![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
Many antiquated or legacy systems are still in operation today because they are critical to the organizations continued operations or are prohibitively expensive to replace. This book guides practitioners in managing the process of legacy system evolution. The author introduces a comprehensive method for managing a software evolution project, from its conception to the deployment of the resulting system. The book helps managers answer two critical decisions: What is the best way to evolve a particular legacy system? and How can the legacy system be migrated to a selected target architecture?
This book constitutes the refereed proceedings of the Second East
European Symposium on Advances in Databases and Information
systems, ADBIS '98, held in Poznan, Poland in September 1998.
Companies must confront an increasingly competitive environment with lean, flexible and market oriented structures. Therefore companies organize themselves according to their business processes. These processes are more and more often designed, implemented and managed based on standard software, mostly ERP or SCM packages. This is the first book delivering a complete description of a business driven implementation of standard software packages, accelerated by the use of reference models and other information models. The use of those models ensures best quality results and speeds up the software implementation. The book discusses how companies can optimize business processes and realize strategic goals with the implementation of software like SAP R/3, Oracle, Baan or Peoplesoft. It also includes the post implementation activities. The book cites numerous case studies and outlines each step of a process oriented implementation, including the goals, procedures and necessary methods and tools.
This book constitutes the refereed proceedings of the 8th
International Symposium on System Configuration Management, SCM-8,
held in conjunction with ECOOP'98 in Brussels, Belgium, in July
1998.
This volume contains revisedversions of selected papers presented at the Fourth Australian Workshop on Distributed Arti?cial Intelligence (DAK 91), together with a set of invited papers. Each paper has been reviewed by at least two program committee members. The workshop was held in Brisbane, Queensland, Australia on July 17,1992. The goalof the workshopwas to promoteresearchin distributed arti?cial intelligence and multi-agent systems, both nationally and internationally. Thepapers covera widerangeofissuesin the?eldof distributed arti?cial intelligence and multi-agent systems, such as theories, languages, and applications. Manypeoplecontributedtothesuccessofthis workshop. Wewouldliketothank all the authors who submitted papers to the workshop. Many thanks also to the members of the programme committee who diligently reviewed all the papers submitted. Finally, we thank the editorial sta? of Springer-Verlag for publishing this contribution to the Lecture Notes in Arti?cial Intelligence series. October 1998 Chengqi Zhang and Dickson Lukose Programme Committee Chengqi Zhang (Co-Chair) University of New England, Australia Dickson Lukose (Co-Chair) Brightware Inc., USA Victor Lesser University of Massachusetts, USA Je?rey S. Rosenschein Hebrew University, Israel Toshiharu Sugawara NTT Basic Research Labs, Japan Rose Dieng ACACIA Project, INRIA, France Norbert Glaser CRIN-INRIA Lorraine, France Sascha Ossowski Rey Juan Carlos Univ, Spain Michael Luck University of Warwick, UK Mark d Inverno University of Westminster, UK Tim Norman University of London, UK Douglas Norrie University of Calgary, Canada Bernard Moulin Laval University, Canada Zhisheng Huang University of London, UK Minjie Zhang Edith Cowan University, Australia Brahim Chaib-draa Laval University, Canada Table of Contents TeamFormationbySelf-InterestedMobileAgents . . . . . . . . . . . . . . . . . . . . . . . . . ."
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders. Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models. The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
Intelligent decision support relies on techniques from a variety of disciplines, including artificial intelligence and database management systems. Most of the existing literature neglects the relationship between these disciplines. By integrating AI and DBMS, Computational Intelligence for Decision Support produces what other texts don't: an explanation of how to use AI and DBMS together to achieve high-level decision making.
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements.
This book constitutes the refereed proceedings of the Second
Australasian Conference on Information Security and Privacy,
ACISP'97, held in Sydney, NSW, Australia, in July 1997.
This book constitutes the refereed proceedings of the 9th International Conference on Advanced Information Systems Engineering, CAiSE'97, held in Barcelona, Spain, in June 1997. The volume presents 30 revised full papers selected from a total of 112 submissions; also included is one invited contribution. The book is divided into topical sections on requirements engineering; information systems design; methods, environments, and tools; distributed information systems; and workflow systems.
This book constitutes the refereed proceedings of the 9th
International Conference on Modeling Techniques and Tools for
Computer Performance Evaluation, held in St. Malo, France, in June
1997.
Dependability has always been an vital attribute of operational systems, regardless of whether they are highly-specialised (like electricity generating plants) or more general-purpose (like domestic appliances). This volume provides a highly-readable overview of the topic, concentrating on dependability as a life-cycle management issue rather than as a technical subject. Specifically avoiding technical language and complex mathematics, it is designed to be accessible to readers at all levels. It will be of particular interest to project managers and software engineers in industries where dependability is of particular importance, such as aerospace, process control, and mining. It will also provide useful reading material for students taking courses with modules in dependability. Felix Redmill and Chris Dale have both worked in industry for over 15 years, and now run successful consultancy businesses.
The most important use of computing in the future will be in the context of the global "digital convergence" where everything becomes digital and every thing is inter-networked. The application will be dominated by storage, search, retrieval, analysis, exchange and updating of information in a wide variety of forms. Heavy demands will be placed on systems by many simultaneous re quests. And, fundamentally, all this shall be delivered at much higher levels of dependability, integrity and security. Increasingly, large parallel computing systems and networks are providing unique challenges to industry and academia in dependable computing, espe cially because of the higher failure rates intrinsic to these systems. The chal lenge in the last part of this decade is to build a systems that is both inexpensive and highly available. A machine cluster built of commodity hardware parts, with each node run ning an OS instance and a set of applications extended to be fault resilient can satisfy the new stringent high-availability requirements. The focus of this book is to present recent techniques and methods for im plementing fault-tolerant parallel and distributed computing systems. Section I, Fault-Tolerant Protocols, considers basic techniques for achieving fault-tolerance in communication protocols for distributed systems, including synchronous and asynchronous group communication, static total causal order ing protocols, and fail-aware datagram service that supports communications by time."
Transaction Management Support for Cooperative Applications integrates Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies by first presenting a rigorous analysis of requirements presented by diverse classes of cooperative applications, ranging from cooperative authoring, through design for manufacturing, to interorganizational workflows, and then goes on to introduce a language that is suitable for the specification of cooperative activities. This language is based on a formal model and provides a collection of tools that allow the users to reason about the correctness of specifications, rather than relying on mechanisms that detect possible violations at run-time. The transaction model introduced in this monograph combines the use of private work spaces that allow individual participants to work independently, with synchronization mechanisms that allow them to combine their work to form a coherent whole. Finally, this monograph shows how the new transactional concepts developed in the project can be mapped into the transaction manager of an object-oriented database management system to provide a clean and efficient implementation. Transaction Management Support for Cooperative Applications summarizes the state of the art of key technologies in cooperative activities and transactions. This book will be extremely useful to students, researchers, and technology developers in the areas of Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies, and is suitable as a text or reference for a graduate-level course on Database Systems or ComputerSupported Cooperative Work.
This book contains the papers that have been presented at the ninth Very Large Scale Integrated Systems conference VLSI'97 that is organized biannually by IFIP Working Group 10.5. It took place at Hotel Serra Azul, in Gramado Brazil from 26-30 August 1997. Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble and Tokyo. The papers in this book report on all aspects of importance to the design of the current and future integrated systems. The current trend towards the realization of versatile Systems-on-a-Chip require attention of embedded hardware/software systems, dedicated ASIC hardware, sensors and actuators, mixed analog/digital design, video and image processing, low power battery operation and wireless communication. The papers as presented in Jhis book have been organized in two tracks, where one is dealing with VLSI System Design and Applications and the other presents VLSI Design Methods and CAD. The following topics are addressed: VLSI System Design and Applications Track * VLSI for Video and Image Processing. * Microsystem and Mixed-mode design. * Communication And Memory System Design * Cow-voltage & Low-power Analog Circuits. * High Speed Circuit Techniques * Application Specific DSP Architectures. VLSI Design Methods and CAD Track * Specification and Simulation at System Level. * Synthesis and Technology Mapping. * CAD Techniques for Low-Power Design. * Physical Design Issues in Sub-micron Technologies. * Architectural Design and Synthesis. * Testing in Complex Mixed Analog and Digital Systems.
This book constitutes the refereed proceedings of the Second
European Dependable Computing Conference, EDCC-2, held in Taormina,
Italy, in October 1996.
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
This book is the proceedings of the Workshop on the Performance Engineering of Computer and Telecommunications Systems. The workshop Was held at Liverpool John Moores University, England on the 5th and 6th September 1995. The workshop follows a series organised by the British Computer Society (BCS) Special Interest Group on Performance Engineering. The workshop addressed most techniques and experieI1ces in the Engineering of Computer and Telecommunications Systems that provide a guaranteed quality of service. Techniques such as measurements, simulation, and analytical models and their applications to ATM networks, Multimedia Systems, Distributed Systems, Access and Wide Area Networks were presented. In addition a number of papers dealt with advances in the development of analytical models, simulation architectures and the application of formal methods, stich as Process Algebra, to the specification and building of performance biased computer systems. The book is suitable for systems designers, engineers, researchers and postgraduate students interested in the design and implementation of Computer Systems, Networks and Telecommunications. Many people assisted in the arrangements and success of this workshop. I would like to thank them all and in particular the reviewers. I would also like to particularly thank our industrial sponsors GPT Public Networks Group, Liverpool and BICC Cables, Chester, England for their generous financial and material support.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.
Originally created for agile software development, scrum provides project managers with the flexibility needed to meet ever-changing consumer demands. Presenting a modified version of the agile software development framework, Scrum Project Management introduces Scrum basics and explains how to apply this adaptive technique to effectively manage a wide range of programs and complex projects. The book provides proven planning methods for controlling project scope and ensuring your project stays on schedule. It includes scrum tracking methods to help your team maintain a focus on improving throughput and streamlining communications. It also demonstrates how to: Combine traditional project management methods with scrum Adapt the familiar work breakdown structure to create scrum backlogs and sprints Use a scrum of scrums to manage programs Apply earned value management, critical path, and PERT in the context of scrum Having successfully deployed and implemented scrum across multiple companies and departments, the authors provide valuable insight into how they achieved their past successes and how they overcame the trials involved with the deployment of a scrum environment. Throughout the text they discuss improvisation, creative problem solving, and emergent phenomena-detailing the methods needed to ensure your team achieves project success.
Debugging has always been a costly part of software development, and many attempts have been made to provide automatic computer support for this task.Automated debugging has seen major develoments over the last decade. Onesuccessful development is algorithmic debugging, which originated in logic programming but was later generalized to concurrent, imperative, and lazy functional languages. Important advances have also been made in knowledge-based program debugging, and in approaches to automated debugging based on static and dynamic program slicing based on dataflow and dependence analysis technology. This is the first collected volume of papers on automated debugging and presents latest developments, tutorial papers, and surveys.
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people. Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation-whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world. So much so that OEE is quickly becoming a requirement for improving quality and substantiating capacity in leading organizations, as well as a required area of study for the ISO/TS 16949. Breaking down the methodology from a historical perspective, The OEE Primer: Understanding Overall Equipment Effectiveness, Reliability, and Maintainability explores the overall effectiveness of machines and unveils novel methods that focus on design improvement-including hazard analysis, rate of change of failure (ROCOF) analysis, failure rate finite element analysis (FEA), and theory of inventive problem solving (TRIZ). It covers loss of effectiveness, new machinery, electrical maintenance issues, Weibull distribution, measurement techniques, and mechanical and electrical reliability. The book also: Discusses Reliability and Maintainability (R&M), not as tools to be used in specific tasks, rather as a discipline Covers the application of OEE as an overall improvement tool Assesses existing and new equipment from classical, reliability, and maintainability perspectives Includes downloadable resources with more than 100 pages of appendices and additional resources featuring statistical tables, outlines, case studies, guidelines, and standards Introducing the classical approach to improvement, this book provides an understanding of exactly what OEE is and how it can be best applied to address capacity issues. Highlighting mechanical and electrical opportunities throughout, the text includes many tables, forms, and examples that clearly illustrate and enhance the material presented.
Once again the wide-ranging and rapid developments in microcomputer technology of the last few years have meant that a detailed revision of The librarian's guide to microcomputers for information management was required, if it was to fulfil its objectives of providing a single source of information on the process of automating with a microcomputer. For this new edition, we have taken into account not only the developments in hardware, but also the growing sophistication and power of software, and the growing sophistication of library and information service managers. The latter are more and more familiar with the use, or at least the principles, of microcomputers, and it no longer seems necessary to spell out certain details. We have, where relevant, indicated sources of more detailed information, particularly of practical applications, and so we hope that the changes we have made will ensure that this book remains of value to practitioner and student alike. ACKNOWLEDGEMENTS We remain, as always, grateful to those who have written or spoken about their experiences with microcomputers and have described applications. We would also like to thank the referees who commented of the book, and provided useful suggestions and on a first draft amendments. Mandy and Lindesay once again patiently accepted our absence during the writing of this edition. |
![]() ![]() You may like...
|