Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 235
- Historia 129
- Development 93
- Management 90
- Engineering & Applied Sciences 78
- Application software 64
- Leadership 60
- Computer Science 46
- Politics and government 42
- Artificial intelligence 39
- Business & Economics 39
- Data processing 39
- Computer security 35
- Filosofía 35
- Business 34
- Crítica e interpretación 34
- Operating systems (Computers) 34
- Computer programming 33
- Computer software 33
- Social aspects 33
- Economic conditions 32
- History and criticism 31
- Technological innovations 31
- Computer networks 30
- Economics 30
- Success in business 30
- Computer programs 28
- Finance 28
- Política y gobierno 27
- Information technology 25
-
2701por Schmalz, Michael“…The problem is, there isn't much documentation on their cross-usage. Until now. Introducing Integrating Excel and Access, the unique reference that shows you how to combine the strengths of Microsoft Excel with those of Microsoft Access. …”
Publicado 2005
Libro electrónico -
2702por Voinov, Vassiliy“…., the parameter is considered to be known). Until 1934, Pearson believed that the limiting distribution of the statistic in (1.1) will be the same if the unknown parameters of the null hypothesis are replaced by their estimates based on a sample; see, for example, Baird (1983), Plackett (1983, p. 63), Lindley (1996), Rao (2002), and Stigler (2008, p. 266). …”
Publicado 2013
Libro electrónico -
2703Publicado 2022“…Tutankhamun Knew the Names of the Two Great Godsoffers a new interpretation of the terms Dtand nHHas fundamental concepts of Pharaonic ideology, terms that, until now, have often been treated as synonyms reflecting notions related to the vastness of time…”
Libro electrónico -
2704por Okuda, HidenobuTabla de Contenidos: “…7.3.3 International Trade, Invoicing, and Dollarization -- 7.4 Financial Dollarization in the Highly Integrated International Market -- 7.4.1 Dollarization of Assets -- 7.4.2 Dollarization and Overseas Assets -- 7.4.3 Dollarization of Liability -- 7.5 Conclusion: Coping With Partial Dollarization -- References -- 8 Strategies for Promotion of Khmer Riel -- 8.1 Introduction -- 8.2 De-Dollarization Policies Until Recently -- 8.2.1 Enhance Confidence in the Riel -- 8.2.2 Promote Price Quotations and Payments of Goods and Services in Riel -- 8.2.3 Promote the Opening of Bank Accounts in Riel -- 8.2.4 Improve the Payment System and Financial Instruments in Riel -- 8.3 De-Dollarization Policy and Financial Market Development -- 8.3.1 Improve Foreign Exchange Markets -- 8.3.2 Further Developing Interbank and Money Markets -- 8.3.3 Further Develop Securities Markets -- 8.3.4 Broaden the Clearing House's Policy On Lowering the Riel Transaction Fee to Market Fund Transfer -- 8.4 New Elements for the Promotion of Khmer Riel -- 8.4.1 Promote Financial Intermediation in Riel On a Gradual Basis -- 8.4.2 Fiscal Support for the Riel -- 8.4.3 Promote Public Awareness and Participation -- 8.4.4 Enhance Cooperation for the Implementation of Effective Measures -- 8.5 Effectiveness of Promoting the Policy and Its Limitations -- 8.5.1 Stronger Yet Still Limited Confidence -- 8.5.2 Difficulty in Changing People's Mindset -- 8.5.3 Network Externality -- 8.5.4 Lack of Demand-Side Policies -- 8.5.5 Limited Domestic Production -- 8.5.6 Limited Coordination Between Implementing Agencies -- 8.6 Conclusion -- Notes -- References -- Index…”
Publicado 2023
Libro electrónico -
2705por Buchstein, Hubertus“…Buchstein claims that the best way to characterize their relationship from their first meeting in Bonn in 1926 up until Kirchheimer's death in 1965 is as enduring enmity - in a political, a theoretical, and even a personal sense…”
Publicado 2024
Libro electrónico -
2706por OECDTabla de Contenidos: “…Economic, structural and geographical characteristics of the Slovak Republic -- The Slovak Republic's economy has been performing strongly until the COVID-19 crisis -- The Slovak economy is highly specialised, with a strong industrial base -- The automotive industry drives the performance of Slovak manufacturing -- Half of total exports are high-tech manufactured products, especially motor vehicles -- A number of promising regional industry clusters have emerged... -- ... that could help reduce regional economic disparities -- 2.3. …”
Publicado 2022
Libro electrónico -
2707por Wolgemuth, Jennifer R.Tabla de Contenidos: “…Narrative Fiction as Feminist Refusal: A Utopian Short Story of Lactation in Education -- References -- Methodologies in Action Part -- Making Sense through Letter Writing -- References -- Chapter 8: The Logic of Peace: Practical Lessons from Thematic Analysis and Meditations -- Instrumental Value and Intrinsic Value -- What Meditation Means to Me -- What Thematic Analysis Means to Me -- Practical Lessons Derivable from the Methodologies of Thematic Analysis and Meditation -- References -- Methodologies in Action -- Creative Silence and 'Theme Jumping': Meditation as Thematic Analysis -- References -- Chapter 9: Getting Mixed Up: Arts-Based, Contemplative, and Generative Approaches to Thematic Analysis -- Situating Contemplative Practices -- Context and Insight Building -- The Process -- And So It Is -- References -- Methodologies in Action -- Deliberate Reflections: Unveiling Identities and Insights through Contemplative Data Analysis in Autoethnography -- Contemplation in (Autoethnographic) Action -- Note -- References -- Chapter 10: Recurring Languaging Practices as 'Themes' -- An EMCA Perspective on Analyzing Recurrence -- A Theory of Language as Action and Methodological Practices -- Approach -- Data and Example -- Conclusions -- References -- Appendix A -- Jeffersonian Transcription Symbols -- Methodologies in Action -- Applying Ubuntu in Thematic Analysis for Exploring Black Student Experiences at a Predominately White Institution -- References -- Chapter 11: Composing Poems: Using Poetry as Qualitative Data Analysis -- Poetic Inquiry -- Poetic Inquiry as Data Analysis -- Poetic Portraits as Poetic Analysis -- Poetic Analysis Example -- Using Poetic Analysis -- References -- Methodologies in Action -- Poetry as Thematic Analysis -- References -- Chapter 12: I Have Hated Analysis: Poetic Thematic Analysis…”
Publicado 2024
Libro electrónico -
2708Publicado 2023Tabla de Contenidos: “…Creating your content strategy -- Content development -- Types of content -- Content distribution -- Measuring and optimizing your efforts -- Unveiling the blueprint for a successful product launch -- Aligning with the launch process -- Stakeholder alignment -- Launch goals -- Launch tier -- Launch metrics/measurement -- Awareness and early adoption -- Channel performance -- Product retention -- A global product launch -- Summary -- Chapter 10: Enable Your Sales Team and Maximize Effectiveness -- Building an effective sales enablement program -- Building your sales collateral hub -- Adjusting your sales collateral for every stage of the buying journey -- Awareness and interest stage -- Sales scripts -- Email templates -- Consideration stage -- Battlecards -- Pitch presentations -- Product sheets -- Product demo -- Case studies -- Purchase stage -- Dealing with objections -- Advocacy/post-purchase stage -- Pricing increases -- Sales enablement tools -- Sales enablement success indicators -- Summary -- Part 4: Impactful Collaboration and Value Creation -- Chapter 11: Ensure Internal Stakeholders Buy-In -- Collaborating with PMs -- Building effective collaboration between PMs and PMMs -- Collaborating with marketing, sales, and customer success teams -- Aligning product marketing, marketing, sales, and customer success -- Getting buy-in and earning the trust of each team -- Engaging the C-suite -- Summary -- Chapter 12: Analyst Relations (AR) -- The role of product marketing in AR -- How can analysts help? …”
Libro electrónico -
2709Publicado 2024Tabla de Contenidos: “…Part 3: Math and Cryptography in Malware -- Chapter 9: Exploring Hash Algorithms -- Technical requirements -- Understanding the role of hash algorithms in malware -- Cryptographic hash functions -- Applying hashing in malware analysis -- A deep dive into common hash algorithms -- MD5 -- SHA-1 -- Bcrypt -- Practical use of hash algorithms in malware -- Hashing WINAPI calls -- MurmurHash -- Summary -- Chapter 10: Simple Ciphers -- Technical requirements -- Introduction to simple ciphers -- Caesar cipher -- ROT13 cipher -- ROT47 cipher -- Decrypting malware - a practical implementation of simple ciphers -- Caesar cipher -- ROT13 -- ROT47 -- The power of the Base64 algorithm -- Base64 in practice -- Summary -- Chapter 11: Unveiling Common Cryptography in Malware -- Technical requirements -- Overview of common cryptographic techniques in malware -- Encryption resources such as configuration files -- Practical example -- Cryptography for secure communication -- Practical example -- Payload protection - cryptography for obfuscation -- Practical example -- Summary -- Chapter 12: Advanced Math Algorithms and Custom Encoding -- Technical requirements -- Exploring advanced math algorithms in malware -- Tiny encryption algorithm (TEA) -- A5/1 -- Madryga algorithm -- Practical example -- The use of prime numbers and modular arithmetic in malware -- Practical example -- Implementing custom encoding techniques -- Practical example -- Elliptic curve cryptography (ECC) and malware -- Practical example -- Summary -- Part 4: Real-World Malware Examples -- Chapter 13: Classic Malware Examples -- Historical overview of classic malware -- Early malware -- The 1980s-2000s - the era of worms and mass propagation -- Malware of the 21st century -- Modern banking Trojans -- The evolution of ransomware -- Analysis of the techniques used by classic malware…”
Libro electrónico -
2710Publicado 2019Tabla de Contenidos: “…-- How to Write a Shell Script -- More Formatting Tricks -- Summing Up -- 25 STARTING A PROJECT -- First Stage: Minimal Document -- Second Stage: Adding a Little Data -- Variables and Constants -- Here Documents -- Summing Up -- 26 TOP-DOWN DESIGN -- Shell Functions -- Local Variables -- Keep Scripts Running -- Summing Up -- 27 FLOW CONTROL: BRANCHING WITH IF -- if Statements -- Exit Status -- Using test -- A More Modern Version of test -- (( ))-Designed for Integers -- Combining Expressions -- Control Operators: Another Way to Branch -- Summing Up -- 28 READING KEYBOARD INPUT -- read-Read Values from Standard Input -- Validating Input -- Menus -- Summing Up -- Extra Credit -- 29 FLOW CONTROL: LOOPING WITH WHILE/UNTIL -- Looping -- Breaking Out of a Loop -- Reading Files with Loops -- Summing Up -- 30 TROUBLESHOOTING -- Syntactic Errors -- Logical Errors -- Testing -- Debugging -- Summing Up -- 31 FLOW CONTROL: BRANCHING WITH CASE -- The case Command -- Summing Up -- 32 POSITIONAL PARAMETERS -- Accessing the Command Line -- Handling Positional Parameters en Masse -- A More Complete Application -- Summing Up -- 33 FLOW CONTROL: LOOPING WITH FOR -- for: Traditional Shell Form…”
Libro electrónico -
2711Publicado 2010Tabla de Contenidos: “…Adding a scroll bar to the text field -- Some suggestions to try on your own -- 6 CREATING PRELOADERS IN ACTIONSCRIPT 3.0 -- Lesson overview -- Tools in the testing environment -- Creating a text field and progress bar to track loading -- Inserting ActionScript to track progress of the UILoader component -- Controlling the frames of a movie clip to reflect loading progress -- Some suggestions to try on your own -- 7 USING ARRAYS AND LOOPS IN ACTIONSCRIPT 3.0 -- Lesson overview -- Examining the starting file -- Adding MovieClip instances to the Stage from the Flash Library -- Adding the initial variables -- Generating multiple instances with a for loop -- Generating drag-and-drop functionality -- Creating the game play in an ENTER_FRAME listener -- Using hitTestObject() to check for collisions -- Some suggestions to try on your own -- 8 CREATING AND FORMATTING TEXT WITH ACTIONSCRIPT -- Lesson overview -- Examining the starting file -- Creating a TLF text field with ActionScript -- Loading an external text file into a TLF text field -- Using the TextFormat class -- Giving the user a custom panel to format text -- Creating a scroll bar using ActionScript -- Some suggestions to try on your own -- 9 CONTROLLING SOUND WITH ACTIONSCRIPT -- Lesson overview -- Examining the starting file -- Adding sliders to the project -- The Sound, SoundChannel, and SoundTransform classes -- Setting the song titles using a for loop -- Making the sliders invisible until needed -- Programming the buttons to select songs -- Controlling the visibility of the volume and pan controls -- Adding a listener for the ID3 tags of an MP3 file -- Adding a text format object -- Adding the slider controls -- Some suggestions to try on your own -- 10 WORKING WITH AN XML PLAYLIST -- Lesson overview -- Understanding the basic structure of an XML file -- Examining the starting file…”
CDROM -
2712Publicado 2023Tabla de Contenidos: “…Intro -- Table of Contents -- Acknowledgements -- Notes on the Use of Terminology -- Abbreviations -- List of Tables, Diagrams, Maps and Illustrations -- Introduction: Scope and Limits of the Study -- Chapter 1 Literature Review -- 1.1 The Linguists -- 1.1.1 While Mapping the Daco-Romanian Dialects: Gustav Weigand -- 1.1.2 Further Mapping: Atlas of Romanian Language II, Emil Petrovici and Ion Gheție -- 1.1.3 The First Description of a Dialect Spoken by Rudari in Romania: Ion Calotă -- 1.1.4 Towards a Comparative Dialectal Description: Nicolae Saramandu -- 1.1.5 The Dialectal Geography of the Rudari: Thede Kahl -- 1.1.6 Conclusions -- 1.2 The Ethnographers, Historians, Anthropologists -- 1.2.1 Paul Bataillard (1816-1894) -- 1.2.2 Martin Block (1891-1972) -- 1.2.3 A Momentum, Ion Chelcea -- 1.2.4 Further Ethnological Investigations in the Muscel Region -- 1.2.5 Recent Fieldwork in Oltenia -- 1.2.6 Conclusion -- 1.3 Sources -- 1.3.1 Cozia Monastery Registers -- 1.3.1.1 Description of the Manuscripts from ANIC -- 1.3.1.2 Previous Research -- 1.3.2 The 1838 Census of Population, Houses and Agriculture -- Chapter 2 Wallachia, from its Rise until the Mid-Nineteenth Century -- Chapter 3 The Time and Space of the Gold-Washers -- 3.1 The Legacy from Antiquity -- 3.2 Renewal of Mining in the Middle Ages and early Modern Era -- 3.3 Conclusions -- Chapter 4 Different Names in Different Times -- 4.1 AURAR, pl. …”
Libro electrónico -
2713por Hau Ucan, Sary Lorena - AutorCan Canul, César - AutorTabla de Contenidos: “…-- YÁAX K'AAX: PAAKAT, TS'A-ÓOLAL YÉETEL U BEEL PÁALKERO'OB -- KA'AP'ÉEL K'AAX: LU'UMIL, U ÁAJAL U YÓOL MÁAK YÉETEL KAAMBALIL -- U TS'OOK TUUKUL: BA'AX KU TAAL YÓOK'OL LE MAAYÁAJ KAAMBALILO'OB MEYAJ (...) -- U TS'ADYOSBO'OTIKIL -- U MIATSIL K'AXNAJ. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2714Publicado 2023“…A comprehensive photo editing guide from a professional artist for Affinity 1.0 and 2.0 users covering best techniques to fix problems in edits and understand workflow Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn to use masking, selection, brushes, blend mode, and color tools in the photo editing workflow Unveil advanced personas used in the editing pipeline like tone mapping, liquification, and more Create your own brushes and build your artistic pallet in Affinity Photo Book Description In this book, you'll explore the Affinity Photo program through practice-based learning as you make popular photo edits, learning the tools and techniques in conjunction with the workflow concept. …”
Libro electrónico -
2715Publicado 2024Tabla de Contenidos: “…-- Getting to know the RenderObjectWidget and its children -- Unveiling the Element class -- Reduce, reuse, recycle! …”
Libro electrónico -
2716Publicado 2023Tabla de Contenidos: “…Chapter 19 Engineering practices for speed and high-quality code -- Ground rapid software delivery in DevOps -- Improve quality through coding standards and code maintainability -- Instill end-to-end automation through continuous integration and continuous deployment (CI/CD) -- Notes -- Chapter 20 The tools to make your developers highly productive -- Flexible and scalable development sandboxes -- Modern and standardized tooling -- Chapter 21 Delivering production-grade digital solutions -- Aim for a high degree of control and auditability -- Ensure the environment is secure, scalable, and available -- Incorporate monitoring and observability -- Chapter 22 Build in security and automation from the start -- Shift left on security -- Embed security into the SDLC using DevSecOps -- Notes -- Chapter 23 MLOps so AI can scale -- Note -- Getting Ready Section Four -- Section Five: Embedding Data Everywhere: What it takes to make data easy to consume across the organization -- Chapter 24 Determine what data matters -- Identifying and prioritizing data -- Assessing data readiness -- Developing the data roadmap -- Note -- Chapter 25 Data products: The reusable building blocks for scaling -- Identifying data products that generate value -- Setting up data product pods -- Developing data products -- Note -- Chapter 26 Data architecture, or the system of data "pipes" -- Data architecture archetypes -- Deciding on data capabilities and adopting reference architectures -- Best practices for designing a data architecture -- Notes -- Chapter 27 Organize to get the most from your data -- Organization -- Talent and a data-driven culture -- DataOps tooling -- Governance and risk -- Notes -- Getting Ready Section Five…”
Libro electrónico -
2717Publicado 2010Tabla de Contenidos: “…-- THE VALUE CYCLE: YOU, ME, AND MUTUAL VALUE -- THE CONVERSATION PRISM -- THE ART AND SCIENCE OF LISTENING AND MONITORING -- LISTENERS MAKE THE BEST CONVERSATIONALISTS -- CHARTING A SOCIAL MAP -- CONVERSATION WORKFLOW -- TAKING CENTER STAGE -- LEVEL ONE: THE EPICENTER -- CHARTING THE COURSE -- ESTABLISHING A CONVERSATION INDEX -- THE COMMUNITY STARTS WITHIN -- NOTES -- Chapter 19: Unveiling the New Influencers -- WE ARE MEDIA -- BUILDING A BRIDGE BETWEEN BRANDS AND MARKETS -- ENGAGE WITH PURPOSE -- THE SHIFT FROM MONITORING TO ACTION -- X-RAY GLASSES AND BIONIC HEARING -- SEARCHING THE SOCIAL WEB -- NOTE -- Chapter 20: The Human Network -- BREATHING LIFE INTO THE HUMAN NETWORK -- THE HUMAN NETWORK: ALIVE AND CLICKING! …”
Libro electrónico -
2718Publicado 2024Tabla de Contenidos: “…Practical implementation with StatsForecast -- Using rates of arrival to identify change points -- Pros and cons of using rates of arrival for change point detection -- Summary -- Further reading -- Part 3: Who and What to Target -- Chapter 8: Customer Insights - Segmentation and RFM -- Technical requirements -- Understanding the sources of customer dynamics -- Analyzing customer dynamics - unveiling segmentation and RFM -- Delving deeper into what segmentation is -- Clustering -- Classification -- Discriminant analysis and classification -- Exploring RFM -- Approaches and techniques - independent versus sequential sorting -- A practical example of RFM analysis -- Profitability evaluation -- ROMI after RFM -- Results of using RFM for targeting -- Summary -- Further reading -- Chapter 8: Customer Lifetime Value with PyMC Marketing -- Technical requirements -- Diving deeper into CLV -- CLV in practice -- Using CLV to calculate acquisition costs -- CLV and prospects -- CLV and incremental value -- What's wrong with the CLV formula? …”
Libro electrónico -
2719Publicado 2024Tabla de Contenidos: “…5.4 Assessing the usability of AR interfaces for path planning -- 5.4.1 Usability evaluation -- 5.5 Conclusions -- References -- Part 3: Crafting the future: System design and applications -- Chapter 6: Unveiling the future of medical imaging: Scan to VR pipeline for visualization -- 6.1 Introduction -- 6.2 Case study -- 6.3 Methodology -- 6.4 Results -- 6.5 Discussion -- 6.6 Summary and conclusion -- Acknowledgements -- References -- Chapter 7: Accelerating rehabilitation through AR/VR solutions -- 7.1 Introduction -- 7.1.1 Brief explanation of the state of the art of VR/AR systems -- 7.2 Search strategy -- 7.3 Existing AR/VR technologies for physical rehabilitation -- 7.4 AR/VR technology as healthcare treatment options -- 7.4.1 Upper limb -- 7.4.2 Lower limb -- 7.4.3 Parkinson's Disease -- 7.4.4 Stroke -- 7.4.5 Sclerosis -- 7.4.6 Pain management -- 7.5 State of art review (top 5 articles) -- 7.6 Design and development approaches for Physical Rehabilitation -- 7.6.1 Traditional research and development of AR/VR devices -- 7.6.1.1 Patient side -- 7.6.1.2 Physician/physiotherapist -- 7.6.1.3 Software -- 7.6.1.4 Limitations of AR/VR usability -- 7.6.2 FDA regulations for AR/VR product development -- 7.7 Discussion -- 7.7.1 Application and benefits -- 7.7.1.1 Mental health and concerned disorders -- 7.7.1.2 Surgical limitations and pediatric diagnosis -- 7.7.2 Emerging risks -- 7.7.3 Design standard requirements -- 7.7.4 Future research directions -- 7.8 Conclusion -- Acknowledgements -- References -- Chapter 8: Overcoming phobias: Harnessing the power of immersive virtual reality therapy -- 8.1 Introduction -- 8.1.1 Background and driving forces -- 8.2 Various types of phobias -- 8.3 Available treatments for phobias -- 8.4 Virtual reality in the treatment of phobias -- 8.5 Virtual reality systems…”
Libro electrónico -
2720