Mostrando 51,241 - 51,260 Resultados de 60,861 Para Buscar '"industrial"', tiempo de consulta: 0.22s Limitar resultados
  1. 51241
    Publicado 2016
    Tabla de Contenidos: “…Intro -- CLOUD COMPUTING -- Contents -- About the Authors -- Acknowledgments -- 1 Introduction -- References -- 2 The Business of Cloud Computing -- 2.1 IT Industry Transformation through Virtualization and Cloud -- 2.2 The Business Model Around Cloud -- 2.2.1 Cloud Providers -- 2.2.2 Software and Service Vendors -- 2.3 Taking Cloud to the Network Operators -- References -- 3 CPU Virtualization -- 3.1 Motivation and History -- 3.2 A Computer Architecture Primer -- 3.2.1 CPU, Memory, and I/O -- 3.2.2 How the CPU Works -- 3.2.3 In-program Control Transfer: Jumps and Procedure Calls -- 3.2.4 Interrupts and Exceptions-the CPU Loop Refined -- 3.2.5 Multi-processing and its Requirements-The Need for an Operating System -- 3.2.6 Virtual Memory-Segmentation and Paging -- 3.2.7 Options in Handling Privileged Instructions and the Final Approximation of the CPU Loop -- 3.2.8 More on Operating Systems -- 3.3 Virtualization and Hypervisors -- 3.3.1 Model, Requirements, and Issues -- 3.3.2 The x86 Processor and Virtualization -- 3.3.3 Dealing with a Non-virtualizable CPU -- 3.3.4 I/O Virtualization -- 3.3.5 Hypervisor Examples -- 3.3.6 Security -- References -- 4 Data Networks-The Nervous System of the Cloud -- 4.1 The OSI Reference Model -- 4.1.1 Host-to-Host Communications -- 4.1.2 Interlayer Communications -- 4.1.3 Functional Description of Layers -- 4.2 The Internet Protocol Suite -- 4.2.1 IP-The Glue of the Internet -- 4.2.2 The Internet Hourglass -- 4.3 Quality of Service in IP Networks -- 4.3.1 Packet Scheduling Disciplines and Traffic Specification Models -- 4.3.2 Integrated Services -- 4.3.3 Differentiated Services -- 4.3.4 Multiprotocol Label Switching (MPLS) -- 4.4 WAN Virtualization Technologies -- 4.5 Software-Defined Network -- 4.6 Security of IP -- References -- 5 Networking Appliances -- 5.1 Domain Name System -- 5.1.1 Architecture and Protocol…”
    Libro electrónico
  2. 51242
    Publicado 2017
    Tabla de Contenidos: “…Chapter 3: The Opportunity for Community Financial Institutions -- Doing Nothing Is Safe, but It's Also Foolish -- Expand Your Mind -- Correlation Does Not Imply Causation -- Because the Real Problem Is Inaction -- Call It "Toe in the Water," "MVP," "Whateveryouwant," Just Try Something -- Reputational Risk Is Mitigated When You Do It Right -- It's Not a Family -- It's a Team -- Train or Fire the People in Your Organization Who Say, "I Don't Do Numbers -- Bad People You Must Push -- Good People Push You -- Pressure Wash the Barnacles -- Much Ado about Branching -- Look at the Retail Industry as a Corollary -- The Five Words That Will Kill: "How May I Help You? …”
    Libro electrónico
  3. 51243
    Publicado 2025
    Tabla de Contenidos: “…-- Why is the IoT So Important? -- What Industries Can Benefit from the IoT? -- Curious Five -- Part III Curious About ... …”
    Libro electrónico
  4. 51244
    Publicado 2024
    Tabla de Contenidos: “…-- Challenges in becoming a software company -- Effective use of new technologies is a critical aspect for the success of any new platform -- FedEx: digital transformation through application innovation -- Background -- New strategies -- Summary -- Chapter 9: Forming a cyber security culture -- Introduction -- History -- Talking to the board -- Establishing a security culture -- Understanding what it means to be compromised -- Cyber security dynamism and responsive organizational dynamism -- Cyber strategic integration -- Cyber cultural assimilation -- Summary -- Organizational learning and application development -- Cyber security risk -- Risk responsibility -- Driver/supporter implications -- Chapter 10: Digital transformation and changes in consumer behavior -- Introduction -- Requirements without users and without input -- Concepts of the S-curve and digital transformation analysis and design -- Organizational learning and the S-curve -- Communities of practice -- The IT leader in the digital transformation era -- How technology disrupts firms and industries -- Dynamism and digital disruption -- Critical components of "Digital" organization -- Assimilating digital technology operationally and culturally -- Conclusion -- Chapter 11: Integrating multiple generations of employees to accelerate competitive advantage in the digital age -- Introduction -- The employment challenge in the digital era -- Gen Y population attributes -- Advantages of employing millennials to support digital transformation -- Integration of Gen Y with baby boomers and Gen X -- Designing the digital enterprise -- The new digital natives: Gen Z -- Assimilating Gen Y and Z talent from underserved and socially excluded populations -- Langer workforce maturity arc -- Theoretical constructs of the LWMA…”
    Libro electrónico
  5. 51245
    Publicado 2007
    Tabla de Contenidos: “….: Project Kickoff -- Rupert Industries: Project Alpha -- Appendix B: What Is Software? …”
    Libro electrónico
  6. 51246
    Publicado 2017
    Tabla de Contenidos: “…-- List of Figures xi -- List of Tables xvii -- Foreword xix -- Preface xxi -- Acknowledgments xxiii -- List of Abbreviations xxv -- About the CompanionWebsite xxvii -- 1 Introduction 1 -- 1.1 The Rise of Cyber-Physical Systems 1 -- 1.2 Humans as Elements of Cyber-Physical Systems 4 -- 1.3 Objectives and Structure 7 -- Part I Evolution and Theory 9 -- 2 Evolution of HiTL Technologies 11 -- 2.1 "Things", Sensors, and the RealWorld 11 -- 2.2 Human Sensing and Virtual Communities 17 -- 2.3 In Summary... 23 -- 3 TheoryofHiTLCPSs 25 -- 3.1 Taxonomies for HiTLCPSs 25 -- 3.2 Data Acquisition 28 -- 3.2.1 Humans as Sets of Sensors 28 -- 3.2.2 Humans as Communication Nodes 29 -- 3.3 State Inference 30 -- 3.3.1 Human Nature 30 -- 3.3.2 Humans as Processing Nodes 31 -- 3.4 Actuation 31 -- 3.4.1 Humans and Robots as Actuators 31 -- 3.5 In Summary... 32 -- 4 HITL Technologies and Applications 35 -- 4.1 Technologies for Supporting HiTLCPS 35 -- 4.1.1 Data Acquisition 35 -- 4.1.2 State Inference 39 -- 4.1.3 Actuation 42 -- 4.2 Experimental Projects 45 -- 4.2.1 HiTL in Industry and at Home 46 -- 4.2.2 HiTL in Healthcare 48 -- 4.2.3 HiTL in Smartphones and Social Networking 51 -- 4.3 In Summary... 56 -- Part II Human-in-the-Loop: Hands-On 57 -- 5 ASampleApp 59 -- 5.1 A Sample Behavior Change Intervention App 59 -- 5.2 The Sample App's Base Architecture 60 -- 5.2.1 The Android App 60 -- 5.2.2 The Server 65 -- 5.3 Enhancing the Sample App with HiTL Emotion-awareness 66 -- 5.3.1 Choosing a Machine Learning Technique 67 -- 5.3.2 Implementing Emotion-awareness 68 -- 5.4 In Summary... 71 -- 6 Setting up the Development Environment 73 -- 6.1 Installing Android Studio 73 -- 6.2 Cloning the Android Project 77 -- 6.3 Deploying the Server 85 -- 6.3.1 Installing the Software and Cloning the Server's Project 85 -- 6.3.2 Obtaining a Foursquare(R)'s Client ID and Client Secret 88 -- 6.3.3 Setting up the Database 91 -- 6.3.4 Deploying the Server on Tomcat 7 95 -- 6.4 Testing the Sample App 99 -- 6.5 In Summary... 101.…”
    Libro electrónico
  7. 51247
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Vulnerability Management Governance -- Security basics -- The CIA triad -- Confidentiality -- Integrity -- Availability -- Identification -- Authentication -- Authorization -- Auditing -- Accounting -- Non-repudiation -- Vulnerability -- Threats -- Exposure -- Risk -- Safeguards -- Attack vectors -- Understanding the need for security assessments -- Types of security tests -- Security testing -- Vulnerability assessment versus penetration testing -- Security assessment -- Security audit -- Business drivers for vulnerability management -- Regulatory compliance -- Satisfying customer demands -- Response to some fraud/incident -- Gaining a competitive edge -- Safeguarding/protecting critical infrastructures -- Calculating ROIs -- Setting up the context -- Bottom-up -- Top-down -- Policy versus procedure versus standard versus guideline -- Vulnerability assessment policy template -- Penetration testing standards -- Penetration testing lifecycle -- Industry standards -- Open Web Application Security Project testing guide -- Benefits of the framework -- Penetration testing execution standard -- Benefits of the framework -- Summary -- Exercises -- Chapter 2: Setting Up the Assessment Environment -- Setting up a Kali virtual machine -- Basics of Kali Linux -- Environment configuration and setup -- Web server -- Secure Shell (SSH) -- File Transfer Protocol (FTP) -- Software management -- List of tools to be used during assessment -- Summary -- Chapter 3: Security Assessment Prerequisites -- Target scoping and planning -- Gathering requirements -- Preparing a detailed checklist of test requirements -- Suitable time frame and testing hours -- Identifying stakeholders -- Deciding upon the type of vulnerability assessment…”
    Libro electrónico
  8. 51248
    Publicado 2017
    Tabla de Contenidos: “…-- Chapter 3: The Implications are not Fully Understood -- Chapter 4: An Obsession with Process over Outcomes -- Chapter 5: Inertia -- Chapter 6: The Project is Set Up to Fail -- Chapter 7: Poor Communications and Disingenuous Stakeholder Engagement -- Change Projects that Fail, Fail to Communicate Effectively -- Change Projects that Fail, Also Fail to Engage Genuinely with Their Stakeholders -- Chapter 8: We Forget that Emotions Trump Logic Every Time -- One Industry that Has Been Built Around the Fact that Our Emotions Rule Our Decisions is the World of Advertising -- The Economist Plays with Our Emotions! …”
    Libro electrónico
  9. 51249
    por Giordano, Anthony, 1959-
    Publicado 2011
    Tabla de Contenidos: “…-- Reference Architecture for Data Integration -- The Layers of the Data Integration Architecture -- Extract/Subscribe Processes -- Initial Staging Landing Zone -- Data Quality Processes -- Clean Staging Landing Zone -- Transform Processes -- Load-Ready Publish Landing Zone -- Load/Publish Processes -- An Overall Data Architecture -- Summary -- End-of-Chapter Questions -- Chapter 3 A Design Technique: Data Integration Modeling -- The Business Case for a New Design Process -- Improving the Development Process -- Overview of Data Integration Modeling -- Conceptual Data Integration Models -- Logical Data Integration Models -- Physical Data Integration Models -- Tools for Developing Data Integration Models -- Industry-Based Data Integration Models -- Summary -- End-of-Chapter Questions -- Chapter 4 Case Study: Customer Loan Data Warehouse Project -- Case Study Overview -- Step 1: Build a Conceptual Data Integration Model -- Step 2: Build a High-Level Logical Model Data Integration Model -- Step 3: Build the Logical Extract DI Models -- Step 4: Define a Logical Data Quality DI Model -- Step 5: Define the Logical Transform DI Model -- Step 6: Define the Logical Load DI Model -- Step 7: Determine the Physicalization Strategy -- Step 8: Convert the Logical Extract Models into Physical Source System Extract DI Models -- Step 9: Refine the Logical Load Models into Physical Source System Subject Area Load DI Models…”
    Libro electrónico
  10. 51250
    Publicado 2021
    Tabla de Contenidos: “…-- Finance and Accounting -- Sales and Marketing -- Story Time: Watch Your Customers! -- Industry-Specific Notes -- Healthcare: Acute -- Healthcare: Ambulatory -- Construction -- Story Time: Planned Rework? …”
    Libro electrónico
  11. 51251
    Publicado 2024
    Tabla de Contenidos: “…Identifying insightful interview questions -- Sharpening interview skills with AI-generated responses -- Generating strategic questions for client engagements with AI -- Summary -- Chapter 4: LLMs for Creative Writing -- Using AI for creative writing -- Using AI to generate fiction -- Using AI to write poetry -- Summary -- Chapter 5: Unlocking Insights from Unstructured Text - AI Techniques for Text Analysis -- Sentiment analysis - AI techniques for emotion detection in text -- Organizing unstructured data - using AI for automated text categorization and data classification -- Cleaning up dirty data - how AI identifies and resolves issues in datasets -- Making sense of unstructured data - pattern matching for information extraction -- Summary -- Part 3: Advanced Use Cases for Different Industries -- Chapter 6: Applications of LLMs in Education and Law -- Creating course materials with ChatGPT -- Creating handouts and other materials -- Creating handouts for the unit -- Creating solved examples -- Word problems -- Creating quizzes -- Creating rubrics -- Creating cloze comprehension tests -- AI for legal research -- Reviewing legal documents using an LLM -- Drafting legal documents with an LLM -- AI for legal education and training -- LLMs for eDiscovery and litigation support -- AI for intellectual property (IP) management -- Other applications of LLMs for lawyers -- Summary -- Chapter 7: The Rise of AI Pair Programmers - Teaming Up with Intelligent Assistants for Better Code -- Code generation with coding assistants -- From confusion to clarity - AI explains what code does in plain English -- Commenting, formatting, and optimizing code -- Fixing faulty code - how AI transforms the debugging process -- Translating code from one language to another -- Case study 1 - developing a website code using AI…”
    Libro electrónico
  12. 51252
    por Parmentier, Guy
    Publicado 2024
    Tabla de Contenidos: “…The use of agile methods in the video game industry -- 5.2. The influence of agile methods on the creativity of the video games produced -- 5.3. …”
    Libro electrónico
  13. 51253
    por Watts, David
    Publicado 2004
    Tabla de Contenidos: “…Positioning -- 2.1 Migrating to a 64-bit platform -- 2.2 Scalable system partitioning -- 2.2.1 RXE-100 Expansion Enclosure -- 2.3 Operating system support -- 2.4 Server consolidation -- 2.5 ServerProven® -- 2.6 IBM Datacenter Solution Program -- 2.7 Application solutions -- 2.7.1 Database applications -- 2.7.2 Business logic -- 2.7.3 e-Business and security transactions -- 2.7.4 In-house developed compute-intensive applications -- 2.7.5 Science and technology industries -- 2.8 Why choose x455 -- Chapter 3. Planning -- 3.1 System hardware -- 3.1.1 Processors -- 3.1.2 Memory -- 3.1.3 PCI-X slot configuration -- 3.1.4 Broadcom Gigabit Ethernet controller -- 3.2 Cabling and connectivity -- 3.2.1 SMP Expansion connectivity -- 3.2.2 Remote Expansion Enclosure connectivity -- 3.2.3 Remote Supervisor Adapter connectivity -- 3.2.4 Serial connectivity…”
    Libro electrónico
  14. 51254
    Publicado 2017
    Tabla de Contenidos: “…and "I Need to Do More Research" Objections -- How to Overcome the "Market/Industry/Economy Is Bad" Objection -- How to Overcome the "My Relative Handles That for Me" Objection and the "I Have a Longstanding Relationship with My Vendor" Objection -- Chapter 9: Winning Closing Techniques -- How to Use Tie-Downs to Build Momentum -- Too Many Options? …”
    Libro electrónico
  15. 51255
    Publicado 2022
    Tabla de Contenidos: “…Understanding an online store -- Understanding an offline store -- Getting started with SageMaker Feature Store -- Creating a feature group -- Ingesting data to SageMaker Feature Store -- Ingesting from SageMaker Data Wrangler -- Accessing features from SageMaker Feature Store -- Accessing a feature group in the Studio UI -- Accessing an offline store - building a dataset for analysis and training -- Accessing online store - low-latency feature retrieval -- Summary -- Chapter 5: Building and Training ML Models with SageMaker Studio IDE -- Technical requirements -- Training models with SageMaker's built-in algorithms -- Training an NLP model easily -- Managing training jobs with SageMaker Experiments -- Training with code written in popular frameworks -- TensorFlow -- PyTorch -- Hugging Face -- MXNet -- Scikit-learn -- Developing and collaborating using SageMaker Notebook -- Summary -- Chapter 6: Detecting ML Bias and Explaining Models with SageMaker Clarify -- Technical requirements -- Understanding bias, fairness in ML, and ML explainability -- Detecting bias in ML -- Detecting pretraining bias -- Mitigating bias and training a model -- Detecting post-training bias -- Explaining ML models using SHAP values -- Summary -- Chapter 7: Hosting ML Models in the Cloud: Best Practices -- Technical requirements -- Deploying models in the cloud after training -- Inferencing in batches with batch transform -- Hosting real-time endpoints -- Optimizing your model deployment -- Hosting multi-model endpoints to save costs -- Optimizing instance type and autoscaling with load testing -- Summary -- Chapter 8: Jumpstarting ML with SageMaker JumpStart and Autopilot -- Technical requirements -- Launching a SageMaker JumpStart solution -- Solution catalog for industries -- Deploying the Product Defect Detection solution -- SageMaker JumpStart model zoo…”
    Libro electrónico
  16. 51256
    por Zheng, Zhiyong
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Preface -- Contents -- On the Development of Fintech in Asia -- 1 Overview of Global Fintech Development -- 1.1 Development Dynamics -- 1.2 The Financing Profile -- 1.3 Regulatory Environment -- 1.4 The Models of Fintech Development -- 1.5 Spatial Layout -- 2 Practice of Fintech Development in Asia -- 2.1 China-The Fintech Has Been Promoted to the Worlds Leading Level -- 2.2 Japan-Boosting the Rapid Growth of Fintech Through Advantages of Backwardness -- 2.3 Singapore-Gathering Innovative Resources with a Relaxed and Inclusive Atmosphere -- 2.4 South Korea-Promoting Scale Development of Fintech Industry by Fanning Out From Point to Area -- 2.5 KazakhstanCDigital Transformation Speeds Up the Construction of Central Asian Fintech Hub -- 2.6 India-Potential for Fintech Development Has Been Gradually Exerted -- 2.7 Israel-Guidance Plus Service to Create a Highland for the Development of Fintech -- 2.8 Indonesia-A Rising Star of Fintech Development in Southeast Asia -- 2.9 Hong Kong of China-The Government Assists the Strong Development of Fintech -- A Probability Inequality with Application to Lattice Theory -- 1 Introduction -- 2 Main Results -- 3 Conclusions -- References -- Robust Identification of Gene-Environment Interactions Under High-Dimensional Accelerated Failure Time Models -- 1 Introduction -- 2 Methods -- 2.1 Data and Model Settings -- 2.2 Robust Estimation and Identification -- 2.3 Computation -- 2.4 Consistency Properties -- 3 Simulations -- 4 Analysis of the TCGA Lung Adenocarcinoma Data -- 5 Discussions -- References -- A Novel Approach for Improving Accuracy for Distributed Storage Networks -- 1 Introduction -- 2 Related Works -- 2.1 Audit Research -- 2.2 Distributed Storage Project -- 3 Audit Algorithm -- 3.1 An Audit Framework -- 3.2 Data Uploading -- 3.3 Self-integrity Verification…”
    Libro electrónico
  17. 51257
    Publicado 2021
    Tabla de Contenidos: “…Barriers and Facilitators of Area-Wide Management Including Sterile Insect Technique Application: The Example of Queensland Fruit Fly. Industry-Driven Area-Wide Management of Queensland Fruit Fly in Queensland and New South Wales, Australia: Can it Work?. …”
    Libro electrónico
  18. 51258
    Publicado 2024
    Tabla de Contenidos: “…-- Does My Project Need to Be Original and Industry Specific? -- How Do I Know When a Project Is Ready? …”
    Libro electrónico
  19. 51259
    Publicado 2019
    Tabla de Contenidos: “…-- 1.2 Student Edition of Matlab® -- 1.3 How is Matlab® Used in Industry? -- 1.4 Problem Solving in Engineering and Science -- 2 MATLAB® ENVIRONMENT -- 2.1 Getting Started -- 2.2 Matlab® Windows -- 2.3 Solving Problems With Matlab® -- 2.4 Saving Your Work -- Summary -- Matlab® Summary -- Key Terms -- Problems -- 3 BUILT‐IN MATLAB® FUNCTIONS -- Introduction -- 3.1 Using Built‐In Functions -- 3.2 Using the Help Feature -- 3.3 Elementary Math Functions -- 3.4 Trigonometric Functions -- 3.5 Data Analysis Functions -- 3.6 Random Numbers -- 3.7 Complex Numbers -- 3.8 Computational Limitations -- 3.9 Special Values and Miscellaneous Functions -- Summary -- Matlab® Summary -- Key Terms -- Problems -- 4 MANIPULATING MATLAB® MATRICES -- 4.1 Manipulating Matrices -- 4.2 Problems with Two Variables-Using Meshgrid -- 4.3 Special Matrices -- Summary -- Matlab® Summary -- Key Terms -- Problems -- 5 PLOTTING -- Introduction -- 5.1 Two‐Dimensional Plots -- 5.2 Subplots -- 5.3 Other Types of Two‐Dimensional Plots -- 5.4 Three‐Dimensional Plotting -- 5.5 Editing Plots From the Menu Bar -- 5.6 Creating Plots From the Workspace Window -- 5.7 Saving Your Plots -- Summary -- Matlab® Summary -- Problems -- 6 LOGICAL FUNCTIONS AND SELECTION STRUCTURES -- Introduction -- 6.1 Relational and Logical Operators -- 6.2 Flowcharts and Pseudocode -- 6.3 Logical Functions -- 6.4 Selection Structures -- 6.5 Debugging -- Summary -- Matlab® Summary -- Key Terms -- Problems -- 7 REPETITION STRUCTURES -- Introduction -- 7.1 For Loops -- 7.2 While Loops -- 7.3 Break and Continue -- 7.4 Midpoint Break Loops -- 7.5 Nested Loops -- 7.6 Improving the Efficiency of Loops -- Summary -- Matlab® Summary -- Key Terms -- Problems…”
    Libro electrónico
  20. 51260
    por Pijoán, José, 1881-1963
    Publicado 1973
    Tabla de Contenidos: “…Olivar Daydí -- Cap. 14-16: El impresionismo : Rodin ; El postimpresionismo : Seurat y cézanne ; Van Gogh y Toulouse-Lautrec -- T. 9: Cap. 1: Gauguin / por Raymond Gogniat -- Cap. 2: Simbolismo y "nabis" / por Pierre Courthion -- Cap. 3: Revolución industrial y arquitectura / por Michel Ragon -- Cap…”
    Libro