![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > Other software packages > Enterprise software
This book presents the latest findings and ongoing research in the field of green information systems as well as green information and communication technology (ICT). It provides insights into a whole range of cross-cutting concerns in ICT and environmental sciences and showcases how information and communication technologies allow environmental and energy efficiency issues to be handled effectively. Offering a selection of extended and reworked contributions to the 30th International Conference EnviroInfo 2016, it is essential reading for anyone wanting to extend their expertise in the area.
This book reports on the results of an interdisciplinary and multidisciplinary workshop on provenance that brought together researchers and practitioners from different areas such as archival science, law, information science, computing, forensics and visual analytics that work at the frontiers of new knowledge on provenance. Each of these fields understands the meaning and purpose of representing provenance in subtly different ways. The aim of this book is to create cross-disciplinary bridges of understanding with a view to arriving at a deeper and clearer perspective on the different facets of provenance and how traditional definitions and applications may be enriched and expanded via an interdisciplinary and multidisciplinary synthesis. This volume brings together all of these developments, setting out an encompassing vision of provenance to establish a robust framework for expanded provenance theory, standards and technologies that can be used to build trust in financial and other types of information.
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to the challenges of microservices security, the book covers fundamentals to secure both the application perimeter and service-to-service communication. Following a hands-on example, readers explore how to deploy and secure microservices behind an API gateway as well as how to access microservices accessed by a single-page application (SPA). Key Features Key microservices security fundamentals Securing service-to-service communication with mTLS and JWT Deploying and securing microservices with Docker Using Kubernetes security Securing event-driven microservices Using the Istio Service Mesh For developers well-versed in microservices design principles who have a basic familiarity with Java. About the technology As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Because microservices are created as a system of independent components, each a possible point of failure, they can multiply the security risk. Prabath Siriwardena is the vice president of security architecture at WSO2, a company that produces open source software, and has more than 12 years of experience in the identity management and security domain. Nuwan Dias is the director of API architecture at WSO2 and has worked in the software industry for more than 7 years, most of which he spent focusing on the API management domain. Both have helped build security designs for Fortune 500 companies including Boeing, Verizon, Nissan, HP, and GE.
The book presents a conceptually novel oscillations based paradigm, the Oscillation-Based Multi-Agent System (OSIMAS), aimed at the modelling of agents and their systems as coherent, stylized, neurodynamic processes. This paradigm links emerging research domains via coherent neurodynamic oscillation based representations of the individual human mind and society (as a coherent collective mind) states. Thus, this multidisciplinary paradigm delivers an empirical and simulation research framework that provides a new way of modelling the complex dynamics of individual and collective mind states. This book addresses a conceptual problem - the lack of a multidisciplinary, connecting paradigm, which could link fragmented research in the fields of neuroscience, artificial intelligence (AI), multi-agent system (MAS) and the social network domains. The need for a common multidisciplinary research framework essentially arises because these fields share a common object of investigation and simulation, i.e., individual and collective human behavior. Although the fields of research mentioned above all approach this from different perspectives, their common object of investigation unites them. By putting the various pathways of research as they are interrelated into perspective, this book provides a philosophical underpinning, experimental background and modelling tools that the author anticipates will reveal new frontiers in multidisciplinary research. Fundamental investigation of the implicit oscillatory nature of agents' mind states and social mediums in general can reveal some new ways of understanding the periodic and nonperiodic fluctuations taking place in real life. For example, via agent states-related diffusion properties, we could investigate complex economic phenomena like the spread of stock market crashes, currency crises, speculative oscillations (bubbles and crashes), social unrest, recessionary effects, sovereign defaults, etc. All these effects are closely associated with social fragility, which follows and is affected by cycles such as production, political, business and financial. Thus, the multidisciplinary OSIMAS paradigm can yield new knowledge and research perspectives, allowing for a better understanding of social agents and their social organization principles.
This book provides a practical approach to designing and implementing a Knowledge Management (KM) Strategy. The book explains how to design KM strategy so as to align business goals with KM objectives. The book also presents an approach for implementing KM strategy so as to make it sustainable. It covers all basic KM concepts, components of KM and the steps that are required for designing a KM strategy. As a result, the book can be used by beginners as well as practitioners. Knowledge management is a discipline that promotes an integrated approach to identifying, capturing, evaluating, retrieving, and sharing all of an enterprise's information assets. These assets may include databases, documents, policies, procedures, and previously un-captured expertise and experience in individual workers. Knowledge is considered to be the learning that results from experience and is embedded within individuals. Sometimes the knowledge is gained through critical thinking, watching others, and observing results of others. These observations then form a pattern which is converted in a 'generic form' to knowledge. This implies that knowledge can be formed only after data (which is generated through experience or observation) is grouped into information and then this information pattern is made generic wisdom. However, dissemination and acceptance of this knowledge becomes a key factor in knowledge management. The knowledge pyramid represents the usual concept of knowledge transformations, where data is transformed into information, and information is transformed into knowledge. Many organizations have struggled to manage knowledge and translate it into business benefits. This book is an attempt to show them how it can be done.
There are two different, interdependent components of IT that are important to a CIO: strategy, which is long-term; and tactical and operational concerns, which are short-term. Based on this distinction and its repercussions, this book clearly separates strategy from day-to-day operations and projects from operations - the two most important functions of a CIO. It starts by discussing the ideal organization of an IT department and the rationale behind it, and then goes on to debate the most pressing need - managing operations. It also explains some best industry standards and their practical implementation, and discusses project management, again highlighting the differences between the methodologies used in projects and those used in operations. A special chapter is devoted to the cutover of projects into operations, a critical aspect seldom discussed in detail. Other chapters touch on the management of IT portfolios, project governance, as well as agile project methodology, how it differs from the waterfall methodology, and when it is convenient to apply each. Taking the fundamental principles of IT service management and best practices in project management, the book offers a single, seamless reference for IT managers and professionals. It is highly practical, explaining how to apply these principles based on the author's extensive experience in industry.
This book presents and discusses the state of the art and future trends in software engineering education, with a focus on agile methods and their budgetary implications. It introduces new and innovative methods, models and frameworks to focus the training towards the industry's requirements. The range of topics covered includes education models for software engineering, development of the software engineering discipline, innovation and evaluation of software engineering education, curricula for software engineering education, requirements and cultivation of outstanding software engineers for the future and cooperation models for industry and software engineering education.
This book accomplishes an analysis of critical aspects of managerial implications on the business with information. The business dealing with information is spreading in the service market; and, an efficient management of informational processes, in order to perform successful business with them, is now crucial. Besides, economical/business, technological or any other kind of information, organized in a variety of forms, can be considered as an 'informational product'. Thus, creating a business value out of information is challenging but vital, especially in the modern digital age. Accordingly, the book covers the methods and technologies to capture, integrate, analyze, mine, interpret and visualize information out of distributed data, which in turn can help to manage information competently. This volume explores the challenges being faced and opportunities to look out for in this research area, while discussing different aspects of this subject. The book will be of interest to those working in or are interested in joining interdisciplinary and transdisciplinary work in the areas of information management, service management, and service business. It will also be of use to young generation researchers by giving them an overview on different aspects of doing business with information. While introducing them to both technical and non-technical details, as well as economic aspects, the book will also be extremely informative for professionals who want to understand and realize the potential of using the cutting-edge managerial technologies for doing successful business with information/ services.
This book identifies, analyzes and discusses the current trends of digitalized, decentralized, and networked physical value creation by focusing on the particular example of 3D printing. In addition to evaluating 3D printing's disruptive potentials against a broader economic background, it also addresses the technology's potential impacts on sustainability and emerging modes of bottom-up and community-based innovation. Emphasizing these topics from economic, technical, social and environmental perspectives, the book offers a multifaceted overview that scrutinizes the scenario of a fundamental transition: from a centralized to a far more decentralized system of value creation.
This book presents a proposal for designing business process management (BPM) systems that comprise much more than just process modelling. Based on a purified Business Process Model and Notation (BPMN) variant, the authors present proposals for several important issues in BPM that have not been adequately considered in the BPMN 2.0 standard. It focusses on modality as well as actor and user interaction modelling and offers an enhanced communication concept. In order to render models executable, the semantics of the modelling language needs to be described rigorously enough to prevent deviating interpretations by different tools. For this reason, the semantics of the necessary concepts introduced in this book are defined using the Abstract State Machine (ASM) method. Finally, the authors show how the different parts of the model fit together using a simple example process, and introduce the enhanced Process Platform (eP2) architecture, which binds all the different components together. The resulting method is named Hagenberg Business Process Modelling (H-BPM) after the Austrian village where it was designed. The motivation for the development of the H-BPM method stems from several industrial projects in which business analysts and software developers struggled with redundancies and inconsistencies in system documentation due to missing integration. The book is aimed at researchers in business process management and industry 4.0 as well as advanced professionals in these areas.
This edited three volume edition brings together significant papers previously published in the Journal of information Technology (JIT) over its 30 year publication history. The three volumes of Enacting Research Methods in Information Systems celebrate the methodological pluralism used to advance our understanding of information technology's role in the world today. In addition to quantitative methods from the positivist tradition, JIT also values methodological articles from critical research perspectives, interpretive traditions, historical perspectives, grounded theory, and action research and design science approaches. Volume 1 covers Critical Research, Grounded Theory, and Historical Approaches. Volume 2 deals with Interpretive Approaches and also explores Action Research. Volume 3 focuses on Design Science Approaches and discusses Alternative Approaches including Semiotics Research, Complexity Theory and Gender in IS Research. The Journal of Information Technology (JIT) was started in 1986 by Professors Frank Land and Igor Aleksander with the aim of bringing technology and management together and bridging the 'great divide' between the two disciplines. The Journal was created with the vision of making the impact of complex interactions and developments in technology more accessible to a wider audience. Retaining this initial focus, the JIT has gone on to extend into new and innovative areas of research such as the launch of JITTC in 2010. A high impact journal, JIT shall continue to publish leading trends based on significant research in the field.
This edited three volume edition brings together significant papers previously published in the Journal of information Technology (JIT) over its 30 year publication history. The three volumes of Enacting Research Methods in Information Systems celebrate the methodological pluralism used to advance our understanding of information technology's role in the world today. In addition to quantitative methods from the positivist tradition, JIT also values methodological articles from critical research perspectives, interpretive traditions, historical perspectives, grounded theory, and action research and design science approaches. Volume 1 covers Critical Research, Grounded Theory, and Historical Approaches. Volume 2 deals with Interpretive Approaches and also explores Action Research. Volume 3 focuses on Design Science Approaches and discusses Alternative Approaches including Semiotics Research, Complexity Theory and Gender in IS Research. The Journal of Information Technology (JIT) was started in 1986 by Professors Frank Land and Igor Aleksander with the aim of bringing technology and management together and bridging the 'great divide' between the two disciplines. The Journal was created with the vision of making the impact of complex interactions and developments in technology more accessible to a wider audience. Retaining this initial focus, the JIT has gone on to extend into new and innovative areas of research such as the launch of JITTC in 2010. A high impact journal, JIT shall continue to publish leading trends based on significant research in the field.
This book is published under a CC BY-NC 4.0 license. The editors present essential methods and tools to support a holistic approach to the challenge of system upgrades and innovation in the context of high-value products and services. The approach presented here is based on three main pillars: an adaptation mechanism based on a broad understanding of system dependencies; efficient use of system knowledge through involvement of actors throughout the process; and technological solutions to enable efficient actor communication and information handling. The book provides readers with a better understanding of the factors that influence decisions, and put forward solutions to facilitate the rapid adaptation to changes in the business environment and customer needs through intelligent upgrade interventions. Further, it examines a number of sample cases from various contexts including car manufacturing, utilities, shipping and the furniture industry. The book offers a valuable resource for both academics and practitioners interested in the upgrading of capital-intensive products and services. "The work performed in the project "Use-It-Wisely (UiW)" significantly contributes towards a collaborative way of working. Moreover, it offers comprehensive system modelling to identify business opportunities and develop technical solutions within industrial value networks. The developed UiW-framework fills a void and offers a great opportunity. The naval construction sector of small passenger vessels, for instance, is one industry that can benefit." Nikitas Nikitakos, Professor at University of the Aegean, Department of Shipping, Trade, and Transport, Greece. "Long-life assets are crucial for both the future competiveness and sustainability of society. Make wrong choices now and you are locked into a wrong system for a long time. Make the right choices now and society can prosper. This book gives important information about how manufacturers can make right choices." Arnold Tukker, Scientific director, Institute of Environmental Sciences (CML), Leiden University, and senior scientist, TNO.
This book examines trends and challenges in research on IT governance in public organizations, reporting innovative research and new insights in the theories, models and practices within the area. As we noticed, IT governance plays an important role in generating value from organization's IT investments. However there are different challenges for researchers in studying IT governance in public organizations due to the differences between political, administrative, and practices in these organizations. The first section of the book looks at Management issues, including an introduction to IT governance in public organizations; a systematic review of IT alignment research in public organizations; the role of middle managers in aligning strategy and IT in public service organizations; and an analysis of alignment and governance with regard to IT-related policy decisions. The second section examines Modelling, including a consideration of the challenges faced by public administration; a discussion of a framework for IT governance implementation suitable to improve alignment and communication between stakeholders of IT services; the design and implementation of IT architecture; and the adoption of enterprise architecture in public organizations. Finally, section three presents Case Studies, including IT governance in the context of e-government strategy implementation in the Caribbean; the relationship of IT organizational structure and IT governance performance in the IT department of a public research and education organization in a developing country; the relationship between organizational ambidexterity and IT governance through a study of the Swedish Tax Authorities; and the role of institutional logics in IT project activities and interactions in a large Swedish hospital.
This book analyses quantitative open source software (OSS) reliability assessment and its applications, focusing on three major topic areas: the Fundamentals of OSS Quality/Reliability Measurement and Assessment; the Practical Applications of OSS Reliability Modelling; and Recent Developments in OSS Reliability Modelling. Offering an ideal reference guide for graduate students and researchers in reliability for open source software (OSS) and modelling, the book introduces several methods of reliability assessment for OSS including component-oriented reliability analysis based on analytic hierarchy process (AHP), analytic network process (ANP), and non-homogeneous Poisson process (NHPP) models, the stochastic differential equation models and hazard rate models. These measurement and management technologies are essential to producing and maintaining quality/reliable systems using OSS.
This book identifies and discusses the main challenges facing digital business innovation and the emerging trends and practices that will define its future. The book is divided into three sections covering trends in digital systems, digital management, and digital innovation. The opening chapters consider the issues associated with machine intelligence, wearable technology, digital currencies, and distributed ledgers as their relevance for business grows. Furthermore, the strategic role of data visualization and trends in digital security are extensively discussed. The subsequent section on digital management focuses on the impact of neuroscience on the management of information systems, the role of IT ambidexterity in managing digital transformation, and the way in which IT alignment is being reconfigured by digital business. Finally, examples of digital innovation in practice at the global level are presented and reviewed. The book will appeal to both practitioners and academics. The text is supported by informative illustrations and case studies, so that practitioners can use the book as a toolbox that enables easy understanding and assists in exploiting business opportunities involving digital business innovation.
This book investigates organizational learning from a variety of information processing perspectives. Continuous change and complexity in regulatory, social and economic environments are increasingly forcing organizations and their employees to acquire the necessary job-specific knowledge at the right time and in the right format. Though many regulatory documents are now available in digital form, their complexity and diversity make identifying the relevant elements for a particular context a challenging task. In such scenarios, business processes tend to be important sources of knowledge, containing rich but in many cases embedded, hidden knowledge. This book discusses the possible connection between business process models and corporate knowledge assets; knowledge extraction approaches based on organizational processes; developing and maintaining corporate knowledge bases; and semantic business process management and its relation to organizational learning approaches. The individual chapters reveal the different elements of a knowledge management solution designed to extract, organize and preserve the knowledge embedded in business processes so as to: enrich organizational knowledge bases in a systematic and controlled way, support employees in acquiring job role-specific knowledge, promote organizational learning, and steer human capital investment. All of these topics are analyzed on the basis of real-world cases from the domains of insurance, food safety, innovation, and funding.
This book explores models and concepts of trust in a digitized world. Trust is a core concept that comes into play in multiple social and economic relations of our modern life. The book provides insights into the current state of research while presenting the viewpoints of a variety of disciplines such as communication studies, information systems, educational and organizational psychology, sports psychology and economics. Focusing on an investigation of how the Internet is changing the relationship between trust and communication, and the impact this change has on trust research, this volume facilitates a greater understanding of these topics, thus enabling their employment in social relations.
This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.
This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting.The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.
This book presents the latest findings and ongoing research in the field of green information systems and green information and communication technology (ICT). It provides insights into a whole range of cross-cutting topics in ICT and environmental sciences as well as showcases how information and communication technologies allow environmental and energy efficiency issues to be handled effectively. The papers presented in this book are a selection of extended and improved contributions to the 28th International Conference on Informatics for Environmental Protection dedicated to ICT for energy efficiency. This book is essential and particularly worth reading for those who already gained basic knowledge and want to deepen and extend their expertise in the subjects mentioned above.
This new Edition of Electronic Commerce is a complete update of the leading graduate level/advanced undergraduate level textbook on the subject. Electronic commerce (EC) describes the manner in which transactions take place over electronic networks, mostly the Internet. It is the process of electronically buying and selling goods, services, and information. Certain EC applications, such as buying and selling stocks and airline tickets online, are reaching maturity, some even exceeding non-Internet trades. However, EC is not just about buying and selling; it also is about electronically communicating, collaborating, and discovering information. It is about e-learning, e-government, social networks, and much more. EC is having an impact on a significant portion of the world, affecting businesses, professions, trade, and of course, people. The most important developments in EC since 2014 are the continuous phenomenal growth of social networks, especially Facebook , LinkedIn and Instagram, and the trend toward conducting EC with mobile devices. Other major developments are the expansion of EC globally, especially in China where you can find the world's largest EC company. Much attention is lately being given to smart commerce and the use of AI-based analytics and big data to enhance the field. Finally, some emerging EC business models are changing industries (e.g., the shared economy models of Uber and Airbnb). The 2018 (9th) edition, brings forth the latest trends in e-commerce, including smart commerce, social commerce, social collaboration, shared economy, innovations, and mobility.
Learn SAP's real estate management integrated solution to effectively manage the real estate portfolio at your organization. You will configure SAP REFX for business scenarios covering solutions from master data to financial posting and reporting. You will address all phases of the real estate life cycle, including real estate acquisition or disposal, portfolio management, and property and technical management. To succeed in today's global and highly competitive economy, asset optimization in real estate management has become a strategic task. Organizations need to ensure insight into their property portfolio to make informed decisions, improve portfolio performance, and reduce compliance costs. Sophisticated solutions are needed to manage changing consumer demands and the global workforce as well as information management, compliance adherence, and leasing and property management. SAP Flexible Real Estate Management by Daithankar is a full-featured book that integrates REFX with Controlling (CO), Plant and Maintenance (PM), CRM, SAP AA (ssset accounting), and SAP PS (project systems). You will refer to real-world, practical examples to illustrate configuration concepts and processes, and learn in an interactive, hands-on way through the use of screenshots, menu paths, and transaction codes throughout the book.What You Will Learn: Understand the SAP REFX Solutions landscape and industry best practices for SAP REFX implementation Configure SAP REFX Integrate REFX with other modules Understand how processes are supported by SAP REFX Who This Book Is For: CIOs/CEOs of organizations with real estate portfolios, SAP REFX purchasing decision makers, SAP REFX pre-sales teams, SAP REFX implementation/AMS consultants
Learn how to make the most of SharePoint 2016 and its wide range of capabilities to support your information management, collaboration, and business process management needs. Whether you are using SharePoint as an intranet or business solution platform, you will learn how to use the resources (such as lists, libraries, and sites) and services (such as search, workflow, and social) that make up these environments. In the fifth edition of this bestselling book, author Tony Smith walks you through the components and capabilities that make up a SharePoint 2016 environment. He provides step-by-step instructions for using and managing these elements, as well as recommendations for how to get the best out of them. What You Will Learn Create and use common SharePoint resources like lists, libraries, sites, pages and web parts Understand when and how workflows and information management policies can be used to automate process Learn how to take advantage of records retention, management, and disposition Make the most of SharePoint search services Take advantage of social capabilities to create social solutions Who This Book Is For Whether you have not yet used SharePoint at all, have used previous versions, have just started using the basic features, or have been using it for a long of time, this book provides the skills you need to work efficiently with the capabilities SharePoint 2016 provides. |
You may like...
Diagnostic Biomedical Signal and Image…
Kemal Polat, Saban Ozturk
Paperback
R2,952
Discovery Miles 29 520
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R7,752
Discovery Miles 77 520
Intelligent Edge Computing for Cyber…
D. Jude Hemanth, Bb Gupta, …
Paperback
R2,954
Discovery Miles 29 540
Handbook of HydroInformatics - Volume…
Saeid Eslamian, Faezeh Eslamian
Paperback
R3,507
Discovery Miles 35 070
29th European Symposium on Computer…
Anton A Kiss, Edwin Zondervan, …
Hardcover
R11,317
Discovery Miles 113 170
Contextual Process Digitalization
Albert Fleischmann, Stefan Oppl, …
Hardcover
R1,438
Discovery Miles 14 380
|