|
|
Books > Computing & IT > Computer software packages > Other software packages
"Enterprise Applications Administration" prepares you for the full
breadth of work associated with administering large enterprise
applications. This book provides essential information on tasks
such as operating systems administration, network design, system
architecture, project planning, working within a team, protecting
the network, and how to keep applications up and running. The book
effectively bridges the gap between what is taught in the
technology-specific literature and the real world of enterprise
application administrators.
Provides a general understanding of all key knowledge areas needed
by enterprise application administratorsBridges the gap between
technology-specific literature and the actual work being performed
by enterprise application administratorsShows how to define and
standardize processes and documentation to make enterprise
application administration easier and more consistent
Throughout the past decade, the notion of ontologies has influenced
research in many application areas including databases, information
retrieval, electronic commerce, natural language processing,
knowledge management, enterprise systems, systems analysis and
design, the Web, and more.Ontology-Based Applications for
Enterprise Systems and Knowledge Management provides an opportunity
for readers to clearly understand the notion of ontology
engineering and the practical aspects of this approach in the
domains of two interest areas: Knowledge Management Systems and
Enterprise Systems. A perfect reference for researchers, scholars,
postgraduate students, and practitioners, this book aims to gather
the recent advances and research findings of various topics in
ontology use for these application areas.
Modeling techniques provide ample opportunities for progress across
numerous fields. When analyzing complex systems, new methods allow
for a deeper understanding of system dynamics. Method of Systems
Potential (MSP) Applications in Economics: Emerging Research and
Opportunities is an innovative source of academic research that
examines the Method of Systems Potential for complex systems
analysis in economical contexts. Highlighting critical perspectives
on topics such as system efficiency, adaptive algorithms, and
variable parameters, this book is ideally designed for researchers,
academics, graduate students, and practitioners interested in the
latest uses and applications of modeling techniques.
"Managing Data in Motion" describes techniques that have been
developed for significantly reducing the complexity of managing
system interfaces and enabling scalable architectures. Author April
Reeve brings over two decades of experience to present a
vendor-neutral approach to moving data between computing
environments and systems. Readers will learn the techniques,
technologies, and best practices for managing the passage of data
between computer systems and integrating disparate data together in
an enterprise environment.
The average enterprise's computing environment is comprised of
hundreds to thousands computer systems that have been built,
purchased, and acquired over time. The data from these various
systems needs to be integrated for reporting and analysis, shared
for business transaction processing, and converted from one format
to another when old systems are replaced and new systems are
acquired.
The management of the "data in motion" in organizations is
rapidly becoming one of the biggest concerns for business and IT
management. Data warehousing and conversion, real-time data
integration, and cloud and "big data" applications are just a few
of the challenges facing organizations and businesses today.
"Managing Data in Motion" tackles these and other topics in a style
easily understood by business and IT managers as well as
programmers and architects.
Presents a vendor-neutral overview of the different technologies
and techniques for moving data between computer systems including
the emerging solutions for unstructured as well as structured data
typesExplains, in non-technical terms, the architecture and
components required to perform data integration Describes how to
reduce the complexity of managing system interfaces and enable a
scalable data architecture that can handle the dimensions of "Big
Data"
Being able to fit design into the Agile software development
processes is an important skill in today s market. There are many
ways for a UX team to succeed (and fail) at being Agile. This book
provides you with the tools you need to determine what Agile UX
means for you. It includes practical examples and case studies, as
well as real-life factors to consider while navigating the Agile UX
waters. You ll learn about what contributes to your team s success,
and which factors to consider when determining the best path for
getting there. After reading this book, you ll have the knowledge
to improve your software and product development with Agile
processes quickly and easily.
Includes hands on, real-world examples to illustrate the successes
and common pitfalls of Agile UX
Introduces practical techniques that can be used on your next
project
Details how to incorporate user experience design into your
company's agile software/product process"
In information technology, the concepts of cost, time, delivery,
space, quality, durability, and price have gained greater
importance in solving managerial decision-making problems in supply
chain models, transportation problems, and inventory control
problems. Moreover, competition is becoming tougher in imprecise
environments. Neutrosophic sets and logic are gaining significant
attention in solving real-life problems that involve uncertainty,
impreciseness, vagueness, incompleteness, inconsistency, and
indeterminacy. Neutrosophic Sets in Decision Analysis and
Operations Research is a critical, scholarly publication that
examines various aspects of organizational research through
mathematical equations and algorithms and presents neutrosophic
theories and their applications in various optimization fields.
Featuring a wide range of topics such as information retrieval,
decision making, and matrices, this book is ideal for engineers,
technicians, designers, mathematicians, practitioners of
mathematics in economy and technology, scientists, academicians,
professionals, managers, researchers, and students.
Learn how to design and develop robotic process automation
solutions with Blue Prism to perform important tasks that enable
value creation in your work Key Features Develop robots with Blue
Prism Automate your work processes with Blue Prism Learn basic
skills required to train a robot for process automation Book
DescriptionRobotic process automation is a form of business process
automation where user-configured robots can emulate the actions of
users. Blue Prism is a pioneer of robotic process automation
software, and this book gives you a solid foundation to programming
robots with Blue Prism. If you've been tasked with automating work
processes, but don't know where to start, this is the book for you!
You begin with the business case for robotic process automation,
and then move to implementation techniques with the leading
software for enterprise automation, Blue Prism. You will become
familiar with the Blue Prism Studio by creating your first process.
You will build upon this by adding pages, data items, blocks,
collections, and loops. You will build more complex processes by
learning about actions, decisions, choices, and calculations. You
will move on to teach your robot to interact with applications such
as Internet Explorer. This can be used for spying elements that
identify what your robot needs to interact with on the screen. You
will build the logic behind a business objects by using read,
write, and wait stages. You will then enable your robot to read and
write to Excel and CSV files. This will finally lead you to train
your robot to read and send emails in Outlook. You will learn about
the Control Room, where you will practice adding items to a queue,
processing the items and updating the work status. Towards the end
of this book you will also teach your robot to handle errors and
deal with exceptions. The book concludes with tips and coding best
practices for Blue Prism. What you will learn Learn why and when to
introduce robotic automation into your business processes Work with
Blue Prism Studio Create automation processes in Blue Prism Make
use of decisions and choices in your robots Use UI Automation mode,
HTML mode, Region mode, and spying Learn how to raise exceptions
Get the robot to deal with errors Learn Blue Prism coding best
practices Who this book is forThe book is aimed at end users such
as citizen developers who create business processes, but may not
have the basic programming skills required to train a robot. No
experience of BluePrism is required.
Kansei Engineering and Soft Computing: Theory and Practice offers
readers a comprehensive review of kansei engineering, soft
computing techniques, and the fusion of these two fields from a
variety of viewpoints. It explores traditional technologies, as
well as solutions to real-world problems through the concept of
kansei and the effective utilization of soft computing techniques.
This publication is an essential read for professionals,
researchers, and students in the field of kansei information
processing and soft computing providing both theoretical and
practical viewpoints of research in humanized technology.
Free/Open Source Enterprise Resource Planning systems (FOS-ERP) are
gaining popularity and acceptance due to two main factors: their
lack of licensing fees and customizability. Given this,
organizations are able to easily adopt and manipulate these systems
to meet their individual needs. Free and Open Source Enterprise
Resource Planning: Systems and Strategies unites research on
FOS-ERP, comparing differences with proprietary Enterprise Resource
Planning products, and demonstrating key research factors. It
includes cases demonstrating how small enterprises have benefited
from FOS-ERP in Spain and in Belgium, along with difficulties
encountered and solutions developed. This essential reference
addresses key issues such as security and legal risks, as well as
challenges, opportunities, and barriers to adoption.
Linear Algebra: An Introduction With Mathematica uses a
matrix-based presentation and covers the standard topics any
mathematician will need to understand linear algebra while using
Mathematica. Development of analytical and computational skills is
emphasized, and worked examples provide step-by-step methods for
solving basic problems using Mathematica. The subject's rich
pertinence to problem solving across disciplines is illustrated
with applications in engineering, the natural sciences, computer
animation, and statistics.
This book provides a full representation of Inverse Synthetic
Aperture Radar (ISAR) imagery, which is a popular and important
radar signal processing tool. The book covers all possible aspects
of ISAR imaging. The book offers a fair amount of signal processing
techniques and radar basics before introducing the inverse problem
of ISAR and the forward problem of Synthetic Aperture Radar (SAR).
Important concepts of SAR such as resolution, pulse compression and
image formation are given together with associated MATLAB codes.
After providing the fundamentals for ISAR imaging, the book
gives the detailed imaging procedures for ISAR imaging with
associated MATLAB functions and codes. To enhance the image quality
in ISAR imaging, several imaging tricks and fine-tuning procedures
such as zero-padding and windowing are also presented. Finally,
various real applications of ISAR imagery, like imaging the
antenna-platform scattering, are given in a separate chapter. For
all these algorithms, MATLAB codes and figures are included. The
final chapter considers advanced concepts and trends in ISAR
imaging.
Throughout the world, high-profile large organizations (aerospace
and defense, automotive, banking, chemicals, financial service
providers, healthcare, high tech, insurance, oil and gas,
pharmaceuticals, retail, telecommunications, and utilities) and
governments are using SAP software to process their most
mission-critical, highly sensitive data. With more than 100,000
installations, SAP is the world's largest enterprise software
company and the world's third largest independent software supplier
overall.
Despite this widespread use, there have been very few books written
on SAP implementation and security, despite a great deal of
interest. (There are 220,000 members in an on-line SAP 'community'
seeking information, ideas and tools on the IT Toolbox Website
alone.) Managing SAP user authentication and authorizations is
becoming more complex than ever, as there are more and more SAP
products involved that have very different access issues. It's a
complex area that requires focused expertise.
This book is designed for these network and systems administrator
who deal with the complexity of having to make judgmental decisions
regarding enormously complicated and technical data in the SAP
landscape, as well as pay attention to new compliance rules and
security regulations.
Most SAP users experience significant challenges when trying to
manage and mitigate the risks in existing or new security solutions
and usually end up facing repetitive, expensive re-work and
perpetuated compliance challenges. This book is designed to help
them properly and efficiently manage these challenges on an ongoing
basis. It aims to remove the 'Black Box' mystique that surrounds
SAP security.
* The most comprehensive coverage of the essentials of SAP security
currently available: risk and control management, identity and
access management, data protection and privacy, corporate
governance, legal and regulatory compliance.
* This book contains information about SAP security that is not
available anywhere else to help the reader avoid the "gotchas" that
may leave them vulnerable during times of upgrade or other system
changes
*Companion Web site provides custom SAP scripts, which readers can
download to install, configure and troubleshoot SAP.
|
|