design Principles -- Basic concurrency concepts -- Concurrency versus parallelism -- Synchronization -- Immutable object -- Atomic operations and variables -- Shared memory versus message passing -- Possible problems in concurrent applications -- Data race -- Deadlock -- Livelock -- Resource starvation -- Priority inversion -- A methodology to design concurrent algorithms -- The starting point - a sequential version of the algorithm -- Step 1 - analysis -- Step 2 - design -- Step 3 - implementation -- Step 4 - testing -- Step 5 - tuning -- Conclusion -- Java Concurrency API -- Basic concurrency classes -- Synchronization mechanisms -- Executors -- The fork/join framework -- Parallel streams -- Concurrent data structures -- Concurrency design patterns -- Signaling -- Rendezvous -- Mutex -- Multiplex -- Barrier -- Double-checked locking -- Read-write lock -- Thread pool -- Thread local storage -- Tips and tricks for designing concurrent algorithms -- Identifying the correct independent tasks -- Implementing concurrency at the highest possible level -- Taking scalability into account -- Using thread-safe APIs -- Never assume an execution order -- Preferring local thread variables over static and shared when possible -- Finding the easier parallelizable version of the algorithm -- Using immutable objects when possible -- Avoiding deadlocks by ordering the locks -- Using atomic variables instead of synchronization -- Holding locks for as short a time as possible -- Taking precautions using lazy initialization -- Avoiding the use of blocking operations inside a critical section -- Summary -- Chapter 2: Working with Basic Elements - Threads and Runnables…”
    Libro electrónico
  8. 8388
    Publicado 2019
    Tabla de Contenidos: “…Seeing What Makes a Great Data Scientist -- Structuring a Data Science Team -- Hiring and evaluating the data science talent you need -- Retaining Competence in Data Science -- Understanding what makes a data scientist leave -- Part 4: Investing in the Right Infrastructure -- Chapter 14: Developing a Data Architecture -- Defining What Makes Up a Data Architecture -- Describing traditional architectural approaches -- Elements of a data architecture -- Exploring the Characteristics of a Modern Data Architecture -- Explaining Data Architecture Layers -- Listing the Essential Technologies for a Modern Data Architecture -- NoSQL databases -- Real-time streaming platforms -- Docker and containers -- Container repositories -- Container orchestration -- Microservices -- Function as a service -- Creating a Modern Data Architecture -- Chapter 15: Focusing Data Governance on the Right Aspects -- Sorting Out Data Governance -- Data governance for defense or offense -- Objectives for data governance -- Explaining Why Data Governance is Needed -- Data governance saves money -- Bad data governance is dangerous -- Good data governance provides clarity -- Establishing Data Stewardship to Enforce Data Governance Rules -- Implementing a Structured Approach to Data Governance -- Chapter 16: Managing Models During Development and Production -- Unfolding the Fundamentals of Model Management -- Working with many models -- Making the case for efficient model management -- Implementing Model Management -- Pinpointing implementation challenges -- Managing model risk -- Measuring the risk level -- Identifying suitable control mechanisms -- Chapter 17: Exploring the Importance of Open Source -- Exploring the Role of Open Source -- Understanding the importance of open source in smaller companies -- Understanding the trend…”
    Libro electrónico
  9. 8389
    Publicado 2022
    Tabla de Contenidos: “…-- Summary -- Part 2: The 360° DevOps Operating Model, Governance, and Orchestration Mechanisms -- Chapter 3: The DevOps 360° Operating Model Pillars and Governance Model -- Defining the DevOps 360° operating model core pillars -- The evolution's core governance -- Establishing a DevOps 360° vision authority group -- Establishing a DevOps 360° design and advocacy group -- Defining your DevOps enterprise evolution ecosystem -- Who should be considered as key stakeholders? …”
    Libro electrónico
  10. 8390
    Publicado 2023
    Tabla de Contenidos: “…Tracing and analyzing debug logs -- Real-time resolution using ChatGPT -- Debugging best practices and continuous improvement -- Summary -- 14 -- What You've Learned and What's Next -- A journey recapped -- The current landscape of generative AI -- Conjectures on generative AI's evolution -- The future of Salesforce development with generative AI -- Appendix A: Case Study -- Problem statement -- Assumptions -- Creating epics -- User stories -- Decomposing user stories -- Integrate Snowflake data with Salesforce account pages -- Display Snowflake information on Salesforce account pages -- Email functionality with Snowflake data -- Feedback mechanism for incorrect Snowflake information -- Integrate the Snowflake summary with Slack -- Providing reporting capabilities for the account and Snowflake information -- Compliance, security, and performance considerations -- User training and documentation -- Appendix B: A Deep Dive Into ChatGPT and User Stories -- Defining the process -- Sample user stories -- Requirements for user stories -- Index -- Other Books You May Enjoy -- _k8rm0fhhz2ea -- _xawt0n4enz72 -- _u4perea5435d -- _24dd1sp141ej -- _5llc259z0o2s -- _49k8v3yix0qq -- _prw104f50ez4 -- _kmiiy977wqaq -- _hnhfhv3mo3j1 -- _w7dxkr8nrdul -- _xyxm94aeqlbm -- _esok6g8djui1 -- _hn4v23h4s0dk -- _57w050msxawk -- _z8pcmfrbiry2 -- _46o0bkjfpehn -- _7ap5asnwo398 -- _7zcbyt2rmj8c -- _fc0satk9k3mn -- _sgqpe5s8ssmr -- _97z54wj6tc8u -- _u6wa4xch17mm -- _agxs3t9iecpv -- _mrsrmzpqtpx -- _d7f8ya60t4qh -- _mjz67uf1mm2q -- _t3jlpasccmx3 -- _l55ii0qz54e3 -- _iq9ve278gdrj -- _n43rkj6l6wra -- _5vmogh4dqw8w -- _yw7z06c8dyxm -- _4s8zsuf61cle -- _ciqpwlsh1287 -- _7fu2fh8cqitm -- _uqzgmo74pp9 -- _q2859qwjutpe -- _v8cym3r5ntej -- _4l9tnbyn5gen -- _o9kr5c68fw7a -- _fi1ypgi2xpl8 -- _7fo5yqqwuq3d -- _32fycl8z376u -- _iddrt8o5gve2 -- _bazb0q6ytq7y -- _1949k9g8e7jw…”
    Libro electrónico
  11. 8391
    Publicado 2024
    Tabla de Contenidos: “…Chapter 8 Social Engineering in Cybersecurity-Threats and Defenses -- 8.1 Introduction -- 8.2 The Evolution of Social Engineering in the Context of Cybersecurity -- 8.3 Phases of Social Engineering -- 8.3.1 Discovery and Investigation -- 8.3.2 Deception and Hook -- 8.3.3 Attack -- 8.3.4 Retreat -- 8.4 Social Engineering Threats -- 8.4.1 Data Breaches -- 8.4.2 Risky Hybrid or Remote Work Environments -- 8.4.3 Mobile Attacks -- 8.4.4 Phishing -- 8.4.5 Ransomware -- 8.4.6 Crypto Jacking -- 8.4.7 Cyber-Physical Attacks -- 8.4.8 State-Sponsored Attacks -- 8.4.9 The Internet of Things (IoT) Attacks -- 8.5 Social Engineering Attacks -- 8.6 Social Engineering Defenses -- 8.6.1 Train Everybody in Your Organization -- 8.6.2 Determine Your Company's Valuable Assets -- 8.6.3 Set Up and Enforce Good Security Policies -- 8.6.4 Update Your Software Regularly -- 8.6.5 Do Not Share Private Information with Strangers -- 8.6.6 Implement Access Control Within Your Company -- 8.6.7 Watch Out for Pretexting and Strange Requests -- 8.6.8 Enforcement of Strong Passwords -- 8.7 Conclusion -- Chapter 9 A Machine Learning Algorithm to Tackle Chat Messages -- 9.1 Introduction -- 9.2 Social Engineering Attacks -- 9.3 Background -- 9.3.1 Backpropagations Algorithm -- 9.3.2 Apriori Algorithm -- 9.4 Literature Survey -- 9.5 Previous Work -- 9.6 Proposed Work -- 9.6.1 Accuracy -- 9.6.2 Context-Awareness -- 9.7 Future Scope -- 9.8 Conclusion -- Chapter 10 A Survey on a Security Model for the Internet of Things Environment -- 10.1 Introduction -- 10.2 Literature Survey -- 10.2.1 Supervised Learning-Based Attack Detection Methodologies -- 10.2.2 Data Integrity through the Fusion Mechanism -- 10.2.3 Ensemble Learning for Concept Drift -- 10.2.4 Ensemble Learning for Imbalance Data -- 10.2.5 Software Defined Networking (SDN) of Loading Security…”
    Libro electrónico
  12. 8392
    Publicado 2003
    Tabla de Contenidos: “…-- 3.1.2 RSCT components -- 3.1.3 Resource Management and Control (RMC) subsystem -- 3.1.4 Security -- 3.1.5 Cluster environment -- 3.2 Cluster System Management -- 3.2.1 Supported platforms -- 3.2.2 Client install mechanisms -- 3.2.3 CSM 1.3.2.1 November 2003 -- 3.3 HACMP -- 3.3.1 HACMP overview -- 3.3.2 Role of HACMP -- 3.3.3 Physical components of an HACMP cluster -- 3.4 IBM Virtual Shared Disks -- 3.4.1 Overview of the Virtual Shared Disk components -- 3.4.2 Product packaging -- 3.4.3 Configuration repository -- 3.4.4 Shared external disk access -- 3.4.5 Quorum -- 3.4.6 IBM Recoverable Virtual Shared Disk overview -- 3.4.7 Recovery for concurrent Virtual Shared Disks -- 3.4.8 Disk cable and disk adapter failures -- 3.4.9 Communication adapter failures -- 3.4.10 Technical large pages overview -- 3.4.11 Restrictions for using Virtual Shared Disks -- 3.4.12 Overview of the subsystem device driver (SDD) -- 3.4.13 VSD configuration support for the SDD -- 3.4.14 HPS considerations when using the IP protocol for data transmissions -- 3.5 General Parallel File System 2.1 -- 3.5.1 GPFS overview -- 3.5.2 GPFS 2.1 (APAR IY47306) new features -- 3.5.3 Benefits of using GPFS -- 3.5.4 The basic GPFS structure -- 3.5.5 GPFS RPD cluster -- 3.5.6 GPFS HACMP cluster -- 3.5.7 Recoverability considerations -- 3.5.8 GPFS quorum considerations -- 3.6 Engineering applications -- 3.6.1 Low-level application programming interface (LAPI) -- 3.6.2 LoadLeveler -- 3.6.3 Message passing interface -- 3.6.4 Parallel Environment…”
    Libro electrónico
  13. 8393
    Publicado 2017
    Tabla de Contenidos: “…. -- Implementing the caching mechanism -- Getting started -- How to do it... -- How it works... -- Intercepting request transactions -- Getting started -- How to do it... -- How it works... -- Implementing user authentication -- Getting started -- How to do it... -- How it works... -- Accessing with restrictions -- Getting started -- How to do it... -- How it works…”
    Libro electrónico
  14. 8394
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Chapter 10 : Securing Hardware -- Introduction -- Hardware best practices -- Uncommon screw types -- Antitamper and hardware protection mechanisms -- Side channel attack protections -- Exposed interfaces -- Encrypting communication data and TPM -- Chapter 11: Advanced IoT Exploitation and Security Automation -- Introduction -- Finding ROP gadgets -- Getting ready -- How to do it... -- See also -- Chaining web security vulnerabilities -- How to do it... -- Step 1 - identifying assets and entry points -- Step 2 - finding the weakest link -- Step 3 - reconnaissance -- Android application -- iOS application -- Web application -- Step 4 - identifying vulnerabilities -- Step 5 - Exploitation -- Chaining vulnerabilities -- See also -- Configuring continuous integration testing for firmware -- Getting ready -- How to do it... -- See also -- Configuring continuous integration testing for web applications -- Getting ready -- How to do it... -- See also -- Configuring continuous integration testing for mobile applications -- Getting ready -- How to do it... -- See also -- Index…”
    Libro electrónico
  15. 8395
    por Mariappan, P., Dr
    Publicado 2013
    Tabla de Contenidos: “…Answers to the Exercise Problems -- Review Questions -- Chapter 5: Assignment Problem -- 5.1 Introduction -- 5.2 General Model of the Assignment Problem -- 5.3 Conversion into an Equivalent LPP -- 5.4 Solution to the Assignment Problem -- 5.5 Travelling Salesman Problem -- Exercise Problems -- Answers to the Exercise Problems -- Review Questions -- Chapter 6: PERT - CPM -- 6.1 Introduction -- 6.1.1 Activity -- 6.1.2 Activity Duration/Activity Time -- 6.1.3 Event -- 6.1.4 Network/Arrow Diagram of a Project -- 6.2 Method for Construction of a Network -- 6.3 Numbering the Nodes -- 6.3.1 Dummy Activity -- 6.3.2 Precedence Relationships -- 6.4 Critical Path Method (CPM) -- 6.4.1 ES and EC Time of an Activity -- 6.4.2 Latest Start (LS) and Latest Completion (LC) Time of an Activity -- 6.4.3 Total Slack (TS) -- 6.4.4 Free Slack (FS) -- 6.4.5 Independent Float (IF) -- 6.4.6 Critical Activity and Critical Path -- 6.5 Project Evaluation Review Technique (PERT) -- 6.6 PERT-Cost -- 6.6.1 Crashing -- 6.6.2 Project Cost -- 6.7 Resource Levelling -- Exercise Problems -- Answers to the Exercise Problems -- Review Questions -- Chapter 7: Sequencing -- 7.1 Introduction -- 7.1.1 Assumptions -- 7.2 Johnson's Method (Rule) -- 7.3 Graphical Method -- Exercise Problems -- Answers to the Exercise Problems -- Review Questions -- Chapter 8: Queuing Theory -- 8.1 Introduction -- 8.2 Some Queuing Terminologies -- 8.2.1 The Input/Arrival Process -- 8.2.2 Queue Discipline -- 8.2.3 Service Mechanism -- 8.2.4 Service Channel -- 8.2.5 Maximum Capacity of the Queue -- 8.2.6 Classification of Queues -- 8.2.7 Methods Used to Solve a Queuing Situation -- 8.3 Model : 1 Single Server Model with Infinite Queue (M/M/1): (∞/FCFS) -- 8.4 Model : 2 Single Server Model with Finite Queue (M/M/1): (N/FCFS) -- 8.5 Model : 3 Multi-server Model with Infi nite Queue (M/M/C): (∞/FCFS)…”
    Libro electrónico
  16. 8396
    Publicado 2018
    Tabla de Contenidos: “…. -- Decoupling your code using a cross-platform publish/subscribe mechanism -- Getting ready... -- How it works... -- There's more... -- Chapter 4: Going Cross-Platform with FireMonkey -- Introduction -- Giving a new appearance to the standard FireMonkey controls using styles -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a styled TListBox…”
    Libro electrónico
  17. 8397
    Publicado 2018
    Tabla de Contenidos: “…Application Migration Scheme -- 2.2.4. Controlling Mechanism -- 2.3. Methodology -- 2.3.1. Power Model -- 2.3.2. …”
    Libro electrónico
  18. 8398
    Publicado 2015
    Tabla de Contenidos: “…GRAHAM -- ASME: AMERICAN SOCIETY OF MECHANICAL ENGINEERS -- FUNCTIONAL FLOW BLOCK DIAGRAM OF PERT -- PERT: Program Evaluation Review Technique28 -- DATA FLOW DIAGRAMS AND IDEF -- Data Flow Diagram -- Integrated Definition -- IDEF032 Overview: Function Modeling Method -- IDEF134 Overview: Information Modeling Method -- IDEF1X35 Overview: Data Modeling Method -- IDEF336 Overview: Process Description Capture Method -- IDEF437 Overview: Object-Oriented Design Method -- IDEF538 Overview: Ontology Description Capture Method -- ZERO DEFECTS -- TOYOTA PRODUCTION SYSTEM -- Just-In-Time: Productivity Improvement -- End Notes -- 3: Process Concept Evolution -- INTRODUCTION -- PROF. …”
    Libro electrónico
  19. 8399
    Publicado 2013
    Tabla de Contenidos: “…Refrigerator/Freezer -- The Basic Refrigeration Cycle -- Refrigeration Components -- Compressor -- Compressor Safety -- Trained Personnel Only -- Terminal Venting and Electrocution -- Compressor Motor Starting Relays -- Current Type Relay -- PTC Type Relay -- Condenser Coil -- Evaporator Coil -- Metering Device -- Other Components Used in the Sealed Refrigeration System -- Diagnosing Sealed Systems -- Part IV: Parts -- Chapter 10: Electric Appliance and Air Conditioner Parts -- The Switch -- Pressure Switch -- Thermostat -- Electromechanical Timer -- The Motor -- The Cam Switches -- The Escapement -- Relays -- Solenoids -- Water Valves -- Motors -- Compressors -- Capacitors -- Testing a Capacitor -- Heating Elements -- Mechanical Linkages -- Wires -- How to Strip, Splice, Solder, and Install Solderless and Terminal Connectors, and How to Use Wire Nuts on Wires -- Circuit Protection Devices -- Chapter 11: Electronic Parts -- Electronic Components in General -- How Electronic Appliances and Air Conditioners Operate -- Electrostatic Discharge -- Testing Printed Circuit Boards -- Touch Panel Membrane -- Transformer -- Integrated Circuit Chip -- Resistors -- Sensors -- Temperature Detectors -- Thermistor -- Thermocouple -- Resistance Temperature Detector -- Thermopile…”
    Libro electrónico
  20. 8400
    Publicado 2022
    Tabla de Contenidos: “…(d) The Appropriate Representatives -- (e) A Structured Process for the Selection of Data -- (f) High-Quality Documentation Which Provides Clear Reasoning and Evidence Supporting the Scenario Output -- (g) Independent Challenge and Oversight -- (h) A Process That Is Responsive to Changes -- (i) Mechanisms for Mitigating Biases -- Scenario Analysis Output -- Key Points -- Review Questions -- Notes -- Chapter 12 Capital Modeling -- Operational Risk Capital -- Basic Indicator Approach -- Standardized Approach -- Alternative Standardized Approach -- Future of the Basic and Standardized Approaches -- Advanced Measurement Approach -- Quantitative Requirements of an AMA Model -- Loss Distribution Approach to Modeling Operational Risk Capital -- Scenario Analysis Approach to Modeling Operational Risk Capital -- Hybrid Approach to Modeling Operational Risk Capital -- Insurance -- Future of Capital Requirements: Basel III -- Basel III Standardized Approach -- Disclosure -- Key Points -- Review Questions -- Notes -- Chapter 13 Reporting -- Role of Reporting -- Operational Risk Event Reporting -- Impact of Gains on Internal Event Reporting -- Trends in Internal Losses -- Internal Losses by Risk Category -- Timeliness -- External Loss Data Reporting -- Risk and Control Self-Assessment Reporting -- Key Risk Indicator Reporting -- Scenario Analysis Reporting -- Capital Reporting -- Action Tracking Reporting -- A Consolidated View -- Dashboards -- Key Points -- Review Question -- Chapter 14 Risk Appetite -- The Role of Risk Appetite -- Regulatory Expectations -- Implementing a Risk Appetite Framework -- The Risk Appetite Framework as a Strategic Decision-Making Tool -- Appetite Governance: The Board, "C-Suite," and Business Lines -- Promoting a Firmwide Risk Appetite Framework -- Monitoring the Firm's Risk Profile within the Risk Appetite Framework…”
    Libro electrónico