Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 172
- Application software 138
- Engineering & Applied Sciences 100
- Management 88
- Cloud computing 78
- Computer Science 72
- Machine learning 69
- Computer software 59
- Computer networks 57
- Computer programs 56
- Python (Computer program language) 56
- Security measures 55
- Data processing 53
- Artificial intelligence 52
- Computer programming 51
- Microsoft .NET Framework 50
- Database management 43
- Computer security 42
- Web site development 42
- Java (Computer program language) 39
- Design 38
- Information technology 38
- Operating systems (Computers) 37
- Web sites 35
- Application program interfaces (Computer software) 32
- Programming 32
- Research & information: general 32
- Software engineering 32
- Business 29
- Business & Economics 29
-
1621por Flora, S. J. S.Tabla de Contenidos: “…. -- Potential biological weapons and warfare agents -- A brief history of biological warfare -- Emergence of next generation biological weapons -- Binary biological weapons -- Designer genes -- Designer diseases -- Gene therapy based bioweapons -- Host swapping diseases -- Stealth viruses -- Synthetic biology assisted whole genome synthesis of bacterial clones and bacteriophages -- Synthesis of bacteriophage φ X174 -- Synthesis bacteriophage T7 genome by refactoring process -- Synthesis of M. genitalium and M. mycoides clones using minimal genome content -- Synthetic biology assisted whole genome synthesis of native or chimeric viruses -- Synthesis of the 1918 Spanish flu virus -- Synthesis of poliovirus -- Synthesis of human endogenous retrovirus -- Synthesis of HIVcpz -- Synthesis of SARS-like coronavirus -- In vitro packaging of viral genomes -- Mechanism for dsRNA viral genome packaging -- Mechanism for dsDNA viral genome packaging -- Mechanism of linear motor assisted viral genome packaging…”
Publicado 2020
Libro electrónico -
1622Publicado 2018Tabla de Contenidos: “…Contents -- List of Contributors xiii -- Preface xv -- About the Companion Website xix -- Part I Analysis and Synthesis of Spatial Sound 1 -- Time–Frequency Processing: Methods and Tools 3 /Juha Vilkamo and Tom Ba¨ckstro¨m -- 1.1 Introduction 3 -- 1.2 Time–Frequency Processing 4 -- 1.2.1 Basic Structure 4 -- 1.2.2 Uniform Filter Banks 5 -- 1.2.3 Prototype Filters and Modulation 6 -- 1.2.4 A Robust Complex-Modulated Filter Bank, and Comparison with STFT 8 -- 1.2.5 Overlap-Add and Windowing 12 -- 1.2.6 Example Implementation of a Robust Filter Bank in Matlab 13 -- 1.2.7 Cascaded Filters 15 -- 1.3 Processing of Spatial Audio 16 -- 1.3.1 Stochastic Estimates 17 -- 1.3.2 Decorrelation 18 -- 1.3.3 Optimal and Generalized Solution for Spatial Sound Processing Using Covariance Matrices 19 -- References 23 -- 2 Spatial Decomposition by Spherical Array Processing 25 /David Lou Alon and Boaz Rafaely -- 2.1 Introduction 25 -- 2.2 Sound Field Measurement by a Spherical Array 26 -- 2.3 Array Processing and Plane-Wave Decomposition 26 -- 2.4 Sensitivity to Noise and Standard Regularization Methods 29 -- 2.5 Optimal Noise-Robust Design 32 -- 2.5.1 PWD Estimation Error Measure 32 -- 2.5.2 PWD Error Minimization 34 -- 2.5.3 R-PWD Simulation Study 35 -- 2.6 Spatial Aliasing and High Frequency Performance Limit 37 -- 2.7 High Frequency Bandwidth Extension by Aliasing Cancellation 39 -- 2.7.1 Spatial Aliasing Error 39 -- 2.7.2 AC-PWD Simulation Study 40 -- 2.8 High Performance Broadband PWD Example 42 -- 2.8.1 Broadband Measurement Model 42 -- 2.8.2 Minimizing Broadband PWD Error 42 -- 2.8.3 BB-PWD Simulation Study 44 -- 2.9 Summary 45 -- 2.10 Acknowledgment 46 -- References 46 -- 3 Sound Field Analysis Using Sparse Recovery 49 /Craig T. …”
Libro electrónico -
1623Publicado 2013Tabla de Contenidos: “…Number of Comparable Firms -- Basis for Selecting Comparable Firms -- Geography and Clientele -- Sector and Industry Characteristics -- Technology and Intraindustry Diversity -- Bimodal and Multimodal Patterns -- Choice of Valuation Multiples -- Choice of Numerator: Market Cap versus Firm Value -- Industry-Specific Multiples -- HYPOTHETICAL EXAMPLE -- Analysis of the Hypothetical Example -- Other Potential Issues -- KEY POINTS -- NOTES -- REFERENCES -- Equity Analysis in a Complex Market -- AN INTEGRATED APPROACH TO A SEGMENTED MARKET -- A Coherent Framework -- DISENTANGLING -- Noise Reduction -- Return Revelation -- Predictive Power -- Additional Complexities -- CONSTRUCTING, TRADING, AND EVALUATING PORTFOLIOS -- PROFITING FROM COMPLEXITY -- KEY POINTS -- NOTES -- REFERENCES -- Equity Portfolio Selection Models in Practice -- PORTFOLIO CONSTRAINTS COMMONLY USED IN PRACTICE -- Long-Only (No-Short-Selling) Constraints -- Holding Constraints -- Turnover Constraints -- Risk Factor Constraints -- Cardinality Constraints -- Minimum Holding and Transaction Size Constraints -- Round Lot Constraints -- BENCHMARK EXPOSURE AND TRACKING ERROR MINIMIZATION -- Standard Definition of Tracking Error -- Alternative Ways of Defining Tracking Error -- Actual Versus Predicted Tracking Error -- INCORPORATING TRANSACTION COSTS -- Linear Transaction Costs -- Piecewise-Linear Transaction Costs -- Quadratic Transaction Costs -- Fixed Transaction Costs -- INCORPORATING TAXES -- MULTIACCOUNT OPTIMIZATION -- ROBUST PARAMETER ESTIMATION -- PORTFOLIO RESAMPLING -- ROBUST PORTFOLIO OPTIMIZATION -- KEY POINTS -- NOTES -- REFERENCES -- Basics of Quantitative Equity Investing -- EQUITY INVESTING -- FUNDAMENTAL VS. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1624Publicado 2019Tabla de Contenidos: “…Distributed Collaborative Search Via Free Energy Minimization -- 4.3.4. Adapting Team Structure -- 4.4. …”
Libro electrónico -
1625Publicado 2021Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
Libro electrónico -
1626Publicado 2022Tabla de Contenidos: “…Cover -- About the Authors -- Title Page -- Copyright Page -- Acknowledgments -- About this Book -- Contents at a Glance -- Contents -- Foreword -- Preface -- Introduction -- Instructor Website -- Chapter 1 Introduction and Security Trends -- The Computer Security Problem -- Definition of Computer Security -- Historical Security Incidents -- The Current Threat Environment -- Infrastructure Attacks -- Ransomware -- Threats to Security -- Viruses and Worms -- Intruders -- Insiders -- Criminal Organizations -- Nation-States, Terrorists, and Information Warfare -- Brand-Name Attacks -- Attributes of Actors -- Internal/External -- Level of Sophistication -- Resources/Funding -- Intent/Motivation -- Security Trends -- Targets and Attacks -- Specific Target -- Opportunistic Target -- Minimizing Possible Avenues of Attack -- Approaches to Computer Security -- Cybersecurity Kill Chain -- Threat Intelligence -- Open Source Intelligence -- Ethics -- Additional References -- Chapter 1 Review -- Chapter 2 General Security Concepts -- Basic Security Terminology -- Security Basics -- Security Tenets -- Security Approaches -- Security Principles -- Formal Security Models -- Confidentiality Models -- Integrity Models -- Additional References -- Chapter 2 Review -- Chapter 3 Operational and Organizational Security -- Policies, Procedures, Standards, and Guidelines -- Organizational Policies -- Change Management Policy -- Change Control -- Asset Management -- Security Policies -- Data Policies -- Credential Policies -- Password and Account Policies -- Human Resources Policies -- Code of Ethics -- Job Rotation -- Separation of Duties -- Employee Hiring (Onboarding) and Promotions -- Retirement, Separation, or Termination (Offboarding) -- Exit Interviews -- Onboarding/Offboarding Business Partners -- Adverse Actions -- Mandatory Vacations -- Acceptable Use Policy…”
Libro electrónico -
1627Publicado 2016Tabla de Contenidos: “…-- Hazard and Risk -- Waste and Hazard Are Insufficient -- THE PRINCIPLES AND IMPLICATIONS -- Maximizing Resource Efficiency -- Eliminating and Minimizing Hazards and Pollution -- Design Systems Holistically and Using Life Cycle Thinking -- PROBLEMS WITH CHEMICALS AND REACTION SPACES -- Chemical Reactivity -- Solvents-Why We Use Them and Can We Eliminate Them? …”
Libro electrónico -
1628Publicado 2021Tabla de Contenidos: “…The Mumford-Shah model -- 8.4.2. Graph cuts minimization -- 8.5. Summary -- 8.6. References -- Chapter 9. …”
Libro electrónico -
1629Publicado 2024Tabla de Contenidos: “…Avoiding pitfalls in value proposition design -- Not actually solving a real customer need -- Putting features before benefits -- Failing to differentiate from the crowd -- Not targeting specific buyer personas -- Inconsistency across touchpoints -- Failing to evolve messaging -- Focusing excessively on brand image over benefits -- Relying too heavily on industry jargon -- Summary -- Questions -- Answers -- Part 3: A Successful Product-Focused Strategy -- Chapter 7: The Science of Growth Experimentation and Testing for Product-Led Success -- The significance of growth experimentation and user testing -- Reduced risk -- Accelerated learning -- Improved ROI -- Increased agility -- Fostered innovation -- Data-driven alignment -- Optimized user experiences -- Sustained competitive advantage -- Principles of growth experimentation -- Designing and executing growth experiments with precision -- Selecting strategic metrics -- Crafting controlled experiments -- Planning and executing effective growth experiments -- Designing controlled experiments -- Reducing biases through randomization -- Blinding mitigates perception biases -- Leveraging analytics tools -- Minimizing bias throughout the experiment -- Optimization in action - testing to boost app retention -- Analyzing experiment results and iterating on product features and marketing strategies -- Embracing a growth mindset -- Continuous optimization fuels growth -- Types of growth experiments -- A/B testing - crafting the perfect blend of impact and innovation -- Cohort analysis - understanding the evolution of user groups -- Funnel analysis - paving the path of conversion -- Empowering growth product managers for informed experimentation -- Analytics tools setup - crafting the infrastructure of insights -- Data-informed decision-making - the art of insightful direction…”
Libro electrónico -
1630Publicado 2011Tabla de Contenidos: “…-- 3.3 Supporting Code Promotion -- 3.4 Managing the Configuration -- 3.5 Practical Approaches to Establishing a CMDB -- 3.6 Change Control Depends on Environment Configuration -- 3.7 Minimize the Number of Controls Required -- 3.8 Managing Environments -- 3.9 The Future of Environment Configuration -- Conclusion -- Chapter 4 Change Control…”
Libro electrónico -
1631Publicado 2024Tabla de Contenidos: “…Managing COTS implementations: Agile versus Big-Bang -- Embracing Agile frameworks for collaboration -- Rediscovering the Agile Manifesto -- Moving beyond the Agile Manifesto -- Charting Scrum's ascendancy in Agile practices -- Understanding the Scrum Sprint cycle -- Applying Scrum's foundational principles -- Adapting to Scrum's deliberate flexibility -- Amplifying team efficacy with Scrum -- Mastering the art of small teams -- Fostering a culture of collaboration and innovation -- Defining team roles and responsibilities -- Facilitating effective collaboration through Scrum -- Encouraging cross-team collaborations -- Exploring the three pillars of Scrum's empiricism -- Embracing the team of teams (TOT) approach -- Adopting insights from the ToT philosophy -- Summary -- Questions -- Answers -- Further Reading -- Chapter 3: Establishing Lean Flows to Improve Productivity -- Technical requirements -- Unlocking Lean efficiency -- Orchestrating value streams -- Understanding the Lean philosophy -- Delivering value - the core of Lean -- Creating operational efficiency - the Lean way -- Meeting customer needs effectively -- Valuing the human element -- Embracing operational transformation -- Identifying waste and constraints -- Viewing the spectrum of waste -- Tweaking elements of waste by domain -- Constraints - the silent value blockers -- Mapping a value stream -- Amplifying IT's impact - driving operational efficiency and strategic value -- Prioritizing efficiency - the Lean imperative for organizational success -- Streamlining value delivery -- Classifying value streams -- Balancing speed and cost -- Enhancing efficiency by minimizing inefficiencies -- Carving a niche in the professional world -- Installing Lean strategies for a competitive edge -- Prioritizing value flows -- Demystifying organizational value streams…”
Libro electrónico -
1632por Godbold, AshleyTabla de Contenidos: “…Input Field - TextMeshPro -- TextMeshPro - Input Field component -- Examples -- Creating a dropdown menu with images -- Summary -- Part 4: Unity UI Advanced Topics -- Chapter 14: Animating UI Elements -- Technical requirements -- Animation Clips -- Animation Events -- Animator Controller -- The Animator of Transition Animations -- Animator layers -- Setting Animation Parameters in scripts -- Animator Behaviours -- Animating pop-up windows to fade in and out -- Animating a complex loot box -- Summary -- Chapter 15: Particles in the UI -- Technical requirements -- Particles in the UI -- Examples -- Creating a Particle System that displays in the UI -- Summary -- Chapter 16: Utilizing World Space UI -- Technical requirements -- When to use World Space UI -- Appropriately scaling text in the Canvas -- Other considerations when working in World Space -- Examples -- 2D World Space status indicators -- 3D hovering health bars -- Summary -- Chapter 17: Optimizing Unity UI -- Optimization basics -- Frame Rate -- GPU and CPU -- Tools for determining performance -- Statistics window -- Unity Profiler -- Unity Frame Debugger -- Basic Unity UI Optimization Strategies -- Using multiple Canvases and Canvas Hierarchies -- Minimizing the use of Layout Groups -- Hiding objects appropriately -- Appropriately time object pooling enabling and disabling -- Reducing Raycast computations -- Summary -- Further reading -- Part 5: Other UI and Input Systems -- Chapter 18: Getting Started with UI Toolkit -- Technical requirements -- Overview of UI Toolkit -- Installing the UI Toolkit package -- Parts of the UI Toolkit system -- Visual Elements and UI Hierarchy -- Creating UI with the UI Builder -- Using the UI Document component -- Making The UI interactable with C# -- The UIElements namespaces -- Getting a reference to UI Documents variables -- Managing Visual Element events…”
Publicado 2023
Libro electrónico -
1633Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
1634Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- CHAPTER 1 WHAT'S NEW IN WINDOWS 7 -- Getting Started -- Aero Peek -- Aero Snap -- Libraries -- Internet Explorer 8 -- Windows Action Center -- Windows Live Essentials -- Device Stage -- CHAPTER 2 GETTING STARTED WITH WINDOWS 7 -- Logging into Windows 7 -- Dealing with a Failed Login -- Using the Mouse -- Using the Keyboard -- User Account Control (UAC) for Administrators -- User Account Control for Standard Users -- Adjusting User Account Control (UAC) -- CHAPTER 3 USING THE WINDOWS 7 DESKTOP -- Starting a Program from the Start Menu -- Opening a New Program Window -- Maximizing, Minimizing, Restoring, and Resizing a Window -- Using Aero Snap to Manage Windows -- Using Aero Peek to View the Desktop -- Using Alt-Tab to Cycle Through Programs -- Using Windows Flip (Win-Tab) to Cycle Through Programs -- Using the Taskbar to View and Select Running Programs -- Closing a Program -- Using Desktop Gadgets -- CHAPTER 4 WORKING WITH YOUR FOLDERS -- Using Libraries -- Enabling the Menu Pane -- Adding Folders to a Library -- Changing Library Layouts -- Using Send To -- Using Drag and Drop to Copy a Folder -- Using Drag and Drop to Move a Folder -- Using Copy and Paste to Copy a Folder -- Using Copy To/Move To -- Creating New Folders -- Renaming Folders -- Deleting Folders -- CHAPTER 5 WORKING WITH YOUR FILES -- Changing File-Viewing Options -- Viewing File Information (Properties) -- Compressing a File -- Renaming a Group of Files -- Renaming a File -- Copying a File to the Same Folder -- Moving a File or Group of Files -- Sorting, Grouping, and Stacking Files in a Folder -- Dealing with Duplicates While Copying Files -- CHAPTER 6 PRINTING -- Viewing Available Printers -- Installing a New Printer -- Using Device Stage to View and Change Printer Properties -- Printing a Test Page to a Local Printer -- Installing a Network Printer…”
Libro electrónico -
1635Publicado 2012Tabla de Contenidos: “…Intro -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Enterprise Security -- 1 Cryptographic Tools -- Determine Appropriate Tools and Techniques -- Advanced PKI Concepts -- Hashing -- Cryptographic Applications -- Digital Signatures -- Code Signing -- Nonrepudiation -- Transport Encryption -- Implications of Cryptographic Methods and Design -- Entropy -- Pseudorandom Number Generation -- Perfect Forward Secrecy -- Confusion -- Diffusion -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 2 Computing Platforms -- Advantages and Disadvantages of Virtualizing Servers and Minimizing Physical Space Requirements -- VLAN -- Securing Virtual Environments, Appliances, and Equipment -- Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines -- Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines -- Secure Use of On-demand/Elastic Cloud Computing -- Vulnerabilities Associated with Co-mingling of Hosts with Different Security Requirements -- Virtual Desktop Infrastructure (VDI) -- Terminal Services -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 3 Enterprise Storage -- Explain the Security Implications of Enterprise Storage -- Virtual Storage -- NAS-Network Attached Storage -- SAN-Storage Area Network -- VSAN -- iSCSI -- FCOE -- LUN Masking -- HBA Allocation -- Redundancy (Location) -- Secure Storage Management -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 4 Infrastructure -- Advanced Network Design -- Complex Network Security Solutions for Data Flow -- Secure Data Flows to Meet Changing Business Needs -- Secure DNS -- Secure Directory Services -- Network Design Consideration…”
Libro electrónico -
1636Publicado 2024Tabla de Contenidos: “…. -- Crafting high-quality questions -- How to do it... -- Generating minimal working examples -- How to do it... -- There's more... -- Chapter 13: Using Artificial Intelligence with LaTeX -- Getting started with ChatGPT -- How to do it... -- How it works... -- There's more... -- Getting answers to LaTeX questions -- How to do it... -- How it works... -- Improving your content -- How to do it... -- How it works... -- There's more... -- Generating code -- How to do it... -- How it works... -- There's more... -- Index -- Other Books You May Enjoy…”
Libro electrónico -
1637por Dave, Parag H.Tabla de Contenidos: “…Problem -- Single Source Shortest Paths -- Shortest Paths Problem -- Shortest Paths Tree -- All-Pairs Shortest Paths -- Maximum Flow Problems -- Flow Networks -- Maximum-Flow Problem -- Analysis of Ford-Fulkerson Algorithm -- Conclusion -- Summary -- Key Terms -- Exercises -- Web Resources -- Abstract Algorithms 4-Backtracking -- Objectives -- Combinatorial Search -- Search and Traversal -- Breadth First Search -- Depth First Search -- The Backtracking Strategy -- Example 1: 8-Queens Problem -- Backtracking Framework -- Efficiency of Backtracking -- Example 2: M-Colouring Problem -- Example 3: Hamiltonian Circuits -- Some Typical State Spaces -- Constructing all Subsets -- Constructing all Permutations -- Constructing all Paths in a Graph -- Bandwidth Minimization -- Covering Chess Boards -- Convex Hull -- Summary -- Key Terms -- Exercises -- Web Resources -- Natural Algorithms-GA, SA, ANN, TS -- Objectives -- Introduction -- Evolutionary Algorithms and Evolutionary Computing -- Genetic Algorithms -- An example problem -- Observations -- Simulated Annealing -- Sample implementation -- Artificial Neural Networks -- Analogy to the Brain -- How they Work? …”
Publicado 1900
Libro electrónico -
1638Publicado 2024Tabla de Contenidos: “…-- Scaling Agile -- Agile and DevSecOps Review -- Challenges with Scaling Agile -- Internal Dependencies, External Dependencies, and the Need for Some Up-Front Engineering - Understanding the Complexity of the Enterprise -- Sprint Teams and Structure -- Minimum Viable Products (MVPs), Minimal Marketable Products (MMPs), Sprints, and Increments -- Recommendations -- No Single Approach Addresses All Systems -- Increment Planning -- Focus on MVP/MMPs -- Up-Front Requirements Decomposition and Initial Systems Engineering -- Tailoring of Tools -- Contract Incentives -- Near Operational Environments…”
Libro electrónico -
1639Publicado 2024Tabla de Contenidos: “…-- Estimating the potential cost of using metadata extractors -- Follow these simple best practices to minimize your costs -- Estimate your maximal costs before running the actual extractors -- Preserving privacy with metadata extractors, and not only -- Scrubbing personal data and other sensitive information -- Using the ingestion pipeline to increase efficiency -- Handling documents that contain a mix of text and tabular data -- Hands-on - ingesting study materials into our PITS -- Summary -- Chapter 5: Indexing with LlamaIndex -- Technical requirements…”
Libro electrónico -
1640Publicado 2024Tabla de Contenidos: “…. -- Optimizing Spark jobs by minimizing data shuffling -- How to do it... -- See also -- Avoiding data skew -- How to do it... -- There's more... -- Caching and persistence -- How to do it... -- There's more... -- Partitioning and repartitioning -- How to do it... -- There's more... -- Optimizing join strategies -- How to do it... -- See also -- Chapter 7: Performance Tuning in Delta Lake -- Technical requirements -- Optimizing Delta Lake table partitioning for query performance -- How to do it... -- There's more... -- See also -- Organizing data with Z-ordering for efficient query execution -- How to do it... -- How it works... -- See also -- Skipping data for faster query execution -- How to do it... -- See also -- Reducing Delta Lake table size and I/O cost with compression -- How to do it... -- How it works... -- See also -- Part 2 - Data Engineering Capabilities within Databricks -- Chapter 8: Orchestration and Scheduling Data Pipeline with Databricks Workflows -- Technical requirements -- Building Databricks workflows -- How to do it... -- See also…”
Libro electrónico