Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 20
- Producción justo a tiempo 20
- Just-in-time systems 19
- Development 15
- Application software 12
- Programming 9
- Production control 8
- Production management 8
- Agile software development 7
- Business logistics 7
- Engineering & Applied Sciences 7
- Security measures 7
- Computer Science 6
- Computer software 6
- Data processing 6
- Lean manufacturing 6
- Producción 6
- Computer networks 5
- Computer security 5
- Design 5
- Java (Computer program language) 5
- Organización industrial 5
- Programming languages (Electronic computers) 5
- Project management 5
- Python (Computer program language) 5
- Video games 5
- Computer programming 4
- Employees 4
- Industrial management 4
- Information technology 4
-
221Publicado 2018Tabla de Contenidos: “…-- Understanding the new database administration functions -- Using configurable WAL-segment sizes -- Larger queryid in pg_stat_statements -- Improved indexing and better optimization -- Expression index statistics -- INCLUDE indexes or covering indexes -- Parallel index creation -- Better cache management -- Improving pg_prewarm -- Enhancing windowing functions -- Introducing just-in-time compilation -- Enhanced partitioning -- Adding support for stored procedures -- Improving ALTER TABLE -- Summary -- Q& -- A -- Chapter 2: Understanding Transactions and Locking -- Working with PostgreSQL transactions -- Handling errors inside a transaction -- Making use of SAVEPOINT -- Transactional DDLs -- Understanding basic locking -- Avoiding typical mistakes and explicit locking -- Considering alternative solutions -- Making use of FOR SHARE and FOR UPDATE -- Understanding transaction isolation levels -- Considering SSI transactions -- Observing deadlocks and similar issues -- Utilizing advisory locks -- Optimizing storage and managing cleanup -- Configuring VACUUM and autovacuum -- Digging into transaction wraparound-related issues -- A word on VACUUM FULL -- Watching VACUUM at work -- Limiting transactions by making use of snapshot too old -- Summary -- Q& -- A -- Chapter 3: Making Use of Indexes -- Understanding simple queries and the cost model -- Making use of EXPLAIN -- Digging into the PostgreSQL cost model -- Deploying simple indexes -- Making use of sorted output -- Using more than one index at a time -- Using bitmap scans effectively -- Using indexes in an intelligent way -- Improving speed using clustered tables -- Clustering tables -- Making use of index-only scans…”
Libro electrónico -
222Publicado 2021Tabla de Contenidos: “…Using Azure Web Application Firewall to Protect a Website Against an "Initial Access" TTP -- Using Microsoft Defender for Office 365 to Protect Against an "Initial Access" TTP -- Using Microsoft Defender Endpoint to Protect Against an "Initial Access" TTP -- Using Azure Conditional Access to Protect Against an "Initial Access" TTP -- Microsoft Detect Services -- Detecting "Privilege Escalation" TTPs -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Privilege Escalation" TTP -- Detecting Credential Access -- Using Azure Identity Protection to Detect Threats Against a "Credential Access" TTP -- Steps to Configure and Enable Risk Polices (Sign-inRisk and User Risk) -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Credential Access" TTP -- Detecting Lateral Movement -- Using Just-in-Time in ASC to Protect and Detect Threats Against a "Lateral Movement" TTP -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Lateral Movement" TTP -- Detecting Command and Control -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Command and Control" TTP -- Detecting Data Exfiltration -- Using Azure Information Protection to Detect Threats Against a "Data Exfiltration" TTP -- Discovering Sensitive Content Using AIP -- Using Azure Security Center and Azure Sentinel to Detect Threats Against a "Data Exfiltration" TTP -- Detecting Threats and Proactively Hunting with Microsoft 365 Defender -- Microsoft Investigate, Response, and Recover Features -- Automating Investigation and Remediation with Microsoft Defender for Endpoint -- Using Microsoft Threat Expert Support for Remediation and Investigation -- Targeted Attack Notification -- Experts on Demand -- Automating Security Response with MCAS and Microsoft Flow…”
Libro electrónico -
223Publicado 2023Tabla de Contenidos: “…BASICS Lean Implementation Model-Check -- Check Principles -- The House of Continuous Improvement -- Brief History of the Toyota House Model -- Purpose of a Model -- Toyota House Model -- Just in Time: The First Pillar -- Going Direct to Retailers: P& -- G Goes JIT in the 1920S -- Jidoka: The Second Pillar of the Toyota Production System -- Difference between an Error and a Defect -- Jidoka at Toyota -- Toyota Tools to Obtain Jidoka -- Labor-Saving (Monitoring of Equipment Is Unnecessary) Machine Jidoka -- People Jidoka and the Use of Safety Glasses -- The Safety Bonus System Story -- What Sigma Level Are Humans? …”
Libro electrónico -
224Publicado 2020Tabla de Contenidos: “…Protractor verwenden -- Elemente selektieren: Locators -- Aktionen durchführen -- Asynchron mit Warteschlange -- Redundanz durch Page Objects vermeiden -- Eine Angular-Anwendung testen -- IV Das Projekt ausliefern: Deployment -- Build und Deployment mit der Angular CLI -- Build-Konfiguration -- Build erzeugen -- Umgebungen konfigurieren -- Abhängigkeit zur Umgebung vermeiden -- Konfigurationen und Umgebungen am Beispiel: BookMonkey -- Produktivmodus aktivieren -- Die Templates kompilieren -- Ahead-of-Time-Kompilierung (AOT) -- Just-in-Time-Kompilierung (JIT) -- Bundles analysieren mit source-map-explorer -- Webserver konfigurieren und die Anwendung ausliefern -- ng deploy: Deployment mit der Angular CLI -- Ausblick: Deployment mit einem Build-Service -- Angular-Anwendungen mit Docker bereitstellen -- Docker -- Docker Registry -- Lösungsskizze -- Eine Angular-App über Docker bereitstellen -- Build Once, Run Anywhere: Konfiguration über Docker verwalten -- Multi-Stage Builds -- Grenzen der vorgestellten Lösung -- Fazit -- V Fortgeschrittene Themen -- Server-Side Rendering mit Angular Universal -- Single-Page-Anwendungen, Suchmaschinen und Start-Performance -- Dynamisches Server-Side Rendering -- Statisches Pre-Rendering -- Hinter den Kulissen von Angular Universal -- Browser oder Server? …”
Libro electrónico -
225Publicado 2011Tabla de Contenidos: “…-- 9.3 Verbose Processes Just Get in the Way -- 9.4 SPINs and Promoting the CMM -- 9.5 Disappearing Verbose Processes -- 9.6 The Danger of Having Too Little Process -- 9.7 Just-in-Time Process Improvement -- 9.8 Don't Overengineer Your CM -- 9.9 Don't Forget the Technology -- 9.10 Testing Your Own Processes -- 9.11 Process Consultation -- 9.12 Create a Structure for Sustainability -- Conclusion -- Chapter 10 Overcoming Resistance to Change -- Goals of Overcoming Resistance to Change -- 10.1 Why Is Overcoming Resistance to Change Important? …”
Libro electrónico -
226por Gurfinkel, ArieTabla de Contenidos: “…6.1 Methodology -- 6.2 Prevalence of SDBMs -- 6.3 Applications to Translation Validation -- 7 Related Work -- 8 Conclusion -- References -- The Top-Down Solver Verified: Building Confidence in Static Analyzers -- 1 Introduction -- 2 Preliminaries -- 3 The Plain Top-Down Solver -- 4 The Top-Down Solver -- 5 Related Work -- 6 Conclusion -- References -- End-to-End Mechanized Proof of a JIT-Accelerated eBPF Virtual Machine for IoT -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions -- 2 Preliminaries -- 3 A Workflow for End-to-End Refinement -- 3.1 Methodology -- 3.2 Application to a rBPF Virtual Machine -- 4 Symbolic CompCert ARM Interpreter -- 5 A Verified Just-In-Time Compiler for rBPF -- 5.1 JIT Design -- 5.2 JIT Correctness -- 5.3 JIT Vertical Refinement -- 6 HAVM: A Hybrid Interpreter for rBPF -- 7 Evaluation: Case Study of RIOT's Femto-Containers -- 8 Lessons Learned -- 9 Related Works -- 10 Conclusion -- References -- A Framework for Debugging Automated Program Verification Proofs via Proof Actions -- 1 Introduction -- 2 Proof Debugging Considered Painful -- 2.1 Background on Automated Program Verification in Verus -- 2.2 Examples of Proof Debugging -- 2.3 Automated Proof Debugging with Proof Actions -- 2.4 Challenges with Automatic Code Transformation -- 3 ProofPlumber: An Extensible Proof Action Framework -- 3.1 ProofPlumber's API Design -- 3.2 ProofPlumber's Implementation -- 4 Evaluation -- 4.1 RQ1: Are proof actions expressive enough? …”
Publicado 2024
Libro electrónico -
227Publicado 2014Tabla de Contenidos: “…Other Schedule Considerations 128 -- Revisions 128 -- Learning Takes Time 128 -- The Heat Is On 128 -- Team Member Estimate Errors 129 -- The Just-in-Time Strategy for Scheduling Resources 129 -- What Happens When They Want to Rush Me? …”
Libro electrónico -
228Publicado 2015Tabla de Contenidos: “…GRAHAM -- ASME: AMERICAN SOCIETY OF MECHANICAL ENGINEERS -- FUNCTIONAL FLOW BLOCK DIAGRAM OF PERT -- PERT: Program Evaluation Review Technique28 -- DATA FLOW DIAGRAMS AND IDEF -- Data Flow Diagram -- Integrated Definition -- IDEF032 Overview: Function Modeling Method -- IDEF134 Overview: Information Modeling Method -- IDEF1X35 Overview: Data Modeling Method -- IDEF336 Overview: Process Description Capture Method -- IDEF437 Overview: Object-Oriented Design Method -- IDEF538 Overview: Ontology Description Capture Method -- ZERO DEFECTS -- TOYOTA PRODUCTION SYSTEM -- Just-In-Time: Productivity Improvement -- End Notes -- 3: Process Concept Evolution -- INTRODUCTION -- PROF. …”
Libro electrónico -
229Publicado 2022Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
Libro electrónico -
230Publicado 2023Tabla de Contenidos: “…. -- How it works... -- Creating just-in-time AudioSource components at runtime through C# scripting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding the CreateAudioSource(...) method as an extension to the MonoBehavior class -- A button to play a sound with no scripting -- Getting ready -- How to do it... -- How it works... -- Preventing an audio clip from restarting if it is already playing -- Getting ready -- How to do it... -- How it works... -- Waiting for the audio to finish playing before auto-destructing an object -- Getting ready -- How to do it... -- How it works... -- See also -- Creating audio visualization from sample spectral data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding visualizations to a second AudioSource component -- Trying out different Fast Fourier Transform (FFT) window types -- Synchronizing simultaneous and sequential music to create a simple 140 bpm music-loop manager -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding visualizations to the four playing loops -- Recording sound clips with the free Audacity application -- Getting ready -- How to do it... -- How it works... -- Further reading -- Chapter 5: Textures, Materials, and 3D Objects -- Creating a scene with 3D primitives and a texture -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enhancing the scene - adding a spotlight…”
Libro electrónico -
231Publicado 2017Tabla de Contenidos: “…The horizontal and vertical blank -- Refresh rate -- Double buffering -- The back buffer -- VSync -- Triple buffering -- LCD monitors -- Time-based movement and animation -- Frame-based movement -- Time-based movement -- Summary -- Chapter 12: Best Practices -- Chapter overview -- Your objectives -- Learning fundamental code quality techniques -- Avoid magic numbers -- White space -- Indentation -- Blank lines and spaces -- Comments and self-documenting code -- Commenting -- Learning and understand the uses of the const keyword -- Const function parameters -- Const classes as parameters -- Const member functions -- Problems with const -- Learning how iteration can improve your game and code design -- The game development cycle -- Production phase -- Prototyping -- Playtesting -- Conducting a playtest -- Iteration -- Meeting milestones -- Learning when to use scripting in a game -- Introduction to assembly -- Moving to higher-level programming languages -- Introducing the compiler -- Introduction to scripting languages -- Using interpreters -- Just in time compilation -- Why use a scripting language? …”
Libro electrónico -
232por Alex, K.Tabla de Contenidos: “…-- 4.7 ABC Analysis -- 4.8 Just-in-Time Analysis-the Origin -- 4.9 VED Analysis -- 4.10 Perpetual Inventory System -- 4.11 Periodic Inventory System -- 4.12 Stock/Material Turnover Ratio -- 4.13 Advanced-Type Solved Problems -- Chapter Summary -- Key Formulae -- Exercise for Your Practice -- Discussion Questions -- Problems -- Examination Problems -- Chapter 5: Pricing of Materials -- 5.1 Introduction -- 5.2 FIFO (First in First Out) -- 5.3 LIFO (Last in First Out) -- 5.4 Simple Average Method -- 5.5 Weighted Average Method -- 5.6 Advanced-Type Solved Problems -- Chapter Summary -- Exercise for Your Practice -- Discussion Questions -- Problems -- Examination Problems -- Chapter 6: Labour -- 6.1 Introduction -- 6.2 Labour Cost -- 6.3 Important Factors For Controlling Labour Cost -- 6.4 Distinction between Direct and Indirect Labour Costs -- 6.5 Labour Turnover -- 6.5.1 Internal Versus External Turnover -- 6.5.2 Voluntary Versus Involuntary Turnover -- 6.5.3 Causes of Labour Turnover -- 6.5.4 Effects of Labour Turnover -- 6.5.5 Costs of Labour Turnover -- 6.5.6 Benefits of Labour Turnover -- 6.5.7 Measurement of Labour Turnover -- 6.6 Time and Motion Study -- 6.6.1 Time Study -- 6.6.2 Motion Study -- 6.6.3 Merits of Time and Motion Studies -- 6.7 Time Wage System -- 6.7.1 Merits of Time Wage System -- 6.7.2 Demerits of Time Wage Payment -- 6.8 Piece Wage System -- 6.8.1 Advantages of the Piece Wage System -- 6.8.2 Disadvantages of the Piece Wage System -- 6.9 Straight Piece-Rate System -- 6.10 Differential Piece-Rate System (or Taylor's Plan) -- 6.10.1 Advantages of the Differential Piece-Rate System -- 6.10.2 Disadvantages of the Differential Piece-Rate System -- 6.11 Merrick's Multiple Piece-Rate Plan -- 6.11.1 Advantages of Merrick's Multiple Piece-Rate Plan…”
Publicado 2012
Libro electrónico -
233Publicado 2012Tabla de Contenidos: “…10.1.1 Benefits -- 10.1.2 Costs -- 10.2 Credit Policy -- 10.2.1 Optimising the Term of Credit -- 10.2.2 Changes in Credit Standard -- 10.2.3 Discount Policy -- 10.3 Selection of Customers -- 10.3.1 Collecting Necessary Information -- 10.3.2 Analysis of the Information -- 10.3.3 Fixation of the Credit Limit -- 10.4 Monitoring and Control of Credit -- 10.4.1 Monitoring at the Customer's Level -- 10.4.2 Monitoring at the Aggregate Level -- 10.4.3 Factoring -- 10.4.4 Forfaiting -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- References -- Select Further Readings -- Chapter 11: Inventory Management -- 11.1 Benefits and Cost of Maintaining Inventory -- 11.1.1 Benefits -- 11.1.2 Costs -- 11.2 Goal of Inventory Management -- 11.2.1 Classification of Inventories -- 11.2.2 Economic Order Quantity (EOQ) -- 11.2.3 Determination of Re-order Point -- 11.2.4 Safety Level of Stock -- 11.3 Just-in-time Inventory System -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- Reference -- Select Further Readings -- Chapter 12: Sources of Short-term Finance -- 12.1 Trade Credit -- 12.1.1 Nature of Trade Credit -- 12.1.2 Benefits and Costs of Trade Credit -- 12.1.3 Stretching of Accounts Payable -- 12.2 Bank Finance -- 12.2.1 Nature of Bank Finance -- 12.2.2 Effective Interest Rate -- 12.2.3 Bank Financing Norms in India -- 12.3 Other Sources of Short-term Funds -- 12.3.1 Commercial Papers -- 12.3.2 Public Deposits -- 12.3.3 Intercorporate Deposits -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- Select Further Readings -- Part IV: Long-term Financing and Dividend Decisions -- Chapter 13: Capitalisation…”
Libro electrónico -
234Publicado 2004Tabla de Contenidos: “…Storage Orchestration -- 2.1 IBM Storage Orchestration introduction -- 2.1.1 IBM Storage Orchestration -- 2.1.2 Just-in-case provisioning -- 2.1.3 Just-in-time provisioning -- 2.1.4 The five areas of orchestration -- 2.2 Storage virtualization: the IBM approach -- 2.2.1 IBM TotalStorage SAN Volume Controller -- 2.2.2 IBM TotalStorage SAN File System -- 2.3 Enterprise Storage Resource Management -- 2.3.1 IBM Tivoli Storage Area Network Manager -- 2.3.2 IBM Tivoli Storage Resource Manager -- 2.3.3 IBM TotalStorage Multiple Device Manager -- Chapter 3. …”
Libro electrónico -
235Publicado 2003“…IBM Tivoli Intelligent ThinkDynamic Orchestrator operates in a closed loop that performs automatic resource-requirements prediction based on predefined service level objectives and agreements, and automates infrastructure deployment. This just-in-time cycle ensures that each application has the resource it needs, when it needs it--without static overprovisioning. …”
Libro electrónico -
236Publicado 2021Tabla de Contenidos: “…Design Site and Facility Security Controls -- Wiring Closets/Intermediate Distribution Facilities -- Server Rooms/Data Centers -- Media Storage Facilities -- Evidence Storage -- Restricted and Work Area Security -- Utilities and Heating, Ventilation, and Air Conditioning -- Environmental Issues -- Fire Prevention, Detection, and Suppression -- Summary -- Domain 4 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- Open System Interconnection and Transmission Control Protocol/Internet Protocol Models -- The OSI Reference Model -- The TCP/IP Reference Model -- Internet Protocol Networking -- Secure Protocols -- Implications of Multilayer Protocols -- Converged Protocols -- Microsegmentation -- Wireless Networks -- Cellular Networks -- Content Distribution Networks -- Secure Network Components -- Operation of Hardware -- Repeaters, Concentrators, and Amplifiers -- Hubs -- Bridges -- Switches -- Routers -- Gateways -- Proxies -- Transmission Media -- Network Access Control -- Endpoint Security -- Mobile Devices -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia Collaboration -- Remote Access -- Data Communications -- Virtualized Networks -- Third-Party Connectivity -- Summary -- Domain 5 Identity and Access Management -- Control Physical and Logical Access to Assets -- Access Control Definitions -- Information -- Systems -- Devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity Management Implementation -- Single/Multifactor Authentication -- Accountability -- Session Management -- Registration, Proofing, and Establishment of Identity -- Federated Identity Management -- Credential Management Systems -- Single Sign-On -- Just-In-Time -- Federated Identity with a Third-Party Service…”
Libro electrónico -
237Publicado 2022Tabla de Contenidos: “…Fire prevention, detection, and suppression -- Power -- Chapter 6 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- OSI and TCP/IP models -- The OSI Reference Model -- The TCP/IP Model -- Secure Network Components -- Operation of hardware -- Transmission media -- Network access control devices -- Endpoint security -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia collaboration -- Remote access -- Data communications -- Virtualized networks -- Third-party connectivity -- Chapter 7 Identity and Access Management -- Control Physical and Logical Access to Assets -- Information -- Systems and devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity management implementation -- Single-/multifactor authentication -- Accountability -- Session management -- Registration, proofing, and establishment of identity -- Federated identity management -- Credential management systems -- Single sign-on -- Just-in-Time -- Federated Identity with a Third-Party Service -- On-premises -- Cloud -- Hybrid -- Implement and Manage Authorization Mechanisms -- Role-based access control -- Rule-based access control -- Mandatory access control -- Discretionary access control -- Attribute-based access control -- Risk-based access control -- Manage the Identity and Access Provisioning Life Cycle -- Implement Authentication Systems -- OpenID Connect/Open Authorization -- Security Assertion Markup Language -- Kerberos -- RADIUS and TACACS+ -- Chapter 8 Security Assessment and Testing -- Design and Validate Assessment, Test, and Audit Strategies -- Conduct Security Control Testing -- Vulnerability assessment -- Penetration testing -- Log reviews -- Synthetic transactions -- Code review and testing -- Misuse case testing…”
Libro electrónico -
238Publicado 2024Tabla de Contenidos: “…Managing Quality -- Global Company Profile: Arnold Palmer Hospital: Managing Quality Provides a Competitive Advantage at Arnold Palmer Hospital -- Quality and Strategy -- Defining Quality -- Implications of Quality -- Malcolm Baldrige National Quality Award -- ISO 9000 International Quality Standards -- Cost of Quality (COQ) -- Ethics and Quality Management -- Total Quality Management -- Continuous Improvement -- Six Sigma -- Employee Empowerment -- Benchmarking -- Just-in-Time (JIT) -- Taguchi Concepts -- OM in Action: A Hospital Benchmarks Against the Ferrari Racing Team? …”
Libro electrónico -
239Publicado 2023Tabla de Contenidos: “…Managing Quality -- Global Company Profile: Arnold Palmer Hospital: Managing Quality Provides a Competitive Advantage at Arnold Palmer Hospital -- Quality and Strategy -- Defining Quality -- Implications of Quality -- Malcolm Baldrige National Quality Award -- ISO 9000 International Quality Standards -- Cost of Quality (COQ) -- Ethics and Quality Management -- Total Quality Management -- Continuous Improvement -- Six Sigma -- Employee Empowerment -- Benchmarking -- Just-in-Time (JIT) -- Taguchi Concepts -- OM in Action: A Hospital Benchmarks Against the Ferrari Racing Team? …”
Libro electrónico -
240Publicado 2017Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
Libro electrónico