Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- City planning 503
- History 350
- Historia 279
- Development 187
- Engineering & Applied Sciences 159
- Management 153
- Application software 141
- Architecture 135
- Social aspects 123
- Computer programming 118
- Computer Science 115
- History and criticism 95
- Economics 90
- Biblia 88
- Data processing 88
- Jazz 85
- Design 84
- Python (Computer program language) 82
- Programming 81
- Business & Economics 80
- Crítica e interpretación 79
- Law and legislation 76
- Photography 76
- RELIGION 75
- Música 73
- Java (Computer program language) 71
- Education 69
- Filosofía 67
- Computer software 66
- Congressos 66
-
9001Publicado 2020Tabla de Contenidos: “…Koehler oChapter 29: Acute Asthma: A Little Influenza, a Big Asthma Attack Level I oChapter 30: Chronic Asthma: Cat Got Your Tongue? …”
Libro electrónico -
9002Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
9003
-
9004Publicado 2005Tabla de Contenidos: “…Causas españolas y procesos romanos de Urbano VIII a Benedicto XIV (siglos xvii-xvni) / Palabra de Dios, pluma de claustro. El discurso literal de la divinidad y sus adyacentes en la Revelación visionaria barroca / Ponencias -- Ecritures de sainte Thérèse dAvila / Santo y rey. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9005Publicado 2018Tabla de Contenidos: “…Real world examples of metaprogramming -- Example 1 - Reflection -- Making a class reflect its members -- C++ libraries which simplifies reflection -- Using the reflection -- Evaluating the assembler output of the reflection -- Conditionally overloading global functions -- Testing reflection capabilities -- Example 2 - Creating a generic safe cast function -- Example 3 - Hash strings at compile time -- The advantages of compile-time hash sum calculation -- Implement and verify a compile-time hash function -- Constructing a PrehashedString class -- Forcing PrehashedString to only accept compile time string literals -- Evaluating PrehashedString -- Evaluating get_bitmap_resource() with PrehashedString -- Summary -- Chapter 9: Proxy Objects and Lazy Evaluation -- An introduction to lazy evaluation and proxy objects -- Lazy versus eager evaluation -- Proxy objects -- Comparing concatenated strings using a proxy -- Implementing the proxy -- Performance evaluation -- The r-value modifier -- Assigning a concatenated proxy -- Postponing an sqrt computation when comparing distances -- A simple two-dimensional point class -- The underlying mathematics -- Implementing the DistProxy object -- Expanding DistProxy to something more useful -- Comparing distances with DistProxy -- Calculating distances with DistProxy -- Preventing the misuse of DistProxy -- Performance evaluation -- Creative operator overloading and proxy objects -- The pipe operator as an extension method -- The pipe operator -- The infix operator -- Further reading -- Summary -- Chapter 10: Concurrency -- Understanding the basics of concurrency -- What makes concurrent programming hard? …”
Libro electrónico -
9006Publicado 2021Tabla de Contenidos: “…Directory services -- Security services -- What's Important in a Server -- Scalability -- Reliability -- Availability -- Service and support -- Components of a Server Computer -- Motherboard -- Processor -- Memory -- Hard drives -- Network interfaces -- Video -- Power supply -- Considering Server Form Factors -- Tower case -- Rack mount -- Blade servers -- Considering Virtualization -- Chapter 6 Cloud Computing -- Introducing Cloud Computing -- Looking at the Benefits of Cloud Computing -- Detailing the Drawbacks of Cloud Computing -- Examining Three Basic Kinds of Cloud Services -- Applications -- Platforms -- Infrastructure -- Public Clouds versus Private Clouds -- Introducing Some of the Major Cloud Providers -- Amazon -- Google -- Microsoft -- Getting Into the Cloud -- Book 2 Understanding Network Protocols -- Chapter 1 Network Protocols and Standards -- Understanding Protocols -- Understanding Standards -- Seeing the Seven Layers of the OSI Reference Model -- The physical layer -- The data link layer -- The network layer -- Logical addressing -- Routing -- The transport layer -- The session layer -- The presentation layer -- The application layer -- Following a Packet through the Layers -- The Ethernet Protocol -- Standard Ethernet -- Fast Ethernet -- Gigabit Ethernet -- Beyond gigabit -- The TCP/IP Protocol Suite -- IP -- TCP -- UDP -- Other Protocols Worth Knowing About -- Chapter 2 TCP/IP and the Internet -- What Is the Internet? -- A Little Internet History -- TCP/IP Standards and RFCs -- The TCP/IP Protocol Framework -- Network interface layer -- Network layer -- Transport layer -- Application layer -- Chapter 3 IP Addresses -- Understanding Binary -- Counting by ones -- Doing the logic thing -- Working with the binary Windows Calculator -- Introducing IP Addresses -- Networks and hosts -- The dotted-decimal dance…”
Libro electrónico -
9007Publicado 2017Tabla de Contenidos: “…B Passing Off: "The Whole Law and the Prophets on the Subject" -- C Kidd/Derringer: Trademark Universality "US Style" -- II The Right/Markets Connex: Materialization, Goodwill, and Trade Diversion -- A The Materialization of Trademark Rights -- B The Reverse Picture: Trade-Diversion Prevention -- C Tea Rose/Rectanus: The Doctrine of Market-Based Rights -- III The Realist Attack: Much Ado about ... Quite Little -- A The Turn-of-the-Century Crisis -- B Courts' Adherence to "Transcendental Nonsense" -- C Frank I. …”
Libro electrónico -
9008Android smartphones for seniorsAndroid Smartphones For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…What's the Deal? -- A Little Android History -- The Many Flavors (Versions) of Android -- Reasons That People Choose Android -- Why You Need a Google Account -- Accessing apps and settings -- Bequeathing your account -- So Many Choices! …”
Libro electrónico -
9009Cryptocurrency All-in-One For DummiesCryptocurrency All–in–One For DummiesPublicado 2022Tabla de Contenidos: “…Ethereum versus Bitcoin -- Ethereum characteristics -- Ripple -- Some Ripple background -- Ripple versus Bitcoin -- Ripple characteristics -- Cardano -- A little Cardano background -- Cardano versus Bitcoin -- Cardano characteristics -- Other top ten major cryptos -- Top 100 major cryptos -- Cryptocurrencies by Category -- Payment cryptos -- Privacy cryptos -- Platform cryptos -- Exchange-specific cryptos -- Finance/fintech cryptos -- Legal and property cryptos -- Book 2 Blockchain Basics -- Chapter 1 Introducing Blockchain -- Beginning at the Beginning: What Blockchains Are -- What blockchains do -- Why blockchains matter -- The Structure of Blockchains -- Blockchain Applications -- The Blockchain Life Cycle -- Consensus: The Driving Force of Blockchains -- Blockchains in Use -- Current blockchain uses -- Future blockchain applications -- Chapter 2 Picking a Blockchain -- Where Blockchains Add Substance -- Determining your needs -- Defining your goal -- Choosing a Solution -- Drawing a blockchain decision tree -- Making a plan -- Chapter 3 Getting Your Hands on Blockchain -- Diving into Blockchain Technology -- Creating a secure environment -- Downloading and installing the Brave browser -- Downloading and installing ProtonVPN -- Downloading, installing, and securing MetaMask -- Buying your first Bitcoin -- Building a Private Blockchain with Docker and Ethereum -- Preparing your computer -- Building your blockchain -- Chapter 4 Beholding the Bitcoin Blockchain -- Getting a Brief History of the Bitcoin Blockchain -- The New Bitcoin: Bitcoin Cash -- Debunking Some Common Bitcoin Misconceptions -- Bitcoin: The New Wild West -- Fake sites -- No, you first! …”
Libro electrónico -
9010Nonprofit kit forNonprofit Kit For DummiesPublicado 2022Tabla de Contenidos: “…Recruiting the Right People for Your Board -- Incorporating diversity, equity, and inclusion in the board's composition -- Keeping it fresh: Terms of service -- Big boards or little boards -- Choosing officers and committees -- Introducing new and prospective members to the board and the organization -- Putting Staff Members on Your Board -- Using Your Board to Full Capacity -- Encouraging commitment from board members -- Holding effective board meetings -- Chapter 4 Creating Your Mission Statement and Vision Statement -- Honing Your Mission Statement -- Keeping your mission statement short and sweet -- Stating your mission - the goal for services -- Specifying who will be served by the nonprofit -- Explaining how you'll accomplish your mission -- Incorporating diversity, equity, and inclusion (DEI) into your mission statement -- Imagining Your Future with a Vision Statement -- Capturing your vision statement -- Asking "Where are we going?" …”
Libro electrónico -
9011Publicado 2017Tabla de Contenidos: “…-- The solo test run -- Making it a social occasion -- Putting it within boundaries -- Reaching out to family and friends -- Those who are strangers -- Those who you want to play your game -- When -- Where -- What -- A little goes a long way -- How…”
Libro electrónico -
9012por Green, DaleTabla de Contenidos: “…Random Gem and Heart classes -- Random gold class -- The random potion class -- Creating a random potion -- Determining potion pickups -- Exercises -- Summary -- Chapter 6: Procedurally Generating Art -- How procedural generation is used with art -- Using sprite effects and modifiers -- Combining multiple textures -- Creating textures from scratch -- Creating complex animations -- The benefits of procedurally generated art -- Versatility -- Cheap to produce -- It requires little storage -- The drawbacks of procedurally generated art -- Lack of control -- Repeatability -- Performance heavy -- Using SFML sprite modifiers -- How colors work in SFML -- Creating sprites of a random color -- Selecting a preset color at random -- Generating a color at random -- Creating sprites of a random size -- Saving modified sprites -- Passing a texture into an image -- Drawing to a RenderTexture class -- Saving an image to a file -- Creating enemy sprites procedurally -- Breaking sprites into components -- The draw setup -- Randomly selecting sprite components -- Loading the default armor textures -- Choosing the armor tier -- Rendering the armor textures -- Rendering the final textures -- Overriding the default draw behavior -- Debugging and testing -- Editing the game tiles -- Exercises -- Summary -- Chapter 7: Procedurally Modifying Audio -- An introduction to SFML audio -- sf::Sound versus sf::Music -- sf::SoundBuffer -- Selecting a random main track -- Adding sound effects -- Editing sound effects -- Playing a sound function -- The audio listener -- Creating a fluctuation in a pitch -- 3D sound - spatialization -- The audio listener -- The minimum distance -- Attenuation -- The position of the sound -- Fixed positions -- Moving positions -- Exercises -- Summary -- Chapter 8: Procedural Behavior and Mechanics -- An introduction to pathfinding…”
Publicado 2016
Libro electrónico -
9013Publicado 2019Tabla de Contenidos: “…Building Tables -- Locating table rows with keys -- Using the CREATE TABLE statement -- Setting Constraints -- Column constraints -- Table constraints -- Keys and Indexes -- Ensuring Data Validity with Domains -- Establishing Relationships between Tables -- Altering Table Structure -- Deleting Tables -- Book 3 SQL Queries -- Chapter 1 Values, Variables, Functions, and Expressions -- Entering Data Values -- Row values have multiple parts -- Identifying values in a column -- Literal values don't change -- Variables vary -- Special variables hold specific values -- Working with Functions -- Summarizing data with set functions -- Dissecting data with value functions -- Using Expressions -- Numeric value expressions -- String value expressions -- Datetime value expressions -- Interval value expressions -- Boolean value expressions -- Array value expressions -- Conditional value expressions -- Converting data types with a CAST expression -- Row value expressions -- Chapter 2 SELECT Statements and Modifying Clauses -- Finding Needles in Haystacks with the SELECT Statement -- Modifying Clauses -- FROM clauses -- WHERE clauses -- GROUP BY clauses -- HAVING clauses -- ORDER BY clauses -- Tuning Queries -- SELECT DISTINCT -- Temporary tables -- The ORDER BY clause -- The HAVING clause -- The OR logical connective -- Chapter 3 Querying Multiple Tables with Subqueries -- What Is a Subquery? …”
Libro electrónico -
9014Publicado 2015Tabla de Contenidos: “…Manipulating Strings -- Working with Strings -- String Literals -- Double Quotes -- Escape Characters -- Raw Strings -- Multiline Strings with Triple Quotes -- Multiline Comments -- Indexing and Slicing Strings -- The in and not in Operators with Strings -- Useful String Methods -- The upper(), lower(), isupper(), and islower() String Methods -- The isX String Methods -- The startswith() and endswith() String Methods -- The join() and split() String Methods -- Justifying Text with rjust(), ljust(), and center() -- Removing Whitespace with strip(), rstrip(), and lstrip() -- Copying and Pasting Strings with the pyperclip Module -- Project: Password Locker -- Step 1: Program Design and Data Structures -- Step 2: Handle Command Line Arguments -- Step 3: Copy the Right Password -- Project: Adding Bullets to Wiki Markup -- Step 1: Copy and Paste from the Clipboard -- Step 2: Separate the Lines of Text and Add the Star -- Step 3: Join the Modified Lines -- Summary -- Practice Questions -- Practice Project -- Table Printer -- II. …”
Libro electrónico -
9015Publicado 2023Tabla de Contenidos: “…Licensing your own IP -- The license agreement -- Defensive strategies -- International strategies -- Chapter 9 Putting Together Your Founding Team -- A Little Science Behind Founding Teams -- Who's on First? …”
Libro electrónico -
9016Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This All-in-One -- Book 1: Introducing R -- Book 2: Describing Data -- Book 3: Analyzing Data -- Book 4: Learning from Data -- Book 5: Harnessing R: Some Projects to Keep You Busy -- What You Can Safely Skip -- Foolish Assumptions -- Icons Used in This Book -- Beyond This Book -- Where to Go from Here -- 1 Introducing R -- Chapter 1 R: What It Does and How It Does It -- The Statistical (and Related) Ideas You Just Have to Know -- Samples and populations -- Variables: Dependent and independent -- Types of data -- A little probability -- Inferential statistics: Testing hypotheses -- Null and alternative hypotheses -- Two types of error -- Getting R -- Getting RStudio -- A Session with R -- The working directory -- Getting started -- R Functions -- User-Defined Functions -- Comments -- R Structures -- Vectors -- Numerical vectors -- Matrices -- Lists -- Data frames -- for Loops and if Statements -- Chapter 2 Working with Packages, Importing, and Exporting -- Installing Packages -- Examining Data -- Heads and tails -- Missing data -- Subsets -- R Formulas -- More Packages -- Exploring the tidyverse -- Importing and Exporting -- Spreadsheets -- CSV files -- Text files -- 2 Describing Data -- Chapter 1 Getting Graphic -- Finding Patterns -- Graphing a distribution -- Bar-hopping -- Slicing the pie -- The plot of scatter -- Of boxes and whiskers -- Doing the Basics: Base R Graphics, That Is -- Histograms -- Graph features -- Bar plots -- Pie graphs -- Dot charts -- Bar plots revisited -- Scatter plots -- A plot twist -- Scatter plot matrix -- Box plots -- Kicking It Up a Notch to ggplot2 -- Histograms -- Bar plots -- Dot charts -- Bar plots re-revisited -- Scatter plots -- About that plot twist . . . -- Scatter plot matrix -- Box plots -- Putting a Bow On It…”
Libro electrónico -
9017Publicado 2022Tabla de Contenidos: “…-- Setting up a Tiltify profile -- Doing a little prep before you get started -- Part 5 The Part of Tens -- Chapter 16 Ten (or More) Life Lessons from Twitch -- Twitch Enabled Me to Take Center Stage -- Twitch Opened the World to Me -- Twitch Helped Me Realize I Am Not Alone -- Success Is Waiting for You If You're Willing to Work for It -- Twitch Encourages Me to Look for Improvement -- You Always Have Someone Watching Your Back -- Twitch Can Surprise You in the Best of Ways -- One Life Lesson from Twitch -- It's a Glimpse of How Good We Can Be -- Twitch Took My Education and Leveled It Up -- Twitch Restored My Faith in People…”
Libro electrónico -
9018Publicado 2023Tabla de Contenidos: “…Summary -- Questions -- Further reading -- Chapter 9: AOP with PostSharp -- Technical requirements -- AOP -- AOP frameworks -- How AOP works with PostSharp -- Extending the aspect framework -- Project - Cross-cutting concerns reusable library -- Adding a caching concern -- Adding file logging capabilities -- Adding an exception-handling concern -- Adding a security concern -- Adding a validation concern -- Adding a transaction concern -- Adding a resource pool concern -- Adding a configuration settings concern -- Adding an instrumentation concern -- PostSharp and build pipeline considerations -- Dynamic AOP with Castle.DynamicProxy -- Summary -- Questions -- Further reading -- Chapter 10: Using Tools to Improve Code Quality -- Technical requirements -- Code analysis -- Using quick actions -- Using the JetBrains dotTrace profiler -- Using JetBrains ReSharper -- Using Telerik JustDecompile -- Continuous integration with GitHub Actions and CodeQL -- Summary -- Questions -- Further reading -- Chapter 11: Refactoring C# Code -- Technical requirements -- Application-level code smells -- Boolean blindness -- Combinatorial explosion -- Contrived complexity -- Data clump -- Deodorant comments -- Duplicate code -- Lost intent -- The mutation of variables -- The oddball solution -- Shotgun surgery -- Solution sprawl -- Uncontrolled side effects -- Class-level code smells -- Cyclomatic complexity -- Divergent change -- Downcasting -- Excessive literal use -- Feature envy -- Inappropriate intimacy -- Indecent exposure -- The large class (the God object) -- The lazy class (the freeloader and the lazy object) -- The middleman class -- The orphan class of variables and constants -- Primitive obsession -- Refused bequest -- Speculative generality -- Tell, Don't Ask -- Temporary fields -- Method-level smells -- The black sheep method -- Cyclomatic complexity…”
Libro electrónico -
9019Publicado 2023Tabla de Contenidos: “…Preface -- 1 -- Getting Started with ChatGPT for Salesforce Development -- A little bit about Salesforce -- History of AI -- Salesforce and generative AI -- OpenAI and ChatGPT -- Setting up ChatGPT for Salesforce -- Dedicated chat thread -- ChatGPT custom instructions -- Salesforce project creative brief -- ChatGPT-assisted Salesforce development -- Troubleshooting with ChatGPT -- ChatGPT "levels up" developers -- The case study -- Summary -- 2 -- Using ChatGPT for Salesforce Configuration -- The basics of Salesforce configuration -- Creating custom fields and objects -- Setting up validation rules -- Modifying page layouts -- Creating a report -- Setting up approval processes -- Summary -- 3 -- Using ChatGPT for Salesforce Flows -- Unlocking the potential of Salesforce Flows and the role of ChatGPT -- Troubleshooting Flow errors with ChatGPT assistance -- Governor limits -- An unhandled fault has occurred in this flow -- Permission and sharing issues -- Advanced flow techniques with ChatGPT -- Case study -- Summary -- 4 -- Using ChatGPT for Salesforce Feature Design -- Exploring multiple solutions with ChatGPT -- Integrating Salesforce and Snowflake -- Conclusion - Integrating Salesforce and Snowflake -- Brainstorming with ChatGPT -- Scaling solutions -- Summary -- 5 -- Using ChatGPT for Salesforce Apex That Someone Else Wrote -- Understanding existing Apex code -- Identifying and rectifying issues in Apex code -- Adding and managing comments in Apex code -- Summary -- 6 -- Using ChatGPT for Salesforce Apex -- Crafting Apex code with ChatGPT's guidance -- Optimizing and refactoring Apex code -- Error handling and debugging in Apex -- Best practices and continuous learning -- Summary -- 7 -- Using ChatGPT for Salesforce Web Services and Callouts -- Technical requirements -- Salesforce Web Services -- Salesforce Apex callouts…”
Libro electrónico -
9020Publicado 2024Tabla de Contenidos: “…. -- Summary -- Further reading -- Chapter 9: Acting Like a Designer - The Design Thinking Process in Application -- The Design Thinking process - stages, steps, and micro-learning cycles -- Exploring and understanding the five stages of Design Thinking -- The five discovery skills -- From process to methods -- The Design Methods - powerful ways to observe, study, and understand -- Categorizing the Design Methods -- Sequencing the Design Methods -- Applying the Design Methods -- A deeper look at the Observe Methods -- A deeper look at the Question Methods -- A deeper look at the Experiment Methods -- A deeper look at the Study Methods -- Embracing the value Design Methods offer -- Knowing how to select the right Design Methods to use -- Creating our Insights Plan -- Prototyping in Design Thinking - a critical element in the process -- Making prototyping inherent to how we operate in Design Thinking -- Understanding the different purposes of prototyping -- Two important considerations about prototyping -- Understanding the different types of prototypes -- Prototype application and fidelity -- When in doubt, prototype and test - the undeniable power of prototyping -- A little help - how Generative AI can help us -- As a resource for more comprehensive insights -- As a stimulus for enhanced imagination -- Not as a direct resource for novel ideation…”
Libro electrónico