Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 213
- Development 148
- Computer networks 135
- Application software 131
- Leadership 123
- Engineering & Applied Sciences 115
- Artificial intelligence 88
- Security measures 87
- Technological innovations 81
- Business & Economics 80
- Data processing 77
- Computer security 69
- History 67
- Examinations 65
- Design 62
- Information technology 61
- Social aspects 60
- Economic aspects 59
- Finance 59
- Success in business 59
- Economics 58
- Electrical & Computer Engineering 57
- Historia 56
- Programming 55
- Computer programs 53
- Organizational change 53
- Python (Computer program language) 52
- Computer Science 50
- Telecommunications 50
- Operating systems (Computers) 49
-
4801por Organisation for Economic Co-operation and Development“…OECD’s report Innovative Learning Environments documents how educators in a number of countries are engaging in bold and forward-thinking innovations to renew, re-imagine and re-invent contexts for teaching and learning, and, most importantly, provides inspiration to take the journey.” …”
Publicado 2013
Libro electrónico -
4802Publicado 2022“…We are very grateful to our students and colleagues for their valuable input, and we look forward to receiving any comments or suggestions for future editions Este libro está diseñado para estudiantes de pregrado que están iniciando su formación profesional en universidades públicas y privadas, el contenido del libro equivale al curso de matemática básica, que corresponde a estudios generales que se dicta en las distintas escuelas profesionales, una característica importante de este libro denominado “Matemática elemental para estudiantes universitarios” es la colección de ejercicios resueltos y propuestos, que coadyuvaran directamente en el desarrollo de sus capacidades y habilidades en resolución de ejercicios y problemas. …”
Libro electrónico -
4803Publicado 2023“…The app has garnered clients such as Stanford and Princeton Universities, highlighting Cem's ingenuity and forward-thinking approach to business. Cem's entrepreneurial journey began at a young age when he started one of Turkey's first online retail stores at the age of 14. …”
Video -
4804Publicado 2022“…Extraordinarily astute and forward-thinking, she inspired women to change their world by giving them a political voice, and the confidence to use it. …”
Libro electrónico -
4805por Nazemoff, Valeh. author“…The Four Intelligences of the Business Mind reframes the way our minds work, and in doing so transforms how we drive business forward. This book is a must-read!" —Joe DiStefano, Senior Vice President and Market Executive, Cardinal Bank…”
Publicado 2014
Libro electrónico -
4806Publicado 2023“…We will explore effective strategies to overcome these challenges, empowering you to navigate and optimize the capabilities of ChatGPT to their fullest. Moving forward, we arrive at a crucial milestone--the ethical use of ChatGPT. …”
Video -
4807Publicado 2022“…Extraordinarily astute and forward-thinking, she inspired women to change their world by giving them a political voice, and the confidence to use it. …”
Libro electrónico -
4808Publicado 2011“…Chapter 4: Guiding Accelerated Development: This chapter provides helps readers distinguish between "forward-focused coaching", or coaching for next-level assignments, and remedial and transitional coaching. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4809Proceedings of the ACM International Conference on Parallel Architectures and Compilation TechniquesPublicado 2020“…All the papers that did not get forwarded to the second round got the rejection notification after the first round so that the authors were free to modify and submit their papers to other places. …”
Libro electrónico -
4810Publicado 2021Tabla de Contenidos: “…Shunt Failure 450 10.20 ESD Clamp Element - Width Scaling 450 10.21 ESD Clamp Element - On-resistance 450 10.22 ESD Clamp Element - Safe Operating Area (SOA) 451 10.23 ESD Power Clamp Issues 451 10.24 ESD Power Clamp Issues - Power-up and Power-down 451 10.25 ESD Power Clamp Issues - False Triggering 452 10.26 ESD Power Clamp Issues - Pre-charging 452 10.27 ESD Power Clamp Issues - Post-charging 452 10.28 ESD Power Clamp Design 453 10.29 ESD Power Clamp Design Synthesis - Forward Bias Triggered ESD Power Clamps 456 10.30 Series Stacked RC-triggered ESD Power Clamps 459 10.31 Triple Well Diode String ESD Power Clamp 463 10.32 Bipolar ESD Power Clamps 464 10.33 ESD Power Clamp Design Synthesis - Bipolar ESD Power Clamps 469 10.34 Bipolar ESD Power Clamps with Frequency Trigger Elements: Capacitance-triggered 480 10.35 Silicon Controlled Rectifier Power Clamps 481 References 486 11 ESD Architecture and Floor Planning 491 11.1 ESD Design Floor Plan 491 11.2 Peripheral I/O Design 492 11.3 Pad Limited Peripheral I/O Design Architecture 493 11.4 Pad Limited Peripheral I/O Design Architecture - Staggered I/O 493 11.5 Core Limited Peripheral I/O Design Architecture 495 11.6 Lumped ESD Power Clamp in Peripheral I/O Design Architecture 496 11.7 Lumped ESD Power Clamp in Peripheral I/O Design Architecture in the Semiconductor Chip Corners 496 11.8 Lumped ESD Power Clamp in Peripheral I/O Design Architecture - Power Pads 497 11.9 Lumped ESD Power Clamp in Peripheral I/O Design Architecture - Master/Slave ESD Power Clamp System 498 11.10 Array I/O 498 11.11 Array I/O Nibble Architecture 501 11.12 Array I/O Pair Architecture 503 11.13 Array I/O - Fully Distributed 504 11.14 ESD Architecture - Dummy Bus Architecture 507 11.15 ESD Architecture - Dummy VDD Bus 507 11.16 ESD Architecture - Dummy Ground (VSS) Bus 508 11.17 Native Voltage Power Supply Architecture 508 11.18 Single Power Supply Architecture 509 11.19 Mixed Voltage Architecture 509 11.20 Mixed Voltage Architecture - Single Power Supply 509 11.21 Mixed Voltage Architecture - Dual Power Supply 511 11.22 Mixed Signal Architecture 514 11.23 Digital and Analog Floor Plan - Placement of Analog Circuits 515 11.24 Mixed Signal Architecture - Digital, Analog, and RF Architecture 518 11.25 ESD Power Grid Design 519 11.26 I/O to Core Guard Rings 525 11.27 Within I/O Guard Rings 527 11.28 ESD-to-I/O Off-Chip Driver (OCD) Guard Ring 527 11.29 Guard Rings and Computer Aided Design (CAD) Methods 539 11.30 Summary and Closing Comments 541 References 541 12 ESD Digital Design 551 12.1 Fundamental Concepts of ESD Design 551 12.2 Concepts of ESD Digital Design 551 12.3 Device Response to External Events 552 12.4 Alternative Current Loops 553 12.5 Decoupling of Feedback Loops 554 12.6 Decoupling of Power Rails 554 12.7 Local and Global Distribution 554 12.8 Usage of Parasitic Elements 555 12.9 Unused Section of a Semiconductor Device, Circuit, or Chip Function 556 12.10 Unused Corners 556 12.11 Unused White Space 556 12.12 Impedance Matching Between Floating and Non-floating Networks 556 12.13 Unconnected Structures 557 12.14 Symmetry 557 12.15 Design Synthesis 557 12.16 ESD, Latchup, and Noise 559 12.17 Structures Under Bond Pads 574 12.18 Summary and Closing Comments 575 References 576 13 ESD Analog Design 583 13.1 Analog Design: Local Matching 583 13.2 Analog Design: Global Matching 583 13.3 Symmetry 584 13.4 Analog Design - Local Matching 584 13.5 Analog Design - Global Matching 584 13.6 Common Centroid Design 586 13.7 Common Centroid Arrays 586 13.8 Interdigitation Design 586 13.9 Common Centroid and Interdigitation Design 587 13.10 Dummy Resistor Layout 593 13.11 Thermoelectric Cancelation Layout 593 13.12 Electrostatic Shield 593 13.13 Interdigitated Resistors and ESD Parasitics 594 13.14 Capacitor Element Design 595 13.15 Inductor Element Design 596 13.16 ESD Failure in Inductors 597 13.17 Inductor Physical Variables 598 13.18 Inductor Element Design 599 13.19 Diode Design 599 13.20 Analog ESD Circuits 602 13.21 ESD MOSFETs 607 13.24 Analog Differential Pair Common Centroid Design Layout - Signal-pin to Signal-pin and Parasitic ESD Elements 620 13.25 Summary and Closing Comments 624 References 624 14 ESD RF Design 629 14.1 Fundamental Concepts of ESD Design 629 14.2 Fundamental Concepts of RF ESD Design 632 14.3 RF CMOS Input Circuits 637 14.4 RF CMOS Impedance Isolation LC Resonator ESD Networks 647 14.5 RF CMOS LC-diode Networks Experimental Results 648 14.6 RF CMOS LNA ESD Design - Low Resistance ESD Inductor and ESD Diode Clamping Elements in Π-configuration 650 14.7 RF CMOS T-coil Inductor ESD Input Network 653 14.8 RF CMOS Distributed ESD Networks 655 14.9 RF CMOS Distributed ESD-RF Networks 656 14.10 RF CMOS Distributed RF-ESD Networks Using Series Inductors and Dual-diode Shunts 656 14.11 RF CMOS Distributed RF-ESD Networks Using Series Inductors and MOSFET Parallel Shunts 659 14.12 RF CMOS Distributed ESD Networks - Transmission Lines and Co-planar Waveguides 661 14.13 RF CMOS - ESD and RF LDMOS Power Technology 663 14.14 Summary and Closing Comments 666 References 666 15 ESD Power Electronics Design 681 15.1 Reliability Technology Scaling and the Reliability Bathtub Curve 681 15.2 Input Circuitry 686 15.3 Summary and Closing Comments 702 References 702 16 ESD in Advanced CMOS 709 16.1 Interconnects and ESD 709 16.2 Aluminum Interconnects 710 16.3 Interconnects - Vias 714 16.4 Interconnects - Wiring 715 16.5 Junctions 719 16.6 Titanium Silicide 725 16.7 Shallow Trench Isolation 731 16.8 LOCOS-bound ESD Structures 734 16.9 LOCOS-bound p+/n-well Junction Diodes 734 16.10 LOCOS-bound n+ Junction Diodes 736 16.11 LOCOS-bound n-well/Substrate Diodes 737 16.12.…”
Libro electrónico -
4811Publicado 2021“…As a board, we are truly grateful for what has been accomplished by this talented group and are looking forward to this new experience. The SIGCSE Technical Symposium provides us with a chance to honor two people for their contributions to computer science education and the SIGCSE community. …”
Libro electrónico -
4812Publicado 2023“…The instructor gives tips and tricks of using empirical data and simple math to get ahead of potential issues that might arise going forward. Lesson 6: Prescriptive Data Analytics: This lesson shows how to analyze your data, identify trends therein, and make informed decisions for your team based on your analysis. …”
Video -
4813Publicado 2023“…Join us on this rewarding journey to unlock the power of Rust programming and propel your career forward. Enroll now and gain the skills, knowledge, and expertise to thrive in the world of Rust. …”
Video -
4814Publicado 2020“…The conference concludes with a closing keynote on Country Centred Design, presented by Angie Abdilla of Old Ways New, offering indigenous cultural knowledge as a way forward in thinking through the intermingling of old and new technologies for future world making imbued with an ethics of care for Country. …”
Libro electrónico -
4815Publicado 2022“…Sixteen studies were carried forward from the prior review and 67 studies were new. …”
Libro electrónico -
4816por Harkins, Malcolm. author“…Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business. …”
Publicado 2013
Libro electrónico -
4817Publicado 2021“…Therefore, we need to gain insight into all incidents and processes that affect and shape the Eastern Mediterranean, and within this framework put forward our projections on the future of Turkey, which is a common concern and asset for all of us. …”
Libro electrónico -
4818Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
4819Publicado 2020“…Does the conclusion explain how the research has moved the body of scientific knowledge forward? Tables, Figures, Images: Are they appropriate? …”
Libro electrónico -
4820Publicado 2020“…The heart of the conference is your research discoveries, which is what drives our field forward…”
Libro electrónico