David Enstrom, a published author with education and extensive experience in the field, places the Business Process Model and Notationthe titles BPMNat the heart of the Unified Architecture MethodUAMthat undergirds this works method. The highly structured contents of A Simplified Approach to IT Architecture with BPMN cover an array of topics: the demystification of IT architecture; the description of UAM; how to architect-in IT security; the delineation of Business, Logical, and Technical Perspectives; and the depiction of architectural patterns.
The additions of a bibliography, a glossary, several supplementary sections, and an index supplement the main presentation in A Simplified Approach to IT Architecture with BPMN, rendering it a comprehensive source for IT professionals charged with responsibilities for IT architecture at every level of the enterprise.
Another way of viewing OLAP is getting a typical company out of the custom-report-writing business and into the data-cube-server building business. An OLAP data structure can be thought of as a Rubik's Cube of data that users can twist and twirl in different ways to work through what-if and what-happened scenerios to get at the whys of the situation. Within an OLAP environment, the focus is on performing dictionary definition and maintenance as well as mapping flat files or relational columns to dimensions and measures. Although this may sound like a lot of work, managing one data cube is more efficient than writing a number of custom reports. Currently, some vendors provide administrative tools to get the data into the cubes in the first place, in the proper form, and on a regular basis. Hence, the job of managing data has been simplified for users.
The book covers the fundamentals of information system quality management, and their quality improvement. The creation of models, algorithms, methods, and tools for improving the information system quality in terms of system development, operation, and evolution is also considered. A comprehensive information system quality management system is proposed as a quality improvement tool, and as a new category of information and control systems. Goals, objectives, functions, structure, development and functioning of such systems are presented.
The book is intended for information system developers, experts, researchers, doctorate students who deal with the information system quality assurance, and for university students majoring in Applied Computer Science, Computer Science for Business, Information Technology, Automated Systems, Information Management, and similar subjects.
Business and industry as well as public agencies are the largest users of information processing technologies. If evolutionary processes are discoverable outside of strictly biological contexts it is reasonable to suppose that they'll be found among those systems that use information processing nearly as much, if not more, than does Nature. Indeed, the thesis of this work is that natural selection does operate over organizations that use so-called ‘Fourth Generation’ computerized database technologies.
There are some basic conceptual hurdles that must be cleared before the vantage point of looking at evolutionary processes as information processes will reveal anything more than tantalizing analogies. The first hurdle is that compartmentalized thinking, putting the things of this world into pigeonholes, must be set aside in favor of a systems approach.
By 'systems approach' nothing more complex is meant than being self-conscious about when and why it is sometimes convenient to compartmentalize thoughts, things and perceptions. It also means looking first at systems, at the organized complexity that constitutes not only life, but virtually all of humankind’s activity and physical reality. Using a systems approach, both organisms and organizations can be discussed from a common ground. The justification for adopting this outlook will appear more and more obvious as it is used to develop fruitful insights.
A second conceptual hurdle that needs to be cleared is the frequent habit of thinking about information as some kind of passive "stuff" that gets manipulated, massaged, stored, and retrieved by computers. In the world of computer technology and business the phrase "data processing" is the traditional reference for all forms of information processing and technology. Note that at any given time other phrases such as “MIS” (management information systems) or “IT” (information technology) are more or less synonymous with “data processing.” For our purposes the latter phrase suffices. Unfortunately this phrase tends to solidify the mental habit of regarding information as a passive substance that people and machines manipulate as they see fit (or are directed).
In reality, information has both a passive and an active role in systems. It is passive when we speak of communicating some particular item to another system, be it a person, machine or organization. Information is active when it takes the form of a program, plan, or goal. This includes all the important meanings of what "information" means as well. Thus, the second habit of thought to be put aside here is the belief that information is only acted upon. In fact, information in the human mind and in organizations is usually present just for the active role of shaping and directing their behavior.
A third conceptual hurdle is the assumption that any attempt to generalize a law of biology is simply "transplanting" biology outside its proper domain and therefore is predestined to failure. In this work, biological laws, especially those of evolution, will be sought in the context of human organizations. However, they will not be transplanted there any more than a physical law of force, mass, and acceleration is "transplanted" to outer space when we discover that it desc
Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS).
Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes
Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
The Handbook of Research on E-Transformation and Human Resources Management Technologies: Organizational Outcomes and Challenges provides practical, situated, and unique knowledge on innovative e-HRM technologies that add competitive advantage to organizations. This Handbook of Research expands on theoretical conceptualizations of e-HRM useful to researchers, academicians, and human resource managers.
Global Implications of Modern Enterprise Information Systems: Technologies and Applications presents useful strategies, techniques, and tools for the successful design, development, and implementation of enterprise information systems (EIS). By assimilating the truly international perspective, this collection constructs on this ascending area of research in an array of related fields will greatly benefit from these cutting-edge findings on modern enterprise information systems.
Given the vendor-neutral theme of the book, anyone who is interested in performance management of distributed and mainframe solution architectures will have an interest in the book. It should become the seminal reference for this segment of the IT industry.
IT professionals need this book because it will allow them to better understand the nature of the investment, the value proposition, and the impact that APM technology will have on their organization. It will allow them to achieve proactive management of their applications and infrastructure to help improve the quality, identify and document defects, and reduce overall management costs of the software that their organization tests and operates.
Measuring Information Systems Delivery Quality provides thoughtful analysis and explains some of the contradictions and apparent paradoxes of the many IS quality perspectives. It offers prescriptions, grounded in research findings, syntheses of relevant, up-to-date literature, and leading IS quality practices to assist the assimilation, measurement, and management of IS quality in order to increase the odds of producing higher quality systems.
Management Information Systems for Enterprise Applications: Business Issues, Research and Solutions provide the conceptual and methodological foundations that reflect interdisciplinary concerns regarding research in management information systems. This book investigates the future of management information systems by means of analyzing a variety of MIS and service-related concepts in a wide range of disciplines, including computer science, software engineering, operations research, management of information systems, economics, management theory, marketing, business strategy, cognitive sciences, anthropology, humanities and the arts, as well as novel concepts and knowledge from related areas.
Design-Type Research in Information Systems: Findings and Practices aims to demonstrate that Design-Type Research is a legitimate scientific activity, particularly in the context of the field of Information Systems. Contending that the philosophy, methodology and principles of traditional science also apply to design-type of science, the research contained within this book is important to the widespread acceptance and promotion of design-type research.
Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission presents trends and techniques for successful intelligent decision-making andtransfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.
Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting.
This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program.Six new chapters present the latest information and resources to counter information security threatsEvery chapter contains opening objectives and closing summaries to clarify key pointsAccessible, easy-to-read style for the busy professional
With this broader and more appropriate definition of success, IT project management techniques and tools can be modernized, extended, and otherwise focused to be more effective. Project Management for Modern Information Systems describes and illustrates practices, procedures, methods, and tools for IT project management that address this extended definition of project success for modern times.
Public Management Information Systems features practical examples drawn from governmental organizations, combined with a comprehensive synthesis of research from both public and private sectors. This book also identifies key concepts and offers review questions and practical exercises to give public administration learners direction in furthering their knowledge in this key area of management.
Information Systems Research Methods, Epistemology, and Applications presents a collection of recent empirical studies in information systems. Gathering cases of innovative approaches to evaluation, as well as examples of effective organizational approaches to analyzing, summarizing, and presenting empirical data sets and conclusions, this book is essential to academic and research libraries and a must-have for IT researchers, business managers, professionals, and academics.