por
Brandl, Dennis.
Signatura topográfica preferida
004 23
Fecha de publicación
2013
Resumen
Information Technology (IT) is an important element of plant floor operations and Dennis Brandl's monthly column on Manufacturing IT in Control Engineering magazine covers IT aspects that are critical to modern manufacturing. This book expands on the magazine's explanations of the concepts and tools needed to achieve higher manufacturing productivity and efficiencies. Written for manufacturing professionals, the book overviews the wide range of IT elements underlying the manufacturing IT environment. It provides you with the information to be conversant in IT elements and to effectively manage and participate in manufacturing IT projects.
Formato:
Recursos electrónicos
Relevancia:
0.0477
por
Coffing, Tom.
Signatura topográfica preferida
005.7565 23
Fecha de publicación
2013
Resumen
Annotation 'This book will make every IT/Developer in your company a superstar. This book is designed to teach IT and developers everything they want to know about Teradata while leaving no stone unturned. They are going to see and understand Teradata at a level theyve never understood it before. It is a brilliant way to explain what is happening in Teradata down to the most detailed levels. Like the rest of the Genius Series, it takes a building block approach to allow readers to continually see how the data is laid out, how to design the tables as well as understand the mechanisms that Teradata uses, and understand why Teradata is the best data warehouse in the world.
Formato:
Recursos electrónicos
Relevancia:
1.5576
Ver otros resultados de búsqueda
por
Karkala, Ashwin Kumar.
Signatura topográfica preferida
005.7585 23
Fecha de publicación
2011
Formato:
Recursos electrónicos
Relevancia:
31267.4121
por
DiPietro, Robin.
Signatura topográfica preferida
647.940687 WOR
Fecha de publicación
2010
Formato:
Recursos electrónicos
Relevancia:
0.0737
por
Gunasekaran, A.
Signatura topográfica preferida
658.4038011 22
Fecha de publicación
2010
Resumen
This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses. Part I of the book, "Health Care Information Systems", focuses on providing global leadership for the optimal use of health care information technology (IT). It provides knowledge about the best use of information systems for the betterment of health care services. Part II, Business Process Information Systems, extends the previous theory in the area of process develo.
Formato:
Recursos electrónicos
Relevancia:
1.2757
por
Sharp, Alec.
Signatura topográfica preferida
658.4063 22
Fecha de publicación
2009
Resumen
This extensively revised second edition of the acclaimed and bestselling book, Workflow Modeling, serves as a complete guide to discovering, scoping, assessing, modeling, and redesigning business processes. Providing proven techniques for identifying, modeling, and redesigning business processes, and explaining how to implement workflow improvement, this book helps you define requirements for systems development or systems acquisition.
Formato:
Recursos electrónicos
Relevancia:
2.3112
por
Williams, Bob, 1947-
Signatura topográfica preferida
388.3 22
Fecha de publicación
2008
Resumen
This one-stop resource provides a state-of-the-art review of intelligent transport systems, services, and supporting technologies, and updates you on the latest ITS standards governing communications, technical support, information technology, and identification technology. You find details on standards covering everything from traveler information and traffic management, to weather monitoring and emergency response.
Formato:
Recursos electrónicos
Relevancia:
0.0737
por
Betz, Charles T.
Signatura topográfica preferida
004 22
Fecha de publicación
2007
Resumen
How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles? This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," IT Resource Planning, and related terms. This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself. Features The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise. He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences. He is the sole author of the popular www.erp4it.com weblog. Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help? Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management? Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real? Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow? The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. Among the specific topics addressed are: * ITIL recommendations from a practical systems implementation point of view * Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals. * Interrelationships between IT portfolio planning, solutions development, and IT operations * The relationship between application development and hosting (infrastructure) organizations * Business intelligence, performance management, and metrics for the IT capability itself * Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications * IT portfolio degradation through complexity * Detailed models of IT information * The various classes of systems used internally by large scale IT organizations * The concept of "repository" and its relationship to the Configuration Management Database (CMDB) * Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management. * Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.
Formato:
Recursos electrónicos
Relevancia:
41501.0977
9.
por
Neapolitan, Richard E.
Signatura topográfica preferida
332.01519542 22
Fecha de publicación
2007
Resumen
Bayesian Networks are a form of probabilistic graphical models and they are used for modeling knowledge in many application areas, from medicine to image processing. They are particularly useful for business applications, ans * Unique coverage of probabilistic reasoning topics applied to business problems, including marketing, banking, operations management, and finance. * Shares insights about when and why probabilistic methods can and cannot be used effectively; * Complete review of Bayesian networks and probabilistic methods for those IT professionals new to informatics.
Formato:
Recursos electrónicos
Relevancia:
0.0680
por
Ash, Gerald W.
Signatura topográfica preferida
658.4038 ASH
Fecha de publicación
2007 2006
Formato:
Libros
Relevancia:
71875.7188
por
Heuvel, Willem-Jan van den.
Signatura topográfica preferida
658.4038011 22
Fecha de publicación
2007
Formato:
Recursos electrónicos
Relevancia:
2.3236
por
Contos, Brian T.
Signatura topográfica preferida
658.478 P578 22
Fecha de publicación
2007
Resumen
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Formato:
Recursos electrónicos
Relevancia:
43629.6211
Limitar resultados de búsqueda
Limitado por: