Mostrando 17,081 - 17,100 Resultados de 17,157 Para Buscar '"framework"', tiempo de consulta: 0.12s Limitar resultados
  1. 17081
    Publicado 2020
    “…In line with the CIKM 2020 theme, the aim of the Resources track is to collect and strengthen works geared towards making research resources, such as datasets, benchmarks or frameworks, more accessible to the research community, thereby ensuring reproducibility and transparency of research. …”
    Libro electrónico
  2. 17082
    Publicado 2019
    “…This year's symposium continues this tradition and invited for submission papers providing original, substantial contributions in one or more of the following categories: a deep theoretical exploration of topical areas central to data management; b new formal frameworks that aim at providing a basis for deeper theoretical investigation of important emerging issues in data management; and c validation of theoretical approaches from the lens of practical applicability in data management. …”
    Libro electrónico
  3. 17083
    Publicado 2022
    “…By giving an in-depth analysis of marginal notes found in the extant copies, he situates the “Ḥabīb al-siyar” within the broader framework of Islamic book culture and shows that the chronicle was part of a larger canon of texts. …”
    Libro electrónico
  4. 17084
    Publicado 2023
    “…What You Will Learn Build a fully functional web server using Actix Web framework in Rust Create an AutoGPT agent "Auto-Gippity" to generate, test, and optimize code Implement AI functions for precise responses from large-language-models Understand Rust's memory management and performance advantages Explore the creation of specialized AutoGPT agents for various tasks Master unit testing, error handling, and lifetimes in Rust Audience This course is designed for intermediate programmers looking to enhance their programming skills and venture into the world of Rust and AI-driven code generation. …”
    Video
  5. 17085
    por Kuh, Nick
    Publicado 2012
    “…By Day 4 you’ll be learning how to communicate with Facebook using Apple’s new Social framework introduced in iOS 6. Day 5 kicks off with code and methods to add in-app social network marketing to your app. …”
    Libro electrónico
  6. 17086
    Publicado 2014
    “…Apps you’ll develop include: Welcome App Cannon Game Tip Calculator Doodlz Twitter® Searches Address Book Flag Quiz Practical, Example-Rich Coverage of: iOS® 8, XCode® 6, SwiftTM Object-Oriented Programming with SwiftTM and Cocoa Touch® UI Design, Storyboards, Auto Layout, Outlets, Outlet Collections, Actions View Controllers, Views, View Animations Event Handling, Multi-Touch Single View, Master-Detail, Game Templates Accessibility, Internationalization Core Data Database Access User Defaults, iCloud Key—Value Storage Social Framework Sharing SpriteKit Game Programming: Animation, Graphics, Physics, Collision Detection Accelerometer and Motion Event Handling Grand Central Dispatch App Store, Pricing, Monetization and more. …”
    Libro electrónico
  7. 17087
    Publicado 2022
    “…What you will learn Get to grips with H2O AutoML and learn how to use it Explore the H2O Flow Web UI Understand how H2O AutoML trains the best models and automates hyperparameter optimization Find out how H2O Explainability helps understand model performance Explore H2O integration with scikit-learn, the Spring Framework, and Apache Storm Discover how to use H2O with Spark using H2O Sparkling Water Who this book is for This book is for engineers and data scientists who want to quickly adopt machine learning into their products without worrying about the internal intricacies of training ML models. …”
    Libro electrónico
  8. 17088
    Publicado 2022
    “…Many of the artifacts suggested in this book are inspired by The Open Group Architecture Framework (TOGAF®); however, familiarity with TOGAF® is not required. …”
    Libro electrónico
  9. 17089
    Publicado 2018
    “…This research topic therefore aims at connecting the diverse aspects of central-complex function and develop an open-source framework in which to embed current knowledge (reviews) and novel findings from biological, theoretical, and engineering perspectives (original research articles, short communications). …”
    Libro electrónico
  10. 17090
    Publicado 2005
    “…This concept of solidarity-based economy, which is theoretical as well as normative, is a framework for analysis and action, which, according to us, must make it possible to guard against the risks of failures and perverse effects mentioned throughout the book…”
    Libro electrónico
  11. 17091
    Publicado 2022
    “…The benefits that are derived from the solutions also are described in detail, which includes how the open-source AI framework portability of the IBM zSystems platform enables model development and training to be done anywhere, including on IBM zSystems, and the ability to easily integrate to deploy on IBM zSystems for optimal inferencing. …”
    Libro electrónico
  12. 17092
    Publicado 2023
    “…He is associated with "Django Ninjas"--a web framework for building APIs with Django and Python 3.6+ type hints. …”
    Video
  13. 17093
    Publicado 2023
    “…You'll experiment with fun and interesting examples such as rewriting games in Cython and implementing a MapReduce framework from scratch. Finally, you'll go deep into Python GPU computing and learn how modern hardware has rehabilitated some former antipatterns and made counterintuitive ideas the most efficient way of working. …”
    Video
  14. 17094
    Publicado 2022
    “…You'll also find the latest Spring best practices, including Spring Boot for application setup and configuration. about the technology Spring is required knowledge for Java developers! Why? This powerful framework eliminates a lot of the tedious configuration and repetitive coding tasks, making it easy to build enterprise-ready, production-quality software. …”
    Video
  15. 17095
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
    Video
  16. 17096
    Publicado 2015
    “…While psychologists, psychiatrists, and cognitive scientists have provided an important conceptual framework to define the most obvious problems of the autistic behavior—those centered at the social and cognitive issues—we gather here occupational therapists, physical therapists, movement disorders specialists, the fellows in movement science, kinesiology and computational motor control, the pediatricians, and the teachers of children with ASD to focus on important sensory-motor differences that can be used to revise our definitions of ASD and unambiguously define its subtypes. …”
    Libro electrónico
  17. 17097
    Publicado 2019
    “…Moreover, institutional-historical case studies situated within Nordic societies as a specific social structural framework, demonstrate the diversity of links between democracy and social life outside of politics in a narrow sense, such as:• Policies of citizenship as a limitation to democracy• Democracy in working life• Democracy and policies of gender relations• Expertise and democratic governance• Social elites - a threat to democracy?…”
    Libro electrónico
  18. 17098
    Publicado 2018
    “…</p><p><br></p><p>One problem is that executive dysfunction or dysexecutive syndrome (Baddeley &amp; Wilson, 1988) after brain injury typically produces a constellation of deficits across social, cognate, emotional and motivational domains that rarely map neatly onto theoretical frameworks (Barker, Andrade &amp; Romanowski, 2004). …”
    Libro electrónico
  19. 17099
    “…Based thereupon an analytical framework will be introduced which follows a multidimensional approach of research by containing aspects of the three reference systems design, subject didactics and subject discipline. …”
    Electrónico
  20. 17100
    “…Google custom-builds both hardware and software, including servers, switches, networks, data centers, the operating system’s stack, application frameworks, applications, and APIs. Have you ever imagined what you could build if you were able to tap the same infrastructure that Google uses to create and manage its products? …”
    Libro electrónico