![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
This volume constitutes the refereed proceedings of the 18th International Conference on Software Process Improvement and Capability Determination, SPICE 2018, held in Tessaloniki, Greece, in October 2018. The 26 full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in the following topical sections: SPI systematic literature reviews; SPI and assessment; SPI methods and reference models; SPI education and management issues; SPI knowledge and change processes; SPI compliance and configuration; SPI and agile; industry short papers.
This book constitutes the proceedings of the Third Latin American Conference on High Performance Computing, CARLA 2016, held in Mexico City, Mexico, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 70 submissions. They are organized in topical sections named: HPC Infrastructure and Applications; Parallel Algorithms and Applications; HPC Applications and Simulations.
The set of papers collected in this issue originated from the AGERE! Workshop series - the last edition was held in 2017 - and concern the application of actor-based approaches to mainstream application domains and the discussion of related issues. The issue is divided into two parts. The first part concerns Web Programming; Data-Intensive Parallel Programming; Mobile Computing; Self-Organizing Systems and the second part concerns Scheduling; Debugging; Communication and Coordination; Monitoring.
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services.
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field.
This volume contains the technical papers presented in the workshops associated with the European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016: 4th International Workshop on Cloud for IoT, CLloT 2016, Second International Workshop on Cloud Adoption and Migration, CloudWays 2016, First International Workshop on Patterns and Pattern Languages for SOCC: Use and Discovery, PATTWORLD 2016, combined with the First International Workshop on Performance and Conformance of Workflow Engines, PEaCE 2016, IFIP WG SOS Workshop 2016 Rethinking Services ResearCH, ReSeRCH 2016. Furthermore, there is a topical section presenting the results of the PhD Symposium. The abstracts of the presentations held at the European Projects Forum, EU Projects 2016, are included in the back-matter of the volume. The 15 full papers included in this volume were carefully reviewed and selected from 49 submissions. They focus on specific topics in service-oriented and cloud computing domains such as limits and/or advantages of existing cloud solutions, future internet technologies, efficient and adaptive deployment and management of service-based applications across multiple clouds, novel cloud service migration practices and solutions, digitization of enterprises in the cloud computing era, federated cloud networking services.
This book constitutes the refereed proceedings of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics, InfQ 2017, held in Venice, Italy, in December 2017. The 11 revised full papers and the one revised short paper presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on networking and mobile applications; applications of quantitative modeling; big data processing and IoT; theory, methods and tools for quantitative analysis.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2018. The 34 full papers presented were carefully reviewed and selected from 86 submissions. They are organized in topical sections on computer networks; teleinformatics and telecommunications; queueing theory; cybersecurity and quality service.
The two volume proceedings of CCIS 698 and 699 constitutes revised selected papers from the 4th International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2016, held in Hong Kong, China, in November 2016. The total of 118 papers presented in these proceedings were carefully reviewed and selected from 311 submissions. The contributions were organized in topical sections named: smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental processes; applications of geo-informatics in resource management and sustainable ecosystem.
The two volume proceedings of CCIS 698 and 699 constitutes revised selected papers from the 4th International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2016, held in Hong Kong, China, in November 2016. The total of 118 papers presented in these proceedings were carefully reviewed and selected from 311 submissions. The contributions were organized in topical sections named: smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental processes; applications of geo-informatics in resource management and sustainable ecosystem.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th Pacific Rim Symposium on Image and Video Technology, PSIVT 2017, held in Wuhan, China, in November 2017.The total of 39 revised papers was carefully reviewed and selected from 91 submissions. The Pacific-Rim Symposium on Image and Video Technology (PSIVT) is a high-quality series of symposia that aim at providing a forum for researchers and practitioners who are being involved, or are contributing to theoretical advances or practical implementations in image and video technology.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016. The 14 revised full papers were carefully reviewed and selected from 18 submissions. The papers are organized thematically in four parts, starting with cloud computing and software defined networking followed by Internet-of-the-things, vehicular networks and novel techniques and algorithms.
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.
This book presents the latest research on the software crowdsourcing approach to develop large and complex software in a cloud-based platform. It develops the fundamental principles, management organization and processes, and a cloud-based infrastructure to support this new software development approach. The book examines a variety of issues in software crowdsourcing processes, including software quality, costs, diversity of solutions, and the competitive nature of crowdsourcing processes. Furthermore, the book outlines a research roadmap of this emerging field, including all the key technology and management issues for the foreseeable future. Crowdsourcing, as demonstrated by Wikipedia and Facebook for online web applications, has shown promising results for a variety of applications, including healthcare, business, gold mining exploration, education, and software development. Software crowdsourcing is emerging as a promising solution to designing, developing and maintaining software. Preliminary software crowdsourcing practices and platforms, including Apple's App Store and TopCoder, demonstrate the advantages of crowdsourcing in terms of software ecosystem expansion and product quality improvement.
This book introduces a new notion of replacement in maintenance and reliability theory. Replacement Overtime, where replacement is done at the first completion of a working cycle over a planned time, is a new research topic in maintenance theory and also serves to provide a fresh optimization technique in reliability engineering. In comparing replacement overtime with standard and random replacement techniques theoretically and numerically, 'Maintenance Overtime Policies in Reliability Theory' highlights the key improvements to be gained by adopting this new approach and shows how they can be applied to inspection policies, parallel systems and cumulative damage models. Utilizing the latest research in replacement overtime by internationally recognized experts, the reader will be introduced to new topics and methods, and learn how to apply this knowledge practically to actual reliability models. This book will serve as an essential guide to a new subject of study for graduate students and researchers and also provides a useful guide for reliability engineers and managers who have difficulties in maintenance of computer and production systems with random working cycles.
In this publication a widespread phenomenon is studied: in many usage scenarios modern complex machines show a significant difference between the maximum sustainable performance available in well specified environments and the average performance many users experience in their everyday interaction with the machine. This performance gap appears to be increasing with technical progress and performance of machines. Although this situation is probably well known to many readers -- and very often not so quietly endured -- it was not studied systematically so far. This publication describes the conceptual background of the performance gap in a very general way. It develops a semi-quantitative description and points to approaches to reduce the performance gap in current and future environments. Process executives, engineers and system analysts will hopefully benefit from this approach especially in the dynamic environments envisioned in initiatives like the German Industrie 4.0. In the technology network Intelligent Technical Systems OstWestfalenLippe (short: it's OWL) around 200 companies, universities, research institutions and organisations have joined forces to jointly shape the innovative leap from mechatronics to intelligent technical systems. Together they develop approaches and technologies for intelligent products and production processes, smart services and the working world of the future. The spectrum ranges from automation and drive solutions to machines, vehicles, automats and household appliances to networked production plants and platforms. This creates a unique technology platform that enables companies to increase the reliability, resource efficiency and user-friendliness of their products and production systems and tap the potential of digital transformation.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible pipelines, and a scalable build/test infrastructure. Pro Continuous Delivery demonstrates how to create a highly available, active/passive Jenkins server using some niche technologies. What You'll Learn Create a highly available, active/passive Jenkins server using CoreOS and Docker, and using Pacemaker and Corosync Use a Jenkins multi-branch pipeline to automatically perform continuous integration whenever there is a new branch in your source control system Describe your continuous delivery pipeline with Jenkinsfile Host Jenkins server on a cloud solution Run Jenkins inside a container using Docker Discover how the distributed nature of Git and the "merge before build" feature of Jenkins can be used to implement gated check-in Implement a scalable build farm using Docker and Kubernetes Who This Book Is For You have experience implementing continuous integration and continuous delivery using Jenkins freestyle Jobs and wish to use the new Pipeline as a Code feature introduced in Jenkins 2.0 Your source code is on a Git-like version control system (Git, GitHub, GitLab, etc.) and you wish to leverage the advantages of a multi-branch pipeline in Jenkins Your infrastructure is on a Unix-like platform and you wish to create a scalable, distributed build/test farm using Docker or Kubernetes You are in need of a highly available system for your Jenkins Server using open source tools and technologies
"Do you want to learn more about software telemetry? Don't look any further, this book is the one you need." - Sander Zegveld Software telemetry is the discipline of tracing, logging, and monitoring infrastructure by observing and analyzing the events generated by the system. In Software Telemetry, you'll master the best practices for operating and updating telemetry systems. This practical guide is filled with techniques you can apply to any organization upgrading and optimizing their telemetry systems, from lean startups to well-established companies. You'll learn troubleshooting techniques to deal with every eventuality, such as building easily-auditable systems, preventing and handling accidental data leaks, and ensuring compliance with standards like GDPR. about the technology Complex systems can become black boxes. Telemetry provides feedback on what's happening inside. Telemetry systems are built for gathering, transforming, and communicating data on the performance, functionality, processing speeds, errors, and security events of production systems. There are many forms of telemetry systems, from classic centralized logging to cutting-edge distributed tracing that follows data across microservices. But despite their difference in functionality, all telemetry systems share core operational similarities-and best practices for optimizing them to support your business needs. about the book Software Telemetry is a guide to operating the telemetry systems that monitor and report on your applications. It takes a big picture view of telemetry, teaching you to manage your logging, metrics, and events as a complete end-to-end ecosystem. You'll learn the base architecture that underpins any software telemetry system, allowing you to easily integrate new systems into your existing infrastructure, and how these systems work under the hood. Throughout, you'll follow three very different companies to see how telemetry techniques impact a software-producing startup, a large legacy enterprise, and any organization that writes software for internal use. You'll even cover how software telemetry is used by court processes-ensuring that when your first telemetry discovery request arrives, there's no reason to panic! what's inside - Processes for legal compliance - Cleaning up after toxic data spills and leaks - Safely handling toxic telemetry and confidential records - Multi-tenant techniques and transformation processes - Updating metrics aggregation and sampling traces to display accurate data for longer - Revising software telemetry emissions to be easier to parse - Justifying increased spend on telemetry software about the reader For software developers and infrastructure engineers supporting and building telemetry systems. about the author Jamie Riedesel is a staff engineer at Dropbox. She has over twenty years of experience in IT, working in government, education, legacy companies, and startups. She has specialized in DevOps for the past decade, running distributed systems in public clouds, getting over workplace trauma, and designing software telemetry architectures.
Explore key scenarios required for building quality Ionic apps quickly and easily and bring them to the iOS and Android mobile ecosystem. Learn Ionic 2 explains various techniques to quickly integrate third-party back end systems. With this short guide, you'll benefit from practical examples of implementing authentication and authorization, connecting to social media, integrating with payment gateway, and analytics integration. This book presents solutions to the challenges faced during the development process of these tasks. Validation is essential to the survival and eventual success of any startup. You validate your business idea by placing a product in the hands of your customers and getting them to interact with it. The Ionic framework makes this possible. What You'll Learn: Master end-to-end hybrid application development Create user management modules including signup, login, and forgotten passwords Use analytics to evaluate an application using Ionic Framework Who This Book Is For: Tech entrepreneurs and businessmen with ideas
This book describes the use of free air cooling to improve the efficiency of, and cooling of, equipment for use in telecom infrastructures. Discussed at length is the cooling of communication installation rooms such as data centers or base stations, and this is intended as a valuable tool for the people designing and manufacturing key parts of communication networks. This book provides an introduction to current cooling methods used for energy reduction, and also compares present cooling methods in use in the field. The qualification methods and standard reliability assessments are reviewed, and their inability to assess the risks of free air cooling is discussed. The method of identifying the risks associated with free air cooling on equipment performance and reliability is introduced. A novel method of assessment for free air cooling is also proposed that utilizes prognostics and health management (PHM). This book also: Describes how the implementation of free air cooling can save energy for cooling within the telecommunications infrastructure. Analyzes the potential risks and failures of mechanisms possible in the implementation of free air cooling, which benefits manufacturers and equipment designers. Presents prognostics-based assessments to identify and mitigate the risks of telecommunications equipment under free air cooling conditions, which can provide the early warning of equipment failures at operation stage without disturbing the data centers' service. Optimum Cooling for Data Centers is an ideal book for researchers and engineers interested in designing and manufacturing equipment for use in telecom infrastructures.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc. Topics and features: presents a thorough introduction to DataFlow supercomputing for big data problems; reviews the latest research on the DataFlow architecture and its applications; introduces a new method for the rapid handling of real-world challenges involving large datasets; provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine; includes a step-by-step guide to the web-based integrated development environment WebIDE. |
You may like...
Critical Care Neurology Part I, Volume…
Eelco F.M. Wijdicks, Andreas H. Kramer
Hardcover
Digital Approaches to Inclusion and…
Danilo Giglitto, Luigina Ciolfi, …
Hardcover
R3,638
Discovery Miles 36 380
Advances in Respiratory Care of the…
Judy L. Aschner, Richard A. Polin
Hardcover
R1,683
Discovery Miles 16 830
Handbook of Research on Distributed…
Athina A. Lazakidou, Konstantinos M. Siassiakos
Hardcover
R8,156
Discovery Miles 81 560
Intellectual Property and Assessing its…
Benedikt Sas, Stanislas De Vocht, …
Hardcover
R1,454
Discovery Miles 14 540
|