Mostrando 14,881 - 14,900 Resultados de 18,165 Para Buscar '"framework"', tiempo de consulta: 0.13s Limitar resultados
  1. 14881
    Publicado 2024
    Tabla de Contenidos: “…Kernel trick -- Data augmentation -- Image data augmentation -- Implementing an SVM with data augmentation in Python -- Introducing the CIFAR-10 dataset -- Loading the CIFAR-10 dataset in Python -- Preprocessing the data for SVM training -- Implementing an SVM with the default hyperparameters -- Evaluating SVM on the original dataset -- Implementing an SVM with an augmented dataset -- Training the SVM on augmented data -- Evaluating the SVM's performance on the augmented dataset -- Image classification using the SVM with data augmentation on the MNIST dataset -- Convolutional neural networks using augmented image data -- How CNNs work -- Practical example of a CNN using data augmentation -- CNN using image data augmentation with the CIFAR-10 dataset -- Summary -- Part 3: Labeling Text, Audio, and Video Data -- Chapter 7: Labeling Text Data -- Technical requirements -- Real-world applications of text data labeling -- Tools and frameworks for text data labeling -- Exploratory data analysis of text -- Loading the data -- Understanding the data -- Cleaning and preprocessing the data -- Exploring the text's content -- Analyzing relationships between text and other variables -- Visualizing the results -- Exploratory data analysis of sample text data set -- Exploring Generative AI and OpenAI for labeling text data -- GPT models by OpenAI -- Zero-shot learning capabilities -- Text classification with OpenAI models -- Data labeling assistance -- OpenAI API overview -- Use case 1 - summarizing the text -- Use case 2 - topic generation for news articles -- Use case 3 - classification of customer queries using the user-defined categories and sub-categories -- Use case 4 - information retrieval using entity extraction -- Use case 5 - aspect-based sentiment analysis -- Hands-on labeling of text data using the Snorkel API…”
    Libro electrónico
  2. 14882
    por Wesselius, Jaap
    Publicado 2023
    Tabla de Contenidos: “…Managing Workloads for Individual Users -- Summary -- Part II: Office 365 Integration -- Chapter 4: Azure AD Identities -- Cloud Identities -- Synchronized Identities -- Federated Identities -- Azure AD Connect -- AD Connect Deployment -- AD Connect Health -- Chapter 5: Exchange Online -- Exchange Hybrid Topologies -- Deploying Exchange Hybrid -- Hybrid Configuration Wizard -- PowerShell: Connecting to Office 365 -- Connecting to Exchange Online -- Connecting to Azure Active Directory -- OAuth -- Autodiscover in Exchange Hybrid -- Mailbox Migration -- Managing Remote Mailboxes -- Federation with Azure Active Directory -- Sharing of Information -- Organizational Relationships -- Sharing Policies -- Internet Calendar Publishing -- Mail Transport -- Inbound Mail -- Centralized Mail Transport -- Outbound Mail -- Enhanced Filtering -- Exchange Online Archiving -- Message Tracking -- Recipient Management Only -- Summary -- Part III: Security -- Chapter 6: Publishing Exchange Server -- Virtual Directories -- Namespaces -- Split DNS -- Certificates -- Requesting Certificates -- Exporting Certificates -- Importing Certificates -- Autodiscover -- Domain-Joined Clients -- Non-Domain-Joined Clients -- Autodiscover Redirect -- Autodiscover SRV Records -- Autodiscover V2 -- Client Connectivity -- Outlook -- MAPI over HTTP -- Web-Based Clients -- Offline Settings -- Outlook Apps -- Exchange Admin Center -- Exchange Web Services -- REST API -- Mobile Clients -- IMAP and POP -- High Availability -- Load Balancing -- Health Check Monitors -- SSL Offloading -- Load Balancer Transparency -- Up-Level and Down-Level Proxying -- Azure AD Application Proxy -- Azure Front Door -- Chapter 7: Email Authentication -- Sender Policy Framework -- Constructing the SPF Record -- Checking the SPF Record -- DKIM -- Exchange and DKIM -- DKIM and Exchange Online Protection -- DMARC…”
    Libro electrónico
  3. 14883
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Hardening embedded frameworks -- Getting ready -- How to do it... -- Securing third-party code and components -- Getting ready -- How to do it... -- Chapter 9: Mobile Security Best Practices -- Introduction -- Storing data securely -- Getting ready -- How to do it... -- See also -- Implementing authentication controls…”
    Libro electrónico
  4. 14884
    Publicado 2016
    Tabla de Contenidos: “…Keys in Google Cloud Datastore -- Putting data into Google Cloud Datastore -- Reading data from Google Cloud Datastore -- Google App Engine users -- Embedding denormalized data -- Transactions in Google Cloud Datastore -- Using transactions to maintain counters -- Avoiding early abstraction -- Querying in Google Cloud Datastore -- Votes -- Indexing -- Embedding a different view of entities -- Casting a vote -- Accessing parents via datastore.Key -- Line of sight in code -- Exposing data operations over HTTP -- Optional features with type assertions -- Response helpers -- Parsing path parameters -- Exposing functionality via an HTTP API -- HTTP routing in Go -- Context in Google App Engine -- Decoding key strings -- Using query parameters -- Anonymous structs for request data -- Writing self-similar code -- Validation methods that return an error -- Mapping the router handlers -- Running apps with multiple modules -- Testing locally -- Using the admin console -- Automatically generated indexes -- Deploying apps with multiple modules -- Summary -- Chapter 10: Micro-services in Go with the Go kit Framework -- Introducing gRPC -- Protocol buffers -- Installing protocol buffers -- Protocol buffers language -- Generating Go code -- Building the service -- Starting with tests -- Constructors in Go -- Hashing and validating passwords with bcrypt -- Modeling method calls with requests and responses -- Endpoints in Go kit -- Making endpoints for service methods -- Different levels of error -- Wrapping endpoints into a Service implementation -- An HTTP server in Go kit -- A gRPC server in Go kit -- Translating from protocol buffer types to our types -- Creating a server command -- Using Go kit endpoints -- Running the HTTP server -- Running the gRPC server -- Preventing a main function from terminating immediately -- Consuming the service over HTTP…”
    Libro electrónico
  5. 14885
    Publicado 2010
    Tabla de Contenidos: “…The Four Cardinal Sins that Undermine Good Customer Service -- Summary -- Test Your Understanding -- Suggested Further Readings -- Chapter 5 Ethics, Legislation, and Outsourcing -- Introduction -- Ethics -- The RadioShack Case -- The Tyco Case -- The WorldCom Case -- The Enron Case -- Legislation -- Sarbanes-Oxley Act -- Graham-Leach-Bliley Act -- California Senate Bill 1386 -- Outsourcing -- Summary -- Test Your Understanding -- Suggested Further Readings -- Chapter 6 Comparison to ITIL Processes -- Introduction -- Developments Leading Up To ITIL -- IT Service Management -- The Origins of ITIL -- Quality Approach and Standards -- Criteria to Differentiate Infrastructure Processes -- Comparison of Infrastructure Processes -- Ten Common Myths Concerning the Implementation of ITIL -- Myth #1: You Must Implement All ITIL or No ITIL at All -- Myth #2: ITIL is Based on Infrastructure Management Principles -- Myth #3: ITIL Applies Mostly to Data Center Operations -- Myth #4: Everyone Needs to be Trained on ITIL Fundamentals -- Myth #5: Full Understanding of ITIL Requires Purchase of Library -- Myth #6: ITIL Processes Should be Implemented Only One at a Time -- Myth #7: ITIL Provides Detailed Templates for Implementation -- Myth #8: ITIL Framework Applies Only to Large Shops -- Myth #9: ITIL Recommends Tools to Use for Implementation -- Myth #10: There Is Little Need to Understand ITIL Origins -- Summary -- Test Your Understanding -- Suggested Further Readings -- Chapter 7 Availability -- Introduction -- Definition of Availability -- Differentiating Availability from Uptime -- Differentiating Slow Response from Downtime -- Differentiating Availability from High Availability -- Desired Traits of an Availability Process Owner -- Methods for Measuring Availability -- The Seven Rs of High Availability -- Redundancy -- Reputation -- Reliability -- Repairability…”
    Libro electrónico
  6. 14886
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Encryption basics and protocols -- Services provided by encryption -- Stream versus block ciphers -- Symmetric versus asymmetric encryption -- Public key infrastructure and certificate authorities -- Authentication basics and protocols -- Authentication types -- Username/password with IP address identification authentication -- Encrypted username/password authentication -- Extensible authentication protocol (EAP) -- Authorization and access protocols -- Hash functions and message digests -- IPSec and key management protocols -- VPNs -- IPSec principles of operation -- IPSec tunnel establishment -- IPSec modes of operation -- IPSec authentication and encryption protocols -- IPSec AH protocol -- IPSec ESP protocol -- SSL/TLS and proxies -- Protocol basics -- The handshake protocol -- Network security components - RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs -- Firewalls -- RADIUS, NAC, and other authentication features -- Web application firewalls (WAFs) -- Summary -- Questions -- Chapter 4: Using Network Security Tools, Scripts, and Code -- Commercial, open source, and Linux-based tools -- Open source tools -- Commercial tools -- Information gathering and packet analysis tools -- Basic network scanners -- Network analysis and management tools -- Protocol discovery tools -- Vulnerability analysis tools -- Nikto -- Legion -- Exploitation tools -- The Metasploit Framework (MSF) -- Stress testing tools -- Windows tools -- Kali Linux tools -- Network forensics tools -- Wireshark and packet capture tools -- Summary -- Questions -- Chapter 5: Finding Protocol Vulnerabilities -- Black box, white box, and gray box testing -- Black box and fuzzing -- Enterprise networks testing -- Provider networks testing -- Fuzzing phases -- Common vulnerabilities -- Layer 2-based vulnerabilities -- Layer 3-based vulnerabilities -- Layer 4-based vulnerabilities…”
    Libro electrónico
  7. 14887
    Publicado 2018
    Tabla de Contenidos: “…Important plist files -- The HomeDomain plist files -- The RootDomain plist files -- The WirelessDomain plist files -- The SystemPreferencesDomain plist files -- Other important files -- Cookies -- Keyboard cache -- Photos -- Thumbnails -- Wallpaper -- Recordings -- Downloaded applications -- Apple Watch -- Recovering deleted SQLite records -- Summary -- Chapter 6: iOS Forensic Tools -- Working with Cellebrite UFED Physical Analyzer -- Features of Cellebrite UFED Physical Analyzer -- Advanced logical acquisition and analysis with Cellebrite UFED Physical Analyzer -- Working with Magnet AXIOM -- Features of Magnet AXIOM -- Logical acquisition and analysis with Magnet AXIOM -- Working with Belkasoft Evidence Center -- Features of Belkasoft Evidence Center -- iTunes backup parsing and analysis with Belkasoft Evidence Center -- Working with Oxygen Forensic Detective -- Features of Oxygen Forensic Detective -- Logical acquisition and analysis with Oxygen Forensic Detective -- Summary -- Chapter 7: Understanding Android -- The evolution of Android -- The Android model -- The Linux kernel layer -- The Hardware Abstraction Layer -- Libraries -- Dalvik virtual machine -- Android Runtime (ART) -- The Java API framework layer -- The system apps layer -- Android security -- Secure kernel -- The permission model -- Application sandbox -- Secure inter-process communication -- Application signing -- Security-Enhanced Linux -- Full Disk Encryption -- Trusted Execution Environment -- The Android file hierarchy -- The Android file system -- Viewing file systems on an Android device -- Common file systems found on Android -- Summary -- Chapter 8: Android Forensic Setup and Pre-Data Extraction Techniques -- Setting up the forensic environment for Android -- The Android Software Development Kit -- The Android SDK installation -- An Android Virtual Device…”
    Libro electrónico
  8. 14888
    Publicado 2023
    Tabla de Contenidos: “…-- Threats to infrastructure security -- The importance of infrastructure security -- Basic principles of infrastructure security -- Types of security measures for infrastructure -- The role of governance in infrastructure security -- How to govern security in AWS -- AWS security services and features -- AWS security compliance and certifications -- AWS security governance frameworks -- Monitoring and logging for AWS security -- Incident response for AWS security -- How to build secure infrastructure in Terraform -- Implementing least privilege using IAM policies -- Creating secure network architectures -- Automating compliance checks -- Storing secrets securely -- Managing Terraform state -- Security and Terraform -- The security benefits of using Terraform -- Best practices for using Terraform securely -- Common security risks with Terraform and how to mitigate them -- Security and IaC operations -- IaC pipeline security -- Securing build and deployment processes -- Securely managing secrets in IaC pipelines -- Testing and validating infrastructure changes -- Best practices for secure IaC operations -- Summary -- Chapter 15: Perfecting AWS Infrastructure with Terraform -- What does perfect mean in cloud infrastructure? …”
    Libro electrónico
  9. 14889
    Publicado 2013
    Tabla de Contenidos: “…Synchronize EMCLI with the OMS -- Download the Installer to the Target Host -- Edit the agent.properties File -- Install the Agent -- Installing Agents Using the Agent Cloning Wizard -- Prerequisites -- Installation Using the Agent Cloning Wizard -- Installing Agents Using the Manual Cloning Procedure -- Prerequisites -- Installation Using the Manual Cloning Procedure -- Installing Shared Oracle Home Agents Using the Wizard -- Prerequisites -- Installing the Shared Oracle Home Agent Using the Wizard -- Installing Shared Oracle Home Agents Using AgentNFS.pl -- Prerequisites -- Installing the Shared Oracle Home Agent Using AgentNFS.pl -- Agent Configuration Issues -- Firewall Issues -- Agent Issues -- Summary -- Chapter 6: Cloud Control Console Configuration -- Selecting the Home Page -- Global Menu Items -- The Enterprise Menu -- The Targets Menu -- The Favorites Menu -- The History Menu -- The Setup Menu -- The Help Menu -- The "User" Menu -- Notification Requirements -- Define Notification Methods -- Mail Server -- Other Notification Methods -- Define an E-mail Address for User -- Set Notification Schedules -- Defining Notification Schedules -- Summary -- Chapter 7: Cloud Control Security and User Management -- Administrators -- Administrator -- Repository Owner -- Creating Administrators -- Roles -- Credentials -- Named Credentials -- Preferred Credentials -- Monitoring Credentials -- Privilege Delegation -- Registration Passwords -- Audit Data -- Securing Cloud Control Data Transfer -- EM Framework Security -- Summary -- Chapter 8: Cloud Control Maintenance and Tuning -- Maintaining Cloud Control -- Operational Maintenance -- Physical Maintenance -- Cloud Control Tuning -- Sizing Guidelines -- OMS and OMR System Errors -- Target Metric Collection Errors -- Targets with Down Status -- Critical and Warning Events -- OMR Database Alert Log Errors…”
    Libro electrónico
  10. 14890
    por Chodorow, Kristina
    Publicado 2013
    Tabla de Contenidos: “…Aggregation -- The Aggregation Framework -- Pipeline Operations -- match -- project -- group -- unwind -- sort -- limit -- skip -- Using Pipelines -- MapReduce -- Example 1: Finding All Keys in a Collection -- Example 2: Categorizing Web Pages -- MongoDB and MapReduce -- Aggregation Commands -- count -- distinct -- group -- Chapter 8. …”
    Libro electrónico
  11. 14891
    Publicado 2018
    Tabla de Contenidos: “…Current Procedural Terminology (CPT) -- Logical Observation Identifiers Names and Codes (LOINC) -- National Drug Code (NDC) -- Systematized Nomenclature of Medicine Clinical Terms (SNOMED-CT) -- Breaking down healthcare analytics -- Population -- Medical task -- Screening -- Diagnosis -- Outcome/Prognosis -- Response to treatment -- Data format -- Structured -- Unstructured -- Imaging -- Other data format -- Disease -- Acute versus chronic diseases -- Cancer -- Other diseases -- Putting it all together - specifying a use case -- Summary -- References and further reading -- Chapter 3: Machine Learning Foundations -- Model frameworks for medical decision making -- Tree-like reasoning -- Categorical reasoning with algorithms and trees -- Corresponding machine learning algorithms - decision tree and random forest -- Probabilistic reasoning and Bayes theorem -- Using Bayes theorem for calculating clinical probabilities -- Calculating the baseline MI probability -- 2 x 2 contingency table for chest pain and myocardial infarction -- Interpreting the contingency table and calculating sensitivity and specificity -- Calculating likelihood ratios for chest pain (+ and -) -- Calculating the post-test probability of MI given the presence of chest pain -- Corresponding machine learning algorithm - the Naive Bayes Classifier -- Criterion tables and the weighted sum approach -- Criterion tables -- Corresponding machine learning algorithms - linear and logistic regression -- Pattern association and neural networks -- Complex clinical reasoning -- Corresponding machine learning algorithm - neural networks and deep learning -- Machine learning pipeline -- Loading the data -- Cleaning and preprocessing the data -- Aggregating data -- Parsing data -- Converting types -- Dealing with missing data -- Exploring and visualizing the data -- Selecting features…”
    Libro electrónico
  12. 14892
    Publicado 2011
    Tabla de Contenidos: “…-- Classic Separation Patterns -- History of MVVM -- Developing Expression Blend -- Presentation Model for WPF and Silverlight -- Architecture of MVVM -- Translating to Silverlight -- Two Kinds of View-models -- Binding the View to the View-model -- Understanding the Data Context -- Inheriting the Data Context -- Binding to the View -- Building a Sample Application -- The Model's Interface -- Building a CustomerViewModel -- Calling the Service in the MainViewModel -- Binding to Results -- Testing the Application -- Bridging the Separation -- Implementing a ViewModelBase Class -- Using Commands -- Sending Messages -- Using an MVVM Framework -- What Could Be Better? -- Summary -- 8 Using Data Controls -- Filtering and Paging with the PagedCollectionView -- Preparing the Sample -- Building the PagedCollectionView -- Filtering Data -- Paging Through Data -- Optimizing Data Handling -- Implementing Custom Sorting -- Adding a DataPager Control -- Customizing the Display -- Validating Data Input -- Using Interface-Based Validation -- Validating with Data Annotations -- Validating Before or After the Data Is Set -- Validating on the Client and on the Server -- Reviewing the DataGrid -- Using the DataGrid with Automatic Columns -- Choosing Between DataGrid and ListBox -- Editing Data in the DataForm -- Adding a Description -- Validating the Input -- Committing Changes Manually -- Defining Fields Manually -- Getting More Information…”
    Libro electrónico
  13. 14893
    Publicado 2010
    Tabla de Contenidos: “…Department of Defense Architecture Framework -- E.5.1 Overview of DoDAF -- E.5.2 DoDAF and Software Architecture…”
    Libro electrónico
  14. 14894
    por Sreenivasan, N. S.
    Publicado 2007
    Tabla de Contenidos: “…R) -- Problem 1 -- Illustration 15 -- Analysis -- Normalised yield (YN) -- Illustration 16 -- Process capability analysis (PCA) -- Conclusion -- Annexure 12A: Exercises on Six Sigma calculations -- Exercise 1 -- Exercise 2 -- Exercise 3 -- Exercise 4 -- Exercise 5 -- Exercise 6 -- Exercise 7 -- Exercise 8 -- Individual process -- Process chain -- Exercise 9 -- Chapter 13: Improving Process Flow and Speed to Achieve Lean Process -- Background -- Process flow and process speed -- Two streams of quality improvement -- Checklist of factors having a bearing on process flow and speed -- Lean Six Sigma -- Addressing the factors of hold-up -- Waiting for approval -- Waiting for maintenance -- Movement -- Searching -- Formats and records -- Meetings -- Late starting and early closing -- Push, pull and out -- Process set-up -- Work in process, lead time and process cycle efficiency -- Work in process -- Lead time/process speed -- Analysis of process lead time and process velocity -- Process cycle efficiency (PCE)-the 'lean metric' -- Lean Six Sigma -- Conclusion -- Section D: Continual Improvement Process Framework…”
    Libro electrónico
  15. 14895
    Publicado 2021
    Tabla de Contenidos: “…THE CONTRIBUTION OF THE ALMORAVID BUILDERS -- 6 CONCLUSIONS -- REFERENCES -- Geographic and chronological extent of brick vaults by slices -- 1 INTRODUCTION -- 2 ORIGIN OF THE TECHNIQUE. FRAMEWORK SAVING -- 3 LATE ANTIQUITY TO MIDDLE AGES DEVELOPMENT: BYZANTIUM -- 4 OCCURRENCE IN THE MEDIEVAL IBERIAN PENINSULA -- 5 RELATED CASES IN LATE MEDIEVAL EUROPE -- 6 A PARTICULAR EARLY MODERN PERIOD OUTCOME. …”
    Libro electrónico
  16. 14896
    Publicado 2022
    Tabla de Contenidos: “…The pipeline execution -- Summary -- Questions -- Further reading -- Chapter 12: Static Code Analysis with SonarQube -- Technical requirements -- Exploring SonarQube -- Installing SonarQube -- Overview of the SonarQube architecture -- SonarQube installation -- Real-time analysis with SonarLint -- Executing SonarQube in a CI process -- Configuring SonarQube -- Creating a CI pipeline for SonarQube in Azure Pipelines -- Summary -- Questions -- Further reading -- Chapter 13: Security and Performance Tests -- Technical requirements -- Applying web security and penetration testing with ZAP -- Using ZAP for security testing -- Ways to automate the execution of ZAP -- Running performance tests with Postman -- Summary -- Questions -- Further reading -- Section 5: Taking DevOps Further/More on DevOps -- Chapter 14: Security in the DevOps Process with DevSecOps -- Technical requirements -- Testing Azure infrastructure compliance with Chef InSpec -- Overview of InSpec -- Installing InSpec -- Configuring Azure for InSpec -- Writing InSpec tests -- Executing InSpec -- Keeping sensitive data safe with HashiCorp Vault -- Installing Vault locally -- Starting the Vault server -- Writing secrets to Vault -- Reading secrets in Vault -- Using the Vault UI web interface -- Getting Vault secrets in Terraform -- Summary -- Questions -- Further reading -- Chapter 15: Reducing Deployment Downtime -- Technical requirements -- Reducing deployment downtime with Terraform -- Understanding blue-green deployment concepts and patterns -- Using blue-green deployment to improve the production environment -- Understanding the canary release pattern -- Exploring the dark launch pattern -- Applying blue-green deployments on Azure -- Using App Service with slots -- Using Azure Traffic Manager -- Introducing feature flags -- Using an open source framework for feature flags…”
    Libro electrónico
  17. 14897
    Publicado 2007
    Tabla de Contenidos: “…A descriptive typological framework on how information on spatial entities might be expressed in languages -- 3.1. …”
    Libro electrónico
  18. 14898
    por Barrett, Joan
    Publicado 2005
    Tabla de Contenidos: “…WebSphere Application Server: New capabilities in Version 6 -- Programming model -- Application programming model support -- Programming model extensions -- Changes in Web services -- Service Data Object -- JavaServer Faces -- System management -- Mixed cell support -- Support for J2EE 1.4 specification -- New administrative commands -- WebSphere profiles -- Server templates -- Resource providers -- Support for extensible server types -- Introduction of node groups -- Improved administrative console look and feel -- System applications -- Application management features -- Replication -- Default message provider -- WebSphere configuration archive -- WebSphere Rapid Deployment -- Annotation-based programming -- Deployment automation -- IBM Service Integration Technologies (messaging) -- Application support -- Service integration bus and messaging -- Mediation -- Clustering -- Quality of Service -- Message Driven Beans -- Common networking services -- Transport channel service -- High availability -- Clustering enhancements -- Security -- Java Authorization Contract with Containers 1.0 support -- Java 2 security manager -- JCA 1.5 support -- SSL channel framework -- Web authentication -- Web services security -- Appendix B. …”
    Libro electrónico
  19. 14899
    Publicado 2023
    Tabla de Contenidos: “…Exploring the phases of cloud migration -- Phase 1 - Discover -- Phase 2 - Plan -- Phase 3 - Migrate -- Phase 4 - Automate -- Phase 5 - Optimize -- Summary -- Further reading -- Chapter 3: Preparing for Cloud Migration -- Learning about cloud migration insights -- Begin with cost savings, evolve with innovation -- Cloud migration propels cultural shift -- High-level metrics are not enough -- Proper planning drives successful migration -- Thinking beyond CapEx and OpEx -- There are many great cloud providers -- Choosing the right cloud partner for your business -- Security -- Certifications, compliance, standards, and attestation frameworks -- Innovation and roadmap -- Service-level agreements and contracts -- Support model -- Pricing model -- Vendor lock-in criteria and exit provisions -- Reliability and performance -- Service dependencies and partnerships -- Overall business health -- Checklist for choosing a strong partner -- Evaluation of potential vendor lock-ins -- Unraveling the multi-cloud - benefits, challenges, and strategy -- Benefits -- Challenges -- Multi-cloud strategy -- Aligning your IT landscape with the cloud - best practices -- Summary -- Further reading -- Chapter 4: Implementing Cloud Migration Strategies -- Introducing cloud migration strategies -- What is a cloud migration strategy? …”
    Libro electrónico
  20. 14900
    Publicado 2023
    Tabla de Contenidos: “…Winston Royce and the Waterfall Model (1970) -- Early Iterative and Incremental Development Methods (Early 1970s) -- Further Evolution of Iterative and Incremental Development (mid-to-late 1970s) -- Early Agile Development Methods (1980s and 1990s) -- Agile Manifesto (2001) -- Agile Manifesto Values -- Agile Manifesto Principles -- Summary of Key Points -- Discussion Topics -- Notes -- Chapter 3 Scrum Overview -- Scrum Framework -- Sprints -- Product Backlog -- Scrum Meetings -- Scrum Roles -- Product Owner Role -- Scrum Master Role -- Team Role -- Scrum Values -- Commitment and Focus -- Openness -- Respect -- Courage -- General Scrum/agile Principles -- Variability and Uncertainty -- Prediction and Adaptation -- Validated Learning -- Work in Progress -- Progress -- Performance -- Summary of Key Points -- Discussion Topics -- Notes -- Chapter 4 Agile Planning, Requirements, and Product Backlog -- Agile Planning Practices -- Planning Strategies…”
    Libro electrónico