Mostrando 121 - 131 Resultados de 131 Para Buscar 'Private Media Group', tiempo de consulta: 0.12s Limitar resultados
  1. 121
    por Kumar, Arya
    Publicado 2012
    Tabla de Contenidos: “…4.7.3 Using Your Brain Effectively and Absurdly -- 4.7.4 Mind Mapping -- 4.7.5 Group Creativity -- 4.7.6 Focus Groups -- 4.7.7 Brainstorming -- 4.7.8 Reverse Brainstorming -- 4.7.9 Synectics -- 4.7.10 The Gordon Method -- 4.7.11 Scientific Method -- 4.7.12 Value Analysis -- 4.7.13 Problem Inventory Analysis -- 4.7.14 Checklist Method -- 4.7.15 Free Association -- 4.7.16 Forced Relationships -- 4.7.17 Attribute Listing -- 4.7.18 Reversal -- 4.7.19 Scamper -- 4.7.20 Collective Notebook Method -- 4.7.21 Big Dream Approach -- 4.8 A Good Idea is not Enough -- Key Concepts -- Endnotes -- References -- Conceptual Questions -- Critical Thinking Questions -- Case 4.1: Creativity in Start-UPS -- Case 4.2: Innovation: Creating and Defending New Sources of Value -- Chapter 5: Idea to Opportunity -- Learning Objectives -- 5.1 Introduction -- 5.2 Opportunity-Definition -- 5.3 Opportunity Recognition -- 5.4 Opportunity Process -- 5.5 Sources of Opportunity -- 5.5.1 Broad Categories of Change -- 5.5.2 Enhancement, Extensions and Specializations to Create Opportunities -- 5.6 Indian Economy-Opportunities -- 5.7 Steps Involved in Assessing Business Potential of an Idea -- 5.7.1 Idea Stage -- 5.7.2 Concept Stage of an Idea -- 5.7.3 Product Development Stage -- 5.7.4 Test Marketing Stage -- 5.8 Steps Involved in Tapping Opportunity -- 5.8.1 Seizing the Opportunity -- 5.8.2 Evaluating Opportunity -- 5.8.3 Understanding the Timeframe -- 5.8.4 Computing the Worth of an Opportunity -- 5.8.5 Establishing Need Through Preliminary Market Research -- 5.8.6 Market Research-Data Collection and Analysis -- 5.8.7 Identifying the Need for Partners, if Any -- 5.8.8 Identifying Resources Required and Sources to Acquire -- 5.8.9 Managing the Venture -- Key Concepts -- Endnotes -- References -- Conceptual Questions -- Critical Thinking Questions -- Case 5.1: Reusable Diaper…”
    Libro electrónico
  2. 122
    Publicado 2016
    Libro electrónico
  3. 123
    Publicado 2017
    Tabla de Contenidos: “…Performance and concurrency -- Managing the database -- Provisioned throughput -- Auto scaling -- Backing up and restoring data -- Controlling user access -- Improving the serverless store -- Retrieving all products -- Retrieving the user's shopping cart -- Saving the user's shopping cart -- Processing the checkout -- Amazon S3 (for media files) -- Uploading and downloading files -- Enabling CORS -- Backing up and restoring data -- Using S3 versioning -- Summary -- Chapter 8: Securing the Serverless Application -- Security basics -- Information security -- Authentication -- Authorization -- Confidentiality -- Integrity -- Non-repudiation -- Availability -- Security on AWS -- Shared responsibility model -- The Trusted Advisor tool -- Pen testing -- AWS CloudTrail -- MFA -- Handling authentication and authorization -- Amazon Cognito -- Creating a user pool -- Creating an identity pool -- Using Cognito in our serverless store -- The Signup page -- The Login page -- Persisting the user token -- Logging out -- Handling authentication in Lambda functions -- Summary -- Chapter 9: Handling Serverless Notifications -- AWS IoT -- Protocols -- Finding the IoT endpoint -- AWS IoT SDK -- Implementing serverless notifications -- Public notifications -- Adding a comment box -- Updating the list of comments -- Creating a new instance of the IoT SDK -- Sending and receiving new comments -- Triggering a Lambda function with IoT -- Private notifications -- Using credentials of an authenticated user -- Updating the logout feature -- Creating an IoT policy -- Attaching an IoT policy and connecting -- Passing the Cognito Identity to the Lambda function -- Sending IoT messages with Lambda -- Summary -- Chapter 10: Testing, Deploying, and Monitoring -- Testing your solution -- Unit testing Lambda functions -- Mocking external services -- Using Sinon.JS for mocking…”
    Libro electrónico
  4. 124
    Publicado 2002
    Libro electrónico
  5. 125
    Publicado 2013
    Libro electrónico
  6. 126
    Publicado 2023
    Tabla de Contenidos: “…Conference session tracks -- Hallway tracks -- After-hour conference events -- A respectful professional environment -- Becoming Familiar with GitHub Events -- GitHub Universe -- GitHub Satellite -- GitHub Constellation -- Git Merge -- Speaking at Events -- Everyone has a story to tell -- Benefits of being a speaker -- Finding Funding for Events -- Part 7 The Part of Tens -- Chapter 18 Ten Ways to Level Up on GitHub -- Trial and Error -- GitHub Help Docs -- GitHub Skills -- GitHub In-Person Training -- Project-Specific Documentation -- External Community Places -- Online Coding Tutorials -- Online Courses and Tutorials -- Blogs, YouTube, Twitter, TikTok, and Other Social Media -- Community Forum -- Chapter 19 Ten Ways to Improve Your Development Workflow -- Drafting Pull Requests -- Git Aliases -- Run Tests Automatically -- Take Breaks -- Prototype User Interfaces -- Scaffold Apps with Yeoman -- Chrome Web Developer Tools -- StackOverflow -- Code Analysis Tools -- Project Boards -- Chapter 20 Ten Tips for Being an Effective Community Member -- Be Respectful and Kind -- Report Bad Behavior -- Write Good Bug Reports -- Be Responsive -- Submit Pull Requests to Correct Documentation -- Document Your Own Code -- Give Credit Where It's Due -- Help Get the Word Out -- Be Proactive and Mentor Others -- Contribute Outside of GitHub -- Index -- EULA…”
    Libro electrónico
  7. 127
    por Prakash, Kolla Bhanu
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Preface -- Chapter 1 Overview of Machine Learning -- 1.1 Introduction -- 1.2 Sorts of Machine Learning -- 1.3 Regulated Gaining Knowledge of Dog and Human -- 1.4 Solo Learning -- 1.5 Support Mastering -- 1.6 Bundles or Applications of Machine Learning -- 1.6.1 Photograph Reputation -- 1.6.2 Discourse Recognition -- 1.6.3 Traffic Prediction -- 1.6.4 Item Recommendations -- 1.6.5 Self-Using Vehicles -- 1.6.6 Electronic Mail Unsolicited Mail And Malware Filtering -- 1.6.7 Computerized Private Assistant -- 1.6.8 Online Fraud Detection -- 1.6.9 Securities Exchange Buying and Selling -- 1.6.10 Clinical Prognosis -- 1.6.11 Computerized Language Translation -- 1.6.12 Online Media Features -- 1.6.13 Feeling Evaluation -- 1.6.14 Robotizing Employee Get Right of Entry to Manipulate -- 1.6.15 Marine Flora and Fauna Protection -- 1.6.16 Anticipate Potential Coronary Heart Failure -- 1.6.17 Directing Healthcare Efficiency and Scientific Offerings -- 1.6.18 Transportation and Commuting (Uber) -- 1.6.19 Dynamic Pricing -- 1.6.19.1 How Does Uber Decide the Cost of Your Excursion? …”
    Libro electrónico
  8. 128
    Publicado 2024
    Libro electrónico
  9. 129
    Publicado 2017
    Tabla de Contenidos: “…Connected Mine Networks -- Core Network Connectivity -- Network Design Consideration for Mining Applications -- Data Processing -- Summary -- ch. 15 Public Safety -- Overview of Public Safety -- Public Safety Objects and Exchanges -- Public and Private Partnership for Public Safety IoT -- Public Safety Adoption of Technology and the IoT -- An IoT Blueprint for Public Safety -- Mission Continuum -- Mission Fabric -- Inter-agency Collaboration -- Emergency Response IoT Architecture -- Mobile Command Center -- Network and Security Services -- Compute and Applications Services -- Mobile Vehicles: Land, Air, and Sea -- Network and Security Services -- Compute and Applications Services -- IoT Public Safety Information Processing -- School Bus Safety -- Bus Location and Student Onboarding/Offboarding -- Driver Behavior Reporting -- Diagnostic Reporting -- Video Surveillance -- Student Wi-Fi -- Push-to-Talk Communication -- School Bus Safety Network Architecture -- Summary -- Reference…”
    Libro
  10. 130
    por Kahate, Atul
    Publicado 2004
    Tabla de Contenidos: “…4.3.9 Normalisation Summary -- 4.3.10 Denormalisation -- 4.4 Entity/Relationship (E/R) Modelling -- 4.4.1 Aspects of E/R Modelling -- 4.4.2 Types of Relationships -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Chapter 5: Transaction Processing and Management -- 5.1 Transaction -- 5.1.1 Transactions - Need and Mechanisms -- 5.1.2 Transaction Processing (TP) Monitor -- 5.1.3 Transaction Properties -- 5.2 Recovery -- 5.2.1 Classification of Recovery -- 5.2.2 System Recovery -- 5.2.2.1 Failure recovery -- 5.2.2.2 Media recovery -- 5.3 Transaction Models -- 5.3.1 Flat Transactions -- 5.3.2 Chained Transactions -- 5.3.3 Nested Transactions -- 5.4 Two-Phase Commit -- 5.5 Concurrency Problems -- 5.5.1 Lost Update Problem -- 5.5.2 Dirty (Uncommitted) Read Problem -- 5.5.3 Non-Repeatable Read Problem -- 5.5.4 Phantom Read Problem -- 5.6 Locking -- 5.7 Concurrency Problems Revisited -- 5.7.1 Lost Update Problem Revisited -- 5.7.2 Dirty (Uncommitted) Read Problem Revisited -- 5.7.3 Non-repeatable Read Problem Revisited -- 5.7.4 Phantom Read Problem Revisited -- 5.8 Deadlocks -- 5.9 Transaction Serialisability -- 5.10 Two-Phase Locking -- 5.11 Isolation Levels -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Chapter 6: Database Security -- 6.1 Data Classification -- 6.1.1 Importance of Data -- 6.1.2 Private Organisations versus Military Classifications -- 6.2 Threats and Risks -- 6.2.1 Confidentiality -- 6.2.2 Authentication -- 6.2.3 Integrity -- 6.2.4 Non-repudiation -- 6.3 Cryptography -- 6.3.1 Types of Cryptography -- 6.3.1.1 Symmetric key cryptography -- 6.3.1.2 Asymmetric key cryptography -- 6.4 Digital Signature -- 6.5 Database Control -- 6.5.1 Discretionary Control -- 6.5.2 Mandatory Control -- 6.6 Users and Database Privileges -- 6.7 Types of Privileges -- 6.8 Object Privileges -- 6.8.1 Operations and Privileges…”
    Libro electrónico
  11. 131
    Publicado 2017
    Tabla de Contenidos: “…3.1.6.2 Mix of Communities with Different Needs 56 -- 3.1.7 University Campuses 57 -- 3.1.8 Underground Stations 59 -- 3.1.9 Cinemas and Theatres 60 -- 3.1.10 Hotels 60 -- 3.1.11 Cruise Ships 62 -- 3.2 Coverage 62 -- 3.2.1 Cellular 62 -- 3.2.2 Wi-Fi 64 -- 3.2.3 Wireless Personal Area Networks (WPAN) 65 -- 3.3 Isolation 66 -- 3.4 Leakage 67 -- 3.5 Capacity 67 -- 3.6 Interference 70 -- 3.7 Signal Quality 71 -- 3.8 Technology 72 -- 3.9 Cost 72 -- 3.10 Upgradeability 73 -- 3.11 System Expansion 74 -- 3.12 Conclusion 74 -- References 74 -- 4 Radio Propagation 77 -- 4.1 Maxwell's Equations 77 -- 4.1.1 Gauss's Law for Electricity 79 -- 4.1.2 Gauss's Law for Magnetism 79 -- 4.1.3 Faraday's Law of Induction 81 -- 4.1.4 Ampère's Circuital Law 81 -- 4.1.5 Consequence of Maxwell's Equations 82 -- 4.2 Plane Waves 82 -- 4.2.1 Wave Equation 83 -- 4.2.2 Plane Wave Properties 84 -- 4.2.3 Wave Polarization 85 -- 4.2.4 Wave Propagation in Lossy Media 87 -- 4.3 Propagation Mechanisms 87 -- 4.3.1 Is Electromagnetic Theory Wrong Inside Buildings? …”
    Libro electrónico