- Table View
- List View
Enterprise Cloud Computing
by Gautam ShroffCloud computing promises to revolutionize IT and business by making computing available as a utility over the internet. This book is intended primarily for practising software architects who need to assess the impact of such a transformation. It explains the evolution of the internet into a cloud computing platform, describes emerging development paradigms and technologies, and discusses how these will change the way enterprise applications should be architected for cloud deployment. Gautam Shroff provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services, programming paradigms such as MapReduce, as well as 'do-it-yourself' hosted development tools. He also describes emerging technologies critical to cloud computing. The book also covers the fundamentals of enterprise computing, including a technical introduction to enterprise architecture, so it will interest programmers aspiring to become software architects and serve as a reference for a graduate-level course in software architecture or software engineering.
Enterprise Cloud Computing for Non-Engineers (Technology for Non-Engineers)
by Stephan Jones Frank GroomThis book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.
Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles
by Adrian Pruteanu Zeal VoraKey Features Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform Practical examples to ensure you secure your Cloud environment efficiently A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Book Description Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. What you will learn Configure your firewall and Network ACL Protect your system against DDOS and application-level attacks Explore cryptography and data security for your cloud Get to grips with configuration management tools to automate your security tasks Perform vulnerability scanning with the help of the standard tools in the industry Learn about central log management
Enterprise Content Management in Information Systems Research
by Jan Vom Brocke Alexander SimonsThis book collects ECM research from the academic discipline of Information Systems and related fields to support academics and practitioners who are interested in understanding the design, use and impact of ECM systems. It also provides a valuable resource for students and lecturers in the field. "Enterprise content management in Information Systems research - Foundations, methods and cases" consolidates our current knowledge on how today's organizations can manage their digital information assets. The business challenges related to organizational information management include reducing search times, maintaining information quality, and complying with reporting obligations and standards. Many of these challenges are well-known in information management, but because of the vast quantities of information being generated today, they are more difficult to deal with than ever. Many companies use the term "enterprise content management" (ECM) to refer to the management of all forms of information, especially unstructured information. While ECM systems promise to increase and maintain information quality, to streamline content-related business processes, and to track the lifecycle of information, their implementation poses several questions and challenges: Which content objects should be put under the control of the ECM system? Which processes are affected by the implementation? How should outdated technology be replaced? Research is challenged to support practitioners in answering these questions.
Enterprise Content Management with Microsoft SharePoint
by Christopher D. Riley Shadrach White<p>Meet the challenges of Enterprise Content Management (ECM) head on, using rich ECM features in Microsoft SharePoint 2013. Led by two ECM experts, you’ll learn how to build a solid information architecture (IA) for managing documents, knowledge, web content, digital assets, records, and user-generated content throughout your organization. Examples and case studies are based on the authors’ real-world experience.</p>
Enterprise Content and Search Management for Building Digital Platforms
by Shailesh Kumar ShivakumarProvides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital Platforms provides modern enterprises with the necessary tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques to compete in the today’s digital world. Features include comprehensive discussions on content strategy, content key performance indicators (KPIs), mobile-first strategy, content assessment models, various practical techniques and methodologies successfully used in real-world digital programs, relevant case studies, and more. Initial chapters cover core concepts of a content management system (CMS), including content strategy; CMS architecture, templates, and workflow; reference architectures, information architecture, taxonomy, and content metadata. Advanced CMS topics are then covered, with chapters on integration, content standards, digital asset management (DAM), document management, and content migration, evaluation, validation, maintenance, analytics, SEO, security, infrastructure, and performance. The basics of enterprise search technologies are explored next, and address enterprise search architecture, advanced search, operations, and governance. Final chapters then focus on enterprise program management and feature coverage of various concepts of digital program management and best practices—along with an illuminating end-to-end digital program case study. Comprehensive and cutting-edge, Enterprise Content and Search Management for Building Digital Platforms is an invaluable reference resource for creating an optimal enterprise digital eco-system to meet the challenges of today’s hyper-connected world.
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
by Bob ChaputThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will LearnRead new information and treat ECRM and cybersecurity as a value creatorReceive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boardsThink differently about funding ECRM and cybersecurity initiativesUnderstand the most critical ECRM decision that boards must facilitate in their organizationsUse practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy“This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.
Enterprise Cybersecurity
by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul AslamUnify your organization''s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. Enterprise Cybersecurity presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise''s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. What you''ll learn Executives, managers, architects, IT professionals, customers and vendors of cybersecurity services, and engineering students will learn from this book How to create a data-driven and objectively-managed cybersecurity program optimally tailored to your organization How to organize, assess, and score cybersecurity programs using the authors'' enterprise cybersecurity architecture scheme The methodology of targeted attacks and why they succeed The processes of cybersecurity risk management, capability assessment, scope selection, operations, and supporting information systems How to audit and report your cybersecurity program in compliance with regulatory frameworks How cybersecurity is evolving and projected to evolve Who this book is for Enterprise Cybersecurity is for people and organizations interested in modern cybersecurity and who are responsible for leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. Table of Contents Part I: The Cybersecurity Challenge Chapter 1: Defining the Cybersecurity Challenge Chapter 2: Meeting the Cybersecurity Challenge Part II: A New Enterprise Cybersecurity Architecture Chapter 3: Enterprise Cybersecurity Architecture Chapter 4: Implementing Enterprise Cybersecurity Chapter 5: Operating Enterprise Cybersecurity Chapter 6: Enterprise Cybersecurity and the Cloud Chapter 7: Enterprise Cybersecurity for Mobile and BYOD Part III: The Art of Cyberdefense Chapter 8: Building an Effective Defense Chapter 9: Responding to Incidents Chapter 10: Managing a Cybersecurity Crisis Part IV: Enterprise Cyberdefense Assessment Chapter 11: Assessing Enterprise Cybersecurity Chapter 12: Measuring a Cybersecurity Program Chapter 13: Mapping Against Cybersecurity Frameworks Part V: Enterprise Cybersecurity Program Chapter 14: Managing an Enterprise Cybersecurity Program Chapter 15: Looking to the Future Appendices: Appendix A: Common Cyberattacks Appendix B: Cybersecurity Frameworks Appendix C: Enterprise Cybersecurity Capabilities Appendix D: Sample Cybersecurity Policy Appendix E: Cybersecurity Operational Processes Appendix F: Object Measurement Appendix G: Cybersecurity Capability Value Scales Appendix H: Cybersecurity Sample Assessment Appendix I: Net...
Enterprise Cybersecurity Study Guide: How To Build A Successful Cyberdefense Program Against Advanced Threats
by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul AslamUse the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.What You’ll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade Who This Book Is For Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.
Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization
by Ariel EvansCyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.
Enterprise Data Governance: Reference and Master Data Management Semantic Modeling
by Pierre BonnetIn an increasingly digital economy, mastering the quality of data is an increasingly vital yet still, in most organizations, a considerable task. The necessity of better governance and reinforcement of international rules and regulatory or oversight structures (Sarbanes Oxley, Basel II, Solvency II, IAS-IFRS, etc.) imposes on enterprises the need for greater transparency and better traceability of their data. All the stakeholders in a company have a role to play and great benefit to derive from the overall goals here, but will invariably turn towards their IT department in search of the answers. However, the majority of IT systems that have been developed within businesses are overly complex, badly adapted, and in many cases obsolete; these systems have often become a source of data or process fragility for the business. It is in this context that the management of ‘reference and master data’ or Master Data Management (MDM) and semantic modeling can intervene in order to straighten out the management of data in a forward-looking and sustainable manner. This book shows how company executives and IT managers can take these new challenges, as well as the advantages of using reference and master data management, into account in answering questions such as: Which data governance functions are available? How can IT be better aligned with business regulations? What is the return on investment? How can we assess intangible IT assets and data? What are the principles of semantic modeling? What is the MDM technical architecture? In these ways they will be better able to deliver on their responsibilities to their organizations, and position them for growth and robust data management and integrity in the future.
Enterprise Data Workflows with Cascading: Streamlined Enterprise Data Management and Analysis
by Paco NathanThere is an easier way to build Hadoop applications. With this hands-on book, you’ll learn how to use Cascading, the open source abstraction framework for Hadoop that lets you easily create and manage powerful enterprise-grade data processing applications—without having to learn the intricacies of MapReduce.Working with sample apps based on Java and other JVM languages, you’ll quickly learn Cascading’s streamlined approach to data processing, data filtering, and workflow optimization. This book demonstrates how this framework can help your business extract meaningful information from large amounts of distributed data.Start working on Cascading example projects right awayModel and analyze unstructured data in any format, from any sourceBuild and test applications with familiar constructs and reusable componentsWork with the Scalding and Cascalog Domain-Specific LanguagesEasily deploy applications to Hadoop, regardless of cluster location or data sizeBuild workflows that integrate several big data frameworks and processesExplore common use cases for Cascading, including features and tools that support themExamine a case study that uses a dataset from the Open Data Initiative
Enterprise Data at Huawei: Methods and Practices of Enterprise Data Governance
by Yun Ma Hao DuThis book systematically introduces the data governance and digital transformation at Huawei, from the perspectives of technology, process, management, and so on. Huawei is a large global enterprise engaging in multiple types of business in over 170 countries and regions. Its differentiated operation is supported by an enterprise data foundation and corresponding data governance methods. With valuable experience, methodology, standards, solutions, and case studies on data governance and digital transformation, enterprise data at Huawei is ideal for readers to learn and apply, as well as to get an idea of the digital transformation journey at Huawei. This book is organized into four parts and ten chapters. Based on the understanding of “the cognitive world of machines,” the book proposes the prospects for the future of data governance, as well as the imaginations about AI-based governance, data sovereignty, and building a data ecosystem.
Enterprise Design, Operations, and Computing. EDOC 2022 Workshops: IDAMS, SoEA4EE, TEAR, EDOC Forum, Demonstrations Track and Doctoral Consortium, Bozen-Bolzano, Italy, October 4–7, 2022, Revised Selected Papers (Lecture Notes in Business Information Processing #466)
by Giancarlo Guizzardi Marco Montali Henderik A. Proper Fabrizio Maria Maggi Claudenir M. Fonseca Tiago Prince SalesThis book constitutes revised selected papers from the international workshops, the EDOC Forum and the Demonstration and Doctoral Consortium track, that were held at the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022. The conference took place in Bozen-Bolzano, Italy, during October 3–7, 2022.The conference focuses on the area of enterprise computing, this year with the special emphasis on the theme of designing and operating “Flexible Enterprises”. Workshops within EDOC cover more focused topics and allow for the presentation and discussion of work that is in the earlier development stages. The 18 full and 8 short papers included in this volume were carefully reviewed and selected from 82 submissions. They stem from the following satellite events: – Workshop on Intelligent Digital Architecture, Methods, and Services for Industry 4.0 and Society 5.0 (IDAMS) – 14th Workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE) – 17th Workshop on Trends in Enterprise Architecture Research (TEAR) – EDOC Forum – Demonstrations Track – Doctoral Consortium
Enterprise Design, Operations, and Computing. EDOC 2023 Workshops: IDAMS, iRESEARCH, MIDas4CS, SoEA4EE, EDOC Forum, Demonstrations Track and Doctoral Consortium, Groningen, The Netherlands, October 30–November 3, 2023, Revised Selected Papers (Lecture Notes in Business Information Processing #498)
by Marten Van Sinderen Henderik A. Proper Sybren De Kinderen Dimka Karastoyanova Tiago Prince Sales Luise PufahlThis volume constitutes revised selected papers of several workshops, the EDOC Forum and the Demonstrations and Doctoral Consortium track, which were held in conjunction with the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, in Groningen, The Netherlands, during October 30–November 3, 2023. The 18 revised full papers and 7 short papers presented in this book were carefully reviewed and selected from 37 submissions. They stem from the following satellite events: - Workshop on Intelligent Digital Architecture, Methods, and Services for Industry 4.0 and Society 5.0 (IDAMS)- Workshop on Empirical Methodologies for Research in Enterprise Architecture and Service-Oriented Computing (iRESEARCH)- Workshop on the Modelling and Implementation of Digital Twins for Complex Systems (MIDas4CS)- Workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE)- EDOC Forum- Demonstrations Track- Doctoral Consortium
Enterprise Design, Operations, and Computing. EDOC 2024 Workshops: iRESEARCH, MIDas4CS, Doctoral Consortium, Joint CBI–EDOC Forum and Other Joint CBI-EDOC Events, Vienna, Austria, September 10–13, 2024, Revised Selected Papers (Lecture Notes in Business Information Processing #537)
by Henderik A. Proper Monika Kaczmarek-Heß Marianne Schnellmann Kristina Rosenthal Marek Suchánek Miguel Mira Da SilvaThis volume constitutes revised selected papers of two workshops, the Doctoral Consortium, the Joint CBI-EDOC Forum and and other Joint CBI-EDOC event, which were held in conjunction with the 28th International Conference on Enterprise Design, Operations, and Computing, EDOC 2024, in Vienna, Austria, in September 10–13, 2024. The presented revised full papers in this book were carefully reviewed and selected. They stem from the following satellite events: iRESEARCH – 2nd International Workshop on Empirical Methodologies for Research in Enterprise Architecture and Service-oriented Computing MIDas4CS – 2nd Workshop on the Modelling and Implementation of Digital Twins for Complex Systems Joint CBI–EDOC Forum Joint CBI–EDOC Case Reports Track Joint CBI–EDOC Tools & Demos Track EDOC Doctoral Consortium CBI Mini Dagstuhl Seminars
Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science #13585)
by Giancarlo Guizzardi Marco Montali João Paulo A. Almeida Dimka Karastoyanova Fabrizio Maria Maggi Claudenir M. FonsecaThis book constitutes the proceedings of the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, which took place in Bozen-Bolzano, Italy, in October 2022. The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications.
Enterprise Design, Operations, and Computing: 27th International Conference, EDOC 2023, Groningen, The Netherlands, October 30 – November 3, 2023, Proceedings (Lecture Notes in Computer Science #14367)
by Marten Van Sinderen João Moreira Henderik A. Proper Dimka Karastoyanova Luise PufahlThis book constitutes the refereed proceedings of the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, held in Groningen, The Netherlands, during October 30–November 3, 2023.The 12 full papers included in this book were carefully reviewed and selected from 36submissions. They were organized in topical sections as follows: Enterprise Modeling, Enterprise Architecture & Engineering, Model-Based Software Engineering, Enterprise Analysis with Process Mining, Process Improvement & Engineering, and Modeling in an Enterprise Context.
Enterprise Design, Operations, and Computing: 28th International Conference, EDOC 2024, Vienna, Austria, September 10–13, 2024, Revised Selected Papers (Lecture Notes in Computer Science #15409)
by Henderik A. Proper José Borbinha Tiago Prince Sales Marianne Schnellmann Miguel Mira Da SilvaThis book constitutes the refereed proceedings of the 28th International Conference on Enterprise Design, Operations, and Computing, EDOC 2024, held in Vienna, Austria, during September 10–13, 2024. The 18 full papers included in this book were carefully reviewed and selected from 70 submissions. They were organized in topical sections as follows: AI, ML and Agents; BPM and WFM; Business Models, Platforms and Strategic Management; Enterprise and IT Architecture; IT and Software Architecture; Modeling Methods, Data and Component; Process Mining and Monitoring; and Sustainability and Resilience.
Enterprise DevOps Framework: Transforming It Operations
by Shamayel M. FarooquiTransform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile and DevOps transformation.In Enterprise DevOps Framework author Shamayel Farooqui shows you how agile adoption will enable your organization to stay ahead in an ever-changing business environment and meet your customers’ needs. He includes detailed references to key concepts such as agile, hybrid and cloud technology, infrastructure management, and process automation.What You’ll LearnEstablish the focus areas for your IT organizationPrepare for the challenges of transforming your enterprise to a DevOps, agile organizationKnow the key steps for executing an enterprise DevOps strategyBuild a strong team of DevOps individuals focused on improving the efficiency of your organization through Agile methodologies, automation, cloud adoption, and “infrastructure as code” practicesWho This Book Is For IT administrators, operational personnel, cloud professionals, DevOps professionals, human resources professionals, managers, and C-level staff
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
by Jeroen MulderAn architect's guide to designing, implementing, and integrating DevOps in the enterpriseKey FeaturesDesign a DevOps architecture that is aligned with the overall enterprise architectureDesign systems that are ready for AIOps and make the move toward NoOpsArchitect and implement DevSecOps pipelines, securing the DevOps enterpriseBook DescriptionDigital transformation is the new paradigm in enterprises, but the big question remains: is the enterprise ready for transformation using native technology embedded in Agile/DevOps? With this book, you'll see how to design, implement, and integrate DevOps in the enterprise architecture while keeping the Ops team on board and remaining resilient. The focus of the book is not to introduce the hundreds of different tools that are available for implementing DevOps, but instead to show you how to create a successful DevOps architecture. This book provides an architectural overview of DevOps, AIOps, and DevSecOps – the three domains that drive and accelerate digital transformation. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this DevOps book will help you to successfully integrate DevOps into enterprise architecture. You'll learn what AIOps is and what value it can bring to an enterprise. Lastly, you will learn how to integrate security principles such as zero-trust and industry security frameworks into DevOps with DevSecOps. By the end of this DevOps book, you'll be able to develop robust DevOps architectures, know which toolsets you can use for your DevOps implementation, and have a deeper understanding of next-level DevOps by implementing Site Reliability Engineering (SRE).What you will learnCreate DevOps architecture and integrate it with the enterprise architectureDiscover how DevOps can add value to the quality of IT deliveryExplore strategies to scale DevOps for an enterpriseArchitect SRE for an enterprise as next-level DevOpsUnderstand AIOps and what value it can bring to an enterpriseCreate your AIOps architecture and integrate it into DevOpsCreate your DevSecOps architecture and integrate it with the existing DevOps setupApply zero-trust principles and industry security frameworks to DevOpsWho this book is forThis book is for enterprise architects and consultants who want to design DevOps systems for the enterprise. It provides an architectural overview of DevOps, AIOps, and DevSecOps. If you're looking to learn about the implementation of various tools within the DevOps toolchain in detail, this book is not for you.
Enterprise Development with Flex: Best Practices for RIA Developers (Adobe Developer Library)
by Yakov Fain Victor Rasputnis Anatole TartakovskyIf you want to use Adobe Flex to build production-quality Rich Internet Applications for the enterprise, this groundbreaking book shows you exactly what's required. You'll learn efficient techniques and best practices, and compare several frameworks and tools available for RIA development -- well beyond anything you'll find in Flex tutorials and product documentation. Through many practical examples, the authors impart their considerable experience to help you overcome challenges during your project's life cycle. Enterprise Development with Flex also suggests proper tools and methodologies, guidelines for determining the skill sets required for the project, and much more. Choose among several frameworks to build Flex applications, including Cairngorm, PureMVC, Mate, and Clear Toolkit Apply selected design patterns with Flex Learn how to extend the Flex framework and build your own component library Develop a sample AIR application that automatically synchronizes local and remote databases to support your sales force Get solutions for leveraging AMF protocol and synchronizing Flex client data modifications with BlazeDS-based servers Determine the actual performance of your application and improve its efficiency
Enterprise Digital Reliability: Building Security, Usability, and Digital Trust
by Manoj KuppamGain a comprehensive understanding of digital reliability to ensure consistent, dependable user experiences that foster trust in technology. Part of author Saurav Bhattacharya’s trilogy that covers the essential pillars of digital ecosystems—security, reliability, and usability—this book tackles the challenges of achieving high reliability in complex systems and provides strategies to overcome these obstacles. You’ll start by reviewing the pivotal role of reliability in establishing the foundation of digital trust, essential for the sustainable growth of digital ecosystems. In today's digital landscape, characterized by rapid technological advancements and increasing cyber threats, understanding and addressing reliability issues are paramount. As transformative technologies like AI, blockchain, and quantum computing emerge, grasping these fundamental principles becomes crucial. Enterprise Digital Reliability advocates for collaborative efforts among technologists, policymakers, and society to create digital environments that are innovative, inclusive, safe, and respectful of human values. What You Will Learn Understand the multifaceted concept of reliability in technology and its significance in building digital trust Foster innovation and inclusivity in digital environments and large-scale enterprise and explore strategies to address them effectively Provide a framework for understanding and achieving digital equilibrium Examine operational uptime and consistent user experiences crucial to successful digital platforms Who This Book Is For Cybersecurity Professionals, Technology Developers and Engineers
Enterprise Digital Transformation: Technology, Tools, and Use Cases
by Pethuru Raj Sathyan Munirathinam Peter AugustineDigital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.
Enterprise Drupal 8 Development
by Todd TomlinsonSuccessfully architect a Drupal 8 website that scales to meet project requirements of any size and scope. Starting with a one-chapter review of Drupal basics, you'll dive into deeper topics including software development processes, architecting a Drupal site, scaling Drupal, working effectively with themes, and more. In addition to a thorough discussion of custom module development and how to develop modules as building blocks, you'll also review many common ways of integrating Drupal with other 3rd party systems.Building and maintaining an enterprise-ready Drupal website presents a unique set of challenges and complexities. From development processes and content management to deployments, version control and more, all aspects of Drupal development are impacted when two or more developers are on a project. If you are involved in a Drupal project that requires frequent updates and long-term support from a team of developers, system administrators, and end-users, Enterprise Drupal 8 Development is for you. Whether you're an experienced Drupal developer looking to expand your skills, a systems administrator managing a Drupal project, or a PHP developer new to Drupal, Enterprise Drupal 8 Development will give you the knowledge and inspiration you need to manage large and complex projects.What You'll LearnArchitect Drupal for development teams and apply best practices for large Drupal projectsIntegrate 3rd party applications with DrupalManage content, code, and configuration across multiple staging environmentsBuild a consistent user experience for administrators and content creatorsWho This Book Is ForThe primary audience is intermediate to advanced Drupal developers who are working on large-scale Drupal projects and advanced PHP developers new to DrupalThe secondary audience is IT Professionals such as Systems Administrators managing Drupal projects