Mostrando 28,641 - 28,660 Resultados de 32,886 Para Buscar '"global"', tiempo de consulta: 0.15s Limitar resultados
  1. 28641
    Publicado 2025
    Tabla de Contenidos: “…-- Curious Five -- Chapter 17 Data Privacy and Regulation -- Data Privacy as a Human Right -- Regulating Data Privacy -- Ethical Data Use -- A Global Change -- Curious Five -- Part V Curious About ... …”
    Libro electrónico
  2. 28642
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive summary -- Central Asia has proven relatively resilient to recent shocks -- This report assesses progress made in improving the legal environment for business and investment -- Implementation gaps and interpretation issues remain problematic -- Addressing the gaps highlighted in the report can help the region adapt to unprecedented environmental, social, and economic challenges -- 1 Setting the scene -- The region has not been spared the consecutive economic shocks resulting from the COVID-19 pandemic and the effects of Russia's war in Ukraine -- The economic effects of the pandemic exacerbated fundamental structural weaknesses across the countries of Central Asia -- The region has withstood the effects of Russia's war in Ukraine so far, but long-term risks to growth remain -- The OECD first assessed the legal environment for business and investment in Central Asia in 2020 -- In 2020, the OECD offered targeted advice to Central Asian governments on improving the legal environment for business -- The original report identified significant gaps between de jure protections and the de facto operational environment for firms -- The OECD assessed progress made and new challenges arising in the legal environment for business in Central Asia since 2020 -- The report finds improvements in the operational environment for business driven by digitalisation, a streamlining of procedures, and adaptation to economic shocks -- Efforts to streamline the operational environment have eased the administrative burden on firms -- Governments swiftly reacted in the face of a challenging global economic context -- However, deeper reforms are taking time to materialise -- Weak implementation remains a key challenge for firms across the region…”
    Libro electrónico
  3. 28643
    por Sacristan Romero, Francisco
    Publicado 2005
    Tabla de Contenidos: “…Cobertura Europea; 3.10.2.3. Cobertura América Global ; Capitulo 4: Servicios y aplicaciones; 4.1.- Servicio fijo de HISPASAT ; 4.1.1. …”
    Libro electrónico
  4. 28644
    Publicado 2019
    Tabla de Contenidos: “…-- Onboarding and relationship selling in the new world -- There are no demographics in Kansas anymore, Toto -- Endnotes -- Feature: Future Vision: Your Personal Voice-Based AI Banker by Brian Roemmele -- Chapter 5: DLT, Blockchain, Alt-Currencies and Distributed Ecosystems -- Emerging digital currencies -- Bitcoin and cryptocurrencies on a surge -- Understanding Bitcoin's rise -- Is this a global capital markets evolution? -- The whole "Bitcoin is a fraud" argument -- The structural implications of DLT -- Why your core system has a shelf-life -- Endnotes -- PART THREE: Why FinTech companies are proving banks aren't necessary -- Chapter 6: FinTech and TechFin: Friend or Foe? …”
    Libro electrónico
  5. 28645
    Publicado 2018
    Tabla de Contenidos: “…The DRY principle with decorators -- Decorators and separation of concerns -- Analyzing good decorators -- Summary -- References -- Chapter 6: Getting More Out of Our Objects with Descriptors -- A first look at descriptors -- The machinery behind descriptors -- Exploring each method of the descriptor protocol -- __get__(self, instance, owner) -- __set__(self, instance, value) -- __delete__(self, instance) -- __set_name__(self, owner, name) -- Types of descriptors -- Non-data descriptors -- Data descriptors -- Descriptors in action -- An application of descriptors -- A first attempt without using descriptors -- The idiomatic implementation -- Different forms of implementing descriptors -- The issue of global shared state -- Accessing the dictionary of the object -- Using weak references -- More considerations about descriptors -- Reusing code -- Avoiding class decorators -- Analysis of descriptors -- How Python uses descriptors internally -- Functions and methods -- Built-in decorators for methods -- Slots -- Implementing descriptors in decorators -- Summary -- References -- Chapter 7: Using Generators -- Technical requirements -- Creating generators -- A first look at generators -- Generator expressions -- Iterating idiomatically -- Idioms for iteration -- The next() function -- Using a generator -- Itertools -- Simplifying code through iterators -- Repeated iterations -- Nested loops -- The iterator pattern in Python -- The interface for iteration -- Sequence objects as iterables -- Coroutines -- The methods of the generator interface -- close() -- throw(ex_type[, ex_value[, ex_traceback]]) -- send(value) -- More advanced coroutines -- Returning values in coroutines -- Delegating into smaller coroutines - the yield from syntax -- The simplest use of yield from -- Capturing the value returned by a sub-generator…”
    Libro electrónico
  6. 28646
    Publicado 2017
    “…'The Change Catalyst is the most accessible, entertaining and insightful book on the subject I have read in many a year.' — David Pitman, Global Partner, Boston Consulting Group 88% of change initiatives fail. …”
    Libro electrónico
  7. 28647
    Publicado 2015
    “…Authors Danner and Coopersmith - with their rare blend of senior-level executive experience, global advising, teac…”
    Libro electrónico
  8. 28648
    Publicado 2023
    “…Utilization of waste materials has become a global challenge since they endanger our environment. …”
    Libro electrónico
  9. 28649
    por Agarwal, Dhairyya
    Publicado 2024
    Tabla de Contenidos: “…Understand and Address Privacy Concerns -- Discuss the Potential Misuse in Sectors Like Financial Systems or Defense -- Encourage Open Dialogue Between Technologists, Policymakers, and the Public -- Evaluating the Impact of Quantum Computing on the Workforce -- Developing Training Programs in Quantum Skills -- Rethinking University Curriculum -- Bridging the Gap between Academia and Industry -- Encouraging Cross-Disciplinary Approaches -- Addressing Regulatory and Compliance Issues -- Lobbying for Favorable Policies -- Collaborating with Legal Experts to Understand the Landscape -- Staying Updated on Global Quantum Policies -- Designing Products Keeping Future Regulations in Mind -- Implementing Effective Cybersecurity Measures -- Researching Quantum-Resistant Cryptography -- Collaborating with Cybersecurity Experts -- Educating Clients on the Potential Risks and Solutions -- Establishing Best Practices for Productizing Quantum Computing -- Draft Standards and Guidelines in Collaboration with Experts -- Open-Source Some Tools to Allow Community Validation -- Continuously Update Practices as Technology Evolves -- Case Studies in Productizing Quantum Computing -- IBM's Quantum Endeavors -- Google's Supremacy Claim -- Rigetti Computing -- Microsoft Quantum -- Lessons Learned for Quantum Product Managers -- Lessons Learned and Future Directions -- The Transition from Theory to Practice -- Amount of Evolution -- Lessons from Difficulties -- Upcoming Directions -- Summary -- Index…”
    Libro electrónico
  10. 28650
    por Kavita, Singh
    Publicado 1900
    Tabla de Contenidos: “…Cover -- Organizational Behaviour -- Copyright -- About the Author -- Brief contents -- Contents -- Preface -- Reviewers -- Managing Organizational Behaviour -- Introduction -- Organizational Behaviour: Past and Present -- The Pre-scientific Era (Pre-1000-1880) -- The Classical Era (1880-1930) -- The Behavioural Era (1930-1960) -- The Modern Era (1960 Onwards) -- Emerging Issues in Organization -- Globalization: Uniting the World -- Trend Towards Diversity: Managing Employeesfrom Different Backgrounds -- Diversity in India -- Corporate Social Responsibility: DevelopingEthical Organizations -- What Can Be Done to Promote Ethical Behaviourin an Organization -- Trends in Working Arrangements: a Newer Way toStructure Your Organizations and Jobs -- Managing Through Knowledge: Developmentof Learning Organizations -- Dynamics of Organizational Life -- Developing Skills -- Managerial Roles -- Organizational Behaviour: a Framework -- Environmental Forces -- Individual Processes -- Interpersonal and Team Processes -- Organizational Processes -- Change Processes -- Common Mistakes Committed by Managers -- Summary -- Personality -- Introduction -- Is Personality Real? …”
    Libro electrónico
  11. 28651
    por Metzger, Robert C.
    Publicado 2004
    Tabla de Contenidos: “…Debugging Tactics; 9.1 Preview; 9.2 Read the source code; 9.3 Write a unit test; 9.4 Display variable values; 9.5 Display execution messages; 9.6 Display procedure arguments; 9.7 Generate a flow trace; 9.8 Generate a variable snapshot; 9.9 Generate memory dump; 9.10 Force variable value; 9.11 Assert assumptions; 9.12 Check data structures; 9.13 Display data structures; 9.14 Use runtime subscript checking; 9.15 Use runtime stack checking; 9.16 Use runtime heap checking; 9.17 Initialize global variables…”
    Libro electrónico
  12. 28652
    por Menke, William
    Publicado 2012
    “…One only has to consider the global warming debate to realize how critically important it is to be able to derive clear conclusions from often-noisy data drawn from a broad range of sources. …”
    Libro electrónico
  13. 28653
    Publicado 2014
    Tabla de Contenidos: “…-- Extending an Extension Point -- Examining the Sample Extension -- Modifying the Sample Extension -- Extension UI Configuration -- Configuration File Conventions -- Configuration UI Rendering -- Interaction Between UI and Model -- UI Validation -- Global UI Configuration -- Summary -- Part III: The Hudson Lifestyle -- Chapter 9: Advanced Plugin Development -- Extending Various Aspects of Hudson Dashboards -- Creating a Custom Rendered Jobs Status View -- Using the Custom Rendered View -- Adding a Custom Column to the Default View -- Adding an Action to the Action Panel of the Main Dashboard -- Custom Decoration of Hudson Pages -- Extending Various Aspects of a Hudson Job -- Adding a Custom Notifier to a Job -- Adding a Custom Link to a Job Dashboard -- Creating a Custom Build Wrapper -- Summary -- Chapter 10: Hudson Best Practices -- Manage the Hudson Resources Effectively -- Tune Memory -- Restrict Job History Depth -- Monitor the Disk Space -- Put Your Hudson Behind a Web Proxy -- Do Not Use Your Hudson as a File Server -- Periodically Back Up Your Hudson Contents -- Set Up a Fail-Safe Mode for Your Hudson -- Redundant Hudson Server Setup -- Monitoring Hudson Setup -- Server Switch on Failure -- Redirecting HTTP Traffic to a Redundant Server -- Scale Up the Security of Your Hudson -- Restrict Job Access to Certain Users -- Add Roles to the Authorization Matrix -- Upgrade Your Hudson Diligently -- Understand the Hudson Versioning Scheme -- Upgrade in a Sandbox First -- Summary -- Part IV: Appendixes -- Appendix A: Widely Used Hudson Plugins -- Appendix B: Personal Hudson Instance -- Hudson-as-Valet -- Optimal Hudson-as-Valet Setup -- Hudson for Work Area Maintenance -- The Open-Source Liaison Role -- The Committer Role -- Hudson as General-Purpose Scheduler…”
    Libro electrónico
  14. 28654
    Publicado 2013
    Tabla de Contenidos: “…Service Layer with ASP.NET Web API -- Creating a Web API service -- Hosting using IIS -- Routing -- Customizing the Web API routing -- Parameter binding -- Model binding -- Formatters -- Building a service for the Movie Tickets application -- Adding a controller -- Content Negotiation -- The Advanced Rest Client Chrome extension -- The Accept header -- The Content-type header -- The Accept-charset header -- An Image/PDF file as response -- Securing Web API -- Authentication -- Basic authentication -- Authentication using message handlers -- Implementing authentication -- Authentication in action -- Authorization -- Using AuthorizeAttribute -- Global level -- Controller level -- Action level -- [AllowAnonymous] attribute -- Role and user checks -- Custom authorization attribute -- Summary -- 4. …”
    Libro electrónico
  15. 28655
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
    Libro electrónico
  16. 28656
    Publicado 2011
    “…Extreme Money is about: The new financial fundamentalism: false gods, false prophets - Faith in money, faith in risk, faith in shadows The cult of risk and the growth engine that isn’t - How financial engineering replaced real engineering and illusions replaced reality Financial alchemy and the “Doomsday Debt Machine”- The rise of the global financial machine we cannot escape The new global oligarchy—and the nihilistic games they pla y - Too smart, too fast, too greedy, too self-absorbed—and far too dangerous…”
    Libro electrónico
  17. 28657
    Publicado 2014
    “…CentOS is self-sufficient and fast while working, with the added benefit of global acceptance as a large number of the world's web servers run on it. …”
    Libro electrónico
  18. 28658
    por Robin, Jennifer, 1974-
    Publicado 2013
    “…Includes case studies, stories, tips, and tools for managers who want to transform their organizations From the experts at the Great Place to Work(r), a global research, consulting, and training firm that operates in nearly 50 countries Proves that any and every organization can change for the better when managers have the right tools and mindset Creating a place where people want to work and want to succeed is the primary key to success for every manager. …”
    Libro electrónico
  19. 28659
    Publicado 2013
    Libro electrónico
  20. 28660
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xi -- 1 Evolution from 2G over 3G to 4G 1 -- 1.1 First Half of the 1990s - Voice-Centric Communication 1 -- 1.2 Between 1995 and 2000: The Rise of Mobility and the Internet 1 -- 1.3 Between 2000 and 2005: Dot Com Burst, Web 2.0, Mobile Internet 2 -- 1.4 Between 2005 and 2010: Global Coverage, Fixed Line VoIP, and Mobile Broadband 4 -- 1.5 2010 and Beyond 5 -- 1.6 All over IP in Mobile - The Biggest Challenge 6 -- 1.7 Summary 6 -- 2 Beyond 3G Network Architectures 9 -- 2.1 Overview 9 -- 2.2 UMTS, HSPA, and HSPA+ 10 -- 2.3 LTE 43 -- 2.4 802.11 Wi-Fi 74 -- 3 Network Capacity and Usage Scenarios 95 -- 3.1 Usage in Developed Markets and Emerging Economies 95 -- 3.2 How to Control Mobile Usage 96 -- 3.3 Measuring Mobile Usage from a Financial Point of View 99 -- 3.4 Cell Capacity in Downlink 100 -- 3.5 Current and Future Frequency Bands for Cellular Wireless 105 -- 3.6 Cell Capacity in Uplink 106 -- 3.7 Per-User Throughput in Downlink 109 -- 3.8 Per-User Throughput in Uplink 114 -- 3.9 Traffic Estimation Per User 116 -- 3.10 Overall Wireless Network Capacity 117 -- 3.11 Network Capacity for Train Routes, Highways, and Remote Areas 124 -- 3.12 When will GSM be Switched Off? …”
    Libro electrónico