Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,667
- Bible 1,923
- Bíblia 1,428
- Historia 1,218
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 560
- Computer Science 516
- Història 511
- History 455
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
47441Publicado 2017“…Explains how business design abstraction based on collaborations, capabilities and values provides a management view of how the business works, the aspects to be improved or changed, and the means to quickly reconfigure to address new business challenges and opportunities Discusses how technology must be exploited for efficiency, effectiveness, innovation and agility Provides practicable and use-case based insights from advisory work with Fortune 100 and 500 companies across multiple verticals Presents the features of CMMN (Case Management Model and Notation) and explains how it enables automation to support knowledge workers, managers and enterprise agility Describes application of the Value Delivery Modeling Language (VDML) to link strategic business transformation to operational design…”
Libro electrónico -
47442Publicado 2017“…The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. …”
Libro electrónico -
47443Publicado 2015“…The IBM® Storwize® family, including the IBM SAN Volume Controller Data Platform, is a storage virtualization system that enables a single point of control for storage resources. …”
Libro electrónico -
47444Publicado 2018“…Business analysis is a crucial discipline for organisational success, it enables organisations to rise to the challenges presented by today's increasing pace of change. …”
Libro electrónico -
47445Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction -- The road to modern Java -- Modern Java features -- Chapter 2: Lambdas Introduction -- λs in functional programming -- 1930s and the lambda calculus -- 1950s and LISP -- What is a lambda -- Functions vs classes -- Lambdas in modern Java -- Some theoretical differences -- Functions vs classes -- Some concrete differences -- Capture semantics -- Shadowed variables -- Summary -- λ basic syntax -- Syntax breakdown -- Summary -- Chapter 3: Lambdas in Depth -- Functional interfaces -- @FunctionalInterface -- Extension -- Other interface improvements -- Summary -- Type inference improvements -- Java type inference -- Target-typing for lambdas -- Type parameters in method calls -- Type parameters in chained method calls -- Method references -- Example -- Method reference types -- Constructor reference -- Static method reference -- Instance method reference of particular object (in this case, a closure) -- Instance method reference of a arbitrary object whose instance is supplied later (lambda) -- Summary -- Scoping -- Effectively final -- Circumventing final -- Exception handling -- Using a callback -- Dealing with exceptions when writing lambdas -- As a caller (dealing with exceptions when calling lambdas) -- Lambdas vs closures -- Basic differences -- Other differences -- Summary -- -- Bytecode recap -- Descriptors -- Converting a method signature -- Code examples -- Example 1 -- Example 2 -- Example 3 -- Example 4 -- Example 4 (with method reference) -- Example 5 -- Summary -- Appendix: Bytecode -- WaitFor -- Example 1 -- Example 2 -- Example 3 -- Example 4 -- Example 4 (with Method Reference) -- Example 5 -- Index…”
Libro electrónico -
47446“…The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. …”
Libro electrónico -
47447Publicado 2016“…This report includes: Recommendations and implementation steps for policymakers, entrepreneurs, and activists looking to leverage open data Key challenges, such as resource shortages and inadequate privacy or security protections Four conditions that enable open data to work—including organizational partnerships and collaborations Case studies of open data projects for improving government in Brazil, Sweden, Slovakia, and other countries Projects for empowering citizens in Tanzania, Kenya, Mexico, and Uruguay New business opportunities enabled by open weather, geo-location, and market research data Public problem-solving efforts built on open data for Ebola in Sierra Leone, dengue fever in Singapore, and earthquakes in New Zealand Andrew Young (@_AndrewYoung) is the Associate Director of Research at The GovLab (www.thegovlab.org), where he leads a number of grant-funded research efforts focusing on the impact of technology on public institutions. …”
Libro electrónico -
47448Publicado 2014“…And IBM Real-time CompressionTM enhances efficiency even further by enabling the storage of up to five times as much active primary data in the same physical disk space. …”
Libro electrónico -
47449Publicado 2002“…iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. …”
Libro electrónico -
47450por Johnson, Steve, 1961-“…In 1991, after working for Apple Computer and Microsoft, Steve Johnson founded Perspection, Inc. …”
Publicado 2008
Libro electrónico -
47451por Brown, Kevin“…IP Telephony Unveiled uncovers the value behind this technology, which helps you see past what might appear to be only a new telephone system, to understand the strategic enabler laying dormant in many companies' networks. …”
Publicado 2004
Libro electrónico -
47452por Miser, Brad“…. • How to customize the way iPhone looks and works with your own wallpaper, Home screen button layouts, ringtones from your favorites songs, and more. CATEGORY: Apple Digital Media COVERS: Apple iPhone USER LEVEL: Beginning-Intermediate Quote from front cover. …”
Publicado 2009
Libro electrónico -
47453por Millas, Jose Luis LatorreTabla de Contenidos: “…Intro -- Microsoft .NET Framework 4.5 Quickstart Cookbook -- Table of Contents -- Microsoft .NET Framework 4.5 Quickstart Cookbook -- Credits -- About the Author -- Acknowledgment -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? …”
Publicado 2013
Libro electrónico -
47454Publicado 2020“…This IBM Redbooks® publication describes how the CSI Driver for IBM file storage enables IBM Spectrum® Scale to be used as persistent storage for stateful applications running in Kubernetes clusters. …”
Libro electrónico -
47455Publicado 2019“…As you progress, you'll discover the strategic aspects of data science by learning the five-phase framework that enables you to enhance the value you extract from data. …”
Libro electrónico -
47456Publicado 2017“…Modern applications running in the cloud often rely on REST-based microservices architectures by using Docker containers. Docker enables your applications to communicate between one another and to compose and scale various components. …”
-
47457Publicado 2021“…These labs are based on Docker, Azure Container Registry (ACR), ACI, and Web App for Containers, and show you how to enable container orchestration and cloud-scale using AKS. …”
Libro electrónico -
47458por Onigbode, Yemi“…The Oracle E-Business Suite 12 Financials Cookbook will enable you to taste the core functionalities of the main modules using bite size recipes. …”
Publicado 2011
Libro electrónico -
47459por Murray, Katherine, 1961-“…Whether you work primarily in the office or on the go, you'll find smart tools in this release that enable you to get your work done easier, faster, and more professionally than ever. …”
Publicado 2010
Libro electrónico -
47460por Ganbar, Ron“…Ron was made a “Teacher’s Trainer” by Apple for Shake in 2005 and has written, taught, and evaluated courses for the National Film and Television School, Apple, Peachpit Press, Westminster University, and others. …”
Publicado 2014
Libro electrónico