![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
Addressing the unique difficulties involved in day-to-day project management communication, The Project Manager's Communication Toolkit provides proven methods for creating clear and effective communications-including text-based plans, reports, messages, and presentations. It examines the many tools available and goes beyond traditional coverage to define their proper use and application. Using language that's easy to understand, the author explains how to determine the appropriate tools for specific communication needs. This time-saving resource provides the understanding to harness the power of everyday communication, such as email and PowerPoint (R) to: Gain control over project parameters Overcome conflict Create effective project plans, charters, and statements of work Considering that most projects fail due to lapses in communication, it is essential for project managers to understand how to communicate their plans and ideas clearly and effectively. Complete with numerous examples and case studies, this book provides the understanding required to select the right tools, as well as the insight to use those tools effectively in a wide range of real-world situations. Praise for: ... a 'slam dunk' in providing the reader a foundation, emphasizing various tools, techniques; and in which situations they should be applied. The case studies further challenge the day-to-day situations one may face; providing techniques that work! Anyone that has been part of a project team will benefit from this book.-Lisa Holowiak, Quality Assurance Specialist, Pfizer, in PM World Today, Vol. XII, Issue X ... a valuable resource for program and project managers at all levels and all industries. Shankar very successfully managed very large and complex projects for my organization utilizing many of these tools and
Economics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the processes required to realize quality in a distributed environment. Communication is a tremendous challenge, especially for teams separated by several time zones, and the authors elucidate how to uncover patterns of communication among these teams to determine effective strategies for managing communication. The authors analyze successful and failed projects and apply this information to how a project can be successful with distributed teams. They also provide lightweight processes that can be dynamically adapted to the demands of any project.
This book presents a new approach to the issue of project management, showing how it can be approached through the lens of sustainability. The nature of sustainable project management is not only to achieve economic goals, but also environmental and social ones. Considering project management from the perspective of sustainability is very important because sustainable development cannot keep up with the pace and scale of accumulation of ecological and social problems. The natural potential of the Earth is quickly running low. The global equilibrium between the Earth's ecosystems, which have developed for millions of years, and the human world of production and consumption, becomes disrupted. The focus is on a functional approach to the subject, allowing management and business to implement the methodology discussed. Topics discussed include sustainable planning, sustainable organizing, sustainable leading and sustainable controlling. The authors use their combined experience in the area to inform their novel approach. The book will be especially useful for people who are project managers, members of project teams and other project stakeholders. It may also be a useful reference for scientists and students studying the fields of management, IT and business.
This volume contains papers from the technical program of the 6th European Semantic Web Conference (ESWC 2009), held from May 31 to June 4, 2009, in Heraklion, Greece. ESWC 2009 presented the latest results in research and applications of Semantic Web technologies. In addition to the technical research track, ESWC 2009 featured a tutorial program, a PhD symposium, a system demo track, a poster track, a number of collocated workshops, and for the ?rst time in the series a Semantic Web in-use track exploring the bene?ts of applying Semantic Web technology in real-life applications and contexts. Thetechnical researchpaper trackreceivedover250submissions.The review process was organized using a two-tiered system, where each submission was reviewed by at least three members of the Program Committee. Vice Program CommitteeChairsorganizedadiscussionbetweenreviewers,collectedadditional reviews when necessary and provided a metareview for each submission. During a physical Program Committee meeting, the Vice Program Committee Chairs together with the Program Chairs selected 45 research papers to be presented at the conference.
SSTD 2009 was the 11th in a series of biannual events that discuss new and exciting research in spatio-temporal data management and related technologies. PrevioussymposiaweresuccessfullyheldinSantaBarbara(1989),Zurich(1991), Singapore (1993), Portland (1995), Berlin (1997), Hong Kong (1999), Los An- les (2001), Santorini, Greece (2003), Angra dos Reis, Brazil (2005), and Boston (2007). Before 2001, the series was devoted solely to spatial database mana- ment, and called SSD. From 2001, the scope was extended in order to also accommodate temporal database management, in part due to the increasing importance of research that considers spatial and temporal aspects jointly. SSTD2009introducedseveralinnovativeaspectscomparedtopreviousevents. There was a demonstrations track which included ten presentations of systems related to the topics of interest. In addition to that, the event included a poster session with seven presentations of innovative research developed at an early stage. For the ?rst time in the SSTD series, the best paper of the symposium was awarded and a few high-quality papers were selected and the authors were invited to submit extended versionsof their work to a special issue of the Geo- formatica journal (Springer). Prior to the symposium, there was a two-day - vanced seminar, which hosted three half-day tutorials on state-of-the-art topics within spatio-temporal data management, held by distinguished international researchers.
The job of Linux systems administrator is interrupt-driven and requires constant learning in byte-wise chunks. This book gives solutions to modern problemseven some you might not have heard ofsuch as scripting LDAP, making Mac clients play nice with Linux servers, and backup, security, and recovery scripts. Author Juliet Kemp takes a broad approach to scripting using Perl and bash, and all scripts work on Debian or Red Hat lineage distributions. Plus, she dispenses wisdom about time management, dealing with desperate colleagues, and how to avoid reinventing the wheel Learn how to love LDAP scripting and NFS tuning Make Perl serve you: don't be enslaved by Perl Learn to change, craft, and feel empowered by recipes that change your life What you'll learn Centralize your network using LDAP and NFS Speak the language of different file systems Know when to use Perl or when to stick to sed and awk Treat security concerns with Perl, bash, and intelligence Learn how to trace errant system calls and misbehaving colleagues Who this book is for System administrators in need of quick succor and guidance when interruptions prevent the smooth running of a network. Table of Contents Saving Yourself Effort Centralizing Your Network: Kerberos, LDAP, and NFS Monitoring and Updating Taking Backups and Managing Data Working with Filesystems Securing Your Systems Working with Apache Using the Command Line Better Working with Text in Files Things Going In, Things Going Out Tracking Down Bugs Managing Time and People
This volume contains the main proceedings of the 3rd Annual Asian Semantic WebConference(ASWC2008)heldinBangkok, Thailand, duringDecember8-11, 2008. Assuch, ASWC2008showcasedthelatestresultsintheresearchandapp- cationofSemantic Web technologies-applyingsemantics ata planetaryscale. OverthelastfewyearswehavebeenwitnessingatrendinwhichtheSemantic Web has been transforming from a niche research area to the mainstream in academia and industry. The European Semantic Web Conference, held earlier this year in Tenerife, saw a growth in the participation and engagement from semantic start-up companies. This conference, showcasing an Asian perspective andnowhaving establisheditself, is alsoa signthatthe Semantic Web is moving to the mainstream. In addition to the emergence in the mainstream, the Semantic Web cont- ues to generate a signi?cant volume of scienti?cally interesting research articles. Research submissions to ASWC 2008 were scrutinized and ?ltered via a thr- phasereviewing process. First, eachsubmissionwasevaluatedby threemembers from the Program Committee. Second, papers and the associated reviews were meta-reviewed by members of the Senior Program Committee. In this second phase the meta-reviewers led discussions between reviewers and produced an acceptance recommendation. In the last phase, on the basis of the reviews and associated meta-review recommendations, the ?nal selections were made jointly by the Programme Chairs. Although this process required substantial e?orts from the members of the Program Committee, it ensured that only papers of the highest quality were accepted. The ?nal acceptance of 37 papers for pub- cation and presentation at the conference out of the 118 submissions resulted in an acceptance rate of 31%. Of the papers we accepted these are split between Asia (18) and Europe (17), with an additional 2 from the U
The Web is a globalinformationspace consistingoflinked documents andlinked data. As the Web continues to grow and new technologies, modes of interaction, and applications are being developed, the task of the Semantic Web is to unlock the power of information available on the Web into a common semantic inf- mation space and to make it available for sharing and processing by automated tools as well as by people. Right now, the publication of large datasets on the Web, the opening of data access interfaces, and the encoding of the semantics of the data extend the current human-centric Web. Now, the Semantic Web c- munity is tackling the challenges of how to create and manage Semantic Web content, how to make Semantic Web applications robust and scalable, and how to organize and integrate information from di?erent sources for novel uses. To foster the exchange of ideas and collaboration, the International Semantic Web Conference brings together researchers and practitioners in relevant disciplines such as arti?cial intelligence, databases, social networks, distributed computing, Web engineering, information systems, natural language processing, soft c- puting, and human-computer interaction. This volume contains the main proceedings of ISWC 2008, which we are - cited to o?er to the growing community of researchers and practitioners of the Semantic Web. We got a tremendous response to our call for research papers from a truly international community of researchers and practitioners from 41 countries submitting 261 papers. Each paper receivedan averageof 3.
This volume contains the papers from the technical programmeof the 5th Eu- pean Semantic Web Conference, ESWC 2008, that took place during June 1-5, 2008 in Tenerife, Islas Canarias, Spain. ESWC 2008 was the latest in a series of annual, international events foc- ing on the dissemination and discussion of the latest research and applications of Semantic Web technologies. The call for papers saw over 270 submissions, a comparable ?gure to the previous year, indicating that the conference series has reached a certain level of maturity. The review process was organized - ing a two-tiered system. First, each submission was reviewed by at least three members of the ProgrammeCommittee. Submissions were also assignedto a - niorProgrammeCommitteemember, wholed discussionsbetweenreviewersand provided a metareview and provisional decision. A physical Programme C- mittee meeting was then held, where the ?nal decisions weremade. Competition was as strong as ever, and the Programme Committee selected 51 papers to be presented at the conference. In addition to the technical research paper track, a system demo track was included, withits ownreviewprocess. Twenty-?vedemo paperswereselectedfor publication. System demo authors were given the opportunity to present their workin dedicated sessionsduring the conference, while anevening receptionwas also devoted to the presentation of posters and demonstrations of systems. As in past years, ESWC subscribed to the call to "eat our own dog food," withthepublicationofarichsetofsemanticmetadatadescribingtheconference. Three invited talks were given by distinguished scientists: Nigel Shadbolt (Garlik Ltd.
Whether you need a network of ten Linux PCs and a server or a data center with a few thousand UNIX nodes, you need to know how to automate much of the installation, configuration, and standard system administration. Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer. Automating Linux and Unix System Administration, Second Edition is unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully.Both new and seasoned professionals will profit from industryleading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux data center to a small office network. What you'll learn See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux data center or a network correctly. Explore handling realworld environments where not all hosts are configured alike via a case study of a fictional new data center build-out. Examine realworld examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks--regardless of network or data center size--in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.
Ruby has set the world on fire, proving itself a serious challenger to Perl and Python in all spheres. In particular, more and more people are discovering that Ruby's flexibility, superb feature set, and gentle learning curve make it a natural choice for system administration tasks, from the humblest server to the largest enterprise deployment. Within the pages of Practical Ruby for System Administration, you'll learn the Ruby way to construct files, tap into clouds of data, build domain-specific languages, perform network traffic analysis, and more. Based on author Andre Ben Hamou 's own experiences working as a system administrator, this book will help you pick up practical tips on Ruby coding style, learn how to analyze and improve script performance, and make use of no-nonsense advice on scripting workflow, including testing and documentation. Above all, you'll come to appreciate the sheer power of Ruby and the hundreds of benefits it offers for system administration.This book places equal emphasis on fundamental Ruby concepts as well as practical how-tos. It uses examples from other languages to ease the transition to Ruby. The book is concise, entertaining, and informativeunlike many books aimed at system administrators, which can be overly long and stodgy.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. This new workbook not only combines practical examples from Google's experiences, but also provides case studies from Google's Cloud Platform customers who underwent this journey. Evernote, The Home Depot, The New York Times, and other companies outline hard-won experiences of what worked for them and what didn't. Dive into this workbook and learn how to flesh out your own SRE practice, no matter what size your company is. You'll learn: How to run reliable services in environments you don't completely control-like cloud Practical applications of how to create, monitor, and run your services via Service Level Objectives How to convert existing ops teams to SRE-including how to dig out of operational overload Methods for starting SRE from either greenfield or brownfield
Time delay systems exist in many engineering ?elds such as transportation, communication, process engineering and more recently networked control s- tems. In recent years,time delaysystems haveattracted recurring interests from research community. Much of the research work has been focused on stability analysis and stabilization of time delay systems using the so-called Lyapunov- Krasovskii functionals and linear matrix inequality (LMI) approach. While the LMI approach does provide an e?cient tool for handling systems with delays in state and/or inputs, the LMI based results are mostly only su?cient and only numerical solutions are available. For systems with knownsingle input delay, there have been rather elegant- alytical solutions to various problems such as optimal tracking, linear quadratic regulation and H control. We note that discrete-time systems with delays can ? usually be converted into delay free systems via system augmentation, however, theaugmentationapproachleadsto muchhigher computationalcosts,especially for systems of higher state dimension and large delays. For continuous-time s- tems,time delayproblemscaninprinciple betreatedby thein?nite-dimensional system theory which, however,leads to solutions in terms of Riccati type partial di? erential equations or operator Riccati equations which are di?cult to und- stand and compute. Some attempts have been made in recent years to derive explicit and e?cient solutions for systems with input/output (i/o) delays. These include the study ontheH controlofsystemswith multiple input delaysbased ? on the stable eigenspace of a Hamlitonian matrix [46].
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the protests of the traditional financial industry. With all the new technology that we have today, it is almost mind-blowing to think about the kind of technology that we will have in another ten years or so. The change is going to keep coming, the only thing we can do is get on board with it. This book introduces the basics of FinTech and equips readers with the knowledge to get on the cutting edge of age we live in today.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Network Infrastructure Security - Infrastructure Interdependencies - Risk Assessment This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty-seven edited papers from the First Annual IFIP WG 11.10 International Conference onCritical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2007. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Eric Goetz is the Associate Director for Research at the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
From a leading expositor of testing methods, a practical, comprehensive, hands-on guide to the state-of-the-art black-box testing techniques This book fills a long-standing need in the software and general systems development communities to make the essential aspects of black-box testing available in one comprehensive work. Written by one of the world's most respected figures in the field of testing, it is both a valuable working resource for independent testers and programmers and an excellent practical introduction for students. Dr. Boris Beizer clearly explains the principles behind behavioral testing in general and behind the most important black-box testing techniques in use today, which involve testing a system based on its desired behavior or function and for conformance to its specifications. Then, with fully worked examples, he leads you step-by-step from specifications to finished test cases. Complete coverage of all important test techniquesæincluding those that apply to object-oriented software
The Maintenance Management Framework describes and reviews the concept, process and framework of modern maintenance management of complex systems; concentrating specifically on modern modelling tools (deterministic and empirical) for maintenance planning and scheduling. It will be bought by engineers and professionals involved in maintenance management, maintenance engineering, operations management, quality, etc. as well as graduate students and researchers in this field.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives. Bold and ambitious, this book tackles the thorny issues of integration of disciplines, cross over of functions, and negotiation of epistemological divides in IS. Historically, the IS discipline has struggled to embrace and integrate technical as well as organizational knowledge, skills and methods. Kawalek argues that there are now a new set of imperatives that will irrecoverably change IS, affecting the way many organizations deploy and access their information and technology. This book defines how the traditional practices of Information Systems are required to integrate into a process of organizational problem-solving. An essential read for students of business information systems, organizational theory and research methods, Kawalek's work also provides core methodological principles on organizational change and problem solving, and presents an effective rationale for their use in Information Systems contexts.
Are you still searching for the workplace that deserves someone like you? Do you really have a good understanding about what is going on out there, in the business world? In this book, we will discuss the importance of agility and how it affects the solutions that are being delivered by an organization. We will also talk about how a blend of strategic innovation, visionary leadership, and organizational agility go hand in hand to ensure the success of an organization. Enterprise agility is not a far-fetched possibility. Once the problems of the organization are identified, with the right tools and effort, the agility, efficiency, and effectiveness of an organization, as well as the processes that the success of the organization are based on, can all be maximized. This book will broaden your thinking and will help you expand your horizons.
A major, comprehensive professional text/reference for designing and maintaining security and reliability.
Industry 4.0 is a challenge for today's businesses. It's a concept that encompasses the technological innovations of automation, control, and information technology, as it's applied to manufacturing processes. It's a new topic that recently emerged in academia and industry, with few books that target both management and engineering. This book will cover the new advances and the way to manage competitive organizations. The chapters will include terms of theory, evidence, and/or methodology, and significantly advance social scientific research. This book: Focuses on the latest and most recent research findings occurring on the topic of Industry 4.0 Presents the ways companies around the world are facing today's technological challenges Assists researchers and practitioners in selecting the correct options and strategies to manage competitive organizations Provides recent advances in international studies Encompasses the main technological innovations in the fields of automation, control, and information technology applied to the manufacturing processes Industry 4.0: Challenges, Trends, and Solutions in Manangment and Engineering is designed to increase the knowledge and effectiveness of all managers and engineers in all organizations and activity sectors Carolina Machado has been teaching in the Human Resources Management subjects since 1989 at University of Minho, Portugal. She has been an associate professor since 2004, with experience and research interest areas in the field of Human Resource Management, International Human Resource Management, Human Resource Management in SMEs, Training and Development, Emotional Intelligence, Management Change, Knowledge Management, and Management/HRM in the Digital Age. She is head of the Department of Management and head of the Human Resources Management Work Group at University of Minho, as well as chief editor of the International Journal of Applied Management Sciences and Engineering (IJAMSE). J. Paulo Davim is a professor at the Department of Mechanical Engineering of the University of Aveiro, Portugal. He has more than 30 years of teaching and research experience in Manufacturing, Materials, Mechanical, and Industrial Engineering, with special emphasis in Machining & Tribology. He has also interest in Management, Engineering Education, and Higher Education for Sustainability. He has worked as evaluator of projects for ERC (European Research Council) and other international research agencies.
This book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.
A proliferation of new technologies has lulled many into thinking that we actually have to think less about how we communicate. In fact, communicating and collaborating across time, distance, and cultures has never been more complex or difficult. Written as a series of bulleted tips drawn from client experiences and best practices, Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results presents practical tips to help leaders engage and motivate their geographically dispersed project team members. If you're a leader of any type of virtual team and want to help your team members collaborate more effectively, then buy this book. You will learn how to: Build trust and cultivate relationships, virtually, across your team Design and facilitate virtual meetings that are focused and engaging Influence without authority Motivate and galvanize a virtual team for top performance Blend asynchronous and synchronous communications for better virtual collaboration Navigate cross-cultural and generational differences in the absence of vital visual cues Assess skills, strengths, aptitudes, and preferences from afar Handle other tough issues that can trip up virtual teams The ideas in this book are based on Nancy Settle-Murphy's decades of experience working as a change management consultant, facilitator, and trainer for project teams around the world. Designed to be read section by section in any order, this book shares approaches and techniques to help you address some of the toughest challenges virtual team leaders face, including keeping team members engaged from afar. |
![]() ![]() You may like...
|