logo资料库

Creating Smart Enterprises-Auerbach Publications(2018).pdf

第1页 / 共409页
第2页 / 共409页
第3页 / 共409页
第4页 / 共409页
第5页 / 共409页
第6页 / 共409页
第7页 / 共409页
第8页 / 共409页
资料共409页,剩余部分请下载后查看
Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
List of Figures
List of Tables
Preface
Acknowledgments
Author
Other Books byVivek Kale
1: VUCA Ecosystem
1.1 VUCA Ecosystem
1.2 Four Industrial Generations
1.3 Trends
1.3.1 Social Trends
1.3.2 Organizational Trends
1.3.3 Business Model Trends
1.3.4 Technology Trends
1.4 From Products to Services to Experiences
1.5 Technology Advancements
1.6 Digital Economy
1.7 Intelligence Analysis
1.7.1 Intelligence Maturity Model (IMM)
1.7.1.1 Data
1.7.1.2 Communication
1.7.1.3 Information
1.7.1.4 Concept
1.7.1.5 Knowledge
1.7.1.6 Intelligence
1.7.1.7 Wisdom
1.8 SMAC Technologies
1.9 Summary
2: Aligning Business and IT Strategy
2.1 Business Strategy
2.1.1 Evolution of Strategy Management
2.1.2 Sustaining Competitive Advantage
2.1.2.1 Competitive Priorities
2.1.2.2 Porter’s Five Forces Model
2.1.2.3 Porter’s Framework of Generic Strategies
2.1.2.4 Porter’s Value Chain
2.2.1 Evolution of IT
2.2.2 Evolution of IS
2.2.3 IS/IT Governance
2.2.3.1 Alignment IT/IS with Business Strategy
2.2.3.2 Aligning Business Goals and IT Goals
2.2.3.3 Aligning business with IT/IS and Business Value from IT
2.2.3.4 Governance Frameworks
2.1.1 Evolution of Strategy Management
2.3 Summary
3: Enterprise Security Technologies
3.1 Concept of Security
3.1.1 The Triad of Confidentiality, Integrity, and Availability
3.1.1.1 Confidentiality
3.1.1.2 Integrity
3.1.1.3 Availability
3.1.2 Types of Attacks
3.1.2.1 Interception
3.1.2.2 Interruption
3.1.2.3 Modification
3.1.2.4 Fabrication
3.1.3 Threats, Vulnerabilities, and Risk
3.1.3.1 Threats
3.1.3.2 Vulnerabilities
3.1.3.3 Risk
3.1.4 Controls
3.1.4.1 Physical
3.1.4.2 Logical
3.1.4.3 Administrative
3.1.5 Defense in Depth
3.2 Identification
3.2.1 Identity Verification
3.2.2 Identity Falsification
3.3 Authentication
3.3.1 Mutual Authentication
3.3.2 Multi-factor Authentication
3.4 Authorization
3.5 Access Control
3.5.1 Access Control Models
3.6 Accountability
3.6.1 Non-repudiation
3.6.2 Deterrence
3.6.3 Intrusion Detection and Prevention
3.6.4 Admissibility of Records
3.7 Audit
3.7.1 Logging
3.7.2 Monitoring
3.7.3 Assessments
3.8 Summary
4: Process-Driven Organization
4.1 Process-Oriented Enterprise
4.1.1 Value-Add Driven Enterprise
4.2 Concept of Business Process Management (BPM)
4.2.1 Business Process
4.3 Business Process Management (BPM)
4.4 Enterprise BPM Methodology
4.4.1 Strategic Planning for Enterprise BPM
4.4.1.1 Identifying the Business Processes in the Company
4.4.2 Selecting Business Processes for BPM
4.4.3 Creating Process Maps
4.4.4 Analyzing Processes for Breakthrough Improvements
4.4.5 Innovative Breakthrough Improvement in Processes
4.4.6 Implementing Designed Processes
4.4.7 Measuring the Performance of Designed Processes
4.5 Business Process Reengineering (BPR)
4.6 Management by Collaboration (MBC)
4.7 Collaboration Technologies
4.7.1 Synchronous Communication Tools
4.7.2 Asynchronous Communication Tools
4.8 Social Software and Collaborative Systems and Tools
4.8.1 Skype
4.8.2 Dropbox
4.8.3 Google Drive and Google Docs
4.8.4 Microsoft SkyDrive
4.8.5 Microsoft OneNote
4.9 Summary
5: Analytics
5.1 Decisions
5.1.1 Types of Decisions
5.1.2 Scope of Decisions
5.2 Decision-Making Process
5.3 Decision-Making Techniques
5.3.1 Mathematical Programming
5.3.2 Multi-criteria Decision Making
5.3.3 Case-based Reasoning
5.3.4 Data Warehouse and Data Mining
5.3.5 Decision Tree
5.3.6 Fuzzy Sets and Systems
5.4 Decision Support Systems
5.4.1 Multi-Source Driven DSSs
5.4.2 Generic DSS Architecture
5.5 Analytics
5.5.1 Descriptive Analytics
5.5.2 Predictive Analytics
5.5.3 Prescriptive Analytics
5.6 Data Science Techniques
5.6.1 Database Systems
5.6.2 Statistical Inference
5.6.3 Regression and Classification
5.6.4 Data Mining and Machine Learning
5.6.5 Data Visualization
5.6.6 Text Analytics
5.6.7 Time Series and Market Research Models
5.7 Snapshot of Data Analysis Techniques and Tasks
5.8 Summary
6: Cloud Computing Basics
6.1 Cloud Definition
6.2 Cloud Characteristics
6.2.1 Cloud Storage Infrastructure Requirements
6.3 Cloud Delivery Models
6.3.1 Infrastructure as a Service (IaaS)
6.3.2 Platform as a Service (PaaS)
6.3.3 Software as a Service (SaaS)
6.4 Cloud Deployment Models
6.4.1 Private Clouds
6.4.2 Public Clouds
6.4.3 Hybrid Clouds
6.4.4 Community Clouds
6.5 Cloud Benefits
6.6 Cloud Technologies
6.6.1 Virtualization
6.6.1.1 Characteristics of Virtualized Environment
6.6.2 Service-Oriented Computing
6.6.2.1 Advantages of SOA
6.6.2.2 Layers in SOA
6.6.3 Business Processes with SOA
6.6.3.1 Process
6.6.3.2 Workflow
6.6.3.3 Business Process Management (BPM)
6.6.3.4 Business Processes via Web Services
6.7 Summary
7: Big Data Computing
7.1 Big Data
7.1.1 What Is Big Data?
7.1.1.1 Data Volume
7.1.1.2 Data Velocity
7.1.1.3 Data Variety
7.1.1.4 Data Veracity
7.1.2 Common Characteristics of Big Data Computing Systems
7.1.3 Big Data Appliances
7.2 Tools and Techniques of Big Data
7.2.1 Processing Approach
7.2.2 Big Data System Architecture
7.2.2.1 Brewer’s CAP (Consistency Availability Partition) Theorem
7.2.2.2 BASE (Basically Available, Soft State, Eventual Consistency)
7.2.2.3 Functional Decomposition
7.2.2.4 Master–Slave Replication
7.2.3 Row Partitioning or Sharding
7.2.4 Row versus Column-Oriented Data Layouts
7.2.5 NoSQL Data Management
7.2.6 In-Memory Computing
7.2.7 Developing Big Data Applications
7.3 NoSQL Databases
7.3.1 Column-Oriented Stores or Databases
7.3.2 Key–Value Stores (K–V Store) or Databases
7.3.3 Document-Oriented Databases
7.3.4 Graph Stores or Databases
7.4 Aadhaar Project
7.5 Summary
8: Web Applications
8.1 Web-Based Applications
8.1.1 Reference Architecture
8.1.1.1 User Interaction Architecture
8.1.1.2 Service-Based Architecture
8.1.1.3 Business Object Architecture
8.1.2 Realization of the Reference Architecture in J2EE
8.1.2.1 JavaServer Pages and Java Servlets as the User Interaction Components
8.1.2.2 Session Bean EJBs as Service-Based Components
8.1.2.3 Entity Bean EJBs as the Business Object Components
8.1.2.4 Distributed Java Components
8.1.2.5 J2EE Access to the EIS (Enterprise Information Systems) Tier
8.1.3 Model–View–Controller Architecture
8.2 Evolution of the Web
8.2.1 Web 1.0
8.2.2 Web 2.0
8.2.3 Web 3.0
8.2.4 Mobile Web
8.2.5 The Semantic Web
8.2.6 Rich Internet Applications
8.3 Web Applications
8.3.1 Web Applications Dimensions
8.4 Search Analysis
8.4.1 SLA Process
8.5 Web Analysis
8.5.1 Veracity of Log Files data
8.5.1.3 Visit Duration
8.5.2 Web Analysis Tools
8.5.3 Common Analysis and Reports
8.6 Summary
9: Social Network Applications
9.1 Networks
9.1.1 Concept of Networks
9.1.2 Principles of Networks
9.1.2.1 Metcalfe’s Law
9.1.2.2 Power Law
9.1.2.3 Small Worlds Networks (SWNs)
9.2 Computer Networks
9.2.1 Internet
9.2.2 World Wide Web (WWW)
9.3 Social Networks
9.3.1 Popular Social Networks
9.3.1.1 LinkedIn
9.3.1.2 Facebook
9.3.1.3 Twitter
9.3.1.4 Google+
9.3.1.5 Other Social Networks
9.4 Social Network Analysis (SNA)
9.5 Text Analysis
9.5.1 Defining Text Analysis
9.5.1.1 Document Collection
9.5.1.2 Document
9.5.1.3 Document Features
9.5.1.4 Domain Knowledge
9.5.1.5 Search for Patterns and Trends
9.5.1.6 Results Presentation
9.6 Sentiment Analysis
9.6.1 Sentiment Analysis and Natural Language Processing (NLP)
9.6.2 Applications
9.7 Summary
10: Mobile Applications
10.1 Mobile Computing Applications
10.1.1 Generations of Communication Systems
10.1.1.1 1st Generation: Analog
10.1.1.2 2nd Generation: CDMA, TDMA and GSM
10.1.1.3 2.5 Generation: GPRS, EDGE and CDMA 2000
10.1.1.4 3rd Generation: wCDMA, UMTS, and iMode
10.1.1.5 4th Generation
10.1.2 Mobile Operating Systems
10.1.2.1 Symbian
10.1.2.2 BlackBerry OS
10.1.2.3 Google Android
10.1.2.4 Apple iOS
10.1.2.5 Windows Phone
10.2 Mobile Web Services
10.2.1 Mobile Field Cloud Services
10.3 Context-Aware Mobile Applications
10.3.1 Ontology-Based Context Model
10.3.2 Context Support for User Interaction
10.4 Mobile Web 2.0
10.5 Mobile Analytics
10.5.1 Mobile Site Analytics
10.5.2 Mobile Clustering Analysis
10.5.3 Mobile Text Analysis
10.5.4 Mobile Classification Analysis
10.5.5 Mobile Streaming Analysis
10.6 Summary
11: Internet of Things (IoT) Technologies
11.1 Internet of Things
11.1.1 IoT Building Blocks
11.1.2 IoT Architecture
11.2 RFID (Radio Frequency Identification)
11.3 Wireless Sensor Networks
11.3.1 Wireless Networks
11.3.2 Sensor
11.3.3 Wireless Sensor Networks
11.3.3.1 WSN Characteristics
11.3.3.2 WSN Design Challenges
11.3.3.3 WSN Design Objectives
11.3.3.4 WSN Architecture
11.4 Sensor Data Processing
11.4.1 Sensor Data-Gathering and Data-Dissemination Mechanisms
11.5 Sensor Database
11.6 Summary
Appendix A: Internet as Extended Brain
References
Index
Creating Smart Enterprises Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies
Creating Smart Enterprises Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies By Vivek Kale
CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2018 Vivek Kale CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-4987-5128-5 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Kale, Vivek, author. Title: Creating smart enterprises : leveraging cloud, big data, web, social media, mobile and IoT technologies / Vivek Kale. Description: Boca Raton, FL : CRC Press, 2017. Identifiers: LCCN 2017019839 | ISBN 9781498751285 (hb : alk. paper) Subjects: LCSH: Technological innovations--Management. | Information technology--Management. Classification: LCC HD45 .K285 2017 | DDC 658.4/0630285--dc23 LC record available at https://lccn.loc.gov/2017019839 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com
To My wife, Girija who made me a better man, And whose smile brings light into my days. Your love and support encouraged me to chase my dreams, And any small success I have reached is as much yours as it is mine.
Contents List of Figures ....................................................................................................xv List of Tables ...................................................................................................xvii Preface ..............................................................................................................xix Acknowledgments ..........................................................................................xxiii Author .............................................................................................................. xxv Other Books by Vivek Kale ..........................................................................xxvii 1 VUCA Ecosystem ...................................................................................1 1.1 VUCA Ecosystem .............................................................................1 1.2 Four Industrial Generations ..............................................................3 1.3 Trends ...............................................................................................4 1.3.1 Social Trends ........................................................................4 1.3.2 Organizational Trends ..........................................................5 1.3.3 Business Model Trends .........................................................7 1.3.4 Technology Trends ................................................................8 1.4 From Products to Services to Experiences ..........................................9 1.5 Technology Advancements ..............................................................10 1.6 Digital Economy .............................................................................14 Intelligent Analysis ..........................................................................17 1.7 Intelligence Maturity Model (IMM) ...................................19 1.7.1 1.7.1.1 Data .....................................................................20 1.7.1.2 Communication ...................................................20 1.7.1.3 Information ..........................................................20 1.7.1.4 Concept ...............................................................21 1.7.1.5 Knowledge ...........................................................21 1.7.1.6 Intelligence ...........................................................23 1.7.1.7 Wisdom ...............................................................24 SMACT Technologies .....................................................................24 Summary .........................................................................................26 2 Aligning Business and IT Strategy .......................................................27 2.1 Business Strategy .............................................................................28 2.1.1 Evolution of Strategy Management .....................................28 1.8 1.9 vii
分享到:
收藏