![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
By the end of the decade, approximately 50 billion devices will be connected over the internet using multiple services such as online gaming, ultra-high definition videos, and 5G mobile services. The associated data traffic demand in both fixed and mobile networks is increasing dramatically, causing network operators to have to migrate the existing optical networks towards next-generation solutions. The main challenge within this development stems from network operators having difficulties finding cost-effective next-generation optical network solutions that can match future high capacity demand in terms of data, reach, and the number of subscribers to support multiple network services on a common network infrastructure. Design, Implementation, and Analysis of Next Generation Optical Networks: Emerging Research and Opportunities is an essential reference source that discusses the next generation of high capacity passive optical access networks (PON) in terms of design, implementation, and analysis and offers a complete reference of technology solutions for next-generation optical networks. Featuring research on topics such as artificial intelligence, electromagnetic interface, and wireless communication, this book is ideally designed for researchers, engineers, scientists, and students interested in understanding, designing, and analyzing the next generation of optical networks.
A revealing insight into the issues surrounding information infrastructure implementation in large, global corporations. Case study material from six different international corporations-AstraZeneca, IBM, Norsk Hydro, Roche, SKF, and Statoil-shows a complex picture of implementation, and one that cannot be interpreted using current management thinking. The authors suggest that the economics of standards and increasing returns be joined with the perspectives from the social studies of science and technology to provide the fundamentals for a fresh view of the management of IT in global corporations.
There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9-10 October 2014). The book is divided into two main topics: information technology and vocational technology. Considerable attention is also paid to electric power, data mining, vocational education and physical education. Information Technology and Career Education will be invaluable to professionals and academics in information and vocational technology, electric and electronic engineering and education science.
In today's competitive business environment, most companies realize that the better they can manage their customer relationships, the more successful they will become. Customer Relationship Management (CRM) software systems are key tools for companies to manage the customer-facing processes of their businesses. However, many companies have resisted implementing this most critical customer-oriented application due in large part to the lack of a single-point resource on implementing a CRM system. This book attempts to fill that gap. Implementing SAP (R) CRM will help technologists and managers come to grips with the vision, concept, and technology of CRM. It begins by laying out the groundwork for understanding CRM. It explains the concept and context of CRM and the tangible business benefits of CRM adoption. Demonstrating a professional approach to the evaluation and selection of SAP, it details the critical success factors (CSFs), patterns, and anti-patterns of a successful SAP CRM implementation. CRM implementations can add significant benefit to the company's bottom line only if the company first transforms itself into a customer-centric and customer-responsive enterprise. This book explains what it means to be a customer-centric and responsive enterprise, and provides a framework for business operations based on customer relationships, rather than the traditional four Ps (product, positioning, price, promotion). It further spells out business process reengineering (BPR) strategies to configure internal business processes and operations with SAP CRM to improve customer-facing strategies, services, and relationships.
Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need. Program Governance provides a thorough understanding of governance while reviewing the underlying theories. The first book dedicated to this subject, it caters to the needs of practitioners, researchers, and students of management and governance. The book provides a holistic view of program governance while covering multiple elements of program governance. Topics covered include the governance structure, governance roles, governance functions, governance mechanisms, factors influencing the governance framework, and different domains of programs that come under the jurisdiction of a governance framework. The book presents the author's own program governance framework, called the Contingent Governance Framework for Programs (CGFPrgTM), which is adaptable to suit different program contexts. This adaptability ensures that the different elements of governance, including structure and mechanisms, are aligned with program requirements. Such alignment results in an efficient and effective environment with an increased probability of program success. The text supplies references to research and case studies to help readers understand key concepts in more detail. It also includes objectives at the end of each chapter to help readers gauge their knowledge of the subject. The book clarifies the linkage/dependencies between program governance and other governance levels, such as international governance and corporate governance, which have a strong influence on governance framework for programs. It also explains the difference between the dynamics of temporary organizations, such as projects and programs, and permanent organizations. This distinct
Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development. The book empirically analyzes the contribution of nonfunctional requirements to project parameters such as cost, time, and quality. Such parameters are of prime interest as they determine the survival of organizations in highly dynamic environments. The impact of nonfunctional requirements on project success is analyzed through surveys and case studies, both individually and relative to each other. Sources for data collection include industry, academia, and literature. The book also empirically studies the impact of nonfunctional requirements on the overall business success of both the software development firm and the software procuring firm. Project success is examined to determine if it leads to business success. The book provides rich empirical evidence to place nonfunctional requirements on par with functional requirements to achieve business success in highly competitive markets. This work enhances the body of knowledge through multiple empirical research methods including surveys, case studies, and experimentation to study software engineers' focus on nonfunctional requirements at both project and business levels. The book can guide both computer scientists and business managers in devising theoretical and technical solutions for software release planning to achieve business success.
Although project team members play crucial roles in projects, they often do not possess the required mastery of project management methodologies. As a result, dialog between project managers and team members is not as effective as it can be and can quickly become a source of stress and tension. Empowering Project Teams: Using Project Followership to Improve Performance improves on this situation by presenting the project environment from the perspective of project team members. Re-interpreting project management methodologies and behaviors using a bottom-up approach, it explores the application of project followership in the key stages of project management. It details the methods and techniques that all project team members need to know and outlines the behaviors they should adopt to be successful in each stage of the project. The book is divided into five sections: Introduces and explores the basic concepts of project management and project followership Examines project start-up-the all too often underestimated set of activities that make it possible to make future activities less problematic Highlights the importance of project planning Focuses on execution and control of the project Considers project closure and transfer and explains why this is an ideal time to determine if efforts invested have been rewarded Despite an understanding that project success is directly proportional to the entire team's ability to act as a managerial center of excellence, there has long been a need for a book dedicated to the individuals that participate in projects. Filling this need, this book is an ideal resource for anyone who regularly works as a member of a project team. Complete with case studies in each chapter, the book also includes exercises on the topics covered to facilitate understanding.
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.
According to the Brookings Institute, an organization s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don t have. Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls so you can get it right the first time. Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:
Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.
"A valuable, practical guide for navigating through ICT turbulence and dynamics. A lighthouse for the human side of ICT." Erik van de Loo, Director Executive Masters in Change, INSEAD Professor of Organisational Behaviour, INSEAD Business School "The ICT Malaise is a different and thorough point of view on the dysfunctional approach the world has taken to information and technology. In an era of exponential changes where humans are rendered obsolete at the same pace of technology, it is fundamental to go back to basics on why we lead and innovate in the first place." Silvio Rugolo, VP, Global Sales, BMC Software, Digital Service Operations We hurtle ahead with technology, apps, and the newest innovation in a world that already demands a constant online presence and availability. You are included if you quickly adapt the newest technology and excluded if you wait too long. Information and communication technology (ICT) service providers, suppliers, and customers all try to make sense and make the most money out of technology developments and constant innovation with the help of frameworks, methodologies, best-practice approaches, and models. They continuously improve, align, integrate, and optimize, but unfortunately do not apply the same drive to safeguarding quality. This book leads the reader along a path of critical thinking, reflecting, and contemplating while offering alternative ways for service providers, customers, and suppliers to interact with each other. In addition, it encourages them to conduct their business in such a way that customers, service providers, and suppliers achieve satisfaction. The author implies a different mindset, a new way of interacting and a surprising approach to the many frameworks, models, and methodologies being introduced ceaselessly. While reading this book, IT professionals receive practical guidelines for using these newfound methodologies and models to help build and maintain healthy business relations while ensuring quality delivery of products and services. Readers will be surprised by how much more satisfying and less stressful their work environment becomes!
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- -Focuses on setting the right road map so that you can be most effective in your information security implementations -Discusses cost-effective staffing, the single biggest expense to the security organization -Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively -Identifies high-risk areas, focusing limited resources on the most imminent and severe threats -Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape of the Internet over the near term. As the Internet business model continues to evolve, so will Internet management. And with the demise of the Internet greatly exaggerated, it will continue to be a driving force for business in the future. Keeping you up-to-date with the latest thinking in this field, New Directions in Internet Management gives you an encyclopedia of Internet management know-how.
"Details the most recent advances in Laboratory Information Management Systems. Offers contemporary approaches to system development, design, and installation; system customization; software and hardware compatibility; quality assurance and regulatory requirements; and resource utilization."
A Standard for Auditing Computer Applications is a dynamic new resource for evaluating all aspects of automated business systems and systems environments. At the heart of A Standard for Auditing Computer Applications system is a set of customizable workpapers that provide blow-by-blow coverage of all phases of the IT audit process for traditional mainframe, distributed processing, and client/server environments.A Standard for Auditing Computer Applications was developed by Marty Krist, an acknowledged and respected expert in IT auditing. Drawing upon his more than twenty years of auditing experience with leading enterprise organizations, worldwide, Marty walks you step-by-step through the audit process for system environments and specific applications and utilities. He clearly spells out what you need to look for and where to look for it, and he provides expert advice and guidance on how to successfully address a problem when you find one.When you order A Standard for Auditing Computer Applications, you receive a powerful package containing all the forms, checklists, and templates you'll ever need to conduct successful audits on downloadable resources. Designed to function as a handy, on-the-job resource, the book follows a concise, quick-access format. It begins with an overview of the general issues inherent in any IT review. This is followed by a comprehensive review of the audit planning process. The remainder of the book provides you with detailed, point-by-point breakdowns along with proven tools for:evaluating systems environments-covers all the bases, including IT administration, security, backup and recovery planning, systems development, and moreEvaluating existing controls for determining hardware and software reliabilityAssessing the new system development processEvaluating all aspects of individual applications, from I/O, processing and logical and physical security to documentation, training, and programmed proceduresAssessing specific applications and utilities, including e-mail, groupware, finance and accounting applications, CAD, R&D, production applications, and more
The popularity of enterprise architecture (EA) has increased in the last two decades, in both business and academic domains. Despite the cumulative interest from all sectors, the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently, some organisations continue to theorise the concept, which has ramifications on practice and ROI. This has led to many studies that have been conducted, to understand the complexities impacting the implementation and practice of EA in organisations. Yet, the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now, implementation and practice of EA have been slow, despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement, sustainability, and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes, from three main fronts. First, it explains the implications that lack of understanding of EA have on organisational activities and processes. Second, it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third, it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates, researchers, academics, and professionals in the fields of EA, IT, and information systems, this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.
This book presents a biographical history of the field of systems thinking, by examining the life and work of thirty of its major thinkers. It discusses each thinker's key contributions, the way this contribution was expressed in practice and the relationship between their life and ideas. This discussion is supported by an extract from the thinker's own writing, to give a flavour of their work and to give readers a sense of which thinkers are most relevant to their own interests.
The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the average professional to become adept at managing their own private server. In Set Up and Manage Your Virtual Private Server, author Jon Westfall expertly designs interesting, understandable lessons for professionals such as teachers, doctors, lawyers, and more to deploy their own virtual private server. He walks you through choosing the right service and customizing it for your specific business or personal needs, and does this with great ease while instilling invaluable knowledge. Basics such as setting up users, managing security and firewalls, installing and updating software, and troubleshooting by reviewing log files, backing up data, and so much more. Set Up and Manage Your Virtual Private Server equips you with the power of knowledge to set your web presence apart from the rest. You now have complete control over your virtual brand that is your own-separate from any employer or affiliate. Your career mobility is in your hands with the ability to run your own private server at your fingertips. The digital era centers this technical literacy and independence as a critical skillset. What You Will Learn Understand basic server terminology and the way servers operate and are networked together See how software is used on a server and its role (for example, Linux, Apache, MySQL, PHP, and so on) Get comfortable with the basic command-line operation of a virtual private server to set up users, manage security and firewalls, install software, update software, and troubleshoot by reviewing log files Store and back up important information Identify, analyze, and deploy open-source software products that can enhance productivity Who This Book Is For Non-tech professionals, individuals who have an established professional career, looking to understand more about how to set up and manage a private server.
IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.
With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully. This book addresses this new managerial situation, the post-digitalisation era, and offers novel perspectives on managing the digital landscape. The topics span how the post-digitalisation era has the potential to renew organisations, markets and society. The chapters of the book are structured in three topical sections but can also be read individually. The chapters are structured to offer insights into the developments that take place at the intersection of the management, information systems and computer science disciplines. It features more than 70 researchers and managers as collaborating authors in 23 thought-provoking chapters. Written for scholars, researchers, students and managers from the management, information systems and computer science disciplines, the book presents a comprehensive and thought-provoking contribution on the challenges of managing organisations and engaging in global markets when tools, systems and data are abundant.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information. |
![]() ![]() You may like...
Telecommunication Networks - Trends and…
Mohammad Abdul Matin
Hardcover
R3,317
Discovery Miles 33 170
Intelligent Multimedia Technologies for…
Dimitris N. Kanellopoulos
Hardcover
R5,200
Discovery Miles 52 000
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,038
Discovery Miles 10 380
Technology Integration and Foundations…
Shuyan Wang, Taralynn Hartsell
Hardcover
R4,790
Discovery Miles 47 900
|