Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,038
- Engineering & Applied Sciences 1,008
- Application software 843
- Management 811
- Computer Science 672
- Computer programs 535
- Computer networks 497
- Design 475
- Web site development 469
- History 445
- Web sites 432
- Data processing 422
- Examinations 383
- Business & Economics 381
- Photography 372
- Computer programming 368
- Leadership 349
- Historia 347
- Programming 345
- Database management 325
- Digital techniques 322
- Operating systems (Computers) 319
- Certification 318
- Security measures 312
- Artificial intelligence 310
- Java (Computer program language) 307
- Computer security 301
- Python (Computer program language) 300
- Computer software 297
- Electrical & Computer Engineering 287
-
28101Publicado 2021“…"Research in cognitive science over the last 30 years shows much of what we know about culture in the business world is based on myth, wishful thinking, outdated science, or is just plain wrong. …”
Libro electrónico -
28102Publicado 2017“…To get the most out of this video, you will need a basic understanding of statistics, and know how to compare variables in a data set. Learn how to make a simple correlational model in RapidMiner Understand how to interpret the meaning of correlation coefficients Gain confidence in your ability to explain and defend conclusions formed on the results of a correlation model Matt North is a professor of Information Systems at Utah Valley University, where he teaches courses on data analytics and database development, administration and security. …”
-
28103Publicado 2020“…You will: Become familiar with SAS Studio IDE Understand essential visualizations Know the fundamental statistical analysis required in most data science and analytics reports Clean the most common data set problems Use linear progression for data prediction Write programs in SAS Get introduced to SAS-Viya, which is more potent than SAS studio…”
Libro electrónico -
28104Publicado 2020Tabla de Contenidos: “…Ensuring That You Have a Good Hypothesis -- Examples of a good (and a bad) hypothesis -- Surveys and research are precursors to tests -- Seeing How the Pieces Fit Together -- Chapter 8 Prioritizing Your Ideas before You Test Them -- The Importance of Prioritization -- Methodologies for Prioritizing Ideas -- The ICE score -- The PIE framework -- The TIR score -- The RICE score -- General Criticisms of Simpler Frameworks -- Chapter 9 Testing Ideas and Learning from Them -- Working with Two Types of Tests -- Prepping tests -- Testing variants -- Common testing pitfalls and ways to work around them -- Analyzing Results -- Acting on What You've Learned -- Winning tests -- Losing tests -- Inconclusive tests -- Systemizing changes -- Chapter 10 Managing the Growth Process -- Establishing a Weekly Routine -- Setting the Ground Rules -- Moving to a Month-to-Month Schedule -- Reviewing objectives monthly -- Checking on the impact of individual tests -- Taking the Long-Term Perspective -- Chapter 11 Laying the Right Foundation for Company-Wide Growth -- Taking Baby Steps -- Making Your CEO the Growth Advocate -- Sharing Is Better than Hoarding -- Weekly updates -- Monthly deep dives -- Quarterly updates -- Part 4 The Part of Tens -- Chapter 12 Ten Key Benefits of the Growth Hacking Methodology -- A Focus on Process versus Tactics -- Cross-Functional Collaboration -- Organizational Alignment -- Data-Informed Decision-Making -- Improved Customer Focus -- A Better Understanding of Your Customers -- Improved Customer Experience -- A State of Constant Curiosity -- Better Product-Development Processes -- Greater Control because of Product-First Growth -- Chapter 13 Ten Things to Watch Out For -- Ignoring the Need to Constantly Evangelize Progress and Learning -- Not Sticking to the Growth Meeting Agenda -- Testing Things That Don't Need to Be Tested (Right Now)…”
Libro electrónico -
28105Publicado 2019“…Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. …”
Libro electrónico -
28106Publicado 2020“…With the right motivation and knowledge, you can be a leader who knows what it takes to succeed. Throughout his extensive experience in training leaders, author Alain Hunkins discovered that many leaders shared a common trait. …”
Libro electrónico -
28107Publicado 2021“…Predicting their behavior requires understanding of the relief of a hillside and knowing where water will find constraints to movement. e. …”
Libro electrónico -
28108Publicado 2017“…This screencast demonstrates the basic set of procedures you must know to configure a Jenkins automation server and integrate it with third party tools. …”
-
28109por Bell, Charles. author“…Introducing MySQL Shell covers everything you need to know about MySQL Shell. You will learn how to use the shell for SQL, as well as the new application programming interfaces for working with a document store and even automating your management of MySQL servers using Python. …”
Publicado 2019
Libro electrónico -
28110Publicado 2012“…This second edition includes a new chapter on the Stepping Up Continuum, a model that looks at six ways to know if you are stepping up or stepping back, as well as fresh stories and a self-assessment tool for helping leaders create a culture for stepping up in their organizations. …”
Libro electrónico -
28111Publicado 2020“…A clear and concise resource, the ideal guide to Windows for IT beginners Windows Operating System Fundamentals covers everything you need to know about Windows 10. Learn to master the installation process and discover the cool new features of Windows 10, including Edge, Cortana, and more. …”
Libro electrónico -
28112Publicado 2016“…Estimations of model parameters are now performed in a split second. For this reason, working through the identifications phase to find the correct model is unnecessary. …”
Libro electrónico -
28113Publicado 2018“…Develop and implement an effective content strategy tailored to your business ’ s needs Inbound Content is a step-by-step manual for attracting the right people, turning them into leads, and closing them into customers. Today, everyone knows that content is king. It’s how we engage, how we inform, and how we pass the time; content is everywhere, and if you’re not leveraging its power to promote your business, you’ve already been left behind. …”
Libro electrónico -
28114Publicado 2019“…It doesn't assume you know anything about Microsoft Project, so beginners will feel right at home. …”
-
28115por Strata Conference and Hadoop World“…The conference delivered on the theme by offering inspiration, guidance, and practical know-how from 363 experts on virtually every aspect of the big data compendium, including: Long-form tutorials on Hadoop operations, machine learning, visualization, and data platform architecture taught by pros at Cloudera and Silicon Valley Data Science. …”
Publicado 2016
-
28116Publicado 2017“…What You’ll Learn: Get a clear view of the available data for social media marketing and how to access all of it Make use of data and information behind social media networks to your favor Know the details of social media analytics tools and platforms so you can use any tool in the market Apply social media analytics to many different real-world use cases Obtain tips from interviews with professional marketers and founders of social media analytics platforms Understand where social media is heading, and what to expect in the future…”
Libro electrónico -
28117Publicado 2016“…In this practical and thorough guide, author Rob Sylvan covers everything photographers need to know about photo organization and management using Lightroom. …”
Libro electrónico -
28118Publicado 2020“…Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. …”
Libro electrónico -
28119por Sinha, Sanjib. author“…Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. …”
Publicado 2019
Libro electrónico -
28120Publicado 2020“…You’ll find: Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently Foundation topics sections that explain concepts and configurations, and link theory to practice Key topics sections calling attention to every figure, table, and list you must know Exam Preparation sections with additional chapter review features Final preparation chapter providing tools and a complete final study plan A customizable practice test library This guide offers comprehensive, up-to-date coverage of all CLACCM #300-815 topics related to: SIP/H.323 protocols, signaling, session establishment, and troubleshooting Cisco Unified Border Element (CUBE) call routing, dial planning, configuration, and troubleshooting Cisco Unified Communications Manager (CUCM) call control and dial planning, including IP Phone registration and call routing, SIP trunks, route patterns, and more CUCME IP Phone Registration, features, and SRST, including hunt groups, call queuing, time-of-day routing, conferencing, call park/pickup, mobility options, and global dial plan replication…”
Libro electrónico