Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2981Publicado 2023Tabla de Contenidos: “…Foreword of the Editor i -- Zusammenfassung iii -- Abstract v -- Abbreviations xiii -- List of Symbols xvii -- 1 Introduction 1 -- 1.1 Aims and Objectives 1 --1.2 State of the Art 4 -- 1.3 Method of Mode-Locking in Laser Physics 7 -- 1.4 From Optics to Microwaves 13 -- 1.5 Outline 14 -- 2 Fundamental Theory of Passive Mode-Locked Oscillators 17 -- 2.1 Characteristics of Ultra-Short Pulses 17 -- 2.1.1 Slowly Varying Amplitudes 17 -- 2.1.2 Ultra-Short Pulses 18 -- 2.2 Haus Master Equation of Passive Mode-Locked Oscillators 20 -- 2.2.1 Amplification 21 -- 2.2.2 Saturable Loss and Self Amplitude Modulation 23 -- 2.2.3 Dispersion 24 -- .2.4 Slow Components 25 -- 2.2.5 Time-Shift 27 -- 2.2.6 Typical Values 28 -- 2.3 Passive Mode-Locked Oscillators for MW Frequencies 30 -- 2.3.1 Fast and Slow Components 30 -- 2.3.2 Fast Amplifier and Fast Absorber 31 -- 2.3.3 Slow Amplifier and Fast Absorber 35 -- 2.4 Conclusion 37 -- 3 MW Components for Passive Mode-Locked Oscillators 39 -- 3.1 Helical Gyro-TWTs 39 -- 3.1.1 Helically Corrugated Waveguides 41 -- 3.1.2 Electron Cyclotron Maser Interaction 46 -- 3.1.3 Large Orbit Electron Beams 50 -- 3.1.4 CUSP-Type Electron Guns 52 -- 3.1.5 Waveguide Polarizers 60 -- 3.1.6 Horn Antenna and Collector 62 -- 3.1.7 Broadband Windows 64 -- 3.1.8 In-and Out-coupling of High-Power Signals 68 -- 3.2 Cyclotron Absorber 70 -- 3.3 Helical Gyro-TWTs as Saturable Absorbers 77 -- 3.4 Passive Components 78 -- 3.4.1 Jones Calculus 78 -- 3.4.2 Polarization Splitter 81 -- 3.4.3 Polarizers 84 -- 4 Simulation Model for Gyro-Devices 87 -- 4.1 Field Equations 89 -- 4.1.1 Helically Corrugated Waveguide 91 -- 4.1.2 Range of Validity 94 -- 4.1.3 Multi-Mode Simulations 100 -- 4.2 Equations of Motion 101 -- 4.2.1 Source Term 103 -- 4.2.2 Space Charge 105 -- 4.3 Numerical Solution 107 -- 4.3.1 Field Equations 108 -- 4.3.2 Coupled Equations of Helical Waveguides 110 -- 4.3.3 Source Term and Equations of Motion 111 -- 4.3.4 Implementation and GPU Acceleration 112 -- 4.4 Comparison with Existing Approaches 116 -- 5 Design of Amplifier and Absorber 119 -- 5.1 Amplifier 120 -- 5.1.1 Helical Interaction Region 121 -- 5.1.2 Power Capability 122 -- 5.1.3 Synchronized Operation Regime 125 -- 5.1.4 Slippage Operation Regime 126 -- 5.1.5 Length of the Interaction Region 127 -- 5.1.6 Amplification of Ultra-Short Pulses 129 -- 5.2 Saturable Absorber 134 -- 5.2.1 Helical Gyro-TWT Absorber 135 -- 5.2.2 Cyclotron Absorber 137 -- 5.2.3 Ultra-Short Pulses in a Saturable Absorber 142 -- 5.3 Effects of Manufacturing Tolerances 147 -- 6 System Design 151 -- 6.1 Simulation of a Passive Mode-Locked Oscillator 151 -- 6.2 Different Passive Mode-Locked Oscillators 153 -- 6.3 Generated Output Signal 157 -- 6.3.1 Pulse Power and Length 158 -- 6.3.2 Pulse Shape 160 -- 6.3.3 Spectrum 161 -- 6.4 Transient Behavior of the Oscillator 167 -- 6.4.1 Start-up in the Hard Excitation Region 167 -- 6.4.2 Start-up in the Soft Excitation Region 169 -- 6.4.3 Achievable Repetition Rate 171 -- 6.4.4 Achievable Coherence 174 -- 6.5 Realistic Start-Up Scenarios 178 -- 6.5.1 High-Gain HelicalGyro-TWT 179 -- 6.5.2 Hard Excitation with a High-Gain HelicalGyro-TWT 181 -- 6.6 Conclusion 182 -- 7 Simulation Model for Passive Components 185 -- 7.1 Surface Integral Equations 186 -- 7.2 Numerical Solution 188 -- 7.2.1 Adaptive Cross Approximation 189 -- 7.2.2 Sparsified Adaptive Cross Approximation 190 -- 7.3 New Zero-Cost Preconditioner 192 -- 7.3.1 GMRE Swith Preconditioner 192 -- 7.3.2 FGMRE Swith Zero-Cost Preconditioner 193 -- 7.3.3 Performance of the Zero-Cost Preconditioner 195 -- 7.4 Implementation and Verification 200 -- 7.5 Dispersion of Helically Corrugated Waveguides 203 -- 8 Design of the Feedback System 205 -- 8.1 Requirements 206 -- 8.2 Feedback System via Overmoded Waveguides 208 -- 8.2.1 Waveguide 210 -- 8.2.2 Broadband Polarization Splitter 212 -- 8.2.3 Broadband Polarizer 215 -- 8.2.4 Performance of the Complete Feedback System 219 -- 8.3 Additional Operation Modes 220 -- 8.3.1 Operation in the Hard Excitation Region 222 -- 8.3.2 New Type of Two-Stage Amplifier 224 -- 8.3.3 Operation as a CW Source 226 -- 8.4 Conclusion 229 -- 9 Conclusion and Outlook 231 -- A Appendix 239 -- A.1 Split-Step Fourier Method 239 -- A.2 Verification of Electron-Wave Interaction Simulations 240 -- A.2.1 Short-Pulse ITERGyrotron 241 -- A.2.2 W-Band HelicalGyro-TWT 245 -- A.3 Verification of EFIE Solver 249 -- A.3.1 Verification of Simulated Field Distribution 249 -- A.3.2 Verification of Simulated Ohmic-Loss 252 -- A.4 Passive Mode-locked Oscillator with Cyclotron Absorber 254 -- Bibliography 257 -- Contents Acknowledgment 281.…”
Libro electrónico -
2982Publicado 2018Tabla de Contenidos: “…FROM command -- MAINTAINER command -- RUN command -- ENV command -- EXPOSE command -- CMD command -- Containerizing applications -- Docker Gradle plugin -- Registries -- Publishing images -- Provisioning multiple-container environments -- Docker Compose -- Linking containers -- links -- depends_on -- Container orchestration with Kubernetes -- Pod -- Labels -- Replication controllers -- Services -- Summary -- Chapter 11: DevOps and Release Management -- Silos -- How to break silos -- DevOps culture -- Motivations -- DevOps adoption -- Embracing automation -- Infrastructure as code -- Spring application and DevOps practices -- Supporting different environments -- Selecting profiles -- Vagrant -- Working with Vagrant -- Release management -- pipelines -- Continuous integration -- Continuous delivery and continuous deployment -- Automating pipelines -- Jenkins -- Summary -- Chapter 12: Monitoring -- Monitoring -- Monitoring Spring applications -- Application Performance Management (APM) tools -- New Relic -- Summary -- Chapter 13: Security -- Why security is important as a part of an application's architecture -- Key security recommendations -- Authentication and authorization -- Cryptography -- Data input validation -- Sensitive data -- Social engineering -- OWASP Top 10 -- Penetration testing -- Authentication and authorization as a service -- Summary -- Chapter 14: High Performance -- Why performance matters -- Scalability -- Horizontal scalability -- Vertical scalability -- High availability -- Performance -- The key recommendation to avoid performance issues -- Identifying bottlenecks -- Profiling applications -- Visual VM -- SQL query optimizations -- A load test example -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2983Publicado 2016Tabla de Contenidos: “…-- Tolerances to Consider -- Following DFM Helps Your Bottom Line -- The Product Behind Your Product -- Testing vs. Validation -- Finding Balance in Industrial Design -- The chumby One's Trim and Finish -- The Arduino Uno's Silkscreen Art -- My Design Process -- Picking (and Maintaining) a Partner…”
Libro electrónico -
2984Publicado 2017Tabla de Contenidos: “…-- Understanding the building blocks of logic programming -- Solving problems using logic programming -- Installing Python packages -- Matching mathematical expressions -- Validating primes -- Parsing a family tree -- Analyzing geography -- Building a puzzle solver -- Summary -- Chapter 7: Heuristic Search Techniques -- What is heuristic search? …”
Libro electrónico -
2985por International Business Machines Corporation, International Technical Support Organization StaffTabla de Contenidos: “…Exits -- 3.1 Overview -- 3.2 E01 - Session Manager initialization time -- 3.3 E05 - Configuration statement processing time -- 3.4 E06 - Application status change -- 3.5 E08 - Timer interval exit -- 3.6 E09 - CALLEXIT invocation from a script -- 3.7 E11- Log on to the Session Manager system -- 3.8 E21 - Signon validation -- 3.9 E22 - Signon completion…”
Publicado 2005
Libro electrónico -
2986por Jacob, BartTabla de Contenidos: “…Creating an installation program -- 6.1 Basic flow -- 6.1.1 Common terms -- 6.1.2 Installation process -- 6.2 Writing a custom installer -- 6.2.1 Checking the environment as defined by the software package -- 6.2.2 Obtaining user input and overriding default values -- 6.2.3 Obtaining and validating the dependencies of the package -- 6.2.4 Installing the package -- 6.2.5 Registering the installable units -- 6.3 Interfacing with ChangeManager and other classes -- 6.3.1 com.ibm.ac.si.mr.MediaInfo -- 6.3.2 com.ibm.ac.si.checker.DependencyChecker -- 6.3.3 com.ibm.ac.si.checker.CheckerUtil -- 6.3.4 com.ibm.ac.si.checker.PropertySelection -- 6.3.5 com.ibm.ac.si.checker.SoftwareSelection -- 6.3.6 com.ibm.ac.si.instances.ParameterOverrides -- 6.3.7 com.ibm.ac.si.selections.FeatureSelectionInput -- 6.3.8 com.ibm.ac.si.instances.SoftwareInstance -- 6.3.9 com.ibm.ac.si.cm.CreateOperation -- 6.3.10 com.ibm.ac.si.cm.DeleteOperation -- 6.3.11 com.ibm.ac.si.cm.ChangeRequest -- 6.3.12 com.ibm.ac.si.cm.IChangeManager -- 6.4 Sample installation program -- 6.4.1 Manifest files -- 6.4.2 Installation program -- 6.4.3 Setup of installation program -- 6.5 Feature selection example -- 6.5.1 Manifest files -- 6.5.2 Installation program -- 6.5.3 Payload -- 6.5.4 Response file -- 6.5.5 Execution -- 6.5.6 Output -- 6.6 Summary -- Chapter 7. …”
Publicado 2004
Libro electrónico -
2987Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- PART I: Getting Started on the Web -- HOUR 1: Understanding How the Web Works -- A Brief History of HTML and the World Wide Web -- Creating Web Content -- Understanding Web Content Delivery -- Selecting a Web Hosting Provider -- Testing with Multiple Web Browsers -- HOUR 2: Publishing Web Content -- Creating the Sample File for this Hour -- Using FTP to Transfer Files -- Understanding Where to Place Files on the Web Server -- Distributing Content without a Web Server -- Testing Web Content -- HOUR 3: Understanding HTML and XHTML Connections -- Getting Started with a Simple Web Page -- HTML Tags Every XHTML Web Page Must Have -- Organizing a Page with Paragraphs and Line Breaks -- Organizing Your Content with Headings -- Validating Your Web Content -- The Scoop on HTML, XML, XHTML, and HTML 5 -- HOUR 4: Understanding Cascading Style Sheets -- How CSS Works -- A Basic Style Sheet -- A CSS Style Primer -- Using Style Classes -- Using Style IDs -- Internal Style Sheets and Inline Styles -- PART II: Building Blocks of Practical Web Design -- HOUR 5: Working with Text Blocks and Lists -- Aligning Text on a Page -- The Three Types of HTML Lists -- Placing Lists Within Lists -- HOUR 6: Working with Fonts -- Boldface, Italics, and Special Text Formatting -- Tweaking the Font -- Working with Special Characters -- HOUR 7: Using Tables to Display Information -- Creating a Simple Table -- Controlling Table Sizes -- Alignment and Spanning Within Tables -- Page Layout with Tables -- HOUR 8: Using External and Internal Links -- Using Web Addresses -- Linking Within a Page Using Anchors -- Linking Between Your Own Web Content -- Linking to External Web Content -- Linking to an Email Address -- Opening a Link in a New Browser Window -- Using CSS to Style Hyperlinks -- HOUR 9: Working with Colors -- Best Practices for Choosing Colors…”
Libro electrónico -
2988Publicado 2017Tabla de Contenidos: “…-- Building a complete web application -- Designing the web application -- Organizing the files -- Creating the application's entry point -- Booting up the application -- Middlewares -- Creating custom middleware -- Order of middlewares -- The configure module -- Activating the configure module -- Routers and controllers -- Handlebars as View engines -- Summary -- Chapter 5: Templating with Handlebars -- Templating engines -- Server-side and client-side templating -- Client-side templating -- Server-side templating -- The basics of Handlebars -- Binding an object to the template -- Embedding presentation logic -- Views -- Layouts -- Partial views -- Handlebars helpers -- Global helpers -- View-specific helpers -- Rendering the views -- Summary -- Chapter 6: Controllers and View Models -- Controllers -- View models -- Updating the home controller -- Updating the image controller -- Displaying an image -- Uploading an image -- Helpers for reusable code -- The sidebar module -- The stats module -- The images module -- The comments module -- Testing the sidebar implementation -- Iterating on the UI -- Summary -- Chapter 7: Persisting Data with MongoDB -- Using MongoDB with Node.js -- Connecting to MongoDB -- Inserting a document -- Retrieving a document -- Introducing Mongoose -- Schemas -- Models -- Built-in validation -- Static methods -- Virtual properties -- Context of method (this) -- Connecting with Mongoose -- Defining the schemas and models -- The models index file -- Adding CRUD to the controllers -- The home controller…”
Libro electrónico -
2989Publicado 2010Tabla de Contenidos: “…Iterations, Qualification, and Release to Product -- Summary: Addressing Schedule Risk -- Chapter 7 Gathering Voice of the Customer to Prioritize Tehnical Requirments -- Importance and Position within DFSS Flow -- VOC Purpose and Objectives -- The VOC Gathering (Interviewing) Team -- Customer Selection -- Voices and Images -- Customer Interview Guide -- Planning Customer Visits and Interviews -- Customer Interviews -- KJ Analysis: Grouping, Structuring and Filtering the VOC -- Identifying Challenging Customer Requirements (NUDs) -- Kano Analysis -- Validation and Prioritization of Customer Requirements -- Translating Customer Requirements to System Requirements: The System-Level House of Quality -- Constructing a House of Quality -- Summary: VOC Gathering-Tying It All Together -- Chapter 8 Concept Generation and Selection -- Position within DFSS Flow -- Concept Generation Approaches -- Brainstorming and Mind-Mapping -- TRIZ -- Alternative Architecture Generation: Hardware and Software -- Generation of Robust Design Concepts -- Consideration of Existing Solutions -- Feasibility Screening -- Developing Feasible Concepts to Consistent Levels -- Concept Selection -- Summary -- Appendix: Kansei Engineering -- Chapter 9 Identification of Critical Parameters and FMEA -- Position within DFSS Flow -- Definition of a Critical Parameter -- Considerations from VOB and Constraints -- Prioritization and Selection of Critical Parameters -- FMEA -- Software FMEA Process (Software Systems, Software Subsystems, and Software Components FMEA) -- Software FMEA Implementation Case Study -- Considerations of Reliability and Availability -- Examples of Critical Parameters -- Summary -- Appendix: Software FMEA Process Documentation -- Chapter 10 Requirements Flow-Down -- Position within DFSS Flow -- Flow-Down for Hardware and Software Systems…”
Libro electrónico -
2990Publicado 2011Tabla de Contenidos: “…Outline View -- Notebook Layout View -- Publishing Layout View -- Full Screen View -- Chapter 9 Other Word Features -- Adding a Cover Page -- Creating Labels -- Printing Envelopes -- Creating a Mail Merge -- PART III: MICROSOFT EXCEL -- Chapter 10 Spreadsheet Essentials -- Creating a New Workbook -- The Excel Interface -- Worksheet Navigation -- Entering Data -- Filling Cells with a Series -- Editing Cell Data -- Finding and Replacing Data -- Adding Cell Comments -- Naming Cell Ranges -- Importing Data from a Text File -- Working with Workbooks -- Printing Worksheets and Workbooks -- Chapter 11 Modifying Worksheets -- Setting Column and Row Sizes -- Reorganizing a Worksheet -- Working with Large Sheets -- Worksheet Formatting -- Shapes and Pictures -- Special Characters -- Chapter 12 Formulas and Functions -- Formula Basics -- About Precedence -- Using Functions -- Working with Formula Builder -- Copying a Formula to Adjacent Cells -- Correcting Formula Errors -- Common Excel Functions -- Chapter 13 Working with Tables -- About Tables -- Creating a Table -- Entering and Editing Data -- Formatting a Table -- Changing a Table's Size -- Filtering a Table -- Sorting a Table -- Calculated Columns -- Adding a Total Row -- Data Validation -- Chapter 14 Charts and Graphs -- Chart Elements -- Creating Charts -- Modifying Charts -- Adding Trendlines -- Creating Sparklines -- Chapter 15 Database Techniques -- Creating a Database -- Using a Form for Data Entry -- Database Operations -- Working with External Databases -- Chapter 16 Sharing Workbooks -- Publishing Excel Data on the Web -- Sharing Workbooks on a Network -- Tracking Changes -- Protecting Your Data -- Removing Personal Information -- PART IV: MICROSOFT POWERPOINT -- Chapter 17 Creating a Presentation -- Starting a Presentation -- About Views -- Adding and Deleting Slides -- Adding Text to Slides…”
Libro electrónico -
2991Publicado 2015Tabla de Contenidos: “…Student Evaluations: Reliability, Validity, and Extraneous Variables -- 16.5. Other Evaluation Procedures -- 16.6. …”
Libro electrónico -
2992Publicado 2024Tabla de Contenidos: “…-- A supermarket analogy -- The shift from ETL to ELT -- The difference between analytics engineers, data analysts, and data engineers -- Summary -- Chapter 2: The Modern Data Stack -- Understanding a Modern Data Stack -- Explaining three key differentiators versus legacy stacks -- Lowering technical barriers with a SQL-first approach -- Improving infrastructure efficiency with cloud-native systems -- Simplifying implementation and maintenance with managed and modular solutions -- Discussing the advantages and disadvantages of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging into the problem of moving data between two systems -- The source of all problems -- Understanding the eight essential steps of a data ingestion pipeline -- Trigger -- Connection -- State management -- Data extraction -- Transformations -- Validation and data quality -- Loading -- Archiving and retention -- Managing the quality and scalability of data ingestion pipelines - the three key topics -- Scalability and resilience -- Monitoring, logging, and alerting -- Governance -- Working with data ingestion - an example pipeline -- Summary -- Chapter 4: Data Warehousing -- Uncovering the evolution of data warehousing -- The problem with transactional databases -- The history of data warehouses -- Moving to the cloud -- Benefits of cloud versus on-premises data warehouses -- Cloud data warehouse users - no one-size fits all -- Building blocks of a cloud data warehouse -- Compute…”
Libro electrónico -
2993por Cheek, PaulTabla de Contenidos: “…Stage 3 Product Development -- Tactic 7 Product Roadmap: Building Your Product's Roadmap -- In This Tactic, You Will: -- Product Vision and Strategy -- Roadmap Timeframe -- What Belongs-and What Doesn't -- Tying the Product Roadmap Back to Organizational Goals -- Summary -- Tactic 8 Design: Minimum Viable Business Product Design -- In This Tactic, You Will: -- Migrating from Inquiry Mode to Advocacy Mode -- Starting with a Sketch -- Low-Fidelity to High-Fidelity -- Value of Sharing Low-Fidelity Designs with Customers -- Components and Templates -- Building Clickable Prototypes for Software -- Avoiding Minute Details -- Example -- catalan.ai -- Summary -- Tactic 9 User Testing: Validating the Product Actually Works -- In This Tactic, You Will: -- PMR versus User Testing: One and the Same -- Sourcing Participants -- Building a Script -- Live Observed Testing -- Unmonitored User Tests -- Unmonitored Observation -- User Testing Metrics -- Beyond the Tests Themselves -- Examples -- Soundboard -- Orbit -- Summary -- Tactic 10 Engineering: Transitioning from Product Design to Development -- In This Tactic, You Will: -- Early Approaches to Technical Talent -- DIY -- Finding Your CTO -- Outsourcing -- Weighing the Options -- Levels of Technical Depth -- No-Tech MVBP -- No-Code -- Low-Code -- Leveling Up Beyond the MVBP -- Software Architecture -- Front End -- Back End -- Databases -- Cloud Providers -- Case Example: Dignitize -- Summary -- Stage 4 Resource Acquisition -- Tactic 11 Legal: Incorporation and Legal Documents for Your Startup -- In This Tactic, You Will: -- When to Incorporate -- Entity Structure -- Considerations for the Team -- Equity Split -- Representation -- Legalese: A Startup Glossary -- Legal Documents -- Summary -- Tactic 12 Finance: Path to Greatness-Building the Financial Model and Setting Up the Piggy Bank -- In This Tactic, You Will:…”
Publicado 2024
Libro electrónico -
2994Publicado 2024Tabla de Contenidos: “…Developing documentation for compliance -- Identifying regulatory requirements -- Structuring compliance documentation -- Best practices in developing compliance documentation -- Automating control assessment -- Benefits of automating control assessments -- Starting with a clear strategy -- Choosing the right tools and technologies -- Integration with existing systems -- Developing automated assessment processes -- Training and skills development -- Testing and validation -- Continuous improvement and adaptation -- Documenting the automation process -- Addressing challenges and risks -- Case studies and examples -- Summary -- Chapter 7: Assessment and Authorization -- Conducting security assessments -- Understanding the scope of security assessments -- Selecting assessment methods -- Developing an assessment plan -- Reporting and analysis -- Recommending improvements -- Follow-up and review -- The risk assessment and authorization process -- Understanding the risk assessment in the RMF context -- Conducting the risk assessment -- Documenting and reporting risk assessment findings -- Risk mitigation strategy development -- System authorization process -- Continuous monitoring and authorization maintenance -- Preparing for security audits -- Understanding the purpose and importance of security audits -- Types of security audits -- Overview of common audit frameworks and standards -- Audit preparation strategies -- Conducting a pre-audit self-assessment -- Updating policies and procedures -- Enhancing security controls -- Data management and protection -- Stakeholder engagement and communication -- Logistics and operational readiness -- Post-audit activities -- Summary -- Part 3: Advanced Topics and Best Practices -- Chapter 8: Continuous Monitoring and Incident Response -- Implementing continuous monitoring -- Understanding continuous monitoring…”
Libro electrónico -
2995por GovenderTabla de Contenidos: “…The case of the Lecturer Support System in South Africa -- Summary -- Introduction -- Context: TVET lecturer support and development -- Imagining TVET lecturers: Real and ideal -- The role of subjectivity on vocational lecturer/teacher development -- Methodology and validity of findings -- Findings and discussion -- Conclusion -- Acknowldgements -- References -- 15. …”
Publicado 2022
Libro electrónico -
2996por Kraus, JimTabla de Contenidos: “…When Features Affect Decisions, Look for Insight -- Be a Respectful Listener -- Part III Creating Your Buyer Persona -- Chapter 7 Mine Your Interviews for Buying Insights -- You Need Fewer Interviews Than You Think -- Steps for Developing Buying Insights from Your Interviews -- Step 1: Mark Up Your Interview Transcripts -- Step 2: Organize the Story Based on Buying Insights -- Step 3: Summarize the Main Point of Each Quotation -- Step 4: Select Buyer Quotes for Each Buying Insight -- Using AI to Mine Your Interviews for Insights -- Chapter 8 Communicate Buying Insights for Impact -- Presenting the 5 Rings of Buying Insight to Others -- Building the Buyer Profile -- Identify Top Themes That Will Resonate with Buyers -- Chapter 9 Conduct Survey Research to Enhance Buying Insights -- Ways to Enhance Your Buyer Persona with Survey Research -- Confirm the Accuracy and Validity of Your Buyer Persona -- Determine Which Buyer Expectations Are the Most Important -- Test Value Proposition and Market Messaging Concepts -- Identify and Understand Buyer Segments -- Who Should You Survey? …”
Publicado 2024
Libro electrónico -
2997Publicado 2024Tabla de Contenidos: “…Using partitions in the fact table -- Scaling with aggregations and composite models -- Leveraging composite models -- Leveraging aggregations -- Improving performance with Synapse and Fabric -- The modern data warehouse architecture (Synapse) -- ADLS -- Azure Synapse Analytics and Fabric -- Summary -- Further reading -- Part 5: Optimizing Capacities in Power BI Enterprises -- Chapter 13: Working with Capacities -- How a noisy neighbor impacts shared capacity -- Controlling capacity workloads and settings -- Capacity settings -- How capacities manage resources -- Managing capacity overload and Autoscale -- Handling peak loads in Premium capacity with Autoscale -- Capacity planning, monitoring, and optimization -- Determining the initial capacity size -- Validating capacity size with load testing -- Alert notifications -- Monitoring capacities -- Understanding the compute report page -- Summary -- Chapter 14: Performance Needs for Fabric Artifacts -- Fabric artifacts -- Delta tables -- Warehouse or lakehouse -- The Spark engine -- Using Direct Lake for data sources -- Monitoring Fabric resource consumption -- Measuring the hotness of data -- Tips for enhancements -- Load balancing -- Dataflow copy fast -- On-demand loading -- Loading data in large chunks -- Vacuum and Delta table structure -- Summary -- Chapter 15: Embedding in Web Apps -- Improving embedded performance -- Measuring embedded performance -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2998por Institute of Medicine (U.S.).Tabla de Contenidos: “…Differential Benefits as a Function of Users and Uses -- USERS OF INFORMATION IN HDOS -- USES OF DATABASES -- Assessing Access to Care and Use of Services -- Assessing Costs and Identifying Opportunities for Savings -- Evaluating Quality and Outcomes of Care -- Hospital-specific Mortality Rate Studies -- Effectiveness and Outcomes Research -- Quality Assurance and Quality Improvement Programs -- Planning and Monitoring Patient Care -- Enhancing Administrative Efficiency -- Operating Managed Care Programs -- Strategic Planning and Selective Contracting -- Strategic Planning -- Selective Contracting -- Other Business-related Uses -- Tracking Injury and Illness, Preventive Care, and Health Behaviors -- Promoting Regional and Community Health Planning, Education, and Outreach -- Health Planning and Education -- Community Outreach -- Other Uses for HDO Databases -- Comment -- ENSURING THE QUALITY OF DATA -- SUMMARY -- 3 Public Disclosure of Data on Health Care Providers and Practitioners -- PREVIOUS STUDIES -- IMPORTANT PRINCIPLES OF PUBLIC DISCLOSURE -- IMPORTANT ELEMENTS OF PUBLIC DISCLOSURE -- Topics for HDO Analysis and Disclosure -- Who Is Identified -- Vulnerability to Harm -- Methodological and Technical Issues -- How Information Is Publicly Disclosed -- COMMITTEE FINDINGS AND CONCLUSIONS -- RECOMMENDATIONS -- Advocacy of Analyses and Public Disclosure of Results -- Minimizing Potential Harms -- Advocacy of Data Release -- Promoting Wide Applications of Health-related Data -- Requiring Recipients to Protect Data Privacy and Confidentiality -- Using Valid Analytic Techniques -- Related Issues -- Privacy Protections for Person-identifiable Data -- Constrained Staff Capabilities -- Obligations to Correct Analyses or Retract Information -- STRENGTHENING QUALITY ASSURANCE AND QUALITY IMPROVEMENT PROGRAMS -- Data Feedback…”
Publicado 1994
Libro electrónico -
2999por National Research Council (U.S.).Tabla de Contenidos: “…DEFINITION OF FRAMEWORK COMPONENTS FOR ECOLOGICAL RISK ASSESSMENT -- 4 Key Scientific Problems Limiting Application of Ecological Risk Assessment -- EXTRAPOLATION ACROSS SCALES -- QUANTIFICATION OF UNCERTAINTY -- VALIDATION OF PREDICTIVE TOOLS -- VALUATION -- 5 Conclusions -- 6 Recommendations -- REFERENCES -- Appendix A Workshop Participants -- Appendix B Workshop Organizing Subcommittee and Federal Liaison Group -- Appendix C Workshop Introduction -- Appendix D Opening Plenary Presentations -- TERRY F. …”
Publicado 1993
Libro electrónico -
3000por Mishra, JibiteshTabla de Contenidos: “…-- 1.2 CHARACTERISTICS OF SOFTWARE -- 1.3 EVOLUTION OF SOFTWARE FOR BUSINESS -- 1.4 GENERATIONS OF COMPUTERS -- 1.5 PROGRAMMING LANGUAGES -- 1.6 PARADIGM SHIFT IN PROGRAMMING TECHNIQUES -- 1.7 SOFTWARE CRISIS AND EMERGENCE OF SOFTWARE ENGINEERING -- 1.8 CORE ASPECTS OF SOFTWARE ENGINEERING -- 1.9 SALIENT FEATURES OF SOFTWARE DEVELOPMENT -- SUMMARY -- EXCERCISES -- Ch.2: Software Development Process -- 2.1 SOFTWARE PROCESSES -- 2.2 SOFTWARE DEVELOPMENT LIFE CYCLE MODELS -- 2.3 WATERFALL MODEL -- 2.4 THE "V" MODEL -- 2.5 PROTOTYPING MODEL -- 2.6 THE ITERATIVE WATERFALL MODEL -- 2.7 THE SPIRAL MODEL -- 2.8 PROCESS STANDARDS -- SUMMARY -- EXERCISES -- Ch.3: Software Requirrement Engineering -- 3.1 REQUIREMENT ENGINEERING PROCESS -- 3.2 REQUIREMENT INCEPTION -- 3.3 REQUIREMENT ELICITATION -- 3.4 REQUIREMENT ELABORATION -- 3.5 NEGOTIATION -- 3.6 REQUIREMENT VALIDATION -- 3.7 STRUCTURE OF SRS -- 3.8 CHARACTERISTICS OF THE RE PROCESS -- SUMMARY -- EXCERCISES -- Ch.4: Software Design Approaches -- 4.1 DIFFERENT APPROACHES TO SAD -- 4.2 OVERVIEW OF THE FO APPROACH -- 4.3 OVERVIEW OF THE OO APPROACH -- 4.4 COMPARISON OF OOAD WITH SSAD -- SUMMARY -- EXERCISES -- Ch.5: Structured Analysis -- 5.1 INTRODUCTION TO STRUCTURED ANALYSIS -- 5.2 DATA FLOW DIAGRAM -- 5.3 PROCESS SPECIFICATION -- 5.4 DATA DICTIONARY -- 5.5 ENTITY RELATIONSHIP MODEL -- 5.6 STATE TRANSITION DIAGRAM -- SUMMARY -- EXERCISES -- Ch.6: Structured Design -- 6.1 STRUCTURED DESIGN METHODOLOGIES -- 6.2 COUPLING AND COHESION -- 6.3 STRUCTURE CHART -- 6.4 MAPPING DFD INTO A STRUCTURE CHART -- 6.5 DATA DESIGN -- 6.6 DETAIL DESIGN -- 6.7 HIPO DOCUMENTATION -- SUMMARY -- EXERCISES -- Ch.7: Object-Oriented Concepts and Principles -- 7.1 KEY CONCEPTS -- 7.2 RELATIONSHIPS…”
Publicado 2011
Libro electrónico