Showing 1–24 of 37 results
Three dominant forces worldwide are driving change today in our financial markets: competition, technology and regulation. But their collective impact in reshaping the markets, though they may be viewed individually as desirable or well-intentioned, is producing challenging results that are difficult to predict, hard to control and not easy to understand. Extreme market turbulence has underlined the key issues as much attention turns to the appropriate regulatory response. That is the backdrop for this thought-provoking book, emerging from a Baruch College Conference on equity market structure in the aftermath of the global financial crisis, and featuring contributions from an acclaimed panel of international scholars, policymakers, regulators, and industry leaders.
The field of enterprise systems integration is constantly evolving, as every new technology that is introduced appears to make all previous ones obsolete. Despite this continuous evolution, there is a set of underlying concepts and technologies that have been gaining an increasing importance in this field. Examples are asynchronous messaging through message queues, data and application adapters based on XML and Web services, the principles associated with the service-oriented architecture (SOA), service composition, orchestrations, and advanced mechanisms such as correlations and long-running transactions.
This book constitutes the revised selected papers of the workshops of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, in December 2013. The conference hosted the following five workshops: 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA’13); 1st International Workshop on Cloud Service Brokerage (CSB’13); 1st International Workshop on Pervasive Analytical Service Clouds for the Enterprise and Beyond (PASCEB’13); 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE’13); 9th International Workshop on Engineering Service-Oriented Applications (WESOA’13); and a PhD Symposium, with best papers also being included in this book.
Focused on web application development, the book considers client-side computing, server-side computing, and database applications.
Der Markt für IT-Dienstleistungen wächst beständig, der Trend zur Verlagerung auf externe Anbieter setzt sich fort. Hersteller, Händler, Lieferanten und Dienstleister verwenden AGB, die häufig unwirksam sind und so große Risiken in sich bergen. Besonders für Nicht-Juristen bietet dieses Buch eine Grundlage zur Überprüfung, Verhandlung und Gestaltung von AGB-Klauseln im IT-Umfeld.
An in-depth look at how today’s businesses use information technologies.
Many businesses look for candidates who know how to use information systems, making a general understanding of information systems an asset to any business professional. Laudon and Laudon continue to emphasize how business objectives shape the application of new information systems and technologies.
The tenth edition features new opening, closing, and Interactive Session cases, as well as updated text, figures, tables, and cases.
Authors: Cordon, C., Garcia-Milà, P., Ferreiro Vilarino, T., Caballero, P.Explains how big data will change every company in the worldProvides frameworks and tools to allow executives from traditional industries to leverage the big data transformationIncludes case studies from well-known companies like LEGO, Yamato and MediqThis book presents strategies and practices to allow everyday companies to cope with the fundamentally changing landscape of business models and to take advantage of the huge business opportunities arising from the advent of big data.
Leverage big data to add value to your business Social media analytics, web–tracking, and other technologies help companies acquire and handle massive amounts of data to better understand their customers, products, competition, and markets. Armed with the insights from big data, companies can improve customer experience and products, add value, and increase return on investment. The tricky part for busy IT professionals and executives is how to get this done, and that′s where this practical book comes in.
Information doesn’t just provide a window on the business, increasingly it is the business. The global economy is moving from products to services which are described almost entirely electronically. Even those businesses that are traditionally associated with making things are less concerned with managing the manufacturing process (which is largely outsourced) than they are with maintaining their intellectual property.Information-Driven Business helps you to understand this change and find the value in your data.
Whether you’re preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides you with a comprehensive, practical introduction to IT service management. Building on their collective, extensive service management experience, the authors of this book walk you through essential concepts including the service lifecycle, processes, functions and roles and illustrate these with real-life examples.
The most authoritative guide to preparing for the ITIL Foundation Certificate in IT Service Management. It includes an extensive range of practice questions complete with explanations and key learning points and will greatly assist anyone sitting or intending to sit the ITIL Service Management Foundation Certificate. This new edition provides a wealth of background knowledge and sample questions and is compatible with the 2011 update to ITIL®. The guide utilises the experience of three established independent service management consultants and experienced lecturers.
While there are many other books on research methods, Research in Organizations differs from them in applying these methods to the study of organizations, supported by numerous case studies illustrating each process. A comprehensive beginner’s research text, the book covers the foundations and methods relevant to doing research in organizations, as well as the identification of research questions and the ethical conduct of research. Research in Organizations offers a holistic perspective of the subject that embraces quantitative, qualitative, and mixed-methodology research procedures.
Anschauliches Buch für Sozial- und Wirtschaftswissenschaftler, die in der (universitären) Grundausbildung eine Programmiersprache erlernen. Es stellt die Grundlagen von Programmiersprachen – insbesondere JAVA™ vor – und erprobt sie anhand grafischer Benutzungsoberflächen.
In a time of unremitting, accelerating technological change, James W. Cortada offers a calm, intelligent path through the wilderness, helping managers understand the big picture and successfully manage the transition to the Internet economy. Cortada shows how to get past the glitter and hype associated with innovation, and leverage the best of the new technologies, without abandoning management fundamentals that are more important today than ever. Cortada demonstrates how to manage and work as your firm transforms itself from an Industrial Age enterprise to an eBusiness – describing exactly what is changing, how to live in both worlds, and where your future sources of profit and personal success are most likely to come from.
The definitive guide to how to technology is developing and changing. From the industrial revolution to the railway age, through the era of electrification, the advent of mass production and finally to the information age, the same pattern keeps repeating itself. An exciting, vibrant phase of innovation and financial speculation is followed by a crash, after which begins a longer, more stately period during which the technology is actually deployed properly
A close look at cloud computing’s transformational role in businessCovering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they can focus on their business. It also reveals the cloud’s effect on corporate organization structures, the evolution of traditional IT in the global economy, potential benefits and risks of cloud models and most importantly, how the IT function is being rethought by companies today who are making room for the coming tidal wave that is cloud computing.
This book shows how to apply pattern ideas in business applications. It presents more than 20 structural and behavioral business patterns that use the REA (resources, events, agents) pattern as a common backbone. The developer working on business frameworks can use the patterns to derive the right abstractions and to design and ensure that the meta-rules are followed by the developers of the actual applications.
The humor and insights in the 2nd Edition of Managing Humans are drawn from Michael Lopp’s management experiences at Apple, Netscape, Symantec, and Borland, among others. This book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other and occasionally throw chairs. It is a place full of dysfunctional bright people who are in an incredible hurry to find the next big thing so they can strike it rich and then do it all over again. Among these people are managers, a strange breed of people who, through a mystical organizational ritual, have been given power over the future and bank accounts of many others.
Every business manager needs intelligence to find suppliers, mobilize capital, win customers and fend off rivals. Obtaining this is often an unplanned, instinctive process. The manager who has a conscious, systematic approach to acquiring intelligence will be better placed to recognize and seize opportunities whilst safeguarding the organization against the competitive risks that endanger its prosperity a " and sometimes even its survival. Christopher Murphy’s Competitive Intelligence explains: a the theory of business competition a how companies try to get ahead of their rivals a methods of research and sources of information that generate the raw material for creating intelligence a analytical techniques which transform the mass of facts and opinions thus retrieved into a platform of sound, useable knowledge to support informed business decision making.
The wind energy industry in Germany has an excellent global standing when it comes to the development and construction of wind turbines. Germany currently represents the world′s largest market for wind energy. The ongoing development of ever more powerful wind turbines plus additional requirements for the design and construction of their offshore foundation structures exceeds the actual experiences gained so far in the various disciplines concerned. This book gives a comprehensive overview for planning and structural design analysis of reinforced concrete and pre–stressed concrete wind turbine towers for both, onshore and offshore wind turbines.
This book provides care providers and other non-technical readers with a broad, practical overview of the changing US healthcare system and the contemporary health informatics systems and tools that are increasingly critical to its new financial and clinical care paradigms. US healthcare delivery is dramatically transforming and informatics is at the center of the changes. Increasingly care providers must be skilled users of informatics tools to meet federal mandates and succeed under value-based contracts that demand higher quality and increased patient satisfaction but at lower cost.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.
An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.
This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment―including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.
Terrifying, educational, informative, frightening, scary, real. Discover why you and the digital world are at risk. 150 antivirus companies have the same problem and they can destroy your data and hurt your business. Imagine your company losing customer data, products and suppliers. Imagine you losing your school work, years of his family photographs destroyed. Imagine being paralyzed governments. This threat is real and immediate. We openly report a didactic way for anyone and even including all codes.
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection.
Showing 1–24 of 37 results