Mostrando 221 - 240 Resultados de 264 Para Buscar '"just in time"', tiempo de consulta: 0.19s Limitar resultados
  1. 221
    Publicado 2018
    Tabla de Contenidos: “…-- Understanding the new database administration functions -- Using configurable WAL-segment sizes -- Larger queryid in pg_stat_statements -- Improved indexing and better optimization -- Expression index statistics -- INCLUDE indexes or covering indexes -- Parallel index creation -- Better cache management -- Improving pg_prewarm -- Enhancing windowing functions -- Introducing just-in-time compilation -- Enhanced partitioning -- Adding support for stored procedures -- Improving ALTER TABLE -- Summary -- Q&amp -- A -- Chapter 2: Understanding Transactions and Locking -- Working with PostgreSQL transactions -- Handling errors inside a transaction -- Making use of SAVEPOINT -- Transactional DDLs -- Understanding basic locking -- Avoiding typical mistakes and explicit locking -- Considering alternative solutions -- Making use of FOR SHARE and FOR UPDATE -- Understanding transaction isolation levels -- Considering SSI transactions -- Observing deadlocks and similar issues -- Utilizing advisory locks -- Optimizing storage and managing cleanup -- Configuring VACUUM and autovacuum -- Digging into transaction wraparound-related issues -- A word on VACUUM FULL -- Watching VACUUM at work -- Limiting transactions by making use of snapshot too old -- Summary -- Q&amp -- A -- Chapter 3: Making Use of Indexes -- Understanding simple queries and the cost model -- Making use of EXPLAIN -- Digging into the PostgreSQL cost model -- Deploying simple indexes -- Making use of sorted output -- Using more than one index at a time -- Using bitmap scans effectively -- Using indexes in an intelligent way -- Improving speed using clustered tables -- Clustering tables -- Making use of index-only scans…”
    Libro electrónico
  2. 222
    Publicado 2021
    Tabla de Contenidos: “…Using Azure Web Application Firewall to Protect a Website Against an "Initial Access" TTP -- Using Microsoft Defender for Office 365 to Protect Against an "Initial Access" TTP -- Using Microsoft Defender Endpoint to Protect Against an "Initial Access" TTP -- Using Azure Conditional Access to Protect Against an "Initial Access" TTP -- Microsoft Detect Services -- Detecting "Privilege Escalation" TTPs -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Privilege Escalation" TTP -- Detecting Credential Access -- Using Azure Identity Protection to Detect Threats Against a "Credential Access" TTP -- Steps to Configure and Enable Risk Polices (Sign-inRisk and User Risk) -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Credential Access" TTP -- Detecting Lateral Movement -- Using Just-in-Time in ASC to Protect and Detect Threats Against a "Lateral Movement" TTP -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Lateral Movement" TTP -- Detecting Command and Control -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Command and Control" TTP -- Detecting Data Exfiltration -- Using Azure Information Protection to Detect Threats Against a "Data Exfiltration" TTP -- Discovering Sensitive Content Using AIP -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Data Exfiltration" TTP -- Detecting Threats and Proactively Hunting with Microsoft 365 Defender -- Microsoft Investigate, Response, and Recover Features -- Automating Investigation and Remediation with Microsoft Defender for Endpoint -- Using Microsoft Threat Expert Support for Remediation and Investigation -- Targeted Attack Notification -- Experts on Demand -- Automating Security Response with MCAS and Microsoft Flow…”
    Libro electrónico
  3. 223
    Publicado 2023
    Tabla de Contenidos: “…BASICS Lean Implementation Model-Check -- Check Principles -- The House of Continuous Improvement -- Brief History of the Toyota House Model -- Purpose of a Model -- Toyota House Model -- Just in Time: The First Pillar -- Going Direct to Retailers: P&amp -- G Goes JIT in the 1920S -- Jidoka: The Second Pillar of the Toyota Production System -- Difference between an Error and a Defect -- Jidoka at Toyota -- Toyota Tools to Obtain Jidoka -- Labor-Saving (Monitoring of Equipment Is Unnecessary) Machine Jidoka -- People Jidoka and the Use of Safety Glasses -- The Safety Bonus System Story -- What Sigma Level Are Humans? …”
    Libro electrónico
  4. 224
    Publicado 2020
    Tabla de Contenidos: “…Protractor verwenden -- Elemente selektieren: Locators -- Aktionen durchführen -- Asynchron mit Warteschlange -- Redundanz durch Page Objects vermeiden -- Eine Angular-Anwendung testen -- IV Das Projekt ausliefern: Deployment -- Build und Deployment mit der Angular CLI -- Build-Konfiguration -- Build erzeugen -- Umgebungen konfigurieren -- Abhängigkeit zur Umgebung vermeiden -- Konfigurationen und Umgebungen am Beispiel: BookMonkey -- Produktivmodus aktivieren -- Die Templates kompilieren -- Ahead-of-Time-Kompilierung (AOT) -- Just-in-Time-Kompilierung (JIT) -- Bundles analysieren mit source-map-explorer -- Webserver konfigurieren und die Anwendung ausliefern -- ng deploy: Deployment mit der Angular CLI -- Ausblick: Deployment mit einem Build-Service -- Angular-Anwendungen mit Docker bereitstellen -- Docker -- Docker Registry -- Lösungsskizze -- Eine Angular-App über Docker bereitstellen -- Build Once, Run Anywhere: Konfiguration über Docker verwalten -- Multi-Stage Builds -- Grenzen der vorgestellten Lösung -- Fazit -- V Fortgeschrittene Themen -- Server-Side Rendering mit Angular Universal -- Single-Page-Anwendungen, Suchmaschinen und Start-Performance -- Dynamisches Server-Side Rendering -- Statisches Pre-Rendering -- Hinter den Kulissen von Angular Universal -- Browser oder Server? …”
    Libro electrónico
  5. 225
    Publicado 2011
    Tabla de Contenidos: “…-- 9.3 Verbose Processes Just Get in the Way -- 9.4 SPINs and Promoting the CMM -- 9.5 Disappearing Verbose Processes -- 9.6 The Danger of Having Too Little Process -- 9.7 Just-in-Time Process Improvement -- 9.8 Don't Overengineer Your CM -- 9.9 Don't Forget the Technology -- 9.10 Testing Your Own Processes -- 9.11 Process Consultation -- 9.12 Create a Structure for Sustainability -- Conclusion -- Chapter 10 Overcoming Resistance to Change -- Goals of Overcoming Resistance to Change -- 10.1 Why Is Overcoming Resistance to Change Important? …”
    Libro electrónico
  6. 226
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…6.1 Methodology -- 6.2 Prevalence of SDBMs -- 6.3 Applications to Translation Validation -- 7 Related Work -- 8 Conclusion -- References -- The Top-Down Solver Verified: Building Confidence in Static Analyzers -- 1 Introduction -- 2 Preliminaries -- 3 The Plain Top-Down Solver -- 4 The Top-Down Solver -- 5 Related Work -- 6 Conclusion -- References -- End-to-End Mechanized Proof of a JIT-Accelerated eBPF Virtual Machine for IoT -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions -- 2 Preliminaries -- 3 A Workflow for End-to-End Refinement -- 3.1 Methodology -- 3.2 Application to a rBPF Virtual Machine -- 4 Symbolic CompCert ARM Interpreter -- 5 A Verified Just-In-Time Compiler for rBPF -- 5.1 JIT Design -- 5.2 JIT Correctness -- 5.3 JIT Vertical Refinement -- 6 HAVM: A Hybrid Interpreter for rBPF -- 7 Evaluation: Case Study of RIOT's Femto-Containers -- 8 Lessons Learned -- 9 Related Works -- 10 Conclusion -- References -- A Framework for Debugging Automated Program Verification Proofs via Proof Actions -- 1 Introduction -- 2 Proof Debugging Considered Painful -- 2.1 Background on Automated Program Verification in Verus -- 2.2 Examples of Proof Debugging -- 2.3 Automated Proof Debugging with Proof Actions -- 2.4 Challenges with Automatic Code Transformation -- 3 ProofPlumber: An Extensible Proof Action Framework -- 3.1 ProofPlumber's API Design -- 3.2 ProofPlumber's Implementation -- 4 Evaluation -- 4.1 RQ1: Are proof actions expressive enough? …”
    Libro electrónico
  7. 227
    Publicado 2014
    Tabla de Contenidos: “…Other Schedule Considerations 128 -- Revisions 128 -- Learning Takes Time 128 -- The Heat Is On 128 -- Team Member Estimate Errors 129 -- The Just-in-Time Strategy for Scheduling Resources 129 -- What Happens When They Want to Rush Me? …”
    Libro electrónico
  8. 228
    Publicado 2015
    Tabla de Contenidos: “…GRAHAM -- ASME: AMERICAN SOCIETY OF MECHANICAL ENGINEERS -- FUNCTIONAL FLOW BLOCK DIAGRAM OF PERT -- PERT: Program Evaluation Review Technique28 -- DATA FLOW DIAGRAMS AND IDEF -- Data Flow Diagram -- Integrated Definition -- IDEF032 Overview: Function Modeling Method -- IDEF134 Overview: Information Modeling Method -- IDEF1X35 Overview: Data Modeling Method -- IDEF336 Overview: Process Description Capture Method -- IDEF437 Overview: Object-Oriented Design Method -- IDEF538 Overview: Ontology Description Capture Method -- ZERO DEFECTS -- TOYOTA PRODUCTION SYSTEM -- Just-In-Time: Productivity Improvement -- End Notes -- 3: Process Concept Evolution -- INTRODUCTION -- PROF. …”
    Libro electrónico
  9. 229
    Publicado 2022
    Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
    Libro electrónico
  10. 230
    Publicado 2023
    Tabla de Contenidos: “…. -- How it works... -- Creating just-in-time AudioSource components at runtime through C# scripting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding the CreateAudioSource(...) method as an extension to the MonoBehavior class -- A button to play a sound with no scripting -- Getting ready -- How to do it... -- How it works... -- Preventing an audio clip from restarting if it is already playing -- Getting ready -- How to do it... -- How it works... -- Waiting for the audio to finish playing before auto-destructing an object -- Getting ready -- How to do it... -- How it works... -- See also -- Creating audio visualization from sample spectral data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding visualizations to a second AudioSource component -- Trying out different Fast Fourier Transform (FFT) window types -- Synchronizing simultaneous and sequential music to create a simple 140 bpm music-loop manager -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding visualizations to the four playing loops -- Recording sound clips with the free Audacity application -- Getting ready -- How to do it... -- How it works... -- Further reading -- Chapter 5: Textures, Materials, and 3D Objects -- Creating a scene with 3D primitives and a texture -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enhancing the scene - adding a spotlight…”
    Libro electrónico
  11. 231
    Publicado 2017
    Tabla de Contenidos: “…The horizontal and vertical blank -- Refresh rate -- Double buffering -- The back buffer -- VSync -- Triple buffering -- LCD monitors -- Time-based movement and animation -- Frame-based movement -- Time-based movement -- Summary -- Chapter 12: Best Practices -- Chapter overview -- Your objectives -- Learning fundamental code quality techniques -- Avoid magic numbers -- White space -- Indentation -- Blank lines and spaces -- Comments and self-documenting code -- Commenting -- Learning and understand the uses of the const keyword -- Const function parameters -- Const classes as parameters -- Const member functions -- Problems with const -- Learning how iteration can improve your game and code design -- The game development cycle -- Production phase -- Prototyping -- Playtesting -- Conducting a playtest -- Iteration -- Meeting milestones -- Learning when to use scripting in a game -- Introduction to assembly -- Moving to higher-level programming languages -- Introducing the compiler -- Introduction to scripting languages -- Using interpreters -- Just in time compilation -- Why use a scripting language? …”
    Libro electrónico
  12. 232
    por Alex, K.
    Publicado 2012
    Tabla de Contenidos: “…-- 4.7 ABC Analysis -- 4.8 Just-in-Time Analysis-the Origin -- 4.9 VED Analysis -- 4.10 Perpetual Inventory System -- 4.11 Periodic Inventory System -- 4.12 Stock/Material Turnover Ratio -- 4.13 Advanced-Type Solved Problems -- Chapter Summary -- Key Formulae -- Exercise for Your Practice -- Discussion Questions -- Problems -- Examination Problems -- Chapter 5: Pricing of Materials -- 5.1 Introduction -- 5.2 FIFO (First in First Out) -- 5.3 LIFO (Last in First Out) -- 5.4 Simple Average Method -- 5.5 Weighted Average Method -- 5.6 Advanced-Type Solved Problems -- Chapter Summary -- Exercise for Your Practice -- Discussion Questions -- Problems -- Examination Problems -- Chapter 6: Labour -- 6.1 Introduction -- 6.2 Labour Cost -- 6.3 Important Factors For Controlling Labour Cost -- 6.4 Distinction between Direct and Indirect Labour Costs -- 6.5 Labour Turnover -- 6.5.1 Internal Versus External Turnover -- 6.5.2 Voluntary Versus Involuntary Turnover -- 6.5.3 Causes of Labour Turnover -- 6.5.4 Effects of Labour Turnover -- 6.5.5 Costs of Labour Turnover -- 6.5.6 Benefits of Labour Turnover -- 6.5.7 Measurement of Labour Turnover -- 6.6 Time and Motion Study -- 6.6.1 Time Study -- 6.6.2 Motion Study -- 6.6.3 Merits of Time and Motion Studies -- 6.7 Time Wage System -- 6.7.1 Merits of Time Wage System -- 6.7.2 Demerits of Time Wage Payment -- 6.8 Piece Wage System -- 6.8.1 Advantages of the Piece Wage System -- 6.8.2 Disadvantages of the Piece Wage System -- 6.9 Straight Piece-Rate System -- 6.10 Differential Piece-Rate System (or Taylor's Plan) -- 6.10.1 Advantages of the Differential Piece-Rate System -- 6.10.2 Disadvantages of the Differential Piece-Rate System -- 6.11 Merrick's Multiple Piece-Rate Plan -- 6.11.1 Advantages of Merrick's Multiple Piece-Rate Plan…”
    Libro electrónico
  13. 233
    Publicado 2012
    Tabla de Contenidos: “…10.1.1 Benefits -- 10.1.2 Costs -- 10.2 Credit Policy -- 10.2.1 Optimising the Term of Credit -- 10.2.2 Changes in Credit Standard -- 10.2.3 Discount Policy -- 10.3 Selection of Customers -- 10.3.1 Collecting Necessary Information -- 10.3.2 Analysis of the Information -- 10.3.3 Fixation of the Credit Limit -- 10.4 Monitoring and Control of Credit -- 10.4.1 Monitoring at the Customer's Level -- 10.4.2 Monitoring at the Aggregate Level -- 10.4.3 Factoring -- 10.4.4 Forfaiting -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- References -- Select Further Readings -- Chapter 11: Inventory Management -- 11.1 Benefits and Cost of Maintaining Inventory -- 11.1.1 Benefits -- 11.1.2 Costs -- 11.2 Goal of Inventory Management -- 11.2.1 Classification of Inventories -- 11.2.2 Economic Order Quantity (EOQ) -- 11.2.3 Determination of Re-order Point -- 11.2.4 Safety Level of Stock -- 11.3 Just-in-time Inventory System -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- Reference -- Select Further Readings -- Chapter 12: Sources of Short-term Finance -- 12.1 Trade Credit -- 12.1.1 Nature of Trade Credit -- 12.1.2 Benefits and Costs of Trade Credit -- 12.1.3 Stretching of Accounts Payable -- 12.2 Bank Finance -- 12.2.1 Nature of Bank Finance -- 12.2.2 Effective Interest Rate -- 12.2.3 Bank Financing Norms in India -- 12.3 Other Sources of Short-term Funds -- 12.3.1 Commercial Papers -- 12.3.2 Public Deposits -- 12.3.3 Intercorporate Deposits -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- Select Further Readings -- Part IV: Long-term Financing and Dividend Decisions -- Chapter 13: Capitalisation…”
    Libro electrónico
  14. 234
    Publicado 2004
    Tabla de Contenidos: “…Storage Orchestration -- 2.1 IBM Storage Orchestration introduction -- 2.1.1 IBM Storage Orchestration -- 2.1.2 Just-in-case provisioning -- 2.1.3 Just-in-time provisioning -- 2.1.4 The five areas of orchestration -- 2.2 Storage virtualization: the IBM approach -- 2.2.1 IBM TotalStorage SAN Volume Controller -- 2.2.2 IBM TotalStorage SAN File System -- 2.3 Enterprise Storage Resource Management -- 2.3.1 IBM Tivoli Storage Area Network Manager -- 2.3.2 IBM Tivoli Storage Resource Manager -- 2.3.3 IBM TotalStorage Multiple Device Manager -- Chapter 3. …”
    Libro electrónico
  15. 235
    Publicado 2003
    “…IBM Tivoli Intelligent ThinkDynamic Orchestrator operates in a closed loop that performs automatic resource-requirements prediction based on predefined service level objectives and agreements, and automates infrastructure deployment. This just-in-time cycle ensures that each application has the resource it needs, when it needs it--without static overprovisioning. …”
    Libro electrónico
  16. 236
    Publicado 2021
    Tabla de Contenidos: “…Design Site and Facility Security Controls -- Wiring Closets/Intermediate Distribution Facilities -- Server Rooms/Data Centers -- Media Storage Facilities -- Evidence Storage -- Restricted and Work Area Security -- Utilities and Heating, Ventilation, and Air Conditioning -- Environmental Issues -- Fire Prevention, Detection, and Suppression -- Summary -- Domain 4 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- Open System Interconnection and Transmission Control Protocol/Internet Protocol Models -- The OSI Reference Model -- The TCP/IP Reference Model -- Internet Protocol Networking -- Secure Protocols -- Implications of Multilayer Protocols -- Converged Protocols -- Microsegmentation -- Wireless Networks -- Cellular Networks -- Content Distribution Networks -- Secure Network Components -- Operation of Hardware -- Repeaters, Concentrators, and Amplifiers -- Hubs -- Bridges -- Switches -- Routers -- Gateways -- Proxies -- Transmission Media -- Network Access Control -- Endpoint Security -- Mobile Devices -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia Collaboration -- Remote Access -- Data Communications -- Virtualized Networks -- Third-Party Connectivity -- Summary -- Domain 5 Identity and Access Management -- Control Physical and Logical Access to Assets -- Access Control Definitions -- Information -- Systems -- Devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity Management Implementation -- Single/Multifactor Authentication -- Accountability -- Session Management -- Registration, Proofing, and Establishment of Identity -- Federated Identity Management -- Credential Management Systems -- Single Sign-On -- Just-In-Time -- Federated Identity with a Third-Party Service…”
    Libro electrónico
  17. 237
    Publicado 2022
    Tabla de Contenidos: “…Fire prevention, detection, and suppression -- Power -- Chapter 6 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- OSI and TCP/IP models -- The OSI Reference Model -- The TCP/IP Model -- Secure Network Components -- Operation of hardware -- Transmission media -- Network access control devices -- Endpoint security -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia collaboration -- Remote access -- Data communications -- Virtualized networks -- Third-party connectivity -- Chapter 7 Identity and Access Management -- Control Physical and Logical Access to Assets -- Information -- Systems and devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity management implementation -- Single-/multifactor authentication -- Accountability -- Session management -- Registration, proofing, and establishment of identity -- Federated identity management -- Credential management systems -- Single sign-on -- Just-in-Time -- Federated Identity with a Third-Party Service -- On-premises -- Cloud -- Hybrid -- Implement and Manage Authorization Mechanisms -- Role-based access control -- Rule-based access control -- Mandatory access control -- Discretionary access control -- Attribute-based access control -- Risk-based access control -- Manage the Identity and Access Provisioning Life Cycle -- Implement Authentication Systems -- OpenID Connect/Open Authorization -- Security Assertion Markup Language -- Kerberos -- RADIUS and TACACS+ -- Chapter 8 Security Assessment and Testing -- Design and Validate Assessment, Test, and Audit Strategies -- Conduct Security Control Testing -- Vulnerability assessment -- Penetration testing -- Log reviews -- Synthetic transactions -- Code review and testing -- Misuse case testing…”
    Libro electrónico
  18. 238
    Publicado 2024
    Tabla de Contenidos: “…Managing Quality -- Global Company Profile: Arnold Palmer Hospital: Managing Quality Provides a Competitive Advantage at Arnold Palmer Hospital -- Quality and Strategy -- Defining Quality -- Implications of Quality -- Malcolm Baldrige National Quality Award -- ISO 9000 International Quality Standards -- Cost of Quality (COQ) -- Ethics and Quality Management -- Total Quality Management -- Continuous Improvement -- Six Sigma -- Employee Empowerment -- Benchmarking -- Just-in-Time (JIT) -- Taguchi Concepts -- OM in Action: A Hospital Benchmarks Against the Ferrari Racing Team? …”
    Libro electrónico
  19. 239
    Publicado 2023
    Tabla de Contenidos: “…Managing Quality -- Global Company Profile: Arnold Palmer Hospital: Managing Quality Provides a Competitive Advantage at Arnold Palmer Hospital -- Quality and Strategy -- Defining Quality -- Implications of Quality -- Malcolm Baldrige National Quality Award -- ISO 9000 International Quality Standards -- Cost of Quality (COQ) -- Ethics and Quality Management -- Total Quality Management -- Continuous Improvement -- Six Sigma -- Employee Empowerment -- Benchmarking -- Just-in-Time (JIT) -- Taguchi Concepts -- OM in Action: A Hospital Benchmarks Against the Ferrari Racing Team? …”
    Libro electrónico
  20. 240
    Publicado 2017
    Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
    Libro electrónico