0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (51)
  • R250 - R500 (246)
  • R500+ (8,227)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Underlying Standards that Support Population Health Improvement (Paperback): Laura Bright, Johanna Goderre Underlying Standards that Support Population Health Improvement (Paperback)
Laura Bright, Johanna Goderre
R1,021 Discovery Miles 10 210 Ships in 12 - 17 working days

This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.

CEH v11 Certified Ethical Hacker Study Guide (Paperback): R Messier CEH v11 Certified Ethical Hacker Study Guide (Paperback)
R Messier
R865 Discovery Miles 8 650 Ships in 12 - 17 working days

As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.

Telecommunications Management for the Data Processing Executive - A Decision-Maker's Guide to Systems Planning and... Telecommunications Management for the Data Processing Executive - A Decision-Maker's Guide to Systems Planning and Implementation (Hardcover)
Milburn D. Smith
R2,684 Discovery Miles 26 840 Ships in 10 - 15 working days

This book is designed to help telecommunications managers prepare themselves and their companies for the 1990s by providing a practical guide to researching, buying, and consulting on office telecommunications systems. The author covers voice communications technologies and products, local, metropolitan, and wide area networks for data transmission, and the various bypass technologies available today, including satellite, microwave, and fiber optic based systems. A detailed section on management aspects of telecommunications discusses the process of defining company telecommunications requirements, strategic telecommunications planning, and future trends in telecommunications. Must reading for every telecommunications manager this book provides a solid basis for successful systems planning and trouble-free implementation.

Design Cybernetics - Navigating the New (Hardcover, 1st ed. 2019): Thomas Fischer, Christiane M. Herr Design Cybernetics - Navigating the New (Hardcover, 1st ed. 2019)
Thomas Fischer, Christiane M. Herr
R3,308 Discovery Miles 33 080 Ships in 10 - 15 working days

Design Cybernetics: Navigating the New Design cybernetics offers a way of looking at ourselves - curious, creative, and ethical humans - as self-organising systems that negotiate their own goals in open-ended explorations of the previously unknown. It is a theory of and for epistemic practices (learning, designing, researching) that is deeply committed to the autonomy of others and hence offers no prescriptive methodology. Design cybernetics describes design practice as inextricable from conversation - a way of enquiring, developing shared understanding and reaching the new that harnesses reliable control as well as error and serendipity. Recognising circular causality, observer-dependency and non-determinability, design cybernetics extends beyond tenets of scientific research into the creative, ethical and aesthetic domain. From this perspective, design is not an ill-conceived subset of scientific research. Instead, scientific research emerges as a particularly restricted subset of the broader human activity of design. This volume offers a cross-section of design cybernetic theory and practice with contributions ranging across architecture, interior lighting studies, product design, embedded systems, design pedagogy, design theory, social transformation design, research epistemology, art and poetics, as well as theatre and acting. Addressing designers, design educators and researchers interested in a rigorous, practice-based epistemology, it establishes design cybernetics as a foundational perspective of design research. "This is a conceptually elegant, well structured, and comprehensive presentation of design cybernetics. It fills a gap in the literature of the field." Ken Friedman, Chair Professor, Tongji University "This book offers a valuable and timely introduction to second-order cybernetics as society grapples with complex issues like climate change and rising inequality." Joichi Ito, Director of the MIT Media Lab

Cloud and Fog Computing Platforms for Internet of Things (Hardcover): Pankaj Bhambri, Sita Rani, Gaurav Gupta, Alex Khang Cloud and Fog Computing Platforms for Internet of Things (Hardcover)
Pankaj Bhambri, Sita Rani, Gaurav Gupta, Alex Khang
R4,305 R4,025 Discovery Miles 40 250 Save R280 (7%) Ships in 12 - 17 working days

Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT). To allow for quicker, more efficient, and expanded privacy-preserving services, a new trend called Fog Computing has emerged: moving these responsibilities to the network's edge. Traditional centralized cloud computing paradigms confront new problems posed by IoT application growth, including high latency, limited storage, and outages due to a lack of available resources. Fog Computing puts the cloud and IoT devices closer together to address these issues. Instead of sending IoT data to the cloud, the fog processes and stores it locally at IoT devices. Unlike the cloud, fog-based services have a faster reaction time and better quality overall. Fog Computing, Cloud Computing, and their connectivity with the IoT are discussed in this book, with an emphasis on the advantages and implementation issues. It also explores the various architectures and appropriate IoT applications. Fog Computing, Cloud Computing, and Internet of Things are being suggested as potential research directions. Features: A systematic overview of the state-of-the-art in Cloud Computing, Fog Computing, and Internet of Things Recent research results and some pointers to future advancements in architectures and methodologies Detailed examples from clinical studies using several different data sets

Organisation Management in the Digital Economy - Globalization Challenges (Hardcover): Anna Brzozowska, Dagmara Bubel, Larysa... Organisation Management in the Digital Economy - Globalization Challenges (Hardcover)
Anna Brzozowska, Dagmara Bubel, Larysa Nekrasenko
R2,909 Discovery Miles 29 090 Ships in 12 - 17 working days

This book highlights the essence of information technology in the modern digital world in relation to improvements and threats to organisations and e-business in the era of the digital economy. Rapid IT development has created modern business proposals such as digital and virtual currencies, crowdfunding, peer-to-peer lending, mobile banking, online investing and new payment systems. This allows organisations and firms to increase competitiveness by using financial products and services, thus increasing their value. Information technology users receive significant timesaving and a choice of investment options. At the same time, there is a new challenge for regulators who must monitor how this or that technology affects the financial sector. The authors have collected and systematised information on the models of using information technology in e-business as well as issues of applying information technology in smart organisations and public institutions. The book addresses the issues of risk management in organizations and the problems of personal and social risks resulting from the use of information technology. In addition, the book presents a review of e-commerce sectors and models as well as e-commerce tools, international payment systems and modern money systems. Risks, threats and security rules for using banking services, e-commerce and payment systems are reviewed and systematised.

Principles of Distributed Database Systems (Hardcover, 4th ed. 2020): M. Tamer OEzsu, Patrick Valduriez Principles of Distributed Database Systems (Hardcover, 4th ed. 2020)
M. Tamer OEzsu, Patrick Valduriez
R2,393 Discovery Miles 23 930 Ships in 12 - 17 working days

The fourth edition of this classic textbook provides major updates. This edition has completely new chapters on Big Data Platforms (distributed storage systems, MapReduce, Spark, data stream processing, graph analytics) and on NoSQL, NewSQL and polystore systems. It also includes an updated web data management chapter that includes RDF and semantic web discussion, an integrated database integration chapter focusing both on schema integration and querying over these systems. The peer-to-peer computing chapter has been updated with a discussion of blockchains. The chapters that describe classical distributed and parallel database technology have all been updated. The new edition covers the breadth and depth of the field from a modern viewpoint. Graduate students, as well as senior undergraduate students studying computer science and other related fields will use this book as a primary textbook. Researchers working in computer science will also find this textbook useful. This textbook has a companion web site that includes background information on relational database fundamentals, query processing, transaction management, and computer networks for those who might need this background. The web site also includes all the figures and presentation slides as well as solutions to exercises (restricted to instructors).

Rational Decisions in Organisations - Theoretical and Practical Aspects (Hardcover): Frederic Adam, Dorota Kuchta, Stanislaw... Rational Decisions in Organisations - Theoretical and Practical Aspects (Hardcover)
Frederic Adam, Dorota Kuchta, Stanislaw Stanek
R3,191 Discovery Miles 31 910 Ships in 12 - 17 working days

Managers in organisations must make rational decisions. Rational decision making is the opposite of intuitive decision making. It is a strict procedure utilising objective knowledge and logic. It involves identifying the problem to solve, gathering facts, identifying options and outcomes, analysing them, considering all the relationships and selecting the decision. Rational decision making requires support: methods and software tools. The identification of the problem to solve needs methods that would measure and evaluate the current situation. Identification and evaluation of options and analysis of the available possibilities involves analysis and optimisation methods. Incorporating intuition into rational decision making needs adequate methods that would translate ideas or observed behaviours into hard data. Communication, observation and opinions recording is hardly possible today without adequate software. Information and data that form the input, intermediate variables and the output must be stored, managed and made accessible in a user-friendly manner. Rational Decisions in Organisations: Theoretical and Practical Aspects presents selected recent developments in the support of the widely understood rational decision making in organisations, illustrated through case studies. The book shows not only the variety of perspectives involved in decision making, but also the variety of domains where rational decision support systems are needed. The case studies present decision making by medical doctors, students and managers of various universities, IT project teams, construction companies, banks and small and large manufacturing companies. Covering the richness of relationships in which the decisions should and must be taken, the book illustrates how modern organisations operate in chains and networks; they have multiple responsibilities, including social, legal, business and ethical duties. Nowadays, managers in organisations can make transparent decisions and consider a multitude of stakeholders and their diverse features, incorporating diverse criteria, using multiple types and drivers of information and decision-making patterns, and referring to numerous lessons learned. As the book makes clear, the marriage of theoretical ideas with the possibilities offered by technology can make the decisions in organisations more rational and, at the same time, more human.

Applications of Cloud Computing - Approaches and Practices (Paperback): Prerna Sharma, Mool Chand Sharma, Mohamed Elhoseny Applications of Cloud Computing - Approaches and Practices (Paperback)
Prerna Sharma, Mool Chand Sharma, Mohamed Elhoseny
R1,369 R1,180 Discovery Miles 11 800 Save R189 (14%) Ships in 9 - 15 working days

Provides the fundamentals of cloud computing; Focuses on new applications for cloud computing; Analyzes real-time problems

Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT... Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT (Hardcover)
Rajdeep Chowdhury, S. K. Niranjan
R3,768 Discovery Miles 37 680 Ships in 12 - 17 working days

This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The fresh and innovative advances that demonstrate computational intelligence and IoT in practice that are discussed in this volume will be informative for academicians, scholars, scientists, industry professionals, policymakers, government and non-government organizations, and others.

Computational Intelligence for Wireless Sensor Networks - Principles and Applications (Book): Sandip Kumar Chaurasiya Computational Intelligence for Wireless Sensor Networks - Principles and Applications (Book)
Sandip Kumar Chaurasiya
R1,302 Discovery Miles 13 020 Ships in 12 - 17 working days
Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,432 Discovery Miles 14 320 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Optimization Based Data Mining: Theory and Applications (Hardcover, 2011 ed.): Yong Shi, Yingjie Tian, Gang Kou, Yi Peng,... Optimization Based Data Mining: Theory and Applications (Hardcover, 2011 ed.)
Yong Shi, Yingjie Tian, Gang Kou, Yi Peng, Jian-Ping Li
R2,830 Discovery Miles 28 300 Ships in 10 - 15 working days

Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has attracted many researchers who are interested in algorithm development of data mining.

"Optimization based Data Mining: Theory and Applications," mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery.

Most of the material in this book is directly from the research and application activities that the authors' research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.

Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover):... Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs - Methods, technologies and applications (Hardcover)
Amit Kumar Tyagi, Ajith Abraham, Farookh Khadeer Hussain, Arturas Kaklauskas, R. Jagadeesh Kannan
R4,214 R3,684 Discovery Miles 36 840 Save R530 (13%) Ships in 10 - 15 working days

Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals. This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.

Direct Conversion Receivers in Wide-Band Systems (Hardcover, 2001 ed.): Aarno Parssinen Direct Conversion Receivers in Wide-Band Systems (Hardcover, 2001 ed.)
Aarno Parssinen
R5,273 Discovery Miles 52 730 Ships in 12 - 17 working days

Wide-band systems will be the next significant generation in wireless communications. Those include both wireless local area networks and cellular systems with a large coverage area. They will provide a higher data rate and access to internet and video services, for example. Although most of the data processing is performed digitally, also the requirements and possibilities to implement the analog part of the radio receiver will be different compared to the second-generation narrow-band receivers. Direct conversion architecture is a distinct candidate for wide-band systems because some non-idealities involved in baseband signal processing are significantly relaxed. The requirements and feasibility of direct conversion in wide-band systems are analyzed in this work. The main emphasis is on cellular systems based on direct sequence code division multiple access, but the same principles are generally valid in all receivers for different applications. The basic principles and design methods involved in receiver design are overviewed as well as the most common radio architectures. In a detailed analysis, the fundamental limitations of the direct conversion architecture are analyzed in wide-band signal processing. Especially, the effect of envelope distortion is characterized both with respect to the specific modulation and to the implementation of a downconversion mixer. Downconversion mixer is the key component in direct conversion because it transfers the radio frequency signal immediately down into the baseband after a relatively small gain at the preceding signal processing blocks, which do not provide filtering of the unwanted radio channels within the system band. Both switching mixersand subsampling mixers are analyzed. Direct Conversion Receivers in Wide-Band Systems consists of four different circuit implementations. A subharmonic sampler operating up to 2 GHz is implemented with a GaAs MESFET technology. The second IC is a CMOS low-noise amplifier with an optimized interface to a subsampling mixer. Two BiCMOS implementations of the wide-band direct conversion receiver are given. The first consists of four different chips: RF front-end, analog baseband circuitry and two analog-to-digital converters. In the second chip, all blocks from the low-noise amplifier to the A/D converters are placed on the same die. In that case, an excellent isolation is required between rail-to-rail clock signals and the sensitive RF input.

Network Information Theory (Hardcover, New): Abbas El Gamal, Young-Han Kim Network Information Theory (Hardcover, New)
Abbas El Gamal, Young-Han Kim
R2,564 Discovery Miles 25 640 Ships in 12 - 17 working days

This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless communication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia.

The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover): Yves Caseau The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover)
Yves Caseau
R3,190 Discovery Miles 31 900 Ships in 12 - 17 working days

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.

Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover): Osman Khalid,... Big Data Recommender Systems, Volume 1 - Algorithms, Architectures, Big Data, Security and Trust (Hardcover)
Osman Khalid, Samee U. Khan, Albert Y. Zomaya
R3,608 R3,157 Discovery Miles 31 570 Save R451 (13%) Ships in 10 - 15 working days

First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data to suggest information, products, and services that best match their preferences. In recent decades, we have seen an exponential increase in the volumes of data, which has introduced many new challenges. Divided into two volumes, this comprehensive set covers recent advances, challenges, novel solutions, and applications in big data recommender systems. Volume 1 contains 14 chapters addressing foundations, algorithms and architectures, approaches for big data, and trust and security measures. Volume 2 covers a broad range of application paradigms for recommender systems over 22 chapters.

Global Information Society - Operating Information Systems in a Dynamic Global Business Environment (Hardcover, New): Global Information Society - Operating Information Systems in a Dynamic Global Business Environment (Hardcover, New)
R2,296 Discovery Miles 22 960 Ships in 12 - 17 working days

Global Information Society: Operating Information Systems in a Dynamic Global Business Environment addresses the importance of information technology management and issues in operating information systems in the global dynamic business environment. It embraces discussions of the global information technology theory, frameworks and IT architecture, discovery of global knowledge management, improvement of the global information systems development methodologies, and applications of the latest technologies such as mobile technology and web services in the global information systems development and operations. The book features a collection of new ideas, latest technology applications and experiences in the global information systems development and operations.

Important Concepts in Wimax (Hardcover): Timothy Kolaya Important Concepts in Wimax (Hardcover)
Timothy Kolaya
R1,770 Discovery Miles 17 700 Ships in 12 - 17 working days
IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Hardcover): Sanjiv Purba IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Hardcover)
Sanjiv Purba
R3,220 Discovery Miles 32 200 Ships in 12 - 17 working days

Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.

Fractal Teletraffic Modeling and Delay Bounds in Computer Communications (Hardcover): Ming Li Fractal Teletraffic Modeling and Delay Bounds in Computer Communications (Hardcover)
Ming Li
R1,871 Discovery Miles 18 710 Ships in 12 - 17 working days

* Network traffic is a type of fractal time series, attracting the interests of not only computer scientists but the scientists from various fields, ranging from statistics to engineering * Innovatively presents a traffic bound named by the author * Further proves the existing identity in min-plus convolution system and the computation formula of the identity

IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Paperback): Sanjiv Purba IT Project Health Checks - Driving Successful Implementation and Multiples of Business Value (Paperback)
Sanjiv Purba
R1,387 Discovery Miles 13 870 Ships in 12 - 17 working days

Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.

Mobile Microservices - Building Flexible Pervasive Applications (Hardcover): Nanxi Chen Mobile Microservices - Building Flexible Pervasive Applications (Hardcover)
Nanxi Chen
R1,876 Discovery Miles 18 760 Ships in 12 - 17 working days

In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.

Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D -... Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D - 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1-3, 2019, Proceedings, Part I (Hardcover, 1st ed. 2019)
Petter Nielsen, Honest Christopher Kimaro
R2,970 Discovery Miles 29 700 Ships in 10 - 15 working days

The two volumes IFIP AICT 551 and 552 constitute the refereed proceedings of the 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, held in Dar es Salaam, Tanzania, in May 2019. The 97 revised full papers and 2 short papers presented were carefully reviewed and selected from 185 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: communities, ICT-enabled networks, and development; digital platforms for development; ICT for displaced population and refugees. How it helps? How it hurts?; ICT4D for the indigenous, by the indigenous and of the indigenous; local technical papers; pushing the boundaries - new research methods, theory and philosophy in ICT4D; southern-driven human-computer interaction; sustainable ICT, informatics, education and learning in a turbulent world - "doing the safari way".

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,631 Discovery Miles 56 310
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Handbook of Research on Digital…
Ana Pego Hardcover R8,162 Discovery Miles 81 620
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,808 Discovery Miles 98 080
Exploring the Convergence of Computer…
Ricardo Queiros, Bruno Cunha, … Hardcover R11,190 Discovery Miles 111 900
Edge Networking - Internet of Edges
K Agha Hardcover R3,613 Discovery Miles 36 130
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Security Engineering - A Guide to…
R. Anderson Hardcover R1,280 Discovery Miles 12 800
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners