![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
Selling and delivering a project to a satisfied client, and making a profit, is a complex task. Project manager and author Robin Hornby believes this has been neglected by current standards and is poorly understood by professionals in the field. Commercial Project Management aims to rectify this deficiency. As a unique 'how-to' guide for project and business managers, it offers practical guidance, and a wealth of explanatory illustrations, useful techniques, proven checklists, real life examples, and case stories. It will give project managers a needed confidence boost and a head start in their demanding role as they go 'on contract'. At the heart of Robin's approach is a vendor sales and delivery lifecycle that provides a framework for business control of projects. Unique elements include the integration of buyer and vendor project lifecycles, the recasting of project management as a cyclic set of functions to lead the work of the project, and the elevation of risk assessment from a project toolkit to a fundamental control process. Beyond project management, the book proposes a comprehensive template for the firm whose business is delivering projects. This is a how-to book for project and business managers working in a commercial environment looking for practical guidance on conducting their projects and organizing their firm.
The First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors & transducers, etc. Topics in this conference include: Computer Science This conference encompassed relevant topics in computer science such as computer vision & intelligent system, networking theory, and application of information technology. Communication EngineeringTo enhance the theory & technology of communication engineering, ACCET 2016 highlighted the state-of the-art research work in the field of VLSI, optical communication, and signal processing of various data formatting. Research work in the field of microwave engineering, cognitive radio and networks are also included. Electrical Technology The state-of-the-art research topic in the field of electrical & instrumentation engineering is included in this conference such as power system stability & protection, non-conventional energy resources, electrical drives, and biomedical engineering. Research work in the area of optimization and application in control, measurement & instrumentation are included as well.
Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps and omissions that need to be filled if data about software development is to be useful for comparisons or estimating future projects. Among the more serious gaps are leaks in reporting about software development efforts that, if not corrected, can distort data and make benchmarks almost useless and possibly even harmful. One of the most common leaks is that of unpaid overtime. Software is a very labor-intensive occupation, and many practitioners work very long hours. However, few companies actually record unpaid overtime. This means that software effort is underreported by around 15%, which is too large a value to ignore. Other sources of leaks include the work of part-time specialists who come and go as needed. There are dozens of these specialists, and their combined effort can top 45% of total software effort on large projects. The book helps software project managers and developers uncover errors in measurements so they can develop meaningful benchmarks to estimate software development efforts. It examines variations in a number of areas that include: Programming languages Development methodology Software reuse Functional and nonfunctional requirements Industry type Team size and experience Filled with tables and charts, this book is a starting point for making measurements that reflect current software development practices and realities to arrive at meaningful benchmarks to guide successful software projects.
To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic support from VMware, readers can use the VMware supported software to create various virtualized IT infrastructures sophisticated enough for various sized enterprises. Then, the virtualized IT infrastructure can be made available to an enterprise through the private cloud services.
Communication, Management and Information Technology contains the contributions presented at the International Conference on Communication, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016, organized by the Universal Society of Applied Research (USAR). The book aims at researchers, scientists, engineers, and scholar students interested or involved in Computer Science and Systems, Communication, and Management.
Intelligent IT Outsourcing enables practitioners to focus in on the essential issues that need to be addressed so that the fundamental structure of their sourcing strategy and its implementation is sound. The authors provide insight into the challenges likely to be faced and give detailed advice on how to pre-empt and manage these. IT and outsourcing continue to be problematic, not least because fundamental learning about this subject fails to be applied systematically, and because IT is inherently difficult to manage. The economics are not obvious and emerging technologies have to be addressed, therefore IT goes to the heart of many enterprises and interfaces with multiple business units and processes, and there are continuous skills shortages. Unfortunately complexities are not removed in outsourced situations where additional problems come into play, for example the supplier's capabilities, whether the IT is right for an outsourcing solution, and whether the contract is robust but flexible enough to allow for outsourcing to take place. Objectives need to be realistic, and factors such as whether the internal management is mature and capable enough in this field, and the impact of prohibitive switching costs on behaviour once an outsourcing deal has been signed all have to be taken into account. The authors have built up over two decades of research, advisory and practitioner experience that enables them to distil the fundamental challenges in IT and outsourcing and demonstrate how these can be addressed.
This book is concerned with the ways in which organizations design, build and use information technology systems. In particular it looks at the interaction between these IT-centred activities and the broader management processes within organizations. The authors adopt a critical social science perspective on these issues, and are primarily concerned with advancing theoretical debates on how best to understand the related processes of technological and organizational change. To this end, the book examines and deploys recent work on power/knowledge, actor-network theory and critical organization theory. The result is an account of the nature and significance of information systems in organizations which is an alternative perspective to pragmatic and recipe-based approaches to this topic which dominate much contemporary management literature on IT. This book is intended for academic: Management and social science academics and postgraduate students of IT strategy and organization. Practitioner: Senior managers concerned with IT and strategy issues.
This book shows IT managers how to identify, mitigate and manage risks in an IT outsourcing exercise. The book explores current trends and highlights key issues and changes that are taking place within outsourcing. Attention is given to identifying the drivers and related risks of outsourcing by examining recently published and existing concepts of IT outsourcing. Founded on academic theory and empirical and quantitative information, this book: * Incorporates the complete risk identification and mitigation life cycle * Highlights the concept of core competency * Looks at motivating factors and working relationships of the buyer and supplier * Provides background to understand the risks as a result of 'human factors' as defined by the agency theory * Reviews the areas of risk that influence the decision to outsource the IT function * Examines the forces that determine the equilibrium in the risk profiles for the buyer and supplier
By the end of the decade, approximately 50 billion devices will be connected over the internet using multiple services such as online gaming, ultra-high definition videos, and 5G mobile services. The associated data traffic demand in both fixed and mobile networks is increasing dramatically, causing network operators to have to migrate the existing optical networks towards next-generation solutions. The main challenge within this development stems from network operators having difficulties finding cost-effective next-generation optical network solutions that can match future high capacity demand in terms of data, reach, and the number of subscribers to support multiple network services on a common network infrastructure. Design, Implementation, and Analysis of Next Generation Optical Networks: Emerging Research and Opportunities is an essential reference source that discusses the next generation of high capacity passive optical access networks (PON) in terms of design, implementation, and analysis and offers a complete reference of technology solutions for next-generation optical networks. Featuring research on topics such as artificial intelligence, electromagnetic interface, and wireless communication, this book is ideally designed for researchers, engineers, scientists, and students interested in understanding, designing, and analyzing the next generation of optical networks.
A revealing insight into the issues surrounding information infrastructure implementation in large, global corporations. Case study material from six different international corporations-AstraZeneca, IBM, Norsk Hydro, Roche, SKF, and Statoil-shows a complex picture of implementation, and one that cannot be interpreted using current management thinking. The authors suggest that the economics of standards and increasing returns be joined with the perspectives from the social studies of science and technology to provide the fundamentals for a fresh view of the management of IT in global corporations.
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9-10 October 2014). The book is divided into two main topics: information technology and vocational technology. Considerable attention is also paid to electric power, data mining, vocational education and physical education. Information Technology and Career Education will be invaluable to professionals and academics in information and vocational technology, electric and electronic engineering and education science.
There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.
In today's competitive business environment, most companies realize that the better they can manage their customer relationships, the more successful they will become. Customer Relationship Management (CRM) software systems are key tools for companies to manage the customer-facing processes of their businesses. However, many companies have resisted implementing this most critical customer-oriented application due in large part to the lack of a single-point resource on implementing a CRM system. This book attempts to fill that gap. Implementing SAP (R) CRM will help technologists and managers come to grips with the vision, concept, and technology of CRM. It begins by laying out the groundwork for understanding CRM. It explains the concept and context of CRM and the tangible business benefits of CRM adoption. Demonstrating a professional approach to the evaluation and selection of SAP, it details the critical success factors (CSFs), patterns, and anti-patterns of a successful SAP CRM implementation. CRM implementations can add significant benefit to the company's bottom line only if the company first transforms itself into a customer-centric and customer-responsive enterprise. This book explains what it means to be a customer-centric and responsive enterprise, and provides a framework for business operations based on customer relationships, rather than the traditional four Ps (product, positioning, price, promotion). It further spells out business process reengineering (BPR) strategies to configure internal business processes and operations with SAP CRM to improve customer-facing strategies, services, and relationships.
Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need. Program Governance provides a thorough understanding of governance while reviewing the underlying theories. The first book dedicated to this subject, it caters to the needs of practitioners, researchers, and students of management and governance. The book provides a holistic view of program governance while covering multiple elements of program governance. Topics covered include the governance structure, governance roles, governance functions, governance mechanisms, factors influencing the governance framework, and different domains of programs that come under the jurisdiction of a governance framework. The book presents the author's own program governance framework, called the Contingent Governance Framework for Programs (CGFPrgTM), which is adaptable to suit different program contexts. This adaptability ensures that the different elements of governance, including structure and mechanisms, are aligned with program requirements. Such alignment results in an efficient and effective environment with an increased probability of program success. The text supplies references to research and case studies to help readers understand key concepts in more detail. It also includes objectives at the end of each chapter to help readers gauge their knowledge of the subject. The book clarifies the linkage/dependencies between program governance and other governance levels, such as international governance and corporate governance, which have a strong influence on governance framework for programs. It also explains the difference between the dynamics of temporary organizations, such as projects and programs, and permanent organizations. This distinct
Although project team members play crucial roles in projects, they often do not possess the required mastery of project management methodologies. As a result, dialog between project managers and team members is not as effective as it can be and can quickly become a source of stress and tension. Empowering Project Teams: Using Project Followership to Improve Performance improves on this situation by presenting the project environment from the perspective of project team members. Re-interpreting project management methodologies and behaviors using a bottom-up approach, it explores the application of project followership in the key stages of project management. It details the methods and techniques that all project team members need to know and outlines the behaviors they should adopt to be successful in each stage of the project. The book is divided into five sections: Introduces and explores the basic concepts of project management and project followership Examines project start-up-the all too often underestimated set of activities that make it possible to make future activities less problematic Highlights the importance of project planning Focuses on execution and control of the project Considers project closure and transfer and explains why this is an ideal time to determine if efforts invested have been rewarded Despite an understanding that project success is directly proportional to the entire team's ability to act as a managerial center of excellence, there has long been a need for a book dedicated to the individuals that participate in projects. Filling this need, this book is an ideal resource for anyone who regularly works as a member of a project team. Complete with case studies in each chapter, the book also includes exercises on the topics covered to facilitate understanding.
Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development. The book empirically analyzes the contribution of nonfunctional requirements to project parameters such as cost, time, and quality. Such parameters are of prime interest as they determine the survival of organizations in highly dynamic environments. The impact of nonfunctional requirements on project success is analyzed through surveys and case studies, both individually and relative to each other. Sources for data collection include industry, academia, and literature. The book also empirically studies the impact of nonfunctional requirements on the overall business success of both the software development firm and the software procuring firm. Project success is examined to determine if it leads to business success. The book provides rich empirical evidence to place nonfunctional requirements on par with functional requirements to achieve business success in highly competitive markets. This work enhances the body of knowledge through multiple empirical research methods including surveys, case studies, and experimentation to study software engineers' focus on nonfunctional requirements at both project and business levels. The book can guide both computer scientists and business managers in devising theoretical and technical solutions for software release planning to achieve business success.
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.
According to the Brookings Institute, an organization s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don t have. Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls so you can get it right the first time. Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:
Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.
"The Moderator's Survival Guide" is your indispensable resource for navigating the rocky shoals of your one-on-one user research sessions. Inside, you ll find guidance for nearly 100 diverse situations (ranging from business-as-usual to tricky and sticky) that might occur during usability studies, contextual inquiries, or user interviews. As a moderator, you are responsible for the well-being of the
participant, your study, and your organization. You must be
prepared for anything that may happen, from your technology failing
to the participant quailing. Use this guide to identify your best
next steps, react appropriately, and survive any challenges that
comes your way.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- -Focuses on setting the right road map so that you can be most effective in your information security implementations -Discusses cost-effective staffing, the single biggest expense to the security organization -Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively -Identifies high-risk areas, focusing limited resources on the most imminent and severe threats -Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri
Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project management commonly used in all industries. The textbook aligns with the latest version of the Project Management Institute's Project Management Body of Knowledge (PMBOK (R)) Guide, which is considered to be the de facto standard for project management. However, it avoids that standard's verbiage and presents students with readable and understandable explanations. Core chapters align with the Project Management Institute's model as well as explain how this model fits real-world projects. The textbook can be used as companion to the standard technical model and help those studying for various project management certifications. The textbook takes an in-depth look at the following areas important to the standard model: Work Breakdown Structures (WBS) Earned Value Management (EVM) Enterprise project management Portfolio management (PPM) Professional responsibility and ethics Agile life cycle The text begins with a background section (Chapters 1-9) containing material outside of the standard model structure but necessary to prepare students for the 10 standard model knowledge areas covered in the chapters that follow. The text is rounded out by eight concluding chapters that explain advanced planning approaches models and projects' external environments. Recognizing that project management is an evolving field, the textbook includes section written by industry experts who share their insight and expertise on cutting-edge topics. It prepares students for upcoming trends and changes in project management while providing an overview of the project management environment today. In addition to guiding students through current models and standards, Project Management: Theory and Practice, Third Edition prepares students for the future by stimulating their thinking beyond the accepted pragmatic view.
Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author's experience in software engineering as a programmer in the defense and aerospace industries, this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop, operate, and maintain software engineering capabilities by instilling an engineering discipline to support programming, design, builds, and delivery to customers. This book helps software engineers to: Understand the basic concepts, standards, and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view, this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools, whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today's software-dependent society.
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises. |
![]() ![]() You may like...
Networks on Chips - Technology and Tools
Giovanni De Micheli
Hardcover
R1,776
Discovery Miles 17 760
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Multidisciplinary Approach to Diversity…
Rilla J. Hynes, Carlos Tasso Aquino, …
Hardcover
R6,432
Discovery Miles 64 320
|