Mostrando 2,201 - 2,220 Resultados de 3,243 Para Buscar '"streaming"', tiempo de consulta: 0.13s Limitar resultados
  1. 2201
    Publicado 2018
    Tabla de Contenidos: “…-- Understanding SoA -- Differentiating microservices from SoA -- From the monolith to microservices -- Microservices principles -- Defining design principles -- Modelled around business capabilities -- Loosely couple -- Single responsibility -- Hiding implementation -- Isolation -- Independently deployable -- Build for failure -- Upstream -- Downstream -- Logging -- Monitoring -- Alerting -- Recovery -- Fallbacks -- Scalability -- Automation -- Domain-Driven Design -- What is Domain-Driven Design -- Ubiquitous language -- Bounded context -- Context mapping -- Using DDD in microservices -- Reactive microservices -- Reactive programming -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Back pressure -- Reactive frameworks -- Reactive Extensions -- Project Reactor -- Java reactive streams -- Akka -- Reactive microservices -- Cloud Native microservices -- Cloud computing -- Containers -- Deployment models -- Private cloud -- Public cloud -- Hybrid cloud -- Service models -- Infrastructure as a Service -- Platform as a Service -- Software as a Service -- Cloud Native microservices -- Summary -- Chapter 2: Getting Started with Spring Boot 2.0 -- Creating a Spring Boot application -- Setting up -- Installing JDK 8 -- UNIX/Mac OS X -- Windows -- Testing the installation -- Installing Maven 3.5 -- Unix /MacOS X -- Windows -- Testing the installation -- Installing IntelliJ IDEA CE 2017.2 -- Using Spring Initializr -- Understanding basic usage -- Reviewing the generated project files -- Maven Files -- Source files -- Resource files -- Gitignore -- Understanding advanced usage -- Using Maven -- Life cycle phases -- Introduction to Maven goals…”
    Libro electrónico
  2. 2202
    Publicado 2021
    Tabla de Contenidos: “…Visualizing multiple threads -- Summary -- Chapter 10: Making Smarter Apps with Core ML -- Technical requirements -- Understanding machine learning and Core ML -- Understanding what machine learning is -- Understanding Core ML -- Combining Core ML and computer vision -- Understanding the Vision framework -- Implementing an image classifier -- Training your own models with Create ML -- Training a Natural Language model -- Training a Vision model -- Updating models remotely with Model Deployment -- Using the Core ML API to retrieve collections of models -- Preparing and deploying the model -- Encrypting Core ML models -- Summary -- Chapter 11: Adding Media to Your App -- Technical requirements -- Playing audio and video -- Creating a simple video player -- Creating an audio player -- Playing media in the background -- Recording video and taking pictures -- Taking and storing a picture -- Recording and storing video -- Manipulating photos with Core Image -- Summary -- Chapter 12: Improving Apps with Location Services -- Technical requirements -- Requesting a user's location -- Asking for permission to access location data -- Obtaining a user's location -- Subscribing to location changes -- Setting up geofences -- Summary -- Chapter 13: Working with the Combine Framework -- Technical requirements -- Understanding the Combine framework -- Understanding Publisher -- Understanding Subscriber -- Understanding Operators -- Understanding Subject -- Combining Publishers, Subscribers, and Operators -- Using Operators to build error-proof streams -- Summary -- Chapter 14: Creating an App Clip for Your App -- Technical requirements -- Introducing App Clips -- App Clip User Journey -- App Clips Invocation Methods -- Developing your first App Clip -- Creating the App Clip's Target -- Sharing resources and code with the App Clip -- Using Active Compilation Conditions…”
    Libro electrónico
  3. 2203
    Publicado 2018
    Tabla de Contenidos: “…. -- Reading data from Blob Storage -- Reading Excel data from the stream -- Creating the activity function -- There's more... -- Auto-scaling Cosmos DB throughput -- Getting ready -- How to do it... -- There's more... -- Bulk inserting data into Cosmos DB -- How to do it... -- There's more... -- Chapter 9: Implementing Best Practices for Azure Functions -- Adding multiple messages to a queue using the IAsyncCollector function -- Getting ready -- How to do it... -- How it works... -- There's more... -- Implementing defensive applications using Azure Functions and queue triggers -- Getting ready -- How to do it... -- CreateQueueMessage - C# console application -- Developing the Azure Function - queue trigger -- Running tests using the console application -- How it works... -- There's more... -- Handling massive ingress using Event Hubs for IoT and other similar scenarios -- Getting ready -- How to do it... -- Creating an Azure Function event hub trigger -- Developing a console application that simulates IoT data -- Avoiding cold starts by warming the app at regular intervals -- Getting ready -- How to do it... -- Creating an HTTP trigger -- Creating a timer trigger -- There's more... -- See also -- Enabling authorization for function apps -- Getting ready -- How to do it... -- How it works... -- There's more... -- Controlling access to Azure Functions using function keys -- How to do it... -- Configuring the function key for each application -- Configuring one host key for all the functions in a single function app -- There's more... -- Securing Azure Functions using Azure Active Directory -- Getting ready -- How to do it…”
    Libro electrónico
  4. 2204
    Publicado 2022
    Tabla de Contenidos: “…Sample Questions -- Notes -- Chapter 3 Continuous Improvement Tools for Smart Manufacturing -- Introduction -- Voice of the Customer in the Age of Smart Manufacturing -- Voice of the Customer Using Net Promoter Score -- Voice of the Customer Using the Delphi Technique -- Voice of the Customer Using the Kano Model -- Affinity Diagrams to Organize Many Ideas into Common Themes -- Critical to Quality to Convert the VOC to Measurable Objectives -- Types of Data -- Benchmarking -- Process Maps -- Types of Process Maps -- SIPOC -- Process Maps with Decision Points -- Process Maps with Swim Lanes -- Limited Data Collection and the Hawthorne Effect Impacting Process Mapping -- Value Stream Maps to Eliminate Waste -- Value-Added Activity versus Non-Value-Added Activity -- Root Cause Analysis Using a Fishbone Diagram and Risk Matrix -- Root Cause Analysis Using the Five Whys -- Changes Coming to Root Cause Analysis with Smart Technologies -- Pareto Chart -- Kanban Pull System -- Poka-Yoke to Error-Proof Processes and Products -- Five S -- Heijunka -- Plan-Do-Check-Act -- Kaizen -- Setup Time Reduction Using Single Minute Exchange of Dies -- Gage Repeatability and Reproducibility (Gage R&amp -- R) -- Failure Modes and Effects Analysis (FMEA) to Solve Complex Problems -- Pugh Matrix to Design New Processes and Products -- Quality Function Deployment (House of Quality) -- History of QFD -- Structure of the House of Quality Used in QFD -- Building a House of Quality -- Benefits of Using QFD -- Using QFD in Combination with the Pugh Matrix -- Smart Technologies to Automate QFD -- Summary -- Sample Questions -- Notes -- Chapter 4 Improving Supply Chain Resiliency Using Smart Technologies -- Introduction -- Supply Chain Resilience -- Supply Chain Risk Heat Maps -- Supply Chain Mapping at a Macro and Micro Level -- Preferred Supplier Programs…”
    Libro electrónico
  5. 2205
    por Russinovich, Mark E.
    Publicado 2009
    Tabla de Contenidos: “…Page Files -- Stacks -- User Stacks -- Kernel Stacks -- DPC Stack -- Virtual Address Descriptors -- Process VADs -- Rotate VADs -- NUMA -- Section Objects -- Driver Verifier -- Page Frame Number Database -- Page List Dynamics -- Page Priority -- Modified Page Writer -- PFN Data Structures -- Physical Memory Limits -- Windows Client Memory Limits -- Working Sets -- Demand Paging -- Logical Prefetcher -- Placement Policy -- Working Set Management -- Balance Set Manager and Swapper -- System Working Set -- Memory Notification Events -- Proactive Memory Management (SuperFetch) -- Components -- Tracing and Logging -- Scenarios -- Page Priority and Rebalancing -- Robust Performance -- ReadyBoost -- ReadyDrive -- Conclusion -- Cache Manager -- Key Features of the Cache Manager -- Single, Centralized System Cache -- The Memory Manager -- Cache Coherency -- Virtual Block Caching -- Stream-Based Caching -- Recoverable File System Support -- Cache Virtual Memory Management -- Cache Size -- Cache Virtual Size -- Cache Working Set Size -- Cache Physical Size -- Cache Data Structures -- Systemwide Cache Data Structures -- Per-File Cache Data Structures -- File System Interfaces -- Copying to and from the Cache -- Caching with the Mapping and Pinning Interfaces -- Caching with the Direct Memory Access Interfaces -- Fast I/O -- Read Ahead and Write Behind -- Intelligent Read-Ahead -- Write-Back Caching and Lazy Writing -- Write Throttling -- System Threads -- Conclusion -- File Systems -- Windows File System Formats -- CDFS -- UDF -- FAT12, FAT16, and FAT32 -- exFAT -- NTFS -- File System Driver Architecture -- Local FSDs -- Remote FSDs -- File System Operation -- File System Filter Drivers -- Troubleshooting File System Problems -- Process Monitor Basic vs. …”
    Libro electrónico
  6. 2206
    Publicado 2015
    Tabla de Contenidos: “…. -- Minesweeper -- Mahjong -- Musik und DVDs abspielen in Windows 10 -- Die generalüberholten Xbox-Apps meistern -- Xbox -- Groove Music -- Gratis Filme und TV gucken per Streaming -- Die App Filme &amp -- Fernsehsendungen -- Kostenlos Fernsehen gucken mit Zattoo -- 11 Sicherheit mit ­Windows 10 -- Neue Anforderungen an die Sicherheit eines Betriebssystems -- Windows Hello -- Microsoft Passport…”
    Libro electrónico
  7. 2207
    Publicado 2023
    Tabla de Contenidos: “…-- Lean and Marketing -- Lessons from an AP Kaizen -- Traditional Metrics Discussion -- We Should Have Part of Our Accounting Report Entitled -- Discover the Opportunities -- Summary -- Part 3: Lean Accounting by Jerold Solomon -- Value Streams -- Accounting for Lean -- Why a Traditional Standard Cost System Is Incompatible with Lean -- Summary -- Chapter Questions -- Notes -- Additional Readings -- Appendix A - Study Guide -- Appendix B - Acronyms -- Appendix C - Glossary -- Index…”
    Libro electrónico
  8. 2208
    Publicado 2019
    Tabla de Contenidos: “…Introduction -- 2.2. Time series data stream clustering -- 2.2.1. Local clustering of histogram data…”
    Libro electrónico
  9. 2209
    Publicado 2017
    Tabla de Contenidos: “…High Availability and Replication -- Introduction -- Setting up hot streaming replication -- Getting ready -- How to do it... -- How it works... -- Replication using Slony -- Getting ready -- How to do it... -- How it works... -- Replication using Londiste -- Getting ready -- How to do it... -- How it works... -- Replication using Bucardo -- Getting ready -- How to do it... -- How it works... -- Replication using DRBD -- Getting ready…”
    Libro electrónico
  10. 2210
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Securing the WAL stream -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up a hot standby -- Getting ready -- How to do it... -- How it works... -- See also -- Upgrading to asynchronous replication -- Getting ready -- How to do it... -- How it works... -- There's more... -- Cascading replication -- Using replication slots -- Viewing replication status on a replica -- See also -- Bulletproofing with synchronous replication -- Getting ready -- How to do it... -- How it works... -- There's more... -- Being less strict -- Being more strict -- Enabling extreme durability -- See also -- Faking replication with pg_receivexlog -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up Slony -- Getting ready -- How to do it... -- How it works... -- See also -- Copying a few tables with Slony -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Setting up Bucardo -- Getting ready -- How to do it... -- How it works... -- See also -- Copying a few tables with Bucardo -- Getting ready -- How to do it... -- How it works... -- See also -- Setting up Londiste -- Getting ready -- How to do it... -- How it works... -- See also -- Copying a few tables with Londiste -- Getting ready -- How to do it... -- How it works... -- See also -- Setting up pglogical -- Getting ready -- How to do it... -- How it works... -- See also -- Copying a few tables with pglogical -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 7: Replication Management Tools -- Introduction -- Deciding when to use third-party tools -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing and configuring Barman -- Getting ready -- How to do it...…”
    Libro electrónico
  11. 2211
    por Rothman, Denis
    Publicado 2020
    Tabla de Contenidos: “…Amazon must expand its services to face competition -- A real-time manufacturing revolution -- CRLMM applied to an automated apparel manufacturing process -- An apparel manufacturing process -- Training the CRLMM -- Generalizing the unit training dataset -- Food conveyor belt processing - positive p and negative n gaps -- Running a prediction program -- Building the RL-DL-CRLMM -- A circular process -- Implementing a CNN-CRLMM to detect gaps and optimize -- Q-learning - MDP -- MDP inputs and outputs -- The optimizer -- The optimizer as a regulator -- Finding the main target for the MDP function -- A circular model - a stream-like system that never starts nor ends -- Summary -- Questions -- Further reading -- Chapter 12: AI and the Internet of Things (IoT) -- The public service project -- Setting up the RL-DL-CRLMM model -- Applying the model of the CRLMM -- The dataset -- Using the trained model -- Adding an SVM function -- Motivation - using an SVM to increase safety levels -- Definition of a support vector machine -- Python function -- Running the CRLMM -- Finding a parking space -- Deciding how to get to the parking lot -- Support vector machine -- The itinerary graph -- The weight vector -- Summary -- Questions -- Further reading -- Chapter 13: Visualizing Networks with TensorFlow 2.x and TensorBoard -- Exploring the output of the layers of a CNN in two steps with TensorFlow -- Building the layers of a CNN -- Processing the visual output of the layers of a CNN -- Analyzing the visual output of the layers of a CNN -- Analyzing the accuracy of a CNN using TensorBoard -- Getting started with Google Colaboratory -- Defining and training the model -- Introducing some of the measurements -- Summary -- Questions -- Further reading…”
    Libro electrónico
  12. 2212
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Encryption basics and protocols -- Services provided by encryption -- Stream versus block ciphers -- Symmetric versus asymmetric encryption -- Public key infrastructure and certificate authorities -- Authentication basics and protocols -- Authentication types -- Username/password with IP address identification authentication -- Encrypted username/password authentication -- Extensible authentication protocol (EAP) -- Authorization and access protocols -- Hash functions and message digests -- IPSec and key management protocols -- VPNs -- IPSec principles of operation -- IPSec tunnel establishment -- IPSec modes of operation -- IPSec authentication and encryption protocols -- IPSec AH protocol -- IPSec ESP protocol -- SSL/TLS and proxies -- Protocol basics -- The handshake protocol -- Network security components - RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs -- Firewalls -- RADIUS, NAC, and other authentication features -- Web application firewalls (WAFs) -- Summary -- Questions -- Chapter 4: Using Network Security Tools, Scripts, and Code -- Commercial, open source, and Linux-based tools -- Open source tools -- Commercial tools -- Information gathering and packet analysis tools -- Basic network scanners -- Network analysis and management tools -- Protocol discovery tools -- Vulnerability analysis tools -- Nikto -- Legion -- Exploitation tools -- The Metasploit Framework (MSF) -- Stress testing tools -- Windows tools -- Kali Linux tools -- Network forensics tools -- Wireshark and packet capture tools -- Summary -- Questions -- Chapter 5: Finding Protocol Vulnerabilities -- Black box, white box, and gray box testing -- Black box and fuzzing -- Enterprise networks testing -- Provider networks testing -- Fuzzing phases -- Common vulnerabilities -- Layer 2-based vulnerabilities -- Layer 3-based vulnerabilities -- Layer 4-based vulnerabilities…”
    Libro electrónico
  13. 2213
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Part 1: Getting Started -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Role of Cryptography in the Connected World -- Evolution of cryptography -- The advent of TLS and the internet -- Increasing connectivity -- Connectivity versus security - larger attack surface -- Connectivity versus marginal attack cost -- Connectivity versus scaling attacks -- Increasing complexity -- Complexity versus security - features -- Complexity versus security - emergent behavior -- Complexity versus security - bugs -- Example attacks -- The Mirai botnet -- Operation Aurora -- The Jeep hack -- Commonalities -- Summary -- Chapter 2: Secure Channel and the CIA Triad -- Technical requirements -- Preliminaries -- Confidentiality -- Integrity -- Authentication -- Message authentication -- Entity authentication -- Secure channels and the CIA triad -- Summary -- Chapter 3: A Secret to Share -- Secret keys and Kerckhoffs's principle -- Cryptographic keys -- One key for each task -- Key change and session keys -- Key space -- Key length -- Crypto-agility and information half-life -- Key establishment -- Key transport -- Key agreement -- Randomness and entropy -- Information-theoretic definition of entropy -- Entropy in cryptography -- True randomness and pseudo-randomness -- Summary -- Chapter 4: Encryption and Decryption -- Preliminaries -- Symmetric cryptosystems -- Information-theoretical security (perfect secrecy) -- A first example -- The one-time pad -- Computational security -- Asymptotic approach and efficient computation -- Negligible probabilities -- Pseudorandomness -- Stream ciphers -- RC4 -- Pseudorandom functions and chosen-plaintext attacks -- Summary -- Chapter 5: Entity Authentication -- The identity concept -- Basic principles of identification protocols -- Basic factors for identification…”
    Libro electrónico
  14. 2214
    Publicado 1999
    Tabla de Contenidos: “…Names have no type, but objects do -- Expression Statements -- Expression Statements and In-Place Changes -- print Statements -- The Python "Hello World" Program -- Redirecting the Output Stream -- The print &gt -- &gt -- file Extension -- Chapter Summary -- Quiz Answers -- if Tests -- if Statements -- General Format -- Basic Examples -- Multiway Branching -- Python Syntax Rules -- Block Delimiters -- Statement Delimiters -- A Few Special Cases -- Truth Tests -- The if/else Ternary Expression -- Chapter Summary -- Quiz Answers -- while and for Loops -- while Loops -- General Format -- Examples -- break, continue, pass, and the Loop else -- General Loop Format -- Examples -- pass -- continue -- break -- else -- More on the loop else clause -- for Loops -- General Format -- Examples -- Basic usage -- Other data types -- Tuple assignment in for -- Nested for loops -- Iterators: A First Look -- File Iterators -- Other Built-in Type Iterators -- Other Iteration Contexts -- User-Defined Iterators -- Loop Coding Techniques -- Counter Loops: while and range -- Nonexhaustive Traversals: range -- Changing Lists: range -- Parallel Traversals: zip and map -- Dictionary construction with zip -- Generating Both Offsets and Items: enumerate -- List Comprehensions: A First Look -- List Comprehension Basics -- Using List Comprehensions on Files -- Extended List Comprehension Syntax -- Chapter Summary -- Quiz Answers -- The Documentation Interlude -- Python Documentation Sources -- # Comments -- The dir Function -- Docstrings: _ _doc_ _ -- User-defined docstrings -- Docstring standards -- Built-in docstrings -- PyDoc: The help Function -- PyDoc: HTML Reports -- Standard Manual Set -- Web Resources -- Published Books -- Common Coding Gotchas -- Chapter Summary -- Quiz Answers -- Part IV -- Function Basics -- Why Use Functions? …”
    Libro electrónico
  15. 2215
    Publicado 2017
    Tabla de Contenidos: “…-- Proxy requests -- Binding HTTP to local addresses -- Installing EC2 discovery plugin -- Installing S3 repository plugin -- Setting up periodic snapshots -- Backing up and restoring -- Setting up a repository for snapshots -- Shared filesystem -- Cloud or distributed filesystems -- Taking snapshots -- Restoring a specific snapshot -- Setting up index aliases -- Understanding index aliases -- How index aliases can help -- Setting up index templates -- Defining an index template -- Creating indexes on the fly -- Modeling time series data -- Scaling the index with unpredictable volume over time -- Unit of parallelism in Elasticsearch -- The effect of the number of shards on the relevance score -- The effect of the number of shards on the accuracy of aggregations -- Changing the mapping over time -- New fields get added -- Existing fields get removed -- Automatically deleting older documents -- How index-per-timeframe solves these issues -- Scaling with index-per-timeframe -- Changing the mapping over time -- Automatically deleting older documents -- Summary -- Chapter 10: Building a Sensor Data Analytics Application -- Introduction to the application -- Understanding the sensor-generated data -- Understanding the sensor metadata -- Understanding the final stored data -- Modeling data in Elasticsearch -- Defining an index template -- Understanding the mapping -- Setting up the metadata database -- Building the Logstash data pipeline -- Accept JSON requests over the web -- Enrich the JSON with the metadata we have in the MySQL database -- The jdbc_streaming plugin -- The mutate plugin…”
    Libro electrónico
  16. 2216
    Publicado 2018
    Tabla de Contenidos: “…. -- I/O in the 21st century - knowing the streams -- Getting ready -- How it works... -- There's more... -- Creating a Windows Service -- Getting ready -- How it works... -- There's more... -- Using the TService.LogMessage method -- Associating a file extension with your application on Windows -- Getting ready -- How to do it... -- There's more... -- Be coherent with the Windows look and feel using TTaskDialog -- Getting started -- How it works... -- There's more... -- The amazing TFDTable - indices, aggregations, views, and SQL -- Getting ready -- How to do it... -- How it works... -- There's more... -- ETL made easy - TFDBatchMode -- Getting ready -- How to do it... -- How it works... -- There's more... -- Data integration made easy - TFDLocalSQL -- Getting ready -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  17. 2217
    Publicado 2018
    Tabla de Contenidos: “…Component Tree -- auraTemp -- Transactions tab -- Performance tab -- Event Log tab -- Actions tab -- Storage tab -- Salesforce community page optimizer -- Using the Chrome developer Console -- Setting breakpoints in the Chrome developer Console -- Pause on caught exceptions -- Apex debugging -- Using the Salesforce CLI to stream logs -- Advanced debugging with the Replay Debugger -- Summary -- Chapter 9: Performance Tuning Your Lightning Component -- Storable actions -- When to use storable actions? …”
    Libro electrónico
  18. 2218
    Publicado 2020
    Tabla de Contenidos: “…How to use EDGAR to pinpoint information -- Getting Data in a Format You Can Work With -- Assembling the tools you need -- Importing financial information into Excel -- Getting in tune with interactive data -- Paying Attention to the Non-Financial Information -- Monitoring news streams for investment banking ideas -- Quickly processing information with aggregators -- Doing research on the key players in a deal -- Chapter 7 Making Sense of Financial Statements -- Income Statements -- Locating the areas of interest to investment bankers -- Tweaking the statement with different assumptions -- Finding investment banking opportunities -- Balance Sheets -- Finding your way around the key parts -- Understanding a company's financial strength -- Locating pitfalls and opportunities -- Statement of Cash Flows -- Seeing why the cash flow statement is so important in deal making -- Understanding the key parts of the document -- Calculating free cash flow -- Proxy Statements -- Learning about the key players in a deal -- Identifying the management team's incentives -- Analyzing management pay packages -- Chapter 8 Perfecting the Financial Ratios for Investment Banking -- Valuation Multiples: Assessing How Much the Company Is Worth -- Investors' favorite valuation tool: P/E ratio -- Going old school with price-to-book -- Putting a price on profitability -- Liquidity Multiples: Checking Companies' Staying Power -- Deciphering debt to equity -- Getting up to speed with the quick ratio -- Interpreting interest coverage -- Profitability Ratios: Seeing How a Company's Bottom Line Measures Up -- Why gross margin isn't so gross after all -- Income from continuing operations: Looking at profit with a keen eye -- Keying into profits with net margin -- Efficiency Ratios: Knowing How Well the Company Is Using Investors' Money -- Finding out about return on assets…”
    Libro electrónico
  19. 2219
    por Sreenivasan, N. S.
    Publicado 2007
    Tabla de Contenidos: “…R) -- Problem 1 -- Illustration 15 -- Analysis -- Normalised yield (YN) -- Illustration 16 -- Process capability analysis (PCA) -- Conclusion -- Annexure 12A: Exercises on Six Sigma calculations -- Exercise 1 -- Exercise 2 -- Exercise 3 -- Exercise 4 -- Exercise 5 -- Exercise 6 -- Exercise 7 -- Exercise 8 -- Individual process -- Process chain -- Exercise 9 -- Chapter 13: Improving Process Flow and Speed to Achieve Lean Process -- Background -- Process flow and process speed -- Two streams of quality improvement -- Checklist of factors having a bearing on process flow and speed -- Lean Six Sigma -- Addressing the factors of hold-up -- Waiting for approval -- Waiting for maintenance -- Movement -- Searching -- Formats and records -- Meetings -- Late starting and early closing -- Push, pull and out -- Process set-up -- Work in process, lead time and process cycle efficiency -- Work in process -- Lead time/process speed -- Analysis of process lead time and process velocity -- Process cycle efficiency (PCE)-the 'lean metric' -- Lean Six Sigma -- Conclusion -- Section D: Continual Improvement Process Framework…”
    Libro electrónico
  20. 2220
    Publicado 2012
    Tabla de Contenidos: “…-- Authentication -- WEP Authentication -- Encryption -- Stream Ciphers vs. Block Ciphers -- How WEP Works -- History of Breaking WEP -- Attacking WEP Encrypted Networks -- How WPA Works -- WPA-PSK -- WPA-Enterprise -- WPA2 Encryption Algorithms -- Attacking WPA Protected Networks -- Cracking the WPA Pre-Shared Key -- WPA Deauthentication Spoofing -- Wi-Fi Protected Setup (WPS) Brute Forcing -- WPA Denial of Service -- Attacks on TKIP -- So What Should I Use? …”
    Libro electrónico