by
Brandl, Dennis.
Call Number
004 23
Publication Date
2013
Summary
Information Technology (IT) is an important element of plant floor operations and Dennis Brandl's monthly column on Manufacturing IT in Control Engineering magazine covers IT aspects that are critical to modern manufacturing. This book expands on the magazine's explanations of the concepts and tools needed to achieve higher manufacturing productivity and efficiencies. Written for manufacturing professionals, the book overviews the wide range of IT elements underlying the manufacturing IT environment. It provides you with the information to be conversant in IT elements and to effectively manage and participate in manufacturing IT projects.
Format:
Electronic Resources
Relevance:
0.0477
by
Coffing, Tom.
Call Number
005.7565 23
Publication Date
2013
Summary
Annotation 'This book will make every IT/Developer in your company a superstar. This book is designed to teach IT and developers everything they want to know about Teradata while leaving no stone unturned. They are going to see and understand Teradata at a level theyve never understood it before. It is a brilliant way to explain what is happening in Teradata down to the most detailed levels. Like the rest of the Genius Series, it takes a building block approach to allow readers to continually see how the data is laid out, how to design the tables as well as understand the mechanisms that Teradata uses, and understand why Teradata is the best data warehouse in the world.
Format:
Electronic Resources
Relevance:
1.5576
View Other Search Results
by
Karkala, Ashwin Kumar.
Call Number
005.7585 23
Publication Date
2011
Format:
Electronic Resources
Relevance:
31267.4121
by
DiPietro, Robin.
Call Number
647.940687 WOR
Publication Date
2010
Format:
Electronic Resources
Relevance:
0.0737
by
Gunasekaran, A.
Call Number
658.4038011 22
Publication Date
2010
Summary
This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses. Part I of the book, "Health Care Information Systems", focuses on providing global leadership for the optimal use of health care information technology (IT). It provides knowledge about the best use of information systems for the betterment of health care services. Part II, Business Process Information Systems, extends the previous theory in the area of process develo.
Format:
Electronic Resources
Relevance:
1.2757
by
Sharp, Alec.
Call Number
658.4063 22
Publication Date
2009
Summary
This extensively revised second edition of the acclaimed and bestselling book, Workflow Modeling, serves as a complete guide to discovering, scoping, assessing, modeling, and redesigning business processes. Providing proven techniques for identifying, modeling, and redesigning business processes, and explaining how to implement workflow improvement, this book helps you define requirements for systems development or systems acquisition.
Format:
Electronic Resources
Relevance:
2.3112
by
Williams, Bob, 1947-
Call Number
388.3 22
Publication Date
2008
Summary
This one-stop resource provides a state-of-the-art review of intelligent transport systems, services, and supporting technologies, and updates you on the latest ITS standards governing communications, technical support, information technology, and identification technology. You find details on standards covering everything from traveler information and traffic management, to weather monitoring and emergency response.
Format:
Electronic Resources
Relevance:
0.0737
by
Ash, Gerald W.
Call Number
658.4038 ASH
Publication Date
2007 2006
Format:
Books
Relevance:
71875.7188
by
Heuvel, Willem-Jan van den.
Call Number
658.4038011 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
2.3236
by
Betz, Charles T.
Call Number
004 22
Publication Date
2007
Summary
How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles? This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," IT Resource Planning, and related terms. This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself. Features The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise. He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences. He is the sole author of the popular www.erp4it.com weblog. Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help? Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management? Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real? Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow? The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. Among the specific topics addressed are: * ITIL recommendations from a practical systems implementation point of view * Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals. * Interrelationships between IT portfolio planning, solutions development, and IT operations * The relationship between application development and hosting (infrastructure) organizations * Business intelligence, performance management, and metrics for the IT capability itself * Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications * IT portfolio degradation through complexity * Detailed models of IT information * The various classes of systems used internally by large scale IT organizations * The concept of "repository" and its relationship to the Configuration Management Database (CMDB) * Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management. * Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.
Format:
Electronic Resources
Relevance:
41501.0977
by
Contos, Brian T.
Call Number
658.478 P578 22
Publication Date
2007
Summary
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Format:
Electronic Resources
Relevance:
43629.6211
12.
by
Neapolitan, Richard E.
Call Number
332.01519542 22
Publication Date
2007
Summary
Bayesian Networks are a form of probabilistic graphical models and they are used for modeling knowledge in many application areas, from medicine to image processing. They are particularly useful for business applications, ans * Unique coverage of probabilistic reasoning topics applied to business problems, including marketing, banking, operations management, and finance. * Shares insights about when and why probabilistic methods can and cannot be used effectively; * Complete review of Bayesian networks and probabilistic methods for those IT professionals new to informatics.
Format:
Electronic Resources
Relevance:
0.0680
Limit Search Results
Narrowed by: