Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 16
- Application software 10
- Computer security 7
- Machine learning 7
- Python (Computer program language) 7
- Data processing 6
- Web sites 6
- Android (Electronic resource) 5
- Artificial intelligence 5
- Computer software 5
- Management 5
- Web site development 5
- Computer programs 4
- Finance 4
- Security measures 4
- Software engineering 4
- Business enterprises 3
- Computer networks 3
- Computer programming 3
- Graph theory 3
- Graphic methods 3
- Information visualization 3
- Internet marketing 3
- Internet programming 3
- Programming 3
- Web applications 3
- AHP 2
- Authoring programs 2
- Business 2
- Cloud computing 2
-
61Publicado 2022Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C& -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
Libro electrónico -
62Publicado 2019“…For each specific use, we can use algorithms that determine and direct how we use a graph, including, for example, algorithms that help networking systems determine the shortest path by which to send packet data to a destination, or those that make suggestions for new friends in your favorite social media app. …”
Video -
63Publicado 2022“…Procuramos abordar neste livro - dialogando especialmente com os iniciantes - os problemas clássicos do Brasil - agora potencializados e escancarados pela pandemia e pelo ultraneoliberalismo - que impedem a universalização da educação pública, gratuita e de qualidade, ou em outro sentido, procuramos identificar os fatores que permitiram ao Brasil um grande destaque nos rankings de mercantilização da educação e de barbárie educacional. …”
Libro electrónico -
64Publicado 2020“…This updated edition will help you kick-start your project as it guides you through the process of creating several example game apps using APIs available in Android. You will learn the basics needed to join the ranks of successful Android game app developers. the book starts with game design fundamentals using Canvas and Android SDK 10 or earlier programming basics. …”
Libro electrónico -
65Publicado 2013Tabla de Contenidos: “…CDM and Resource Allocation and Exchange -- CDM Resource Allocation -- Slot Trading Models -- Modeling Equity and Equity Efficiency Tradeoffs -- Resource Allocation Based on User Supplied Priorities -- Large-Scale Deterministic Optimization Models -- Stochastic Models -- Concluding Remarks -- See -- References -- Airline Industry Operations Research -- Introduction -- Flight Scheduling Planning -- Fleet Assignment -- Yield Management -- Crew Scheduling -- Aircraft Maintenance Routing -- Schedule Recovery -- Concluding Remarks -- See -- References -- Algebraic Modeling Languages for Optimization -- Introduction -- Background and Motivation -- Advantages -- Alternatives -- Extensions -- See -- References -- Algorithm -- See -- Algorithmic Complexity -- Alternate Optima -- See -- Alternate Paths -- See -- AMPL -- References -- Analytic Combat Model -- See -- Analytic Hierarchy Process -- Introduction -- The Fundamental Scale -- Absolute and Relative Measurement and Structural Information -- Comments on Cost-Benefit Analysis -- The Eigenvector Solution for Weights and Consistency -- How to Structure a Hierarchy -- Hierarchic Synthesis and Rank -- Examples -- Relative Measurement: Choosing the Best House -- Absolute Measurement: Evaluating Employees for Raises -- Concluding Remarks -- See -- References -- Analytic Network Process -- Introduction -- Feedback Networks -- The Supermatrix of a Feedback System -- The Control Hierarchy -- Drug-Marketing Decision -- See -- References -- Analytics -- Animation -- ANP -- Ant Colony Optimization -- See -- References -- Anticycling Rules -- See -- Antithetic Random Variates -- Applied Probability -- See -- Approximate Dynamic Programming -- Introduction -- Problem Setting -- Value Function and the Optimality Equation -- Two Approaches -- Successful Applications -- Concluding Remarks -- See -- References -- Arc…”
Libro electrónico -
66Publicado 2024Tabla de Contenidos: “…-- MDM design patterns -- MDM architecture for a data mesh -- Build versus buy -- Popular MDM tools -- Summary -- Chapter 11: Monitoring and Data Observability -- Piecing it all together - the importance of data mesh monitoring and data observability -- How data mesh monitoring differs -- Baking diagnostic logging into the landing zone templates -- Azure Platform Metrics -- Azure platform logs -- Enabling diagnostic settings in an ARM template -- Designing a data mesh operations center -- Step 1 - collection -- Step 2 - rank the critical metrics and events -- Step 3 - build a threshold logic for each service in a data product -- Step 4 - build a monitoring view for each resource -- Step 5 - build a threshold logic for each data product -- Step 6 - build a threshold logic for each data landing zone -- Step 7 - set up alerts for critical metrics -- Step 8 - host the dashboards in one location -- Tooling for the DMOC -- Azure Monitor -- Log Analytics -- Azure Data Explorer -- Grafana -- Power BI -- Data observability -- Setting up alerts -- Piecing it all together -- Summary…”
Libro electrónico -
67Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Understanding Functional Programming -- Identifying a paradigm -- Subdividing the procedural paradigm -- Using the functional paradigm -- Using a functional hybrid -- Looking at object creation -- The stack of turtles -- A classic example of functional programming -- Exploratory data analysis -- Summary -- Chapter 2: Introducing Essential Functional Concepts -- First-class functions -- Pure functions -- Higher-order functions -- Immutable data -- Strict and non-strict evaluation -- Recursion instead of an explicit loop state -- Functional type systems -- Familiar territory -- Learning some advanced concepts -- Summary -- Chapter 3: Functions, Iterators, and Generators -- Writing pure functions -- Functions as first-class objects -- Using strings -- Using tuples and named tuples -- Using generator expressions -- Exploring the limitations of generators -- Combining generator expressions -- Cleaning raw data with generator functions -- Using lists, dicts, and sets -- Using stateful mappings -- Using the bisect module to create a mapping -- Using stateful sets -- Summary -- Chapter 4: Working with Collections -- An overview of function varieties -- Working with iterables -- Parsing an XML file -- Parsing a file at a higher level -- Pairing up items from a sequence -- Using the iter() function explicitly -- Extending a simple loop -- Applying generator expressions to scalar functions -- Using any() and all() as reductions -- Using len() and sum() -- Using sums and counts for statistics -- Using zip() to structure and flatten sequences -- Unzipping a zipped sequence -- Flattening sequences -- Structuring flat sequences -- Structuring flat sequences - an alternative approach -- Using reversed() to change the order…”
Libro electrónico -
68por Chapple, MikeTabla de Contenidos: “…Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks -- Antivirus Software -- Intrusion Detection and Prevention -- Intrusion Detection -- Intrusion Prevention -- Environments Monitored -- Classification Errors -- Detection Techniques -- Firewalls -- Vulnerability Scanning -- Network Vulnerability Scanning -- Application Scanning -- Web Application Scanning -- Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure -- Data Center Protection -- Air Temperature -- Humidity -- Fire -- Network Security Zones -- Switches, WAPs, and Routers -- Switches -- WAPs -- Routers -- Network Segmentation -- Virtual Private Networks -- Network Access Control -- Role-Based Access Control -- Posture Checking -- Internet of Things -- IoT Security -- Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Community Cloud -- Cloud Service Categories -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Security and the Shared Responsibility Model -- Automation and Orchestration -- Vendor Relationships -- Managed Service Providers -- Vendor Agreements -- Part V Domain 5: Security Operations -- Chapter 18 Encryption: Objective 5.1 Understand Data Security -- Cryptography -- Encrypting Data -- Decrypting Data -- Encryption Algorithms -- Symmetric Encryption -- Asymmetric Encryption -- Uses of Encryption -- Data at Rest -- Data in Transit -- Hash Functions -- MD5 -- SHA -- Chapter 19 Data Handling: Objective 5.1 Understand Data Security -- Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data Classification…”
Publicado 2024
Libro electrónico -
69Publicado 2024Tabla de Contenidos: “…Introducing second-order methods -- Summary -- Chapter 6: Deep Learning and Convolutional Neural Networks -- Technical requirements -- Understanding DL basic concepts -- Automated feature extraction -- Training a DNN -- Exploring DL models -- Approaching CNNs -- Convolutional layer -- Pooling layer -- ReLUs -- FC layer -- Building a CNN in MATLAB -- Exploring the model's results -- Discovering DL architectures -- Understanding RNNs -- Analyzing LSTM networks -- Introducing transformer models -- Summary -- Part 3: Machine Learning in Practice -- Chapter 7: Natural Language Processing Using MATLAB -- Technical requirements -- Explaining NLP -- NLA -- NLG -- Analyzing NLP tasks -- Introducing automatic processing -- Exploring corpora and word and sentence tokenizers -- Corpora -- Words -- Sentence tokenize -- Implementing a MATLAB model to label sentences -- Introducing sentiment analysis -- Movie review sentiment analysis -- Using an LSTM model for label sentences -- Understanding gradient boosting techniques -- Approaching ensemble learning -- Bagging definition and meaning -- Discovering random forest -- Boosting algorithms explained -- Summary -- Chapter 8: MATLAB for Image Processing and Computer Vision -- Technical requirements -- Introducing image processing and computer vision -- Understanding image processing -- Explaining computer vision -- Exploring MATLAB tools for computer vision -- Building a MATLAB model for object recognition -- Introducing handwriting recognition (HWR) -- Training and fine-tuning pretrained deep learning models in MATLAB -- Introducing the ResNet pretrained network -- The MATLAB Deep Network Designer app -- Interpreting and explaining machine learning models -- Understanding saliency maps -- Understanding feature importance scores -- Discovering gradient-based attribution methods -- Summary…”
Libro electrónico -
70Publicado 2023Tabla de Contenidos: “…6.1.3 Diatoms and Their Growth -- 6.1.4 Growth Data Analysis and Growth Parameter Estimation -- 6.2 Simulation Trials -- 6.2.1 Methodology for the Simulation Trials -- 6.2.2 Candidate Methods for Estimating the Specific Growth Rate -- 6.2.3 Simulation Trials Results -- 6.2.3.1 Results with Only the Noise Challenge -- 6.2.3.2 Results when Crashing Occurs -- 6.2.3.3 Results when Censoring Occurs -- 6.2.3.4 Overall Results and Ranking of the Methods -- 6.3 Empirical Example -- 6.4 Conclusions and Recommendations -- References -- Chapter 7 Integrating Metabolic Modeling and High-Throughput Data to Characterize Diatoms Metabolism -- 7.1 Introduction -- 7.2 Characterization of Diatom Genomes -- 7.2.1 Available Genomics Data -- 7.2.2 Computational Tools to Allocate Gene Functions by Subcellular Localization -- 7.3 Metabolic Modeling of Diatoms: Data and Outcomes -- 7.3.1 Using Genomic Information to Build Genome-Scale Metabolic Models -- 7.3.2 Comprehensive Diatom Omic Datasets Are Useful to Constrain Metabolic Models -- 7.3.3 Unraveling New Knowledge About Central Carbon Metabolism of Diatoms -- 7.3.4 Light-Driven Metabolism that Enables Acclimation to High Light Intensities -- 7.4 Modeling Applications to Study Bioproduction and Genome Changes in Diatoms -- 7.4.1 Predicting Diatom-Heterotroph Interactions and Horizontal Gene Transfer Using Community Metabolic Models -- 7.4.2 Optimization and Scale-Up of the Production of Valuable Metabolites -- 7.4.3 Potential for the Study of Proteome Allocation in Diatoms -- 7.5 Conclusions -- References -- Part III: Diatom Motility -- Chapter 8 Modeling the Synchronization of the Movement of Bacillaria paxillifer by a Kuramoto Model with Time Delay -- 8.1 Introduction -- 8.2 Materials and Methods -- 8.3 Time Dependence of the Relative Motion of Adjacent Diatoms…”
Libro electrónico -
71Publicado 2024Tabla de Contenidos: “…LLMs: What's the Difference? -- The Three-Layer GenAI Application Stack -- The Infrastructure Layer -- The Model Layer -- The Application Layer -- Paths to Productionizing GenAI Applications -- Sample LLM-Powered Chat Application -- The Importance of Cost Optimization -- Cost Assessment of the Model Inference Component -- Cost Assessment of the Vector Database Component -- Benchmarking Setup and Results -- Other Factors to Consider -- Cost Assessment of the Large Language Model Component -- Summary -- Chapter 2 Tuning Techniques for Cost Optimization -- Fine-Tuning and Customizability -- Basic Scaling Laws You Should Know -- Parameter-Efficient Fine-Tuning Methods -- Adapters Under the Hood -- Prompt Tuning -- Prefix Tuning -- P-tuning -- IA3 -- Low-Rank Adaptation -- Cost and Performance Implications of PEFT Methods -- Summary -- Chapter 3 Inference Techniques for Cost Optimization -- Introduction to Inference Techniques -- Prompt Engineering -- Impact of Prompt Engineering on Cost -- Estimating Costs for Other Models -- Clear and Direct Prompts -- Adding Qualifying Words for Brief Responses -- Breaking Down the Request -- Example of Using Claude for PII Removal -- Conclusion -- Providing Context…”
Libro electrónico -
72por Justus, RoyTabla de Contenidos: “…-- Types of value -- Service quality -- Defining a service scope -- Service quality metrics -- Planning for service quality -- Identifying opportunities in the current state -- Aligning the implementation scope with the opportunity -- Cost optimization -- Process efficiency -- Process efficiency metrics -- Asset optimization -- Customer experience -- Tools for customer experience -- Scoping customer experience value - portals -- Scoping customer experience value - Virtual Agent -- Measuring customer experience -- Innovation enablement -- Ideation -- Project management -- Summary -- Chapter 2: Recognizing and Avoiding Value Traps -- Replicating the current state -- The tool replacement approach -- Arguments in favor of replicating the current state -- Issues with replicating the current state -- Strategy 1 - Adopting the out-of-the-box process -- Strategy 2 - Developing an MVP process -- Ignoring the current state -- Focusing on the future -- Failing to learn from the past -- Strategy 1 - Process shadowing -- Tips for conducting process shadowing -- The time investment of process shadowing -- The expected benefits of process shadowing -- Strategy 2 - Data analysis -- Targeting data analysis -- Conducting exploratory analysis -- Integrating value and analysis -- The importance of intentional time allocation -- Chasing the long tail -- The appeal of aiming for 100% coverage -- The distribution of value -- Risks of completeness -- Strategy 1 - Top N selection -- The recommended approach for ranking…”
Publicado 2022
Libro electrónico -
73Publicado 2017“…The quantitative and qualitative methods to measure the ongoing risks posed by systemically important financial institutions are surveyed. A review of the regulations that identify systemically important financial institutions The tools to use to detect early warning indications of default A review of historical systemic events their common causes Techniques to measure interconnectedness Approaches for ranking the order the institutions which pose the greatest degree of default risk to the industry Understanding Systemic Risk in Global Financial Markets offers a must-have guide to the fundamentals of systemic risk and the key critical policies that work to reduce systemic risk and promoting financial stability…”
Libro electrónico -
74Publicado 2024“…"Accenture is now a technology giant, over 700,000 people strong with Fortune 100 status, and diversity has been a key driver of its growth. …”
Libro electrónico -
75Publicado 2015Tabla de Contenidos: “…CART -- 18.5.4 Detailed Look at the Statistical Analysis -- 18.5.5 Early Results on Defect Data Sets -- 18.6 Summary -- Part IV: Sharing Models -- Chapter 19: Sharing Models: Challenges and Methods -- Chapter 20: Ensembles of Learning Machines -- 20.1 When and Why Ensembles Work -- 20.1.1 Intuition -- 20.1.2 Theoretical Foundation -- 20.2 Bootstrap Aggregating (Bagging) -- 20.2.1 How Bagging Works -- 20.2.2 When and Why Bagging Works -- 20.2.3 Potential Advantages of Bagging for SEE -- 20.3 Regression Trees (RTs) for Bagging -- 20.4 Evaluation Framework -- 20.4.1 Choice of Data Sets and Preprocessing Techniques -- 20.4.1.1 PROMISE data -- 20.4.1.2 ISBSG data -- 20.4.2 Choice of Learning Machines -- 20.4.3 Choice of Evaluation Methods -- 20.4.4 Choice of Parameters -- 20.5 Evaluation of Bagging+RTs in SEE -- 20.5.1 Friedman Ranking -- 20.5.2 Approaches Most Often Ranked First or Second in Terms of MAE, MMRE and PRED(25) -- 20.5.3 Magnitude of Performance Against the Best -- 20.5.4 Discussion -- 20.6 Further Understanding of Bagging+RTs in SEE -- 20.7 Summary -- Chapter 21: How to Adapt Models in a Dynamic World -- 21.1 Cross-Company Data and Questions Tackled…”
Libro electrónico -
76por Oxer, Jonathan“… Ubuntu Linux--the most popular Linux distribution on the planet--preserves the spirit embodied in the ancient African word ubuntu, which means both ""humanity to others"" and ""I am what I am because of who we all are."" Ubuntu won the Linux Journal Reader's Choice Award for best Linux distribution and is consistently the top-ranked Linux variant on DistroWatch.com. …”
Publicado 2006
Libro electrónico -
77Adobe Photoshop Lightroom Classic for dummiesAdobe Photoshop Lightroom Classic For DummiesPublicado 2022Tabla de Contenidos: “…The Network preferences -- Local Storage versus Cloud Storage -- Local storage -- Cloud storage -- What if I stop my subscription? -- Getting Familiar with File Formats -- Supported file formats -- Making sense of bit depth -- Understanding color spaces -- Part 2: Managing Your Photos with Lightroom Classic -- Chapter 4: Tackling the Lightroom Classic Import Process -- Knowing How the Import Process Works -- Exploring the Import Dialog -- Importing Your Photos into Lightroom Classic -- Employing an effective import workflow -- Putting it all together -- Auto Import -- Shooting Tethered -- Chapter 5: Viewing and Finding Photos in the Library -- Exploring the Library Module -- Getting to know the panels and tools -- Becoming familiar with the menu options -- Creating a custom identity plate -- Choosing the Right View for the Task -- Working with thumbnails in Grid view -- Taking a closer look in Loupe view -- Using the Panels to Access Your Photos -- Getting the 20,000-foot view from the Catalog panel -- Using the Folders panel like a file browser -- Grouping photos into collections -- Creating Multiple Versions with Virtual Copies -- Chapter 6: Getting Organized with the Library -- Evaluating Photos -- Survey view -- Compare view -- Flags, Ratings, and Color Labels -- Deleting photos from Lightroom Classic -- Using ratings to rank images -- Applying color labels to photos -- Applying color labels to folders and collections -- Filtering folders and collections -- Filenames and Metadata -- Batch renaming with filename templates -- Creating metadata templates to embed information into each image -- Keywording -- Adding and organizing keywords -- Using the Keyword List to find photos -- Using the Painter Tool -- Finding Photos with the Library Filter Bar -- Chapter 7: Exploring the Library Module's Advanced Features -- People View -- Finding faces…”
Libro electrónico -
78Publicado 2021Tabla de Contenidos: “…Assessing the CNN classifier with traditional interpretation methods -- Determining what misclassifications to focus on -- Visualizing the learning process with activation-based methods -- Intermediate activations -- Evaluating misclassifications with gradient-based attribution methods -- Saliency maps -- Guided Grad-CAM -- Integrated gradients -- Bonus method: DeepLIFT -- Tying it all together -- Understanding classifications with perturbation-based attribution methods -- Feature ablation -- Occlusion sensitivity -- Shapley value sampling -- KernelSHAP -- Tying it all together -- Mission accomplished -- Summary -- Further reading -- Chapter 8: Interpreting NLP Transformers -- Technical requirements -- The mission -- The approach -- The preparations -- Loading the libraries -- Understanding and preparing the data -- The data dictionary -- Loading the model -- Visualizing attention with BertViz -- Plotting all attention with the model view -- Diving into layer attention with the head view -- Interpreting token attributions with integrated gradients -- LIME, counterfactuals, and other possibilities with the LIT -- Mission accomplished -- Summary -- Further reading -- Chapter 9: Interpretation Methods for Multivariate Forecasting and Sensitivity Analysis -- Technical requirements -- The mission -- The approach -- The preparation -- Loading the libraries -- Understanding and preparing the data -- The data dictionary -- Understanding the data -- Data preparation -- Loading the LSTM model -- Assessing time series models with traditional interpretation methods -- Using standard regression metrics -- Predictive error aggregations -- Evaluating the model like a classification problem -- Generating LSTM attributions with integrated gradients -- Computing global and local attributions with SHAP's KernelExplainer -- Why use KernelExplainer?…”
Libro electrónico -
79Publicado 2024Tabla de Contenidos: “…Chapter 3: Using the DEAP Framework -- Technical requirements -- Python version -- Using a virtual environment -- Installing the necessary libraries -- Introduction to DEAP -- Using the creator module -- Creating the Fitness class -- Creating the Individual class -- Using the Toolbox class -- Creating genetic operators -- Creating the population -- Calculating the fitness -- The OneMax problem -- Solving the OneMax problem with DEAP -- Choosing the chromosome -- Calculating the fitness -- Choosing the genetic operators -- Setting the stopping condition -- Implementing with DEAP -- Using built-in algorithms -- The Statistics object -- The algorithm -- The logbook -- Running the program -- Adding the hall of fame feature -- Experimenting with the algorithm's settings -- Population size and number of generations -- Crossover operator -- Mutation operator -- Selection operator -- Summary -- Further reading -- Chapter 4: Combinatorial Optimization -- Technical requirements -- Search problems and combinatorial optimization -- Solving the knapsack problem -- The Rosetta Code knapsack 0-1 problem -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Solving the TSP -- TSPLIB benchmark files -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Improving the results with enhanced exploration and elitism -- Solving the VRP -- Solution representation -- Python problem representation -- Genetic algorithm solution -- Summary -- Further reading -- Chapter 5: Constraint Satisfaction -- Technical requirements -- Constraint satisfaction in search problems -- Solving the N-Queens problem -- Solution representation -- Python problem representation -- Genetic algorithms solution -- Solving the nurse scheduling problem -- Solution representation -- Hard constraints versus soft constraints…”
Libro electrónico -
80Publicado 2016Tabla de Contenidos: “…(c) Taking account of diagnostic coverage -- (d) Subdividing the checklists according to the effect of diagnostics -- (e) Establishing a model -- (f) Nonlinearity -- (g) Equipment type -- (h) Calibration -- 5.2.3 Fault Tree Analysis -- 5.3 Taking Account of Auto Test -- 5.4 Human Factors -- 5.4.1 Addressing Human Factors -- 5.4.2 Human Error Rates -- "HEART" method -- "TESEO" method -- 5.4.3 A Rigorous Approach -- 6 - Failure Rate and Mode Data -- 6.1 Data Accuracy -- 6.2 Sources of Data -- 6.2.1 Electronic Failure Rates -- 6.2.2 Other General Data Collections -- 6.2.3 Some Older Sources -- 6.2.4 Manufacturer's Data -- 6.2.5 Anecdotal Data -- 6.3 Data Ranges and Confidence Levels -- 6.4 Conclusions -- 7 - Demonstrating and Certifying Conformance -- 7.1 Demonstrating Conformance -- 7.2 The Current Framework for Certification -- 7.3 Self-Certification (Including Some Independent Assessment) -- 7.3.1 Showing Functional Safety Capability (FSM) as Part of the Quality Management System -- 7.3.2 Application of IEC 61508 to Projects/Products -- 7.3.3 Rigor of Assessment -- 7.3.4 Independence -- 7.4 Preparing for Assessment -- 7.5 Summary -- B - Specific Industry Sectors -- 8 - Second Tier Documents-Process, Oil and Gas Industries -- 8.1 IEC International Standard 61511: Functional Safety-Safety Instrumented Systems for the Process Industry Sector (Second Edition to be Published in 2016) -- 8.1.1 Organizing and Managing the Life Cycle -- 8.1.2 Requirements Involving the Specification -- 8.1.3 Requirements for Design and Development -- (a) Selection of components and subsystems -- (b) Architecture (i.e., safe failure fraction) -- (c) Predict the random hardware failures -- (d) Software (referred to as "program") -- (i) Requirements -- (ii) Software library modules -- (iii) Software design specification -- (iv) Code -- (v) Programming support tools…”
Libro electrónico