Produkt zum Begriff Customary practices:
-
Demand Forecasting Best Practices
Master the demand forecasting skills you need to decide what resources to acquire, products to produce, and where and how to distribute them. For demand planners, S&OP managers, supply chain leaders, and data scientists. Demand Forecasting Best Practices is a unique step-by-step guide, demonstrating forecasting tools, metrics, and models alongside stakeholder management techniques that work in a live business environment. You will learn how to: Lead a demand planning team to improve forecasting quality while reducing workload Properly define the objectives, granularity, and horizon of your demand planning process Use smart, value-weighted KPIs to track accuracy and bias Spot areas of your process where there is room for improvement Help planners and stakeholders (sales, marketing, finances) add value to your process Identify what kind of data you should be collecting, and how Utilise different types of statistical and machine learning models Follow author Nicolas Vandeput's original five-step framework for demand planning excellence and learn how to tailor it to your own company's needs. You will learn how to optimise demand planning for a more effective supply chain and will soon be delivering accurate predictions that drive major business value. About the technology Demand forecasting is vital for the success of any product supply chain. It allows companies to make better decisions about what resources to acquire, what products to produce, and where and how to distribute them. As an effective demand forecaster, you can help your organisation avoid overproduction, reduce waste, and optimise inventory levels for a real competitive advantage.
Preis: 38.51 € | Versand*: 0 € -
Optoelectronics & Photonics: Principles & Practices
For one-semester, undergraduate-level courses in Optoelectronics and Photonics, in the departments of electrical engineering, engineering physics, and materials science and engineering. This text takes a fresh look at the enormous developments in electo-optic devices and associated materials—such as Pockels (Lithium Niobate) modulators. The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. Upon purchase, you'll gain instant access to this eBook. Time limit The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.
Preis: 53.49 € | Versand*: 0 € -
Android Database Best Practices
Battle-Tested Strategies for Storing, Managing, and Sharing Android Data “Android™ Database Best Practices goes well beyond API documentation to offer strategic advice about how to handle data in an Android application and the tools needed to develop productively. This arms the developer with a trove of solutions to nearly any problem an application may face involving data. Mastering the concepts in this book are therefore essential for any developer who wants to create professional Android applications.” –Greg Milette, Android developer, Gradison Technologies, Inc. This is the first guide to focus on one of the most critical aspects of Android development: how to efficiently store, retrieve, manage, and share information from your app’s internal database. Through real-world code examples, which you can use in your own apps, you’ll learn how to take full advantage of SQLite and the database-related classes on Android. A part of Addison-Wesley’s Android™ Deep Dive series for experienced Android developers, Android Database Best Practices draws on Adam Stroud’s extensive experience leading cutting-edge app projects. Stroud reviews the core database theory and SQL techniques you need to efficiently build, manipulate, and read SQLite databases. He explores SQLite in detail, illuminates Android’s APIs for database interaction, and shares modern best practices for working with databases in the Android environment. Through a complete case study, you’ll learn how to design your data access layer to simplify all facets of data management and avoid unwanted technical debt. You’ll also find detailed solutions for common challenges in building data-enabled Android apps, including issues associated with threading, remote data access, and showing data to users. Extensive, up-to-date sample code is available for download at github.com/android-database-best-practices/device-database. You will Discover how SQLite database differs from other relational databasesUse SQL DDL to add structure to a database, and use DML to manipulate dataDefine and work with SQLite data typesPersist highly structured data for fast, efficient accessMaster Android classes for create, read, update, and delete (CRUD) operations and database queriesShare data within or between apps via content providersMaster efficient UI strategies for displaying data, while accounting for threading issuesUse Android’s Intents API to pass data between activities when starting a new activity or serviceAchieve two-way communication between apps and remote web APIsManage the complexities of app-to-server communication, and avoid common problemsUse Android’s new Data Binding API to write less code and improve performance
Preis: 21.39 € | Versand*: 0 € -
Information Security: Principles and Practices
Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career. Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today’s Information Security Common Body of Knowledge. Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today’s IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security. This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, “Bring Your Own Device” (BYOD) strategies to today’s increasingly rigorous compliance requirements. Throughout, you’ll find updated case studies, review questions, and exercises–all designed to reveal today’s real-world IT security challenges and help you overcome them. Learn how to -- Recognize the evolving role of IT security -- Identify the best new opportunities in the field -- Discover today’s core information security principles of success -- Understand certification programs and the CBK -- Master today’s best practices for governance and risk management -- Architect and design systems to maximize security -- Plan for business continuity -- Understand the legal, investigatory, and ethical requirements associated with IT security -- Improve physical and operational security -- Implement effective access control systems -- Effectively utilize cryptography -- Improve network and Internet security -- Build more secure software -- Define more effective security policies and standards -- Preview the future of information security
Preis: 62.05 € | Versand*: 0 €
-
Wie funktioniert eine Schaltanlage und welche Komponenten sind in ihr enthalten? Welche Sicherheitsaspekte sind bei der Installation und Wartung einer Schaltanlage zu beachten?
Eine Schaltanlage besteht aus Schaltgeräten wie Schaltern, Sicherungen und Leistungsschaltern, die elektrische Ströme steuern und verteilen. Sie wird verwendet, um elektrische Energie zu schalten und zu verteilen. Bei der Installation und Wartung einer Schaltanlage müssen Sicherheitsmaßnahmen wie das Tragen von Schutzausrüstung, das Arbeiten in spannungsfreien Zuständen und die regelmäßige Inspektion der Anlage beachtet werden.
-
Wie kann eine Schaltanlage richtig installiert werden, um eine effiziente und sichere Stromversorgung zu gewährleisten?
Eine Schaltanlage sollte gemäß den Herstelleranweisungen installiert werden, um eine ordnungsgemäße Funktion zu gewährleisten. Alle Verbindungen müssen sorgfältig überprüft und ordnungsgemäß verdrahtet werden. Zudem ist es wichtig, regelmäßige Wartungen durchzuführen, um die Sicherheit und Effizienz der Stromversorgung zu gewährleisten.
-
Was sind die Vor- und Nachteile von Bodenheizungssystemen in Bezug auf Energieeffizienz, Installation und Wartung?
Bodenheizungssysteme bieten eine hohe Energieeffizienz, da sie die Wärme gleichmäßig im Raum verteilen und somit eine angenehme Raumtemperatur bei niedrigeren Heizkosten ermöglichen. Die Installation von Bodenheizungssystemen kann aufwändig und teuer sein, da sie in den Boden eingebaut werden müssen und daher eine professionelle Installation erfordern. Die Wartung von Bodenheizungssystemen ist in der Regel minimal, da sie keine beweglichen Teile haben und somit weniger anfällig für Reparaturen sind. Allerdings kann die Wartung schwieriger sein, da eventuelle Probleme im Boden versteckt sein können und daher schwer zu erkennen sind.
-
Welche Best Practices sollten bei der Datenbankentwicklung beachtet werden, um die Leistung, Skalierbarkeit und Sicherheit zu maximieren?
Bei der Datenbankentwicklung sollten Best Practices wie die Verwendung von Indexen, die Optimierung von Abfragen und die Vermeidung von redundante Daten beachtet werden, um die Leistung zu maximieren. Zudem ist es wichtig, die Datenbank so zu entwerfen, dass sie skalierbar ist, indem beispielsweise Partitionierung und Sharding verwendet werden. Um die Sicherheit zu maximieren, sollten bewährte Methoden wie die Verwendung von verschlüsselten Verbindungen, die Implementierung von Zugriffssteuerungen und die regelmäßige Überprüfung auf Sicherheitslücken angewendet werden. Außerdem ist es wichtig, regelmäßige Backups und Wiederherstellungspläne zu erstellen, um die Datenintegrität zu gewährleisten.
Ähnliche Suchbegriffe für Customary practices:
-
DevOps Troubleshooting: Linux Server Best Practices
“If you’re a developer trying to figure out why your application is not responding at 3 am, you need this book! This is now my go-to book when diagnosing production issues. It has saved me hours in troubleshooting complicated operations problems.” –Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In DevOps Troubleshooting: Linux Server Best Practices, award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You’ll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps’ approach to troubleshooting and proven Linux server problem-solving principlesDiagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecksUnderstand healthy boots, so you can identify failure points and fix themSolve full or corrupt disk issues that prevent disk writesTrack down the sources of network problemsTroubleshoot DNS, email, and other network servicesIsolate and diagnose Apache and Nginx Web server failures and slowdownsSolve problems with MySQL and Postgres database servers and queriesIdentify hardware failures–even notoriously elusive intermittent failures
Preis: 24.6 € | Versand*: 0 € -
Functional Design: Principles, Patterns, and Practices
A Practical Guide to Better, Cleaner Code with Functional Programming In Functional Design, renowned software engineer Robert C. Martin ("Uncle Bob") explains how and why to use functional programming to build better systems for real customers. Martin compares conventional object-oriented coding structures in Java to those enabled by functional languages, identifies the best roles for each, and shows how to build better systems by judiciously using them in context. Martin's approach is pragmatic, minimizing theory in favor of "in the-trenches" problem-solving. Through accessible examples, working developers will discover how the easy-to-learn, semantically rich Clojure language can help them improve code cleanliness, design, discipline, and outcomes. Martin examines well-known SOLID principles and Gang of Four Design Patterns from a functional perspective, revealing why patterns remain extremely valuable to functional programmers, and how to use them to achieve superior results. Understand functional basics: immutability, persistent data, recursion, iteration, laziness, and statefulness Contrast functional and object approaches through expertly crafted case studies Explore functional design techniques for data flow Use classic SOLID principles to write better Clojure code Master pragmatic approaches to functional testing, GUIs, and concurrency Make the most of design patterns in functional environments Walk through building an enterprise-class Clojure application "Functional Design exudes 'classic-on-arrival'. Bob pulls back the curtain to reveal how functional programming elements make software design simple yet pragmatic. He does so without alienating experienced object-oriented programmers coming from languages like C#, C++, or Java."--Janet A. Carr, Independent Clojure Consultant Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Preis: 35.3 € | Versand*: 0 € -
Security Program and Policies: Principles and Practices
Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you create, deploy, and manage them. Complete and easy to understand, it explains key concepts and techniques through real-life examples. You’ll master modern information security regulations and frameworks, and learn specific best-practice policies for key industry sectors, including finance, healthcare, online commerce, and small business. If you understand basic information security, you’re ready to succeed with this book. You’ll find projects, questions, exercises, examples, links to valuable easy-to-adapt information security policies...everything you need to implement a successful information security program. Sari Stern Greene, CISSP, CRISC, CISM, NSA/IAM, is an information security practitioner, author, and entrepreneur. She is passionate about the importance of protecting information and critical infrastructure. Sari founded Sage Data Security in 2002 and has amassed thousands of hours in the field working with a spectrum of technical, operational, and management personnel, as well as boards of directors, regulators, and service providers. Her first text was Tools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, which was soon followed by the first edition of Security Policies and Procedures: Principles and Practices. She is actively involved in the security community, and speaks regularly at security conferences and workshops. She has been quoted in The New York Times, Wall Street Journal, and on CNN, and CNBC. Since 2010, Sari has served as the chair of the annual Cybercrime Symposium. Learn how to · Establish program objectives, elements, domains, and governance · Understand policies, standards, procedures, guidelines, and plans—and the differences among them · Write policies in “plain language,” with the right level of detail · Apply the Confidentiality, Integrity & Availability (CIA) security model · Use NIST resources and ISO/IEC 27000-series standards · Align security with business strategy · Define, inventory, and classify your information and systems · Systematically identify, prioritize, and manage InfoSec risks · Reduce “people-related” risks with role-based Security Education, Awareness, and Training (SETA) · Implement effective physical, environmental, communications, and operational security · Effectively manage access control · Secure the entire system development lifecycle · Respond to incidents and ensure continuity of operations · Comply with laws and regulations, including GLBA, HIPAA/HITECH, FISMA, state data security and notification rules, and PCI DSS
Preis: 62.05 € | Versand*: 0 € -
IT Strategy: Issues and Practices, Global Edition
For undergraduate or graduate courses in IT Strategy or Management IT Strategy: Issues and Practices provides a critical issues perspective that shows students how to deliver business value. As with the first two editions, this revision combines the insights of senior IT managers with academic research, bringing IT management to life and demonstrating how IT strategy plays out in contemporary business. This edition has been overhauled in order to reflect the most important issues facing IT managers today. Use a program that presents a better teaching and learning experience—for you and your students. Focus on IT management: Because IT is an important part of successful business strategy; the text focuses management skills so a wider range of business professionals will find it useful. Offer real-world current context: Real-world content found in chapter mini-cases and reading materials makes the material more relevant to students and prepares them for their field. The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. Upon purchase, you'll gain instant access to this eBook. Time limit The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.
Preis: 53.49 € | Versand*: 0 €
-
Welche grundlegenden Werkzeuge werden typischerweise von Schlossern verwendet, um verschiedene Aufgaben wie Installation, Reparatur und Wartung von Schlössern auszuführen?
Schlosser verwenden typischerweise Werkzeuge wie Schraubendreher, Zangen und Hammer, um Schlösser zu installieren, zu reparieren und zu warten. Spezielle Werkzeuge wie Dietriche und Schließzylinderfräsen werden auch verwendet, um Schlösser zu öffnen oder zu modifizieren. Darüber hinaus sind auch Messwerkzeuge wie Maßbänder und Wasserwaagen wichtig für die genaue Installation von Schlössern.
-
Was sind die grundlegenden Best Practices für Kommunikationsrichtlinien in Unternehmen?
1. Klar definierte Ziele und Botschaften festlegen. 2. Regelmäßige interne und externe Kommunikation sicherstellen. 3. Offene und transparente Kommunikation fördern.
-
Was sind die gängigen Best Practices für Compliance-Training in Unternehmen?
Die gängigen Best Practices für Compliance-Training in Unternehmen umfassen regelmäßige Schulungen für Mitarbeiter, klare Richtlinien und Verfahren, sowie die Integration von Compliance-Themen in die Unternehmenskultur. Es ist wichtig, dass das Training interaktiv und praxisnah gestaltet ist, um das Verständnis und die Einhaltung der Vorschriften zu fördern. Zudem sollten regelmäßige Überprüfungen und Updates des Trainingsprogramms durchgeführt werden, um sicherzustellen, dass es den aktuellen rechtlichen Anforderungen entspricht.
-
Welche Best Practices sollten bei der Datenbankverwaltung beachtet werden, um die Leistung, Sicherheit und Skalierbarkeit von Anwendungen zu gewährleisten?
Bei der Datenbankverwaltung ist es wichtig, regelmäßige Backups durchzuführen, um Datenverlust zu vermeiden. Zudem sollten Indizes und Abfragen optimiert werden, um die Leistung der Datenbank zu verbessern. Die Sicherheit der Datenbank kann durch die Verwendung von Verschlüsselung und Zugriffskontrollen gewährleistet werden. Um die Skalierbarkeit zu verbessern, ist es ratsam, die Datenbank auf mehrere Server zu verteilen und die Hardware entsprechend zu skalieren.
* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.