![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace. Processes serve as a coordination mechanism, and the aim of business process management is to improve the organization's effectiveness and efficiency in adapting to change, and maintaining competitive advantage. In Business Process Management, Kumar argues for the value of looking at businesses as a collection of processes that cut across departments, and for breaking down functional silos. The book provides an overview of the basic concepts in this field before moving on to more advanced topics such as process verification, flexible processes, process security and evaluation, resource assignment, and social networks. One chapter of the book is also devoted to process analytics. The book concludes with an examination of the future directions of the discipline. Blending a strong grounding in current research with a focus on concepts and tools, Business Process Management is an accessible textbook full of practical examples and cases that will appeal to upper level students.
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.
This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with the head office to make the offshore team an extension of the head office. While integrating teams with the head office, offshore center managers can still retain independence and authority to meet team aspirations. The book provides insight into devising new organizational structures to balance the authority and responsibilities of offshore center and head office managers. Head office managers responsible for managing globally distributed projects learn how to achieve a higher success rate on their projects and be better rewarded for their efforts in offshoring. Head office managers also learn techniques to make more significant contributions in their expatriate assignments to the offshore center. This book guides both the offshore center managers and the head office managers to fully realize the potential of the offshore center, which can result in higher revenues and profitability.
This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.
Nowadays software engineers not only have to worry about the technical knowledge needed to do their job, but they are increasingly having to know about the legal, professional and commercial context in which they must work. With the explosion of the Internet and major changes to the field with the introduction of the new Data Protection Act and the legal status of software engineers, it is now essential that they have an appreciation of a wide variety of issues outside the technical. Equally valuable to both students and practitioners, it brings together the expertise and experience of leading academics in software engineering, law, industrial relations, and health and safety, explaining the central principles and issues in each field and shows how they apply to software engineering.
A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.
Transaction Management Support for Cooperative Applications integrates Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies by first presenting a rigorous analysis of requirements presented by diverse classes of cooperative applications, ranging from cooperative authoring, through design for manufacturing, to interorganizational workflows, and then goes on to introduce a language that is suitable for the specification of cooperative activities. This language is based on a formal model and provides a collection of tools that allow the users to reason about the correctness of specifications, rather than relying on mechanisms that detect possible violations at run-time. The transaction model introduced in this monograph combines the use of private work spaces that allow individual participants to work independently, with synchronization mechanisms that allow them to combine their work to form a coherent whole. Finally, this monograph shows how the new transactional concepts developed in the project can be mapped into the transaction manager of an object-oriented database management system to provide a clean and efficient implementation. Transaction Management Support for Cooperative Applications summarizes the state of the art of key technologies in cooperative activities and transactions. This book will be extremely useful to students, researchers, and technology developers in the areas of Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies, and is suitable as a text or reference for a graduate-level course on Database Systems or ComputerSupported Cooperative Work.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses. With pioneering editors and expert contributors, Advanced Geoinformation Science explores how certain technical aspects of geoinformation have been used and could be used to address such global issues. The editors and chapter authors have been involved in global initiatives such as Global Earth Observation System of Systems (GEOSS) and Digital Earth, and research problems such as air quality, public health, and cloud computing. The book delineates the problems communities are likely to face and how advanced geoinformation science can be a part of their solution. It introduces different methods in collecting spatial data as the initial feeds to geoinformation science and computing platforms. It discusses systems for data management, data integration and analysis, the geoinformation infrastructure, as well as knowledge capture, formatting, and utilization. The book then explores a variety of geoinformation applications, highlighting environmental, agriculture, and urban planning uses. Geoinformation science encompasses more than just traditional technologies such as Remote Sensing, GIS, GPS, and supporting disciplines. And although the science continues to become more multidisciplinary, the literature remains compartmentalized according to the traditional disciplinary boundaries. Capturing recent developments in geoinformation science and linking IT with a wide range of Earth sciences, the authors explain how advanced technology and concepts play a significant role in recent advancements. Enhanced with forty-four color illustrations, live examples such as GOS and AirNow, and insights from NASA, EPA, and USGS, the book provides a vision for the future and explores how to bring that vision into reality.
The primary cause of many project failures is that responsible executives, because of their lack of knowledge in project management, fail to demand that their managers and staff properly utilize the well-proven best practices, processes, systems, and tools that are now available in this field. This book remedies this situation by providing executives at all levels with the understanding and knowledge needed to best take advantage of the power of effective project management and thereby lead and manage innovations within their enterprise. In Leading and Managing Innovation: What Every Executive Team Must Know about Project, Program, and Portfolio Management, Second Edition, the authors present concise descriptions of The key concepts underlying project and program management The important characteristics of projects and programs How projects and programs are best governed and managed How to determine if the desired benefits have actually been achieved The book presents a list of 31 reasonable demands that executives can and must place on their staff members to ensure excellence in the way their programs and projects are created, selected for funding, planned, and executed. Placing these demands communicates to the entire enterprise that top management understands what it takes to achieve the best performance possible and fully supports the continuous improvement needed to ensure continued success. Leading and Managing Innovation explains how to measure the project management maturity level of an enterprise, benchmark against competitors, and identify where project management improvements are required. It discusses the many ways that an enterprise can derive substantial success and competitive advantage from increasing its project management maturity level. A helpful quick reference summary of all of the book's key information is included in the final chapter. Ar
This book highlights all aspects of laboratory informatics, with a focus on information management and the corresponding hardware and technical processes involved. In addition to a comprehensive introduction on laboratory informatics, the book emphasizes the importance of information and resource management as opposed to simply covering the role of computers that support the information system. As a Professor of Pathology and the Director of Laboratory Information Services at the University of Texas Medical Branch at Galveston, Dr. Cowan has witnessed the shift in focus in the laboratory from the information generation to information management, and increasing resource limitations demand a higher level of management precision than can be gained from manual methods. The American Board of Pathology now requires an increasing sophistication in information management from candidates for certification. Thus, this book is intended for pathologists and residents in pathology, clinical laboratory scientists, and laboratory and information managers. Following the broad-based introduction on laboratory informatics, the book's topics include: computer basics; development and validation of the laboratory information system; computer networks; security and confidentiality on computer systems and networks; total cost of ownership; essential software; interfaces; process modeling; artificial intelligence and expert systems; bar coding in the laboratory; image analysis and computer-assisted quantitation; and telepathology.
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today's information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.
Close collaboration across agencies and international borders is mandatory for public health officials. A powerful tool for sharing knowledge, knowledge management (KM) can help public health professionals quickly collaborate and disseminate knowledge for solving public health issues worldwide. The latest initiatives for reforming healthcare have put the spotlight on the need for maximizing resources. In addition to providing a platform for sharing knowledge, KM can help healthcare professionals do more with less. One tool, two problems solved. Yet the sharing of knowledge and KM continues to be a major challenge in the public health field. Knowledge Management in Public Health provides a general introduction to KM and social networking in the public health arena. The book begins with coverage of basic principles, components, and methodologies as well as trends and key issues in public health. It includes ten case studies illustrating applications of KM and social networking in public health. The chapters are written by leading individuals from organizations involved in applying KM in public health worldwide. The editors and chapter authors explore the many elements of KM, delineating how and why to start such an initiative. They provide specific examples of the development and value-added benefits of KM in a variety of public health environments. Tough or quick decision making has always benefitted enormously from knowledge based on the maximum amount of pertinent information available at the time-this has not changed. What is new in the present public health environment is the need to do this more often, with fewer personnel available, and increased expectations relative to the services expected by the public. Better use of information under a KM system is well suited to serve that purpose. This book explores the many ways to use KM to anticipate potential health issues and quickly resolve key incidents when they occur.
Getting Web projects done right and delivered on time is all about efficiency. Putting the information you need and tools you can rely on at your ready disposal-Managing Web Projects-is a complete guide for project managers in the Internetworking industry. Whether you are a Web developer or an Internet Service Provider, whether your project is a quick fix, a complete overhaul, or a new start-up, this resource provides you with an organized path. It will walk you through a typical project life cycle, while providing you with all the tools and definitions needed to take charge and instill confidence in your staff and your customers. Invaluable for those seeking ISO 9001 certification, the text includes a number of detailed Work Instructions that can be used to develop a formal quality management system specific to a project management organization. They can also be leveraged in a TQM (Total Quality Management) or a Six Sigma environment. The book includes: Management guidelines for web hosting, data center migrations, site security, content development, application and Web site loading and testing, VPNs, VoIP, business continuity, and disaster recovery An Internet project management glossary, a technical Internetworking glossary, and a project management acronym table A tools suite with a proven record of success for project initiation, planning, execution, control, and close out This complete resource provides the resources needed-including dozens of time-tested templates, schedules, checklists, and flow charts-to become fully versed in and aligned with the nine knowledge areas and five major processes codified by the Project Management Body of Knowledge (PMBOK (R)).
An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience. Using practical examples, it details the geoscience requirements of cloud computing, covers general procedures and considerations when migrating geoscience applications onto cloud services, and demonstrates how to deploy different applications. The book discusses how to choose cloud services based on the general cloud computing measurement criteria and cloud computing cost models. The authors examine the readiness of cloud computing to support geoscience applications using open source cloud software solutions and commercial cloud services. They then review future research and developments in data, computation, concurrency, and spatiotemporal intensities of geosciences and how cloud service can be leveraged to meet the challenges. They also introduce research directions from the aspects of technology, vision, and social dimensions. Spatial Cloud Computing: A Practical Approach a common workflow for deploying geoscience applications and provides references to the concepts, technical details, and operational guidelines of cloud computing. These features and more give developers, geoscientists, and IT professionals the information required to make decisions about how to select and deploy cloud services.
The definition and parameters of teacher education have recently been changed by the concept of mentoring. Supporters of the concept maintain that it is an effective technique for inducting and retaining new teachers, but who and what are mentors, and what attributes do they possess? Previous research has identified collaboration, enthusiasm, emotional commitment, and sensitivity as the necessary traits of an effective mentor. It has also been found that mentors are available, give immediate feedback, listen attentively, and collaboratively solve problems with mentees. Epistemological structures that best serve the mentor-novice relationship, gender issues between mentors and proteges, and moral development orientations within the mentor-intern relationship have also been investigated. Thus, mentoring is a complex activity that involves a mentor, an intern or novice, and a process within a predetermined structure. The articles in this special issue validate the fact that the terms "good mentor" and "effective mentoring relationship" often elude easy definition. However, a common theme emerges: The mentor-mentee relationship is a transformative one that can change the course of one's life.
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.
Portfolio management is becoming the 'must have' for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs, projects, and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity, which only can be done through a disciplined portfolio process in ensuring the best mix of programs, projects, and operational work is under way. In turn, the portfolio is constantly in flux as difficult decisions are made if a project, for example, is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels, and communication is required so everyone knows how their work contributes to the organization's strategic goals and objectives. Portfolio Management: Delivering on Strategy, Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development, the book is a reference for executives and practitioners in the field, as well as a students and researchers studying portfolio management.
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.
Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals, healthcare systems, ACOs, and patient analytics, including hot spotting, risk stratification, and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity, this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out, such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies, data, and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information, including Business Intelligence, Six Sigma, Data, and Text Mining.
As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts. Winning the spot of #19 out of 26 on the 2020 Bookauthority Best New Industrial Management Books of All Time. Winning the spot of #3 out of 8 on the 2021 Bookauthority Best New Industrial Management Books to Read in 2021. Winning the spot of #5 out of 11 on the 2021 Bookauthority Best New Product Design Books to Read in 2021. 2020 Taylor & Francis Award Winner for Outstanding Professional Book! Product Lifecycle Management (PLM): A Digital Journey Using Industrial Internet of Things (IIot) provides a summary of the essential topics of Product Lifecycle Management (PLM) and the Industrial Internet of Things (IIoT) in the era of Industry 4.0. The book discusses emerging technologies, their contribution towards enhancing product design, development, and manufacturing. It also presents the integration of PLM, Enterprise Resource Planning (ERP), and Manufacturing Execution System (MES) along with IIoT as well the integration of mechanical, electronic components, embedded systems, firmware and software focusing on smart design, development, and manufacturing in the digital transformation journey. The book provides a high-level overview of how the smart product development through smart manufacturing materializes within the smart ecosystem. Manufacturing professionals, designers, mechanical, electrical, electronics, instrumentation and industrial engineers, information and communication technology consultants and those working in production planning, process control, and operations will find this book invaluable.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.
First Published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.
Strong stakeholder engagement is perhaps the most critical factor for achieving successful program execution in our fast-paced world. Many program managers get stuck in the "science" of program management, spending vast amounts of effort on tasks, charts, and metrics. Program managers who emphasize activities around relationship building and stakeholder engagement usually have the best chance for program success. This book focuses on how to engage your stakeholders in the right way, and keep them engaged throughout the course of your program. The first section of the book covers stakeholder engagement in the program definition phase, including how to identify key stakeholders, gain their trust, and build relationships through effective communication. The second section moves to the project execution phase. It explains how to drive stakeholder engagement through the use of performance metrics, effective meeting management, and informal program governance. In the last section, the author explains how to keep stakeholders engaged through the program closure phase. This section covers the operational readiness review, including transition plans, new process documentation and training, new technology rollout, and cultural readiness assessment. It also provides best practices and tips for holding the post-launch review and lessons learned session. The book concludes with a case study of a fictitious company, followed by discussion questions that allow you to apply the knowledge you have gained in this book.
Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy. |
![]() ![]() You may like...
Standing up to Climate Change - Creating…
Shahrooz Mohajeri, Lena Horlemann, …
Hardcover
R3,079
Discovery Miles 30 790
Advanced Research in Nanosciences for…
Ramprasad, Thirugnanasambandham Karchiyappan
Hardcover
R4,919
Discovery Miles 49 190
Nucleic Acid Polymerases
Katsuhiko S Murakami, Michael A. Trakselis
Hardcover
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Industrial Enzymes - Structure, Function…
Julio Polaina, Andrew P. Maccabe
Hardcover
R6,269
Discovery Miles 62 690
|