Search Results - (( Defined contribution ((pension plans) OR (pension plan)) ) OR ((( Defined distribution ((operations plans) OR (operations plan)) ) OR ( Defined distribution version pass ))))

  1. 161

    Saving for development : how Latin America and the Caribbean can save more and better by Inter-American Development Bank

    Published: Palgrave Macmillan US, 2016
    Description: 1 online resource (352 pages)
    Contents: “…The Last Resort: Taking Care of Grandma; Act Today, for a Better Tomorrow; Notes; 7 Saving for the Future: Pension Systems; Newer Systems for Older Populations; PAYG/Defined-Benefit Systems: Promises, Promises; Sustainability; Adequacy and Redistribution; Institutional Arrangements; Recommendations; Defined Contribution Systems: A Work in Progress; Transition Costs; Investments, Returns, and Costs; Retirement Products and Insurance Arrangements; Financial Literacy, Legitimacy, and Confidence; Appropriate Regulation and Supervision; Recommendations; When All Else Fails: Noncontributory Pensions.…”
    SpringerLink - Click here for access
    eBook
  2. 162

    Advances in information systems and technologies by World Conference on Information Systems and Technologies Olhão, Portugal, SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (xxii, 1160 pages) : illustrations.
    Contents: “…Analyzing Website Content for Improved R & T Collaboration Planning /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 163

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  4. 164

    Pro Python Second edition. by Browning, J. Burton, Alchin, Marty

    Published: Apress, 2014
    Description: 1 online resource.
    Contents: “…Using __all __ to Customize Imports -- Relative Imports -- The __import__() function -- The importlib module -- Taking It With You -- Chapter 3: Functions -- Arguments -- Planning for Flexibility -- Variable Positional Arguments -- Variable Keyword Arguments -- Combining Different Kinds of Arguments -- Invoking Functions with Variable Arguments -- Preloading Arguments -- Introspection -- Example: Identifying Argument Values -- Example: A More Concise Version -- Example: Validating Arguments -- Decorators -- Closures -- Wrappers -- Decorators with Arguments -- Decorators with-or without-Arguments -- Example: Memoization -- Example: A Decorator to Create Decorators -- Function Annotations -- Example: Type Safety -- Factoring Out the Boilerplate -- Example: Type Coercion -- Annotating with Decorators -- Example: Type Safety as a Decorator -- Generators -- Lambdas -- Introspection -- Identifying Object Types -- Modules and Packages -- Docstrings -- Taking It with You -- Chapter 4: Classes -- Inheritance -- Multiple Inheritance -- Method Resolution Order -- Example: C3 Algorithm -- Using super() to Pass Control to Other Classes -- Introspection -- How Classes Are Created -- Creating Classes at Runtime -- Metaclasses -- Example: Plugin Framework -- Controlling the Namespace -- Attributes -- Properties -- Descriptors -- Methods -- Unbound Methods -- Bound Methods -- Class Methods -- Static Methods -- Assigning Functions to Classes and Instances -- Magic Methods -- Creating Instances -- Example: Automatic Subclasses -- Dealing with Attributes -- String Representations -- Taking It With You -- Chapter 5: Common Protocols -- Basic Operations -- Mathematical Operations -- Bitwise Operations -- Variations -- Numbers -- Sign Operations -- Comparison Operations -- Iterables -- Example: Repeatable Generators -- Sequences -- Mappings -- Callables.…”
    SpringerLink - Click here for access
    eBook
  5. 165

    Managing downside risk in financial markets : theory, practice and implementation by ScienceDirect (Online service)

    Published: Butterworth-Heinemann, 2001
    Description: 1 online resource (xiv, 267 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  6. 166

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  7. 167

    Agile marketing by Accardi-Petersen, Michelle

    Published: Apress ; Distributed by Springer Science + Business Media, 2011
    Description: 1 online resource (xv, 232 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  8. 168

    Management of uncertainty : theory and application in the design of systems and organizations by Grote, Gudela

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  9. 169

    Lake Charles CCS Project. Phase 2. Final technical report by Leib, Thomas J., Cole, Dan E.

    Published: United States. Department of Energy, 2015
    Description: 1 online resource (141 pages) : illustrations.
    Get full text
    Address at time of PURL creation
    Government Document eBook
  10. 170

    Healthcare information privacy and security : regulatory compliance and data security in the age of electronic health records by Robichau, Bernard Peter

    Published: Apress, 2014
    Description: 1 online resource (xi, 167 pages) : illustrations (some color)
    SpringerLink - Click here for access
    eBook
  11. 171

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  12. 172

    Logic, Rationality, and Interaction : Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings by LORI 2009 Chongqing, China, SpringerLink (Online service)

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    Contents: “…On the Temporal Structure of Learning -- Agreement Theorems in Dynamic-Epistemic Logic -- Learning and Teaching as a Game: A Sabotage Approach -- First-Order Logic Formalisation of Arrow's Theorem -- Twelve Angry Men: A Study on the Fine-Grain of Announcements -- Dynamic Testimonial Logic -- From the Logical Point of View: The Chain Store Paradox Revisited -- A Cooperation Logic for Declaration Structures -- Intentions and Assignments -- Epistemic Games in Modal Logic: Joint Actions, Knowledge and Preferences All Together -- Dynamic Epistemic Logic of Finite Identification -- An Epistemic Logic for Planning with Trials -- Obligations in a Responsible World -- Dynamic Epistemic Temporal Logic -- Measurement-Theoretic Foundation of Preference-Based Dyadic Deontic Logic -- An Update Operator for Strategic Ability -- Strategy Elimination in Games with Interaction Structures -- Posters -- The Logic of Knowledge-Based Cooperation in the Social Dilemma -- Getting Together: A Unified Perspective on Modal Logics for Coalitional Interaction -- Oppositional Logic -- Deliberate Contrary-to-Law Action -- Mono-Agent Dynamics -- Modal Expressivity and Definability over Sets -- Dynamic Logics for Explicit and Implicit Information -- Existence of Satisfied Alternative and the Occurring of Morph-Dictator.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 173
  14. 174

    Configuration management for senior managers : essential product configuration and lifecycle management for manufacturing by Watts, Frank B.

    Published: Elsevier : BH, 2015
    Description: 1 online resource.
    Contents: “…FUNCTION NAMERESPONSIBILITIES; REENGINEER OR CONTINUOUS IMPROVEMENT; PLAN TO IMPROVE; SUMMARY; Chapter Four -- CM and Software; SOFTWARE'S CURRENT CONDITION; MODERN TREND; PROCESS REDESIGN BEFORE SOFTWARE; CM'S ROLL IN SOFTWARE; WHAT CM SHOULD CONTROL-AND NOT; SOFTWARE (SW) AND FIRMWARE (FW) CONTROL; SUMMARY; Chapter Five -- Standard Foundation Blocks; STANDARDS WRITING; GENERAL STANDARDS; ACRONYMS AND DEFINITIONS; PART NUMBERS-SIGNIFICANT OR NOT; CLASS CODING; INTERCHANGEABILITY AND THE PART NUMBER; INTERCHANGEABILITY/PART NUMBER/REV CHANGE; ITEM/DOCUMENT NUMBERING.…”
    Elsevier - Click here for access
    eBook
  15. 175

    Beginning backup and restore for SQL Server : data loss management and prevention techniques by Beard, Bradley

    Published: Apress, 2018
    Description: 1 online resource : illustrations.
    SpringerLink - Click here for access
    eBook
  16. 176

    How to validate a pharmaceutical process by Ostrove, Steve

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…II: Stage I-Process Development4 Getting Started; Before It All Starts; Example; Getting Started (After the Equipment Specifications); The Validation Master Plan; Standard Operating Procedures (SOPs) Preparation; Quality Programs; Training; Basic Risk Approach; Putting it Together; Notes; 5 Basic Equipment and Utility Qualification; Introduction; Determining the Level of Qualification; Factory Acceptance Test and Site Acceptance Test; Commissioning; Qualification Protocols-Installation Qualification (IQ) and Operational Qualification (OQ); Performance Qualification.…”
    Elsevier - Click here for access
    eBook
  17. 177

    Intelligent infrastructures by SpringerLink (Online service)

    Published: Springer, 2010
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  18. 178

    Big data and the internet of things : enterprise information architecture for a new age by Stackowiak, Robert, Licht, Art, Mantha, Venu, Nagode, Louis

    Published: Apress, 2015
    Description: 1 online resource (xviii, 220 pages) : illustrations.
    SpringerLink - Click here for access
    eBook
  19. 179
  20. 180

    Software and data technologies : Second International Conference, ICSOFT/ENASE 2007, Barcelona, Spain, July 22-25, 2007, revised selected papers by ICSOFT 2007 Barcelona, Spain, SpringerLink (Online service), ICSOFT (Conference), ENASE (Conference)

    Published: Springer, 2008
    Description: 1 online resource (xv, 428 pages) : illustrations.
    Contents: “…Invited Papers -- Benefits of Enterprise Ontology for the Development of ICT-Based Value Networks -- SOA Pragmatism -- Software and Data Technologies -- A Simple Language for Novel Visualizations of Information -- Generic Components for Static Operations at Object Level -- A Visual Dataflow Language for Image Segmentation and Registration -- A Debugger for the Interpreter Design Pattern -- Concepts for High-Performance Scientific Computing -- A Model Driven Architecture Approach to Web Development -- Reverse-Architecting Legacy Software Based on Roles: An Industrial Experiment -- A Supporting Tool for Requirements Elicitation Using a Domain Ontology -- Pattern Detection in Object-Oriented Source Code -- Testing the Effectiveness of MBIUI Life-Cycle Framework for the Development of Affective Interfaces -- Developer Stories: Improving Architecture in Agile Practice -- An Ontological SW Architecture Supporting Agile Development of Semantic Portals -- The Vcodex Platform for Data Compression -- Classification of Benchmarks for the Evaluation of Grid Resource Planning Algorithms -- A Disconnection-Aware Mechanism to Provide Anonymity in Two-Level P2P Systems -- Approximation and Scoring for XML Data Management -- Quantitative Analysis of the Top Ten Wikipedias -- A Semantic Web Approach for Ontological Instances Analysis -- Aspects Based Modeling of Web Applications to Support Co-evolution -- Recommending Trustworthy Knowledge in KMS by Using Agents -- Recent Developments in Automated Inferencing of Emotional State from Face Images -- Inconsistency-Tolerant Integrity Checking for Knowledge Assimilation -- Improving Cutting-Stock Plans with Multi-objective Genetic Algorithm -- Knowledge Purpose and Visualization -- Empirical Experimentation for Validating the Usability of Knowledge Packages in Transferring Innovations -- An Ontological Investigation in the Field of Computer Programs -- Evaluation of Novel Approaches to Software Engineering -- Formal Problem Domain Modeling within MDA -- Model Based Testing for Agent Systems -- A Metamodel for Defining Development Methodologies.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook