Mostrando 4,101 - 4,120 Resultados de 4,825 Para Buscar 'Forwardis~', tiempo de consulta: 2.15s Limitar resultados
  1. 4101
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…Key areas of focus for building forward better -- 3.2.1. Attract investment in line with national SDG priorities -- 3.2.2. …”
    Libro electrónico
  2. 4102
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…-- References -- Notes -- 3 Policies for sustainable cities in Colombia -- Introduction -- Pursuing urban sustainability -- Improving spatial and land use planning -- Strategic planning is underexploited and reduced to a bureaucratic requirement -- POTs are too complex and mostly outdated and underused -- The POT formulation process is costly and prone to political influence -- POTs include a large number of topics that makes them complex to elaborate or update -- Lack of sufficient financial resources hinders the implementation of POTs -- Land use planning must be more flexible and simplified -- POTs should be supported by fiscal incentives to steer land use -- POTs should pursue compact development and be forward-looking -- The metropolitan dimension in land use planning should be reinforced -- Land use planning should prioritise urban regeneration and environmental preservation -- Improving urban accessibility -- Urban mobility plans are not widely adopted and face financial difficulties -- Public transport and urban planning are not always aligned -- COVID-19 imposed constraints on the use of public space and movement -- A new national policy to overcome mobility challenges has been adopted although some limitations remain -- The national urban mobility policy lacks a focus on accessibility and equality…”
    Libro electrónico
  3. 4103
    Publicado 2017
    Tabla de Contenidos: “…. -- 6.1 Introduction -- 6.2 The Widening Participation Research Evidence -- 6.3 The Widening Participation Policy Agenda: Past, Present, and Future Initiatives -- 6.4 Conclusion: Social Identity and Ways Forward for Widening Participation Initiatives -- References -- 7 Access of Disadvantaged Students to Higher Education in Chile: Current Scenarios and Challenges -- 7.1 Introduction…”
    Libro electrónico
  4. 4104
    por Lee, Thomas
    Publicado 2023
    Tabla de Contenidos: “…. -- Configuring DNS Forwarding -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Implementing Enterprise Security -- Introduction -- The systems used in the chapter -- Implementing Just Enough Administration (JEA) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Examining Applications and Services Logs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Discovering Logon Events in the Event Log -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deploying PowerShell Group Policies -- Getting ready…”
    Libro electrónico
  5. 4105
    Publicado 2024
    Tabla de Contenidos: “…Project Management -- Global Company Profile: Bechtel Group: Project Management Provides a Competitive Advantage for Bechtel -- The Importance of Project Management -- Project Planning -- The Project Manager -- Work Breakdown Structure -- Project Scheduling -- OM in Action: Delta's Ground Crew Orchestrates a Smooth Takeoff -- Project Controlling -- Project Management Techniques: PERT and CPM -- The Framework of PERT and CPM -- Network Diagrams and Approaches -- Activity-on-Node Example -- Activity-on-Arrow Example -- Determining the Project Schedule -- Forward Pass -- Backward Pass -- Calculating Slack Time and Identifying the Critical Path(s) -- Variability in Activity Times -- Three Time Estimates in PERT -- Probability of Project Completion -- Cost-Time Trade-Offs and Project Crashing -- A Critique of PERT and CPM -- OM in Action: Behind the Tour de France -- Using Software to Manage Projects -- Summary -- Key Terms -- Ethical Dilemma…”
    Libro electrónico
  6. 4106
    Publicado 2023
    Tabla de Contenidos: “…Project Management -- Global Company Profile: Bechtel Group: Project Management Provides a Competitive Advantage for Bechtel -- The Importance of Project Management -- Project Planning -- The Project Manager -- Work Breakdown Structure -- Project Scheduling -- OM in Action: Delta's Ground Crew Orchestrates a Smooth Takeoff -- Project Controlling -- Project Management Techniques: PERT and CPM -- The Framework of PERT and CPM -- Network Diagrams and Approaches -- Activity-on-Node Example -- Activity-on-Arrow Example -- Determining the Project Schedule -- Forward Pass -- Backward Pass -- Calculating Slack Time and Identifying the Critical Path(s) -- Variability in Activity Times -- Three Time Estimates in PERT -- Probability of Project Completion -- Cost-Time Trade-Offs and Project Crashing -- A Critique of PERT and CPM -- OM in Action: Behind the Tour de France -- Using Software to Manage Projects -- Summary -- Key Terms -- Ethical Dilemma…”
    Libro electrónico
  7. 4107
    por Hall, Vincent Austin
    Publicado 2024
    Tabla de Contenidos: “…India and Canada - human author's skill and judgment -- Australia - to the person making the necessary arrangements -- Japan - copyright requires human authorship -- South Korea -- Brazil - human authorship required -- Indonesia - human authorship needed -- Evolving legal landscape -- Precedent -- Addressing liability and responsibility for LLM-generated code -- Licensing -- Attribution and credit -- Quality and reliability -- Ethical considerations -- Product liability -- Use case restrictions -- Security concerns -- Transparency and explainability -- Third-party dependencies -- Use good communication to avoid legal action -- Code of ethics when using AI -- Accountability and redress mechanisms -- Examining legal frameworks governing the use of LLMs in coding -- UN resolution on AI -- EU - the European Parliament adopts the "AI Act" -- California AI kill switch bill proposed -- AI Acts of other countries -- Other regulations -- Possible future of the regulation of AI-generated code -- Key points moving forward -- Questions that should still be answered -- Keep up to date -- Summary -- Bibliography -- Chapter 7: Security Considerations and Measures -- Technical requirements -- Understanding the security risks of LLMs -- Data privacy and confidentiality -- Security risks in LLM-generated code -- Implementing security measures for LLM-powered coding -- Input sanitization and validation -- Secure integration patterns -- Monitoring and logging -- Version control and traceability -- Encryption and data protection -- Regular security assessments -- Incident response planning -- Bonus - training -- Who can help here? …”
    Libro electrónico
  8. 4108
    por Shore, James
    Publicado 2008
    Tabla de Contenidos: “…-- The Challenge of Change -- Final Preparation -- Applying XP to a Brand-New Project (Recommended) -- Applying XP to an Existing Project -- The big decision -- Bring order to chaos -- Pay down technical debt -- Organize your backlog -- Fix important bugs -- Move testers forward -- Emerge from the darkness -- Applying XP in a Phase-Based Organization -- Mandatory planning phase -- Mandatory analysis phase -- Mandatory design phase -- Mandatory coding phase -- Mandatory testing phase -- Mandatory deployment phase -- Extremities: Applying Bits and Pieces of XP -- Iterations -- Retrospectives -- Ten-minute build -- Continuous integration -- Test-driven development -- Other practices -- Assess Your Agility -- Self-Assessment Quiz -- Part II. …”
    Libro electrónico
  9. 4109
    Publicado 2017
    Tabla de Contenidos: “…Converting between types -- Making friends -- Marking constructors as explicit -- Destructing objects -- Assigning objects -- Move semantics -- Declaring static members -- Defining static members -- Using static and global objects -- Named constructors -- Nested classes -- Accessing const objects -- Using objects with pointers -- Getting pointers to object members -- Operator overloading -- Defining function classes -- Defining conversion operators -- Managing resources -- Writing wrapper classes -- Using smart pointers -- Managing exclusive ownership -- Sharing ownership -- Handling dangling pointers -- Templates -- Using classes -- Summary -- Chapter 7: Introduction to Object-Orientated Programming -- Inheritance and composition -- Inheriting from a class -- Overriding methods and hiding names -- Using pointers and references -- Access levels -- Changing access level through inheritance -- Inheritance access levels -- Multiple inheritance -- Object slicing -- Introducing polymorphism -- Virtual methods -- Virtual method tables -- Multiple inheritance and virtual method tables -- Virtual methods, construction, and destruction -- Containers and virtual methods -- Friends and inheritance -- Override and final -- Virtual inheritance -- Abstract classes -- Obtaining type information -- Smart pointers and virtual methods -- Interfaces -- Class relationships -- Using mixin classes -- Using polymorphism -- Summary -- Chapter 8: Using the Standard Library Containers -- Working with pairs and tuples -- Containers -- Sequence containers -- List -- Forward list -- Vector -- Deque -- Associative containers -- Maps and multimaps -- Sets and multisets -- Unordered containers -- Special purpose containers -- Using iterators -- Input and output iterators -- Stream iterators -- Using iterators with the C Standard Library -- Algorithms -- Iteration of items…”
    Libro electrónico
  10. 4110
    por Nunes, Fabio Mazanatti
    Publicado 2013
    Tabla de Contenidos: “…Understanding how to use the startup annotation -- Establishing a startup and shutdown sequence -- Dealing with concurrency when using singletons -- Singleton applied to web services -- Persisting an object using JPA -- Understanding the available transaction contexts -- Using container-managed transactions -- Using bean-managed transactions -- Acquiring a transaction context manually -- A brief intermission -- Web services and SOAP -- The reservation web service -- Testing the service provider -- Consuming the service -- Web resources -- Summary -- Chapter 6: Using Events, Interceptors, and Logging Services -- Understanding interceptors -- Creating a log interceptor -- Interceptors and Aspect Oriented Programming -- Using asynchronous methods -- Understanding WebLogic's logging service -- Anatomy of a log message -- Redirecting standard output to a log file -- Integrating Log4J to WebLogic's logging services -- Accessing and reading log files -- Events -- Defining audit events -- Web resources -- Summary -- Chapter 7: Remote Access with JMS -- WebLogic clients -- Thin T3 client - wlthint3client.jar -- RMI thin client - wlclient.jar -- JMS thin client - wljmsclient.jar -- JMS SAF client - wlsafclient.jar -- JMS T3 SAF client - wlsaft3client.jar -- Full client - wlfullclient.jar -- JMX client - wljmxclient.jar -- Java Messaging Service (JMS) and WebLogic -- The persistent store -- The JMS server -- The JMS module -- The JMS subdeployment -- The JMS queue -- The JMS connection factory -- Posting messages from a standalone client -- Creating the project -- Coding the message producer -- Queuing messages -- Consuming messages with an MDB -- Configuring thread limits for MDBs -- The Store-and-Forward client feature -- Creating the configuration file -- Encrypting the connection password -- Adjusting the configuration file -- Adjusting the code…”
    Libro electrónico
  11. 4111
    Publicado 2010
    Tabla de Contenidos: “…Remote Office Topology -- Data Center Topology -- Traffic Flows -- Network Infrastructure Checklist -- Application Characteristics -- Application Requirements Checklist -- Application Optimizer Requirements -- CIFS Accelerator -- Advanced Features -- File Services Utilization -- File Services Requirements Checklist -- MAPI Accelerator -- MAPI Requirements Checklist -- HTTP Accelerator -- HTTP Requirements Checklist -- NFS Accelerator -- NFS Requirements Checklist -- Video Accelerator -- Video Requirements Checklist -- SSL Accelerator -- SSL Requirements Checklist -- Replication Accelerator -- Platform Requirements -- Platform Requirements Checklist -- Scalability Requirements -- Scalability Requirements Checklist -- Availability Requirements -- Availability Checklist -- Management Requirements -- Cisco WAAS Central Manager and XML-API -- SNMP Trap/Inform Routing -- SNMP Community Strings -- Syslog Servers -- Management Requirements Checklist -- Security Requirements -- Security Requirements Checklist -- Virtualization Requirements -- Virtualization Requirements Checklist -- Summary -- Chapter 4 Network Integration and Interception -- Interface Connectivity -- Link Aggregation Using PortChannel -- PortChannel Configuration -- Using the Standby Interface Feature -- Standby Interface Configuration -- Interception Techniques and Protocols -- Web Cache Communication Protocol -- WCCP Overview -- Service Groups -- Forwarding and Return Methods -- Load Distribution -- Failure Detection -- Flow Protection -- Graceful Shutdown -- Scalability -- Redirect Lists -- Service Group Placement -- WCCP Configuration -- Hardware-Based Platforms -- Policy-Based Routing -- Inline Interception -- Content Switching -- Application Control Engine -- Egress Methods -- Directed Mode -- Network Integration Best Practices -- Summary -- Chapter 5 Branch Office Network Integration…”
    Libro electrónico
  12. 4112
    Publicado 2003
    Tabla de Contenidos: “…TMTP WTP Version 5.2 installation and deployment -- 4.1 Custom installation of the Management Server -- 4.1.1 Management Server custom installation preparation steps -- 4.1.2 Step-by-step custom installation of the Management Server -- 4.1.3 Deployment of the Store and Forward Agents…”
    Libro electrónico
  13. 4113
    Publicado 2011
    Tabla de Contenidos: “…-- 8.2 Inductive Solution -- 8.3 The Iterative Solution -- 8.4 Summary -- 8.5 Bibliographic Remarks -- CHAPTER 9 - Principles of Algorithm Design -- 9.1 Iteration, Invariants and Making Progress -- 9.2 A Simple Sorting Problem -- 9.3 Binary Search -- 9.4 Sam Loyd's Chicken-Chasing Problem -- 9.4.1 Cornering the Prey -- 9.4.2 Catching the Prey -- 9.4.3 Optimality -- 9.5 Projects -- 9.6 Summary -- 9.7 Bibliographic Remarks -- CHAPTER 10 - The Bridge Problem -- 10.1 Lower and Upper Bounds -- 10.2 Outline Strategy -- 10.3 Regular Sequences -- 10.4 Sequencing Forward Trips -- 10.5 Choosing Settlers and Nomads -- 10.6 The Algorithm -- 10.7 Summary -- 10.8 Bibliographic Remarks -- CHAPTER 11 - Knight's Circuit -- 11.1 Straight-Move Circuits -- 11.2 Supersquares -- 11.3 Partitioning the Board -- 11.4 Summary -- 11.5 Bibliographic Remarks -- PART II Mathematical Techniques -- CHAPTER 12 - The Language of Mathematics -- 12.1 Variables, Expressions and Laws -- 12.2 Sets -- 12.2.1 The Membership Relation -- 12.2.2 The Empty Set -- 12.2.3 Types/Universes -- 12.2.4 Union and Intersection -- 12.2.5 Set Comprehension -- 12.2.6 Bags -- 12.3 Functions -- 12.3.1 Function Application -- 12.3.2 Binary Operators -- 12.3.3 Operator Precedence -- 12.4 Types and Type Checking -- 12.4.1 Cartesian Product and Disjoint Sum…”
    Libro electrónico
  14. 4114
    Publicado 2010
    Tabla de Contenidos: “…Deleting a Desktop Shortcut -- Customizing the Start Menu -- Customizing the Taskbar -- Customizing Notification Icons with Control Panel -- Setting AutoPlay Options -- Configuring Toolbars -- Setting Default Programs -- CHAPTER 15 WINDOWS ACCESSORIES -- Viewing the Accessories Menu -- Working with Calculator -- Using WordPad -- Using Notepad -- Using Paint -- Using Windows Photo Viewer -- CHAPTER 16 NETWORKING YOUR HOME -- Connecting to an Unsecured Wireless Network -- Connecting to a Secured Wireless Network -- Connecting to a Wired Network -- Opening the Network and Sharing Center -- Viewing Computers on Your Network -- Using the Network Map to Diagram Your Network -- Changing Your Workgroup -- Enabling File and Printer Sharing -- Sharing Public Folders -- Sharing Printers -- Setting Up a Homegroup -- Joining a Homegroup -- Accessing Homegroup Shared Folders -- Changing Homegroup Settings -- Using Windows Easy Transfer -- Sharing a Folder Manually -- CHAPTER 17 USING WINDOWS LIVE ESSENTIALS -- Downloading and Installing Windows Live Essentials -- Viewing Photos in Gallery View -- Adding and Using Tags -- Playing a Slide Show -- Fixing Photos -- Cropping a Photo and Undoing Changes -- Sharing Photos with Flickr -- Burning Photos and Videos to a DVD Slide Show -- Importing Photos from a Camera -- Printing Photos -- Setting Up Your Email Account with Windows Live Mail -- Receiving Email -- Opening File Attachments -- Replying to Email -- Forwarding Messages -- Deleting Messages -- Creating a Contact -- Starting an Email to a Contact -- Adding Text Formatting to an Email -- Adding Attachments -- Adding an Appointment to the Calendar -- Windows Live Family Safety -- Starting Windows Live Movie Maker Beta -- Importing Videos and Photos -- Changing the Position of Your Photos and Videos -- Saving Your Project -- Adding Transitions to Your Movie…”
    Libro electrónico
  15. 4115
    Tabla de Contenidos: “…Dresback Application of the Forward Sensitivity Method to a GWCE-Based Shallow Water Model Reprinted from: J. …”
    Libro electrónico
  16. 4116
    Publicado 2024
    Tabla de Contenidos: “…Assessing Your Unique Leadership Skills and Talents -- Identifying Your Leadership Style -- Selfless leadership style -- Transformational leadership style -- Transactional leadership style -- "Laissez Faire" leadership style -- Democratic leadership style -- Situational leadership style -- Building Your Personal Brand and Reputation -- Why building a strong personal brand matters -- Why your reputation as a leader matters -- Strengthening your personal leadership brand -- Diagnosing Your Level of Inclusiveness -- Part 2 Developing the Skills to Lead Yourself -- Chapter 5 Getting Clear on Your Purpose, Vision, and Values -- Knowing the Importance of Your Purpose -- Asking the Right Questions to Uncover Your "Why" -- Getting Grounded on Your Personal Vision Statement -- Establishing and Living Your Personal Values -- Chapter 6 Minimizing Your Own Biases and Microaggressions -- Defining Unconscious Bias -- Figuring Out Microaggressions -- Understanding Intent versus Impact -- Identifying the Effects of Bias in the Workplace -- Sourcing and selecting new talent -- Onboarding and orienting new talent -- Developing, promoting, and engaging talent -- Communicating with talent -- Retaining top talent -- Interrupting Biased Behaviors -- Step 1: Recognize when a bias has occurred -- Step 2: Validate or invalidate your bias -- Step 3: Chart your path forward -- Chapter 7 Leading with Authenticity and Transparency -- Defining Authenticity and Transparency and Seeing How They Relate -- Authenticity -- Transparency -- Understanding Why Some Leaders Shy Away from Authenticity and Transparency -- Analyzing Your Effectiveness as an Authentic and Transparent Leader -- Mastering Authentic and Transparent Leadership -- Chapter 8 Demonstrating Empathy and Emotional Intelligence -- Understanding Empathy and its Role in Leadership…”
    Libro electrónico
  17. 4117
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding Cloud Deploy target types -- Using the Kubernetes manifest and Kustomization -- Using a Skaffold configuration -- Preparing your project -- Enabling the API -- Creating the GKE clusters -- Granting the necessary permissions -- Creating a delivery pipeline -- Understanding the progression -- Understanding targets -- Registering the delivery pipeline and targets -- Creating a release -- Examining a release -- Verifying your deployment -- Using a deployment strategy -- Configuring the deliver pipeline for a canary deployment -- Running the canary deployment -- Summary -- Chapter 9: Securing Your Runtimes with Binary Authorization -- Technical requirements -- Understanding Binary Authorization concepts -- Setting up Binary Authorization -- Creating a CMEK -- Setting up Binary Authorization on GKE -- Setting up Binary Authorization on Cloud Run -- Using Binary Authorization on GKE on other public clouds -- Setting up attestations -- Creating an attestation -- Configuring Binary Authorization policies -- Creating the policy -- Applying an attestation to the image -- Summary -- Part 4: Hands-On Secure Pipeline Delivery and Looking Forward -- Chapter 10: Demonstrating an End-to-End Software Delivery Pipeline -- Technical requirements -- Software delivery pipeline overview -- Building your software delivery pipeline -- Creating your source code repository -- Configuring the required IAM roles -- Creating two GKE clusters -- Creating GKE gateway resources -- Creating your Cloud Deploy delivery pipeline -- Configuring security policies for your pipeline -- Connecting your source code repository to Cloud Build -- Creating two Cloud Build triggers for your repository -- Creating your initial release -- Running your pipeline -- Updating your code as a developer…”
    Libro electrónico
  18. 4118
    Publicado 2024
    Tabla de Contenidos: “…-- New Business Models: Partners Needed -- The Independent Workforce: A New Balancing Act for Preserving the Culture -- New Organization Structures: Enabling Knowledge Worker Productivity -- Solving the Problems of Today and Tomorrow -- Applying the Leadership Pipeline Model -- Dispelling Myths About the Model -- Part I Why the Leadership Pipeline Matters -- 1 Leadership Pipeline Overview -- The Big Ideas -- The Core Leadership Passages -- Passage 1: Leading Others -- Passage 2: Leading Leaders -- Passage 3: Leading a Function -- Passage 4: Leading a Business -- Passage 5: Leading an Enterprise -- Defining the Job to Be Done -- Understanding the Transitions -- Work Values -- Time Application -- Skills -- Interdependency -- New Ways of Looking at Careers -- Going Forward -- 2 Leadership Pipeline Value Proposition -- Strengthening Your Weakest Link -- Reducing Your Soft Costs -- Universal Bank of Leaders Required -- A Model for Past, Present, and Future -- Case 1: Internationalization of the Business/Significant Change -- Case 2: Significant Improvement of the Gender Diversity of the Leadership Population -- Case 3: Redesign and Improve Efficiency in the Project Versus Line Organization -- Case 4: Speed Up the Execution of the Business Strategy -- How to Build Needed Architecture -- Part II Five Leadership Pipeline Passages…”
    Libro electrónico
  19. 4119
    Publicado 2024
    Tabla de Contenidos: “…-- Lessons Learned: How to Evaluate Digital Transformation -- The Path Forward -- Acknowledgments -- References -- Biographical Sketches -- Part III Tradespace Analysis in a Digital Engineering Ecosystem - Context and Implications -- Chapter 13 A Landscape of Trades: The Importance of Process, Ilities, and Practice -- Levels of Trades -- Defense Enterprise Levels of Concern -- System Design and Development Analytics -- Mission and Operational Effectiveness -- Common Challenges -- System Qualities: The Nonfunctional Requirements…”
    Libro electrónico
  20. 4120
    Publicado 2024
    Tabla de Contenidos: “…On the Traveling and Turns of Being and Becoming a Narrative Inquirer -- Abstract -- Keywords -- 1 My Personal and Professional 'Narrative Turns' -- 2 Turning from Narrative Research to Narrative Inquiry -- 3 Turning towards the World Traveling of Narrative Inquiry -- 3.1 Risten3 -- 3.2 Maria -- 4 Turning towards Embodied Experiences -- 5 Turning towards Silence and Silencing -- 6 Turning Forward -- Notes -- References -- 4. Beyond Personal and Political Boundaries: Being and Becoming a Cross-Cultural Researcher -- Abstract -- Keywords -- 1 Turning Points in Professional Formation -- 2 Threshold Encounters -- 3 Narrative Inquiry -- 4 Narratives from Threshold Encounters -- 4.1 Suffering and Sacrifices -- 4.2 Being on the Right Side -- 4.3 The Relative Relativist -- 4.4 Being an In-Betweener -- 5 Formation of a Cross-Cultural Researcher as an In-Betweener -- References…”
    Libro electrónico