Mostrando 29,221 - 29,240 Resultados de 32,878 Para Buscar '"global"', tiempo de consulta: 0.16s Limitar resultados
  1. 29221
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Foreword -- Table of contents -- Acronyms and abbreviations -- Executive summary -- 1 Assessment and Recommendations -- Stocktaking of Ukraine's policy framework for investment in the energy sector -- Policy framework for investment -- The protection of investment in Ukraine -- Energy infrastructure in Ukraine -- Investment promotion and facilitation -- Public governance in Ukraine's energy sector -- RBC in Ukraine's energy sector -- 2 Stocktaking of Ukraine's Policy Framework for Investment in the Energy Sector -- Introduction -- Energy Profile of Ukraine -- Investment in Ukraine's energy sector takes an important place in the country's FDI -- Energy production and consumption -- Regulatory analysis of Ukraine's energy subsectors -- Upstream Oil and Gas sector -- Natural Gas Market -- Coal Extraction -- Electricity Generation and Transmission -- Wholesale Electricity Market -- Energy Pricing -- Crude Oil and Gas Condensate -- Natural gas -- Electricity -- Heat -- The government's energy strategy and future energy investment requirements -- Key trends for investors in Ukraine ́s energy sector -- Direct private participation in Ukraine ́s energy sector -- Public procurement, auctions and privatisation in the energy sector -- Increased public-private synergies in oil and gas exploration and production -- Fragmented land reforms to advance energy projects -- Securing sustainable energy investments in a challenging global reality -- Investing in the energy sector and the COVID-19 crisis -- Renewable energy potential and opportunities in Ukraine -- Amendments to the regulatory framework for renewable energy -- International co-operation to advance energy projects -- Support to advance energy reforms and the integration of Ukraine into the EU energy system -- Support to advance private investments in the energy sector…”
    Libro electrónico
  2. 29222
    Tabla de Contenidos: “…-- Graphique 4.3. Émissions globales de polluants atmosphériques organiques... -- Graphique 4.4. …”
    Libro electrónico
  3. 29223
    Publicado 2016
    Tabla de Contenidos: “…Infinite loop -- The traditional for statement -- The for range -- The break, continue, and goto statements -- The label identifier -- The break statement -- The continue statement -- The goto statement -- Summary -- Chapter 4: Data Types -- Go types -- Numeric types -- Unsigned integer types -- Signed integer types -- Floating point types -- Complex number types -- Numeric literals -- Boolean type -- Rune and string types -- The rune -- The string -- Interpreted and raw string literals -- Pointers -- The pointer type -- The address operator -- The new() function -- Pointer indirection - accessing referenced values -- Type declaration -- Type conversion -- Summary -- Chapter 5: Functions in Go -- Go functions -- Function declaration -- The function type -- Variadic parameters -- Function result parameters -- Named result parameters -- Passing parameter values -- Achieving pass-by-reference -- Anonymous Functions and Closures -- Invoking anonymous function literals -- Closures -- Higher-order functions -- Error signaling and handling -- Signaling errors -- Error handling -- The error type -- Deferring function calls -- Using defer -- Function panic and recovery -- Function panic -- Function panic recovery -- Summary -- Chapter 6: Go Packages and Programs -- The Go package -- Understanding the Go package -- The workspace -- Creating a workspace -- The import path -- Creating packages -- Declaring the package -- Multi-File packages -- Naming packages -- Use globally unique namespaces -- Add context to path -- Use short names -- Building packages -- Installing a package -- Package visibility -- Package member visibility -- Importing package -- Specifying package identifiers -- The dot identifier -- The blank identifier -- Package initialization -- Creating programs -- Accessing program arguments -- Building and installing programs -- Remote packages…”
    Libro electrónico
  4. 29224
    Publicado 2016
    Tabla de Contenidos: “…. -- Summary -- Chapter 2: Understanding How Data is Stored within Visio -- A very quick introduction to data in Visio -- Defining Shape Data -- Understanding the Visio object model -- Starting with the Application object -- Understanding the relationship of the Master shape and its shape instances -- Knowing how a shape can be identified -- How to use a globally unique identifier -- The danger of using the Index property -- Reviewing shape text -- Understanding the DataRecordsets collection -- Understanding the Validation objects -- Getting shapes selected in the UI -- Understanding shape sections, rows, and cells -- Getting to grips with the ShapeSheet -- Understanding the Shape Data section -- Specifying the type of Shape Data -- Listing Shape Data rows in code -- Auto-generating hyperlinks from data -- Using the Off-page reference shape to jump around a document…”
    Libro electrónico
  5. 29225
    por Montagnino, Marian, author
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Preface -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Part 1: Getting Started with a Solid Foundation -- Chapter 1: Understanding CLI Standards -- A brief introduction and history of the command line -- About the history -- Introducing the CLI -- The philosophy of CLI development -- Checklist for a successful CLI -- The guidelines -- Name -- Help and documentation -- Input -- Output -- Configuration -- Security -- Open source community -- Software lifespan and robustness -- Go for CLIs -- Summary -- Questions -- Answers -- Further reading -- Chapter 2: Structuring Go Code for CLI Applications -- Technical requirements -- Commonly used program layouts for robust applications -- Program layouts -- Common folders -- Determining use cases and requirements -- Use cases -- Requirements -- Disadvantages and benefits of use cases and requirements -- Use cases, diagrams, and requirements for a CLI -- Requirements for a metadata CLI -- Structuring an audio metadata CLI application -- Bounded context -- Language -- Entities and value objects -- Aggregation -- Service -- Events -- Repository -- Creating the structure -- Summary -- Questions -- Answers -- Further reading -- Chapter 3: Building an Audio Metadata CLI -- Technical requirements -- Defining the components -- cmd/ -- cmd/api/ -- cmd/cli/ -- cmd/cli/command -- extractors/ -- extractors/tags -- extractors/transcript -- internal/interfaces -- models/ -- services/metadata -- storage/ -- vendor/ -- Implementing use cases -- Uploading audio -- Requesting metadata -- Testing a CLI -- Manual testing -- Testing and mocking -- Summary -- Questions -- Answers -- Chapter 4: Popular Frameworks for Building CLIs -- Technical requirements -- Cobra - a library for building modern CLI applications -- Creating subcommands -- Global, local, and required flags…”
    Libro electrónico
  6. 29226
    Publicado 2017
    Tabla de Contenidos: “…-- Common security threats in RESTful web services -- Use of HTTPS -- Securing an API key/token -- Not passing an access token in the URL -- Access token expiration -- Limited scope access token -- Public and private endpoints -- Public API endpoints -- Insecure direct object reference -- Restricting allowable verbs -- Input validation -- Available reusable code -- Summary -- Chapter 5: Load and Resolve with Composer, an Evolutionary -- Introduction to Composer -- Installation -- Installation on Windows -- Installation on Linux/Unix/OS X -- Global Installation -- Usage of Composer -- Composer as a dependency manager -- Installing packages -- Installing using composer.json -- The composer.json in detail -- The require object -- The require-dev object -- The autoload and autoload-dev -- The scripts -- The composer.lock -- Composer as an auto-loader -- Example -- Composer for creating a project -- Example -- Summary…”
    Libro electrónico
  7. 29227
    Publicado 2022
    Tabla de Contenidos: “…La promoció de la Immaculada com a patrona de Barcelona durant la primera meitat del segle xvii / Ramon Dilla Martí -- Aclariment d’algunes dades personals i del parentiu de diversos artistes de la nissaga Planella / Victoria Durà Ojea -- Contes il•lustrats per l’autora / Lluïsa Esteve Boada -- La meva coneixença amb Imma Socias / Francesc Fontbona -- Les pintures de Mont Repòs de Torres García, una nova interpretació / Mireia Freixa -- Norman Rockwell avui: Saying grace o la revalorització de l’storytelling / Toni Galmés -- Bestiari romànic a Catalunya / Montse García i Robert Carbó -- Els museus en el pas de la modernitat a l’era del global / Anna Maria Guasch -- Fundación, arquitectura e historia del real monasterio de Santa María de Poblet hasta su abandono en 1835 / Xavier Guinovart i Pujals -- L’Institut de Batxillerat Eugeni d’Ors de Badalona / Encarnació Hidalgo Villarroya -- Numismatic interludes among the first coins in Catalunya: Professor Dr. …”
    Libro
  8. 29228
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 2 Existing Approaches-Traditional Vendor Risk Management -- Assessments -- SDL Assessments -- Application Security Maturity Models -- Governance -- Design -- Implementation -- Verification -- Operations -- Application Security Assurance -- Static Application Security Testing -- Dynamic Application Security Testing -- Interactive Application Security Testing -- Mobile Application Security Testing -- Software Composition Analysis -- Hashing and Code Signing -- Summary -- Chapter 3 Vulnerability Databases and Scoring Methodologies -- Common Vulnerabilities and Exposures -- National Vulnerability Database -- Software Identity Formats -- CPE -- Software Identification Tagging -- PURL -- Sonatype OSS Index -- Open Source Vulnerability Database -- Global Security Database -- Common Vulnerability Scoring System -- Base Metrics -- Temporal Metrics -- Environmental Metrics -- CVSS Rating Scale -- Critiques -- Exploit Prediction Scoring System -- EPSS Model -- EPSS Critiques -- CISA's Take -- Common Security Advisory Framework -- Vulnerability Exploitability eXchange -- Stakeholder-Specific Vulnerability Categorization and Known Exploited Vulnerabilities -- Moving Forward -- Summary -- Chapter 4 Rise of Software Bill of Materials…”
    Libro electrónico
  9. 29229
    Publicado 2020
    Tabla de Contenidos: “…-- Mögliche Lösungen -- Globale versus lokale Optimierung -- Wie kann sich dieses Problem zeigen? …”
    Libro electrónico
  10. 29230
    por Sundberg, Niklas
    Publicado 2022
    Tabla de Contenidos: “…Choosing a sustainable cloud service provider -- Microsoft Azure -- Google Cloud -- Amazon Web Services -- Alibaba Cloud -- Oracle -- Tencent Cloud -- IBM -- Cloud vendor report cards -- The power of alliances -- Summary -- Further reading -- Bibliography -- Chapter 5: Application and Data -- The world runs on software -- Transforming Enterprise Architecture to help achieve sustainability targets -- Turning a sustainability strategy into action with Enterprise Architecture -- Transforming business architecture with the UN's SDGs -- Optimizing application and data architectures in the cloud using best practice frameworks -- A pragmatic Enterprise Architecture framework for sustainability tracking -- Application portfolio management -- Application rationalization process -- Application assessment criteria -- TIME analysis -- Sustainable software development -- Choosing energy-efficient programming languages -- Sustainable SDLC -- Measuring your CO2 spend in the cloud -- Summary -- Further reading -- Bibliography -- Chapter 6: IT Hardware Management -- Understanding the impact of IT hardware equipment -- Product design and manufacturing -- Product lifetime expansion -- Energy consumption -- Finite resources and hazardous substances -- End-of-life management -- Circular IT hardware management -- Social responsibility - a key unlocking circular transition -- Making a business case for change -- ITAD - the rise of a new circular industry -- Services -- Global footprint and service availability -- Process -- Data sanitization -- Why and how does ITAD fit with the Electrolux sustainability strategy? …”
    Libro electrónico
  11. 29231
    Publicado 2021
    Tabla de Contenidos: “…-- Neoliberalism and the Unfolding Patterns of Young People's Political Engagement and Political Participation in Contemporary Britain -- Towards a Conceptualization of Young People's Political Engagement: A Qualitative Focus Group Study -- Young People Engaging in Volunteering: Questioning a Generational Trend in an Individualized Society -- Political Consumerism as a Neoliberal Response to Youth Political Disengagement -- Still Troubled: Tunisia's Youth During and Since the Revolution of 2011 -- A Global Generation? Youth Studies in a Postcolonial World.Application of AI methods for the integration of structural engineering knowledge in early planning phases -- Analysis of the early-design timber models for sound insulation analysis -- Framework proposal for automated generation of production layout scenarios: A parametric design technique to connect production planning and structural industrial building design -- Component-based machine learning for predicting representative time-series of energy performance in building design -- A hybrid-model time-series forecasting approach for reducing the building energy performance gap -- Deep learning approach for predicting pedestrian dynamics for transportation hubs in early design phases -- Implementing Information Container for linked Document Delivery (ICDD) as a micro-service -- An explanatory use case for the implementation of Information Container for linked Document Delivery in Common Data Environments -- Automatic generation of ISO 19650 compliant templates based on standard construction contracts -- Graph-based version control for asynchronous BIM level 3 collaboration -- Image-documentation of existing buildings using a server-based BIM Collaboration Format workflow -- Unlocking the full potential of Building Information Modelling by applying the principles of Industry 4.0 and Data Governance such as COBIT -- Data Quality in Building Productivity Assessment -- the Case of Acute Care Environments -- An Approach for Cross-Data Querying and Spatial Reasoning of Tunnel Alignments -- Ontological reasoning in factory-BIM: An industrial case study for an automotive OEM -- IFCNet: A Benchmark Dataset for IFC Entity Classification -- IFC based Framework for Generating, Modeling and Visualizing Spalling Defect Geometries -- Automatic generation of IFC models from point cloud data of transport infrastructure environments -- A Proposed Ontology for Knowledge Representation in Designing Indoor Inspection Robot Systems -- Bidirectional coupling of Building Information Modeling and Building Simulation using ontologies -- Building Ontology for Preventive Fire Safety -- A Framework for Intelligent Building Information Spoken Dialogue System (iBISDS) -- A Design Recommender System: A Rules-based Approach to Exploit Natural Language Imprecision using Belief and Fuzzy Theories -- Towards the Adoption of Vision Intelligence for Construction Safety: Grounded Theory Methodology based Safety Regulations Analysis -- Concept to support the estimation of static load capacity on construction site using in-situ AR-based methods -- Using eye-tracking to compare the experienced safety supervisors and novice in identifying job site hazards under a VR environment -- Virtual Reality Platform for 3D Irregular Packing Problem -- Reference Architectural Model of Buildings for Virtual City Creator -- Data shortage for urban energy simulations? …”
    Libro electrónico
  12. 29232
    Publicado 2014
    Tabla de Contenidos: “…Il passato dentro l'archivio di Foucault: decifrare la griglia -- 1.4.1 Il 'viaggio' di Parole e Cose fuori dalla Francia: la «decodifica» di Hayden White -- 1.4.2 Pre-figurare la storia e «the fashioning of the common humanity of the future» -- 1.5 L'«energia sociale» e la letteratura nella storia -- 1.5.1 Neostoricismo e materialismo culturale: alcune questioni aperte -- 1.6 Dal sexual character alla critica posizionata: verso le letture femministe -- 1.6.1 Il tratto sessuato della differenza, tra gender e post-gender -- 1.6.2 Corpo, Foucault, attualità, femminismo: un processo globale di de-generizzazione? -- PARTE SECONDA IL 'GENERE' LETTERARIO DELLA BIOFICTION -- 2.0 I personaggi-intertesti delle historiographic metafictions: metanarratività, parodia e ironia nell'indifferenziato canone storico e letterario. …”
    Libro electrónico
  13. 29233
    Publicado 2024
    Tabla de Contenidos: “…Shrinking lists - deleting, removing, and popping -- Writing list-related type hints -- Reversing a copy of a list -- Building sets - literals, adding, comprehensions, and operators -- Shrinking sets - remove(), pop(), and difference -- Writing set-related type hints -- Chapter 5: Built-In Data Structures Part 2: Dictionaries -- Creating dictionaries - inserting and updating -- Shrinking dictionaries - the pop() method and the del statement -- Writing dictionary-related type hints -- Understanding variables, references, and assignment -- Making shallow and deep copies of objects -- Avoiding mutable default values for function parameters -- Chapter 6: User Inputs and Outputs -- Using the features of the print() function -- Using input() and getpass() for user input -- Debugging with f"{value=}" strings -- Using argparse to get command-line input -- Using invoke to get command-line input -- Using cmd to create command-line applications -- Using the OS environment settings -- Chapter 7: Basics of Classes and Objects -- Using a class to encapsulate data and processing -- Essential type hints for class definitions -- Designing classes with lots of processing -- Using typing.NamedTuple for immutable objects -- Using dataclasses for mutable objects -- Using frozen dataclasses for immutable objects -- Optimizing small objects with __slots__ -- Using more sophisticated collections -- Extending a built-in collection - a list that does statistics -- Using properties for lazy attributes -- Creating contexts and context managers -- Managing multiple contexts with multiple resources -- Chapter 8: More Advanced Class Design -- Choosing between inheritance and composition - the "is-a" question -- Separating concerns via multiple inheritance -- Leveraging Python's duck typing -- Managing global and singleton objects -- Using more complex structures - maps of lists…”
    Libro electrónico
  14. 29234
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Recettes tirées des impôts sur le patrimoine dans les pays de l'OCDE -- Les recettes des impôts sur le patrimoine, qui comprennent un sous-ensemble de taxes sur l'immobilier, ne représentent qu'une faible part des recettes fiscales globales -- Les hausses de valeur des logements ne se sont pas répercutées sur les recettes tirées de l'impôt sur la propriété immobilière…”
    Libro electrónico
  15. 29235
    Publicado 2005
    Tabla de Contenidos: “…Dilemas y entrelazamientos: el mercado es global; las instituciones educa-tivas, nacionales 5. …”
    Libro
  16. 29236
    por Amaya Amaya, Jairo
    Publicado 2010
    Tabla de Contenidos: “…-- Tecnología y capacidades de Internet -- Herramientas de Internet para comunicación -- La World Wide Web -- Cómo buscar información en la web -- Tecnología de difusión o "empuje" -- Intranets y extranets -- Tecnología de intranets -- Extranets -- Beneficios de Internet para las organizaciones -- Conectividad y alcance global -- Más bajos costos de comunicación -- Interactividad, flexibilidad y personalización -- Distribución acelerada de conocimientos -- 4.2. …”
    Libro electrónico
  17. 29237
    por Flanagan, William A.
    Publicado 2012
    Tabla de Contenidos: “…7.1 Space, Power, and Cooling 171 -- 7.2 Priority for Voice, Video, Fax Packets 172 -- 7.3 Packets per Second 174 -- 7.4 Bandwidth 174 -- 7.5 Security Issues 175 -- 7.5.1 Eavesdropping and vLAN Hopping 176 -- 7.5.2 Access Controls for Users and Connections 176 -- 7.5.3 Modems 177 -- 7.5.4 DNS Cache Poisoning 177 -- IN SHORT: Earliest Instance of DNS Cache Poisoning 179 -- 7.5.5 Toll Fraud 179 -- 7.5.6 Pay-per-Call Scams 179 -- 7.5.7 Vishing 180 -- 7.5.8 SIP ScanningSPIT 180 -- 7.5.9 Opening the Firewall to Incoming Voice 181 -- 7.6 First Migration Steps While Keeping Legacy Equipment 181 -- 7.6.1 Circuit-Switched PBX 182 -- 7.6.2 Digital Phones 182 -- 7.6.3 Analog Phones and FX Service 183 -- 7.6.4 Facsimile Machines 184 -- 7.6.5 Modems 185 -- 8 Interconnections to Global Services 187 -- 8.1 Media Gateways 188 -- 8.2 SIP Trunking 192 -- 8.3 Operating VoIP Across Network Address Translation 196 -- 8.3.1 Failures of SIP, SDP (Signaling) 199 -- 8.3.2 Failures of RTP (Media) 199 -- 8.3.3 Solutions 200 -- 8.3.4 STUN: Session Traversal Utilities for NAT 201 -- 8.3.5 TURN: Traversal Using Relays around NAT 204 -- 8.3.6 ICE: Interactive Connectivity Establishment 206 -- 8.4 Session Border Controller 207 -- 8.4.1 Enterprise SBC 209 -- 8.4.2 Carrier SBC 210 -- 8.5 Supporting Multiple-Carrier Connections 212 -- 8.6 Mobility and Wireless Access 213 -- 8.6.1 VoIP on Wireless LANsWi-Fi 213 -- 8.6.2 Integration of Wi-Fi and Cellular Services 214 -- 8.6.3 Packet Voice on Mobile Broadband: WiMAX, LTE 214 -- 8.6.4 Radio over VoIP 215 -- IN SHORT: E&M Voice Signaling 216 -- 9 Network Management for VoIP and UC 217 -- 9.1 Starting Right 218 -- 9.1.1 Acceptance Testing 219 -- 9.1.2 Configuration Management and Governance 220 -- 9.1.3 Privilege Setting 220 -- 9.2 Continuous Monitoring and Management 221 -- 9.2.1 NMS Software 222 -- 9.2.2 Simple Network Management Protocol 223 -- 9.2.3 Web Interface 224 -- 9.2.4 Server Logging 224 -- 9.2.5 Software Maintenance 225 -- 9.2.6 Quality of ServiceExperience Monitoring 225.…”
    Libro electrónico
  18. 29238
    Publicado 2018
    Libro electrónico
  19. 29239
    Publicado 2017
    Libro electrónico
  20. 29240
    Publicado 2021
    Tabla de Contenidos: “…4.4.1 NLP Mainstream -- 4.4.2 Natural Language Based on Cognitive Computation -- 4.5 Representation of Knowledge Models -- 4.6 Conclusion -- References -- 5 iParking-Smart Way to Automate the Management of the Parking System for a Smart City -- 5.1 Introduction -- 5.2 Background &amp -- Literature Review -- 5.2.1 Background -- 5.2.2 Review of Literature -- 5.3 Research Gap -- 5.4 Research Problem -- 5.5 Objectives -- 5.6 Methodology -- 5.6.1 Lot Availability and Occupancy Detection -- 5.6.2 Error Analysis for GPS (Global Positioning System) -- 5.6.3 Vehicle License Plate Detection System -- 5.6.4 Analyze Differential Parking Behaviors and Pricing -- 5.6.5 Targeted Digital Advertising -- 5.6.6 Used Technologies -- 5.6.7 Specific Tools and Libraries -- 5.7 Testing and Evaluation -- 5.8 Results -- 5.9 Discussion -- 5.10 Conclusion -- References -- 6 Cognitive Cyber-Physical System Applications -- 6.1 Introduction -- 6.2 Properties of Cognitive Cyber-Physical System -- 6.3 Components of Cognitive Cyber-Physical System -- 6.4 Relationship Between Cyber-Physical System for Human-Robot -- 6.5 Applications of Cognitive Cyber-Physical System -- 6.5.1 Transportation -- 6.5.2 Industrial Automation -- 6.5.3 Healthcare and Biomedical -- 6.5.4 Clinical Infrastructure -- 6.5.5 Agriculture -- 6.6 Case Study: Road Management System Using CPS -- 6.6.1 Smart Accident Response System for Indian City -- 6.7 Conclusion -- References -- 7 Cognitive Computing -- 7.1 Introduction -- 7.2 Evolution of Cognitive System -- 7.3 Cognitive Computing Architecture -- 7.3.1 Cognitive Computing and Internet of Things -- 7.3.2 Cognitive Computing and Big Data Analysis -- 7.3.3 Cognitive Computing and Cloud Computing -- 7.4 Enabling Technologies in Cognitive Computing -- 7.4.1 Cognitive Computing and Reinforcement Learning -- 7.4.2 Cognitive Computing and Deep Learning…”
    Libro electrónico