![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book constitutes the refereed proceedings of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics, InfQ 2017, held in Venice, Italy, in December 2017. The 11 revised full papers and the one revised short paper presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on networking and mobile applications; applications of quantitative modeling; big data processing and IoT; theory, methods and tools for quantitative analysis.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
This book constitutes the proceedings of the 16th International Conference on Information Technologies and Mathematical Modelling, ITMM 2017, held in Kazan, Russia, in September/October 2017. The 31 papers presented in this volume were carefully reviewed and selected from 85 submissions. The conference covers various aspects of mathematical modeling and information technologies, focusing on probabilistic methods and models, queueing theory and communication networks.
This book constitutes the refereed proceedings of the 11th International Conference on Parallel Computational Technologies, PCT 2017, held in Kazan, Russia, in April 2017. The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
This book constitutes the proceedings of the 15th Asian Symposium on Programming Languages and Systems, APLAS 2017, held in Suzhou, China, in November 2017. The 24 papers presented in this volume were carefully reviewed and selected from 56 submissions. They were organized in topical sections named: security; heap and equivalence reasoning; concurrency and verification; domain-specific languages; semantics; and numerical reasoning. The volume also contains two invited talks in full-paper length.
This book investigates the problem of reducing operating cost for a video streaming content delivery network (CDN), including both the CDN's energy and traffic costs. It first introduces the key issues and design choices of representative real-world CDNs, and discusses the energy saving techniques for data centers and CDNs. Then, based on a measurement study on a large video streaming CDN, it reveals an inherent conflict between improving a video streaming CDN's energy efficiency for energy saving, and maintaining the CDN's ISP-friendly server selection policy. Further, it discusses a cost-aware capacity provisioning algorithm that not only allows the service capacity of a CDN's server clusters in numerous ISPs to be dynamically planned, but also means that the overall operating cost, including both the energy consumptions and the cross-ISP traffics, can be further optimized. In addition it uses the workload derived from real-world measurement and also implements real values of the actual power and bandwidth prices to evaluate the capacity provisioning algorithm, showing that it can significantly reduce the overall operating cost of a video streaming CDN, and effectively avoid frequent server switches. Lastly, the book outlines a number of potential research directions regarding cost-aware content delivery. The measurement, analysis, and optimization methodologies and results presented in this book are of particular interest to researchers in the Internet and networking area.
This book provides an overview of the resources and research projects that are bringing Big Data and High Performance Computing (HPC) on converging tracks. It demystifies Big Data and HPC for the reader by covering the primary resources, middleware, applications, and tools that enable the usage of HPC platforms for Big Data management and processing.Through interesting use-cases from traditional and non-traditional HPC domains, the book highlights the most critical challenges related to Big Data processing and management, and shows ways to mitigate them using HPC resources. Unlike most books on Big Data, it covers a variety of alternatives to Hadoop, and explains the differences between HPC platforms and Hadoop.Written by professionals and researchers in a range of departments and fields, this book is designed for anyone studying Big Data and its future directions. Those studying HPC will also find the content valuable.
Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance, and evolution of these architectures. Software and Systems Architecture in Action explores practices that can be helpful in the development of architectures of large-scale systems in which software is a major component. Examining the synergies that exist between the disciplines of software and systems engineering, it presents concepts, techniques, and methods for creating and documenting architectures. The book describes an approach to architecture design that is driven from systemic quality attributes determined from both the business and technical goals of the system, rather than just its functional requirements. This architecture-centric design approach utilizes analytically derived patterns and tactics for quality attributes that inform the architect's design choices and help shape the architecture of a given system. The book includes coverage of techniques used to assess the impact of architecture-centric design on the structural complexity of a system. After reading the book, you will understand how to create architectures of systems and assess their ability to meet the business goals of your organization. Ideal for anyone involved with large and complex software-intensive systems, the book details powerful methods for engaging the software and systems engineers on your team. The book is also suitable for use in undergraduate and graduate-level courses on software and systems architecture as it exposes students to the concepts and techniques used to create and manage architectures of software-intensive systems.
This book constitutes the refereed proceedings of the 17th International Conference on Software Process Improvement and Capability Determination, SPICE 2017, held in Palma de Mallorca, Spain, in October 2017.The 34 full papers presented together with 4 short papers were carefully reviewed and selected from 65 submissions. The papers are organized in the following topical sections: SPI in agile approaches; SPI in small settings; SPI and assessment; SPI and models; SPI and functional safety; SPI in various settings; SPI and gamification; SPI case studies; strategic and knowledge issues in SPI; education issues in SPI.
This book constitutes the proceedings of the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in malaga, Spain, in November 2017. The 33 full papers presented together with 20 short papers and 4 keynotes in this volume were carefully reviewed and selected from 179 submissions. The selected papers cover a wide variety of important topics in the area of service-oriented computing, including foundational issues on service discovery and service-systems design, business process modelling and management, economics of service-systems engineering, as well as services on the cloud, social networks, the Internet of Things (IoT), and data analytics. The chapter "Risk-based Proactive Process Adaptation" is available open access under a CC BY 4.0 license via link.springer.com.
This volume constitutes the refereed proceedings of the 24th EuroSPI conference, held in Ostrava, Czech Republic, in September 2017.The 56 revised full papers presented were carefully reviewed and selected from 97 submissions. They are organized in topical sections on SPI and VSEs, SPI and process models, SPI and safety, SPI and project management, SPI and implementation, SPI issues, SPI and automotive, selected key notes and workshop papers, GamifySPI, SPI in Industry 4.0, best practices in implementing traceability, good and bad practices in improvement, safety and security, experiences with agile and lean, standards and assessment models, team skills and diversity strategies.
This is a primer on the development process for embedded systems designed to teach the specialised aspects of writing software in this enviroment that are not covered in standard coursework for software developers and electrical engineers. It traces the software and hardware methodologies and the intergration of the two disciplines in the lifecycle. The guide details the steps necessary for designing and producing embedded systems and discusses the key methods and technologies for each phase of the process: specification, partition, design, integration, validation, release, maintenance and upgrade.
This book constitutes the tutorial lectures of the 6th European Business Intelligence and Big Data Summer School, eBISS 2016, held in Tours, France, in July 2016. Tutorials were given by renowned experts and covered recent and various aspects of Business Intelligence and Big Data processing, including analytics on graph data, machine translation, pattern mining, scalability, and energy consumption. This volume contains the corresponding lecture notes of the summer school.
This book offers a systematic and practical overview of Quality of Service prediction in cloud and service computing. Intended to thoroughly prepare the reader for research in cloud performance, the book first identifies common problems in QoS prediction and proposes three QoS prediction models to address them. Then it demonstrates the benefits of QoS prediction in two QoS-aware research areas. Lastly, it collects large-scale real-world temporal QoS data and publicly releases the datasets, making it a valuable resource for the research community. The book will appeal to professionals involved in cloud computing and graduate students working on QoS-related problems.
This book constitutes the refereed conference proceedings of the 12th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2016, held in Seoul, South Korea, in July 2016. The 27 full papers, 5 short papers and 18 workshop papers were selected from 85 submissions. The papers are organized thematically in tracks, starting with network security, followed by QoS, reliability and modeling, wireless and mobile networks. In addition the papers of two workshops are included: International Workshop on 5G Communication Architecture and Technology (5G-CAT 2016), and the 2nd International Workshop on Sensor Networks and Cloud Computing (SNCC 2016).
This book constitutes the refereed proceedings of the 10th International Conference on Model Transformation, ICMT 2017, held as part of STAF 2017, in Marburg, Germany, in July 2017. The 9 full papers and 2 short papers were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: transformation paradigms, languages, algorithms and strategies; development of transformations; and applications and case studies.
Master build and release management with Team Foundation Service and Visual Studio Team Services to facilitate the continuous delivery of software updates to your development team. You'll receive detailed, practical guidance on automating website deployments in Azure App Service, database deployments to Azure platform, Micro Services deployments in Azure Service Fabric, and more. Each deployment is structured with the aid of hands-on lessons in a given target environment designed to empower your teams to achieve successful DevOps. This book provides lessons on how to optimize build release management definitions using capabilities, such as task groups. With the help of practical scenarios, you'll also learn how to diagnose and fix issues in automated builds and deployments. You'll see how to enhance the capability of build and release management, using team services/TFS Marketplace extensions and writing your own extensions for any missing functionality via hands-on lessons. What You Will Learn Automate deployment to Azure platform, including Web App Service, Azure SQL and Azure Service Fabric Test automation integration with builds and deployments Perform Dynamic CRM deployment handling and package management with TFS/VSTS Examine requirement to production delivery traceability in practical terms Review cross platform build/deployment capabilities of TFS/VSTS. Who This Book Is For Build/Release Engineers, Configuration Managers, Software Developers, Test Automation Engineers, System Engineers, Software Architects and System/Production Support Engineers or anyone who handles and involves in the software delivery process.
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible pipelines, and a scalable build/test infrastructure. Pro Continuous Delivery demonstrates how to create a highly available, active/passive Jenkins server using some niche technologies. What You'll Learn Create a highly available, active/passive Jenkins server using CoreOS and Docker, and using Pacemaker and Corosync Use a Jenkins multi-branch pipeline to automatically perform continuous integration whenever there is a new branch in your source control system Describe your continuous delivery pipeline with Jenkinsfile Host Jenkins server on a cloud solution Run Jenkins inside a container using Docker Discover how the distributed nature of Git and the "merge before build" feature of Jenkins can be used to implement gated check-in Implement a scalable build farm using Docker and Kubernetes Who This Book Is For You have experience implementing continuous integration and continuous delivery using Jenkins freestyle Jobs and wish to use the new Pipeline as a Code feature introduced in Jenkins 2.0 Your source code is on a Git-like version control system (Git, GitHub, GitLab, etc.) and you wish to leverage the advantages of a multi-branch pipeline in Jenkins Your infrastructure is on a Unix-like platform and you wish to create a scalable, distributed build/test farm using Docker or Kubernetes You are in need of a highly available system for your Jenkins Server using open source tools and technologies
This book constitutes the proceedings of the Third Latin American Conference on High Performance Computing, CARLA 2016, held in Mexico City, Mexico, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 70 submissions. They are organized in topical sections named: HPC Infrastructure and Applications; Parallel Algorithms and Applications; HPC Applications and Simulations.
Use this comprehensive guide to study for the Oracle WebLogic Server 12c Administration I Exam 1Z0-133. This book is a unique introductory resource to the WebLogic Server certification for new Oracle Fusion Middleware administrators and a valuable resource for veteran WebLogic Server administrators seeking to update their skills for the 12c certification topics. It is common sense that passing a certification exam requires a good command of the subject matter, understanding the intricacies surrounding its practice, and having sufficient experience working with the concepts. This book aims to accelerate the process by providing an accurate review of all exam topics, suggesting hands-on practices to gain or reinforce experience working with WebLogic Server, and introducing questions to help candidates become familiar with the format and style of questions found on the actual certification exam. Oracle WebLogic Server 12c Administration I Exam 1Z0-133 covers the associate level certification with Oracle. Although not dedicated to exam 1Z0-599, the guide is also a valuable foundational resource for those preparing for WebLogic Server 12c implementation specialist level certification. This book: Inspects the certification topics in the order that you would likely follow in an on-the-job middleware infrastructure project Is a great resource for candidates preparing for the certification, who are unable to start with live or personally-assisted training Is a great starting point for those pursuing advanced Oracle WebLogic Server certifications What You'll Learn Cover all topics on the certification exam 1Z0-133 Become familiar with the types and format of questions on the certification exam Understand and properly describe Oracle WebLogic Server domains and clusters Install, configure, maintain, and monitor Oracle WebLogic Server Deploy and manage applications on Oracle WebLogic Server Discover how to use new administration features of Oracle WebLogic Server 12c Who This Book Is For Certified Oracle WebLogic administrators seeking to update their Oracle WebLogic Server credentials, as well as experienced WebLogic Server administrators seeking to earn certification for the first time. Non-Oracle administrators seeking to earn a WebLogic Server certification will also find this book useful.
This book constitutes the thoroughly refereed proceedings of the 24th International Conference on Computer Networks, CN 2017, held in Brunow, Poland, in June 2017. The 35 full papers presented were carefully reviewed and selected from 80 submissions. They are dealing with the topics computer networks; teleinformatics and telecommunications; new technologies; queueing theory; innovative applications.
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field. |
![]() ![]() You may like...
5 Days in May - The Coalition and Beyond
Andrew Adonis
Hardcover
![]()
Cardio-Obstetrics - A Practical Guide to…
Afshan B. Hameed, Diana S. Wolfe
Paperback
R2,218
Discovery Miles 22 180
Combinatorial and Additive Number Theory…
Melvyn B Nathanson
Hardcover
R6,073
Discovery Miles 60 730
Neonatal Simulation - A Practical Guide
Lamia M. Soghier, Beverley Robin
Paperback
R2,910
Discovery Miles 29 100
Symmetries and Applications of…
Albert C.J. Luo, Rafail K. Gazizov
Hardcover
R3,643
Discovery Miles 36 430
|