Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Globalization 766
- History 762
- Historia 650
- Globalización 630
- Management 603
- Social aspects 514
- Taxation 473
- Law and legislation 461
- Economic aspects 430
- Economic conditions 426
- Economics 399
- Business & Economics 384
- Development 350
- Economic policy 331
- Economic development 289
- Political Science 273
- Education 250
- Finance 250
- Technological innovations 249
- Sustainable development 239
- Government policy 236
- Politics and government 230
- Political aspects 221
- Engineering & Applied Sciences 220
- Leadership 218
- Marketing 214
- International cooperation 211
- Aspectos sociales 207
- Environmental aspects 205
- Globalización económica 205
-
29121por Bevilacqua, CarmelinaTabla de Contenidos: “…5 Findings: Detecting Context Vulnerabilities and Leverage Resilience-Based Planning Processes -- 5.1 Detecting Local Context Vulnerabilities -- 5.2 For a Resilience-Based Planning Approach: Assessing Local Context Resilience Through the Rapid Resilience Review Toolkit -- 5.3 Vulnerabilities, Resilience, and On-Going Urban Development Strategies -- 6 Discussion: The Potential of the Integrated Approach to Address City's Vulnerabilities -- 7 Conclusions -- References -- Transformative Urban Regeneration: Two Paradigmatic Examples in Boston and Paris -- 1 Introduction -- 2 Literature Review -- 2.1 The Role of Cities in the Global Challenge of Climate Change -- 2.2 Sustainable Transition and Urban Resilience -- 2.3 Transformative Urban Regeneration: District-Scale Transformations for Activating Urban Transition -- 2.4 Three Pillars for Driving Urban Transition -- 3 Methodology and Case Studies Analysis -- 3.1 The Chicly-Batignolles Eco-District, Paris -- 3.2 The Talbot-Norfolk Triangle Eco-Innovation District, Boston, MA -- 4 Findings and Conclusions -- References -- New Risk Assessments Due to Climate Change in Metropolitan Peripheral Areas. …”
Publicado 2023
Libro electrónico -
29122
-
29123Publicado 2024Tabla de Contenidos: “…-- Introducing functions -- Introducing packages -- Running Go code -- Compiling Go code -- Using Go like a scripting language -- Important formatting and coding rules -- What you should know about Go -- Defining and using variables -- Constants -- Global variables -- Printing variables -- Controlling program flow -- Iterating with for loops and range -- Getting user input -- Reading from standard input -- Working with command line arguments -- Using error variables to differentiate between input types -- Understanding the Go concurrency model -- Developing the which(1) utility in Go -- Logging information -- log.Fatal() and log.Panic() -- Writing to a custom log file -- Printing line numbers in log entries -- Writing to multiple log files -- Developing a statistics application -- Summary -- Exercises -- Additional resources -- Chapter 2: Basic Go Data Types -- The error data type -- Numeric data types -- Avoiding overflows -- Non-numeric data types -- Strings, characters, and runes -- Converting int to string -- The unicode package -- The strings package -- Times and dates -- Working with different time zones -- Constants -- The constant generator iota -- Typed and untyped constants -- Grouping similar data -- Arrays -- Slices -- About slice length and capacity -- Selecting a part of a slice -- Byte slices -- Deleting an element from a slice -- How slices are connected to arrays -- Catching out of bounds errors -- The copy() function -- Sorting slices -- Pointers -- Converting a slice to an array or an array pointer -- Data types and the unsafe package -- Generating random numbers…”
Libro electrónico -
29124Publicado 2024“…Design, build, and secure scalable machine learning (ML) systems to solve real-world business problems with Python and AWS Purchase of the print or Kindle book includes a free PDF eBook Key Features Solve large-scale ML challenges in the cloud with several open-source and AWS tools and frameworks Apply risk management techniques in the ML life cycle and learn architecture patterns for solutions Understand the challenges and risks of implementing generative AI Book Description David Ping, Head of GenAI and ML Solution Architecture for global industries at AWS, provides expert insights and practical examples to help you become a proficient ML solutions architect, linking technical architecture to business-related skills. …”
Libro electrónico -
29125Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of AWS Security -- Chapter 1: Introduction to AWS Security Concepts and Shared Responsibility Model -- Cloud security overview - its importance and challenges -- The significance of cloud security -- Cloud security challenges -- AWS shared responsibility model -- Security "of" the cloud -- Security "in" the cloud -- IaaS, PaaS, SaaS - different levels of responsibility -- Shared responsibility in practice - a closer look at AWS compute -- The importance of understanding the shared responsibility model -- AWS global infrastructure and security -- Regions -- AZs -- Edge locations -- AWS security best practices - general guidelines -- Understand the shared responsibility model -- Use AWS security services and features -- Implement a strong identity and access management strategy -- Protect your data -- Ensure network security -- Integrate security into your development life cycle -- Monitor and audit your environment -- Continuously improve your security posture -- Summary -- Questions -- Answers -- Further reading -- Chapter 2: Infrastructure Security - Keeping Your VPC secure -- Designing secure VPCs -- Understanding VPCs and their importance -- Key components of a VPC -- Best practices for designing secure VPCs -- Implementing security groups, NACLs, and AWS Network Firewall -- Overview -- Using security groups -- Using NACLs -- Using AWS Network Firewall -- Configuring AWS Shield and AWS WAF for advanced protection -- Enabling AWS Shield for DDoS protection -- Configuring AWS WAF for web application protection -- Summary -- Questions -- Answers -- Further reading -- Chapter 3: Identity and Access Management - Securing Users, Roles, and Policies -- Access control models -- Access control models overview -- Understanding RBAC…”
Libro electrónico -
29126
-
29127
-
29128
-
29129
-
29130
-
29131Publicado 2023Tabla de Contenidos: “…Embedding virtual elements seamlessly within environments -- Strategically orchestrating engagement through sensory cues -- Designing a multi-dimensional spatial experience -- Addressing user comfort and ethical considerations -- VR versus AR UX comparison -- UI design -- VR versus AR UI comparison -- Business growth through VR and AR UX/UI design -- VR UX business benefit -- VR UI business benefit -- VR UI's contribution to sustainability and social responsibility -- AR UX business benefit -- Operational efficiency gains through AR UX -- AR UI business benefit -- AR UI's impact on global appeal and brand consistency -- AR UI's role in pioneering new market opportunities -- Summary -- Part 3: Consumer and Enterprise Use Cases -- Chapter 10: New Ways of Social Interaction -- Friends and Family Metaverse -- Use case 1 - virtual family reunions -- Use case 2 - augmented reality playdates -- Use case 3 - senior engagement and companionship -- Use case 4 - long-distance romantic relationships -- Use case 5 - multiplayer VR and AR gaming -- Negative implications of the Friends and Family Metaverse -- Personalized Metaverse -- Use case 1 - personalized virtual culinary experiences -- Use case 2 - holistic mental health support -- Use case 3 - specialized education and training -- Use case 4 - adaptive eCommerce platforms -- Use case 5 - ultimate fantasy fulfillment -- Negative implications of the Personalized Metaverse -- Exploration Metaverse -- Use case 1 - serendipitous social encounters across virtual and physical realities -- Use case 2 - randomized life simulations -- Use case 3 - Temporal Tourism -- Use case 4 - Pocket Universes -- Use case 5 - dynamic marketplaces -- Negative implications of the Exploration Metaverse -- Best business practices -- Data governance and ethics -- User experience and engagement -- Business models and monetization…”
Libro electrónico -
29132Publicado 2024Tabla de Contenidos: “…Changing the website's logo -- Adding web file images -- Incorporating advanced CSS techniques -- Summary -- Chapter 4: Dataverse Tables and Forms -- Planning your development -- Developing the user story -- Planning the data model -- Planning out the Dataverse forms -- Planning out the web roles -- Planning table permissions configuration -- Planning your implementation in the recommended order -- Practical example - developing the data model -- Creating tables in Dataverse -- Creating table relationships in Dataverse -- Creating table columns -- Views -- Designing Dataverse forms -- Insert forms -- Edit forms -- Timeline control -- Summary -- Chapter 5: Table Permissions and Security -- User story - table permissions for access to Dataverse -- Self-access permissions -- Global access permissions -- Contact access permissions -- Account access permissions -- Child access permissions -- The architecture of table permissions -- Practical applications and benefits -- Privileges and relationships in Dataverse architecture -- Implementation of table permissions in Power Pages -- Summary -- Chapter 6: Basic Forms, Lists, and Web Pages -- Technical requirements -- Integration of Dataverse tables with Power Pages forms, lists, and web pages -- Basic forms -- Creating an insert form and web page -- The Incident insert basic form -- The Incident insert web page -- Power Pages Management web page configuration -- Website sync - testing your work -- Creating an edit form and web page -- The Incident edit basic form -- Basic form options -- Additional settings - Allowing attachments -- Configuring action buttons -- Configuring Basic Form Metadata options -- The Incident edit web page -- On Success Settings tab of the Incident insert form -- Creating an incident read-only page -- Creating a list page -- Configuring action buttons -- List Search -- Summary…”
Libro electrónico -
29133
-
29134por Büchner, AlexTabla de Contenidos: “…Understanding Moodle performance ; Optimizing Moodle feature performance ; Optimizing Moodle functions ; Optimizing Moodle activities ; Moodle Universal Cache (MUC) ; Understanding MUC ; Configuring and testing MUC ; Optimizing Moodle system performance ; Handling sessions ; Managing cron and scheduled tasks ; Configuring global search ; Setting system paths ; Moodle performance profiling and monitoring ; Performance info ; Tideways profiling ; JMeter support ; Summary -- 16: Avoiding Sleepless Nights - Moodle Backup and Restore. …”
Publicado 2022
Libro electrónico -
29135Publicado 2018Tabla de Contenidos: “…Cuadro: Una ojeada a las estructuras globales de capital…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29136por Brea, Julio CésarTabla de Contenidos: “…EVOLUCIÓN DE LA RADIO EN EL CONTEXTO (...) -- 3. CAMBIOS GLOBALES EN EL MODELO RADIOFÓNICO -- 4. LOS PUNTOS FUERTES DE LA RADIO -- II. …”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29137por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Modalités de mise en œuvre et partenariats -- Les partenariats -- Le soutien apporté par le Canada aux pays est globalement réactif et inclusif…”
Publicado 2018
Libro electrónico -
29138por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Le recours aux cadres relatifs aux droits de l'homme dans le contexte de l'IA offre des avantages -- Une approche de l'IA basée sur les droits de l'homme peut aider à identifier les risques, les priorités, les groupes vulnérables et à proposer des solutions -- La protection des données personnelles -- L'IA défie les notions de « données personnelles » et de consentement -- L'IA défie également les principes de protection des données personnelles concernant la limitation en matière de collecte, la limitation de l'utilisation et la spécification des finalités -- L'IA peut aussi renforcer la participation et le consentement des individus -- Équité et éthique -- Les algorithmes d'apprentissage automatique peuvent refléter les biais implicites de leurs données d'entraînement -- Les notions philosophiques, juridiques et informatiques de l'équité et d'une IA éthique varient -- L'application de l'IA aux ressources humaines donne une illustration des biais qu'elle peut introduire et des problèmes qui en résultent -- Plusieurs approches peuvent aider à réduire la discrimination dans les systèmes d'IA -- Les efforts visant à atteindre l'équité dans les systèmes d'IA peuvent nécessiter des compromis -- Les responsables politiques pourraient réfléchir à un traitement approprié des données sensibles dans le contexte de l'IA -- Transparence et explicabilité -- La transparence sur l'utilisation de l'IA et le fonctionnement des systèmes d'IA est essentielle -- Les approches de la transparence dans les systèmes d'IA -- Certains systèmes offrent des garanties théoriques sur leurs contraintes d'exploitation -- Des preuves statistiques de la performance globale peuvent être fournies dans certains cas -- La transparence de l'optimisation est la transparence des objectifs et des résultats d'un système -- L'explication concerne un résultat précis d'un système d'IA…”
Publicado 2020
Libro electrónico -
29139Publicado 2013Tabla de Contenidos: “…Crecimiento anual de la producción agrícola global -- ¿Cuáles son las restricciones de tierra y agua para la agricultura? …”
Libro electrónico -
29140por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Rapport de dépendance économique global et de la population âgée…”
Publicado 2000
Libro electrónico