Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 149
- History 135
- Management 47
- Crítica e interpretación 46
- Documentales 46
- History and criticism 42
- Historia y crítica 40
- RELIGION 40
- Guerra mundial, 1939-1945 36
- Social aspects 36
- Application software 33
- Engineering & Applied Sciences 33
- Filosofía 32
- Novela inglesa 32
- Psychological aspects 31
- Development 30
- FICTION 27
- Politics and government 27
- Operating systems (Computers) 26
- Series de televisión 26
- Milton, John 24
- Política y gobierno 24
- Business & Economics 23
- Leadership 23
- Novela norteamericana 23
- Philosophy 23
- Psychodiagnostics 23
- Seguretat informàtica 23
- Historia contemporánea 22
- JavaScript (Computer program language) 22
-
2641Publicado 2013“…The burst of Japan’s bubble was followed by two “lost decades”. Before a contrite Japan completely adopted Western ways of finance, the “Lehman shock” hit, followed by the euro crisis. …”
Libro electrónico -
2642Publicado 2023Tabla de Contenidos: “…Cruz-Ram ́ırez, Laura R. de Almeida, Valeria Ch ́avez and Rodolfo Silva Interconnections between Coastal Sediments, Hydrodynamics, and Ecosystem Profiles on the Mexican Caribbean Coast Reprinted from: Land 2022, 11, 524, doi:10.3390/land11040524 1 -- Mauro Bonasera, Ciro Cerrone, Fabiola Caso, Stefania Lanza, Giandomenico Fubelli and Giovanni Randazzo Geomorphological and Structural Assessment of the Coastal Area of Capo Faro Promontory, NE Salina (Aeolian Islands, Italy) Reprinted from: Land 2022, 11, 1106, doi:10.3390/land11071106 23 -- Laura Borz`ı, Giorgio Anfuso, Giorgio Manno, Salvatore Distefano, Salvatore Urso, Domenico Chiarella and Agata Di Stefano Shoreline Evolution and Environmental Changes at the NW Area of the Gulf of Gela (Sicily, Italy) Reprinted from: Land 2021, 10, 1034, doi:10.3390/land10101034 49 -- Maurizio D'Orefice, Piero Bellotti, Tiberio Bellotti, Lina Davoli and Letizia Di Bella Natural and Cultural Lost Landscape during the Holocene along the Central Tyrrhenian Coast (Italy) Reprinted from: Land 2022, 11, 344, doi:10.3390/land11030344 71 -- Philippes Mbevo Fendoung, Mesmin Tchindjang and Aur ́elia Hubert-Ferrari Weakening of Coastlines and Coastal Erosion in the Gulf of Guinea: The Case of the Kribi Coast in Cameroon Reprinted from: Land 2022, 11, 1557, doi:10.3390/land11091557 107 -- Juan J. …”
Libro electrónico -
2643por Monson-Haefel, RichardTabla de Contenidos: “…Distributed Transactions; 6.5. Lost Connections; 6.6. Dead Message Queues; 7. Deployment Considerations; 7.1.2. …”
Publicado 2001
Libro electrónico -
2644por OECDTabla de Contenidos: “…Young people have recovered some of the lost ground but are still lagging behind, especially in some countries…”
Publicado 2022
Libro electrónico -
2645Publicado 2023Tabla de Contenidos: “…Viewing Etsy Ads stats -- Deactivating Etsy Ads -- Changing your ad spend -- Discount of Monte Cristo: Offering Discounts -- Running a sale -- Creating a promo code -- Sending targeted offers -- Managing Your Discount Offers -- Editing a sale or ending a sale early -- Deactivating a promo code or targeted offer -- Social Studies: Promoting Your Etsy Shop and Listings on Social Media -- Connecting your Etsy shop to Facebook, Pinterest, and Twitter -- Posting on social media from within Etsy -- Social media best practices -- Camera Ready: Sharing Videos with Explore -- Chapter 15 You've Been Served: Providing Exceptional Customer Service -- Sliding into your DMs: Accessing Etsy Messages -- Accessing, reading, and replying to messages -- Sending a new message -- Receiving email notifications -- Let's Talk: Communicating with Buyers -- Thanking the buyer -- Answering customer questions -- Confirming shipping and seeking feedback -- Bungle Fever: Handling a Botched Transaction and Other Tough Issues -- Dealing with a lost item -- Refunding lost or damaged items through Etsy's Purchase Protection program -- Handling returns and issuing refunds -- Canceling an order -- Responding to a negative review -- Dealing with a difficult customer -- Chapter 16 Business as Usual: Managing Your Etsy Shop -- Room and Dashboard: Exploring the Shop Manager Dashboard -- One Track Mind: Tracking and Analyzing Shop Stats -- High Finance: Viewing Your Etsy Financials -- It's Payday! …”
Libro electrónico -
2646Publicado 2019Tabla de Contenidos: “…Reconnect to what you are awesome at - your strengths -- It's time to own it (time that is) -- Part III Combat burn out -- chapter 6 Define what's important -- The cost of Burn Out -- The universal truth -- Your values - from obscure to clear -- Explore your unique blend -- Identify your values -- Listen to the rumblings -- Know what presses your buttons -- Explore your top five lists -- The bullshit of balance -- chapter 7 Design a values-aligned life -- From diminished to amplified -- Your intention drives your attention -- Your behaviours show your intentions -- Your environment reflects your values -- Rituals are your anchor -- Refresh and redesign -- chapter 8 Defend the sacred -- From exposed to protected -- Let go of #FOMO -- Draw the line -- Mitigate the impact -- Delegate like a boss -- Eliminate it, stat -- Leadership: defend what's sacred in your workplace -- Set non-negotiables -- Make it public -- Celebrate and reward -- Know the 'why' behind the 'what' -- Part IV Tackle freak out -- chapter 9 Map it -- From blindfolded to blueprint -- Getting found when we're feeling lost -- Five essential components of maps -- 1. Title -- 2. …”
Libro electrónico -
2647Publicado 2015Tabla de Contenidos: “…A.16.1.1 - Responsibilities and procedures -- A.16.1.2 - Reporting information security events -- A.16.1.3 - Reporting security weaknesses -- A.16.1.4 - Assessment of and decision on information security events -- A.16.1.5 - Response to information security incidents -- A.16.1.6 - Learning from information security incidents -- A.16.1.7 - Collection of evidence -- Strategies and tactics for treating breaches -- Tactical advice -- Regular meetings -- Time, time, time -- Rest -- People (number) -- International contacts -- Keep the information flowing -- Keep minutes -- Additional quality feedback -- Dimensions of treatment / mitigation of information security breaches -- None -- Internal investigation -- External investigation -- Joint task force -- Part 2 - Case studies -- Chapter 5: Notes from the Field -- Privacy -- Cost -- The practicalities of surveillance -- People -- Cost -- Speed -- Outreach -- The truth vs. company policy -- Chapter 6: Motives and Reasons -- Greed -- Despair -- Revenge -- Business advantage -- Chapter 7: Case Studies from Small Companies -- Foreword to the case studies -- The stolen backup -- In-depth explanation -- Lessons learned -- Eavesdropping on faxes -- In-depth explanation -- A stolen laptop -- In-depth explanation -- Chapter 8: Case Studies from Medium-sized Companies -- A case of intrigue - the missing contract -- In-depth explanation -- Lessons learned -- The sales manager who changed jobs -- In-depth explanation -- Lessons learned -- The project manager who became a friend, and then an enemy -- In-depth explanation -- The lost customers - how a sales manager cost a company 10% of revenue -- In-depth explanation -- Lessons learned -- The flood - how not to learn about risk management -- In-depth explanation -- Chapter 9: Case Studies from Large Corporations -- Who wants my data? …”
Libro electrónico -
2648Publicado 2025Tabla de Contenidos: “…-- Aligning purpose and profit -- The relationship between profit and pricing -- Corporate purpose -- The relationship between profit and purpose -- The triple bottom line -- The financial case for purpose -- Aligning price, profit, and purpose -- Pricing for demand management -- Pricing for a sustainable environment -- Pricing for poverty alleviation -- Pricing for healthy living -- Pricing for governmental policy -- Pricing for improving quality of life -- The seven-step plan -- Key takeaways -- Notes -- Chapter 2: Seeking internal alignment and true costs -- Internal misalignment issues -- The importance of including societal impact within the business case -- Impact-weighted accounting: the promise -- A framework for quantifying societal impact -- Understand the value being created - for customers and society -- Measurement challenges -- Measuring carbon emissions -- Measuring a life saved -- Measuring jobs created or lost -- The social cost of food -- Other measurements -- True costs and responsible business: getting there -- Key takeaways -- Notes -- Chapter 3: Innovation diffusion: Pricing for growth -- The "diffusion of innovation" stages and the role of pricing -- Pricing of innovations and its influence on societal welfare -- Stage 1: Innovators (2.5% market share) -- Stage 2: Early adopters (13.5% market share) -- The "green premium" -- Stage 3: Early majority (34% market share) -- Case of Tesla -- Stage 4: Late majority (34% market share) -- Crossing the chasm: Driving adoption and market share (34%) -- Georgia-Pacific Case Study…”
Libro electrónico -
2649Publicado 2011Tabla de Contenidos: “…Reclaiming Our Selves: Gender and Violence -- Terror, Domination, and Partnership -- The Crowned Cannibals -- The Mind as Erotic Weapon -- The Birth of Plea sure -- A Woman's Side of the Story -- Please Listen to the Women of Iraq -- Meena, Heroine of Afghanistan -- Behind Bars -- Boys Will Be Boys: Breaking the Link between Masculinity and Violence -- She Cannot Be Lost to Me -- Joining Prayers -- Serenity -- Acceptance Speech, Nobel Peace Prize -- Prayer of The Virgin of Guadalupe -- CHAPTER 7. …”
Libro electrónico -
2650Publicado 2024Tabla de Contenidos: “…-- Running the performance test -- Flight SQL, the new kid on the block -- Summary -- Chapter 8: Understanding Arrow Database Connectivity (ADBC) -- Technical requirements -- ODBC takes an Arrow to the knee -- Lost in translation -- Arrow adoption in ODBC drivers -- The benefits of standards around connectivity -- The ADBC specification -- ADBC databases -- ADBC connections -- ADBC statements -- ADBC error handling -- Using ADBC for performance and adaptability -- ADBC with C/C++ -- Using ADBC with Python -- Using ADBC with Go -- Summary -- Chapter 9: Using Arrow with Machine Learning Workflows -- Technical requirements -- SPARKing new ideas on Jupyter -- Understanding the integration of Arrow in Spark -- Containerization makes life easier -- SPARKing joy with Arrow and PySpark -- Facehuggers implanting data -- Setting up your environment -- Proving the benefits by checking resource usage -- Using Arrow with the standard tools for ML -- More GPU, more speed! …”
Libro electrónico -
2651por Dearlove, DesTabla de Contenidos: “…-- Biography -- 2 The Four-day Week: Here's Why -- Biography -- 3 Why We Lost Touch with Each Other and How We Reconnect -- The Missing Link -- The Power of Questions -- The Monopoly -- The Democratization -- Biography -- 4 One Simple Change to Improve Your Connections -- Are You a Rational or Emotional Thinker? …”
Publicado 2024
Libro electrónico -
2652Publicado 2017“…Do you ever feel as though your message hasn't gotten across? Do details get lost along the way? Have tense situations ever escalated unnecessarily? …”
Libro electrónico -
2653Publicado 2001Tabla de Contenidos: “…Hardware Handling of Interrupts and Exceptions -- Nested Execution of Exception and Interrupt Handlers -- Initializing the Interrupt Descriptor Table -- Interrupt, Trap, and System Gates -- Preliminary Initialization of the IDT -- Exception Handling -- Saving the Registers for the Exception Handler -- Entering and Leaving the Exception Handler -- Interrupt Handling -- I/O Interrupt Handling -- Interrupt vectors -- IRQ data structures -- IRQ distribution in multiprocessor systems -- Multiple Kernel Mode stacks -- Saving the registers for the interrupt handler -- The do_IRQ( ) function -- The _ _do_IRQ( ) function -- Reviving a lost interrupt -- Interrupt service routines -- Dynamic allocation of IRQ lines -- Interprocessor Interrupt Handling -- Softirqs and Tasklets -- Softirqs -- Data structures used for softirqs -- Handling softirqs -- The do_softirq( ) function -- The _ _do_softirq( ) function -- The ksoftirqd kernel threads -- Tasklets -- Work Queues -- Work queue data structures -- Work queue functions -- The predefined work queue -- Returning from Interrupts and Exceptions -- The entry points -- Resuming a kernel control path -- Checking for kernel preemption -- Resuming a User Mode program -- Checking for rescheduling -- Handling pending signals, virtual-8086 mode, and single stepping -- Kernel Synchronization -- How the Kernel Services Requests -- Kernel Preemption -- When Synchronization Is Necessary -- When Synchronization Is Not Necessary -- Synchronization Primitives -- Per-CPU Variables -- Atomic Operations -- Optimization and Memory Barriers -- Spin Locks -- The spin_lock macro with kernel preemption -- The spin_lock macro without kernel preemption -- The spin_unlock macro -- Read/Write Spin Locks -- Getting and releasing a lock for reading -- Getting and releasing a lock for writing -- Seqlocks -- Read-Copy Update (RCU) -- Semaphores…”
Libro electrónico -
2654por Oehlke, AndreasTabla de Contenidos: “…Special Effects -- Creating complex effects with particle systems -- Adding a dust particle effect to the player character -- Moving the clouds -- Smoothing with Linear interpolation (Lerp) -- Letting the rocks float on the water -- Adding parallax scrolling to the mountains in the background -- Enhancing the game screen's GUI -- Event - player lost a life -- Event - score increased -- Summary -- 9. …”
Publicado 2013
Libro electrónico -
2655Publicado 2019“…Individuals become independent consultants out of necessity or preference: necessity because they lost their job or the company offered an attractive exit package; preference because they want a career change, more control over their time, or an enriched, varied work situation. …”
Libro electrónico -
2656Publicado 2015“…This represents a challenge for disciplines with ever more complex subject matter, and a lost opportunity when new active learning approaches to education are yielding dramatic improvements in student learning and retention. …”
Libro electrónico -
2657Publicado 2022Tabla de Contenidos: “…Converting a standalone server into a replica set -- Creating a replica set -- Read preference -- Write concern -- Priority settings for replica set members -- Production considerations -- Connecting to a replica set -- Replica set administration -- How to perform maintenance on replica sets -- Initial sync -- Resyncing a member of a replica set -- Changing the oplog's size -- Reconfiguring a replica set when we have lost the majority of our servers -- Chained replication -- Streaming replication -- Flow control -- Cloud options for a replica set -- Amazon DocumentDB -- Microsoft Azure Cosmos DB -- MongoDB Atlas -- Replica set limitations -- Summary -- Chapter 14: Mastering Sharding -- Technical requirements -- Why do we need sharding? …”
Libro electrónico -
2658por Sundberg, Niklas“…Humanity is under threat, but all is not lost. We can take action! But how? Sustainable IT Playbook for Technology Leaders will show you how. …”
Publicado 2022
Libro electrónico -
2659Publicado 2024Tabla de Contenidos: “…Analysis of service-to-service resource sharing -- Network analysis tools for identifying complex configurations -- Metrics and triggers for autoscaling opportunities -- Real consequences of anti-patterns -- Operational chaos caused by configuration drift -- Compliance risks and regulatory challenges -- Lost opportunities for resource optimization -- Service degradation and end user impact -- Systemic complexity and increased maintenance efforts -- Resource wastage and increased operational costs -- Security vulnerabilities and data breach possibilities -- Hindrance to innovation and development -- Team productivity and collaboration challenges -- Business reputation and customer trust impacts -- Summary -- Chapter 3: Causes and Consequences -- Unpacking the root causes of Kubernetes anti-patterns -- Defining root causes within Kubernetes -- Historical perspectives on Kubernetes development -- Common misconceptions and knowledge gaps -- Architectural and design pitfalls -- Organizational dynamics and their effects -- The human element - skills, training, and communication -- Tooling and technology choices -- Tracing Kubernetes anti-pattern influence -- Subtle shifts in development culture -- Workflow disruptions and inefficiencies -- Altered deployment and operational metrics -- Increased monitoring noise and alert fatigue -- Degradation of service reliability -- Complications in automation and orchestration -- Obstacles in performance tuning -- The value of understanding anti-pattern causes -- Enabling predictive and preventive strategies -- Cultivating informed decision-making processes -- Guiding strategic planning and long-term vision -- Promoting sustainable and scalable Kubernetes practices -- Improving organizational resilience to future challenges -- Summary -- Part 2: Implementing Best Practices…”
Libro electrónico -
2660por Verham, DominiekTabla de Contenidos: “…-- Chapter 2: Importance of Securing Your Desktops -- A desktop at the heart of a user's workspace -- Multiple users on a single desktop -- What happens when a physical desktop is lost or stolen? -- What can IT admins do to prevent data leakage? …”
Publicado 2024
Libro electrónico