- Table View
- List View
Enterprise, Business-Process and Information Systems Modeling
by Rainer Schmidt Wided Guédria Ilia Bider Sérgio GuerreiroThis book contains the refereed proceedings of the 17th International Conference on Business Process Modeling, Development and Support, BPMDS 2016, and the 21st International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2016, held together with the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016) in Ljubljana, Slovenia, in June 2016. The focus theme for BPMDS 2016 papers was "Business Processes in a Connected World", for which three subthemes were identified: business processes for connecting people, connecting intelligent objects to business processes and connecting information/data/knowledge to business processes. The 17 full and 1 short paper accepted for BPMDS were selected from 48 submissions and are grouped into topical sections on process execution support; improving usability of process models; social and human perspectives; new directions in process modeling; consistency, correctness and compliance; process and data mining; and process variability. The intention of EMMSAD is to solicit papers related to the field of information systems analysis and design including numerous information modeling methods and notations that are typically evolving. These ongoing changes significantly impact the way information systems, enterprises, and business processes are being analyzed and designed in practice. The 12 full papers accepted for EMMSAD were chosen from 19 submissions and are grouped into topical sections on fundamental issues in modeling; requirements and regulations; enterprise and software ecosystem modeling; information and process model quality; meta-modeling and domain specific modeling and model composition; and modeling of architecture and design.
Enterprise, Business-Process and Information Systems Modeling: 25th International Conference, BPMDS 2024, and 29th International Conference, EMMSAD 2024, Limassol, Cyprus, June 3–4, 2024, Proceedings (Lecture Notes in Business Information Processing #511)
by Arnon Sturm Rainer Schmidt Han van der Aa Dominik BorkThis book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: - the 25th International Conference on Business Process Modeling, Development and Support, BPMDS 2024, and - the 29th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2024. The conferences were taking place in Limassor, Cyprus, during June 3–4, 2024. For BPMDS 8 full papers and 3 short papers were carefully reviewed and selected for publication from a total of 25 submissions; for EMMSAD 11 full papers and 5 short papers were accepted from a total of 32 submissions after thorough reviews. The BPMDS papers deal with a broad range of theoretical and applications-based research in business process modeling, development and support. EMMSAD focusses on modeling methods for systems analysis and development.
The Enterprise Cloud: Best Practices for Transforming Legacy IT
by James BondDespite the buzz surrounding the cloud computing, only a small percentage of organizations have actually deployed this new style of IT—so far. If you're planning your long-term cloud strategy, this practical book provides insider knowledge and actionable real-world lessons regarding planning, design, operations, security, and application transformation. This book teaches business and technology managers how to transition their organization's traditional IT to cloud computing. Rather than yet another book trying to sell or convince readers on the benefits of clouds, this book provides guidance, lessons learned, and best practices on how to design, deploy, operate, and secure an enterprise cloud based on real-world experience. Author James Bond provides useful guidance and best-practice checklists based on his field experience with real customers and cloud providers. You'll view cloud services from the perspective of a consumer and as an owner/operator of an enterprise private or hybrid cloud, and learn valuable lessons from successful and less-than-successful organization use-case scenarios. This is the information every CIO needs in order to make the business and technical decisions to finally execute on their journey to cloud computing.Get updated trends and definitions in cloud computing, deployment models, and for building or buying cloud servicesDiscover challenges in cloud operations and management not foreseen by early adoptersUse real-world lessons to plan and build an enterprise private or hybrid cloudLearn how to assess, port, and migrate legacy applications to the cloudIdentify security threats and vulnerabilities unique to the cloudEmploy a cloud management system for your enterprise (private or multi-provider hybrid) cloud ecosystemUnderstand the challenges for becoming an IT service broker leveraging the power of the cloud
Enterprise Cloud Computing
by Gautam ShroffCloud computing promises to revolutionize IT and business by making computing available as a utility over the internet. This book is intended primarily for practising software architects who need to assess the impact of such a transformation. It explains the evolution of the internet into a cloud computing platform, describes emerging development paradigms and technologies, and discusses how these will change the way enterprise applications should be architected for cloud deployment. Gautam Shroff provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services, programming paradigms such as MapReduce, as well as 'do-it-yourself' hosted development tools. He also describes emerging technologies critical to cloud computing. The book also covers the fundamentals of enterprise computing, including a technical introduction to enterprise architecture, so it will interest programmers aspiring to become software architects and serve as a reference for a graduate-level course in software architecture or software engineering.
Enterprise Cloud Computing for Non-Engineers (Technology for Non-Engineers)
by Frank Groom Stephan JonesThis book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.
Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles
by Adrian Pruteanu Zeal VoraKey Features Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform Practical examples to ensure you secure your Cloud environment efficiently A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Book Description Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. What you will learn Configure your firewall and Network ACL Protect your system against DDOS and application-level attacks Explore cryptography and data security for your cloud Get to grips with configuration management tools to automate your security tasks Perform vulnerability scanning with the help of the standard tools in the industry Learn about central log management
Enterprise Content and Search Management for Building Digital Platforms
by Shailesh Kumar ShivakumarProvides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital Platforms provides modern enterprises with the necessary tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques to compete in the today’s digital world. Features include comprehensive discussions on content strategy, content key performance indicators (KPIs), mobile-first strategy, content assessment models, various practical techniques and methodologies successfully used in real-world digital programs, relevant case studies, and more. Initial chapters cover core concepts of a content management system (CMS), including content strategy; CMS architecture, templates, and workflow; reference architectures, information architecture, taxonomy, and content metadata. Advanced CMS topics are then covered, with chapters on integration, content standards, digital asset management (DAM), document management, and content migration, evaluation, validation, maintenance, analytics, SEO, security, infrastructure, and performance. The basics of enterprise search technologies are explored next, and address enterprise search architecture, advanced search, operations, and governance. Final chapters then focus on enterprise program management and feature coverage of various concepts of digital program management and best practices—along with an illuminating end-to-end digital program case study. Comprehensive and cutting-edge, Enterprise Content and Search Management for Building Digital Platforms is an invaluable reference resource for creating an optimal enterprise digital eco-system to meet the challenges of today’s hyper-connected world.
Enterprise Content Management in Information Systems Research
by Jan Vom Brocke Alexander SimonsThis book collects ECM research from the academic discipline of Information Systems and related fields to support academics and practitioners who are interested in understanding the design, use and impact of ECM systems. It also provides a valuable resource for students and lecturers in the field. "Enterprise content management in Information Systems research - Foundations, methods and cases" consolidates our current knowledge on how today's organizations can manage their digital information assets. The business challenges related to organizational information management include reducing search times, maintaining information quality, and complying with reporting obligations and standards. Many of these challenges are well-known in information management, but because of the vast quantities of information being generated today, they are more difficult to deal with than ever. Many companies use the term "enterprise content management" (ECM) to refer to the management of all forms of information, especially unstructured information. While ECM systems promise to increase and maintain information quality, to streamline content-related business processes, and to track the lifecycle of information, their implementation poses several questions and challenges: Which content objects should be put under the control of the ECM system? Which processes are affected by the implementation? How should outdated technology be replaced? Research is challenged to support practitioners in answering these questions.
Enterprise Content Management with Microsoft SharePoint
by Christopher D. Riley Shadrach White<p>Meet the challenges of Enterprise Content Management (ECM) head on, using rich ECM features in Microsoft SharePoint 2013. Led by two ECM experts, you’ll learn how to build a solid information architecture (IA) for managing documents, knowledge, web content, digital assets, records, and user-generated content throughout your organization. Examples and case studies are based on the authors’ real-world experience.</p>
Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
by Bob ChaputThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will LearnRead new information and treat ECRM and cybersecurity as a value creatorReceive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boardsThink differently about funding ECRM and cybersecurity initiativesUnderstand the most critical ECRM decision that boards must facilitate in their organizationsUse practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy“This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.
Enterprise Cybersecurity
by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul AslamUnify your organization''s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. Enterprise Cybersecurity presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise''s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. What you''ll learn Executives, managers, architects, IT professionals, customers and vendors of cybersecurity services, and engineering students will learn from this book How to create a data-driven and objectively-managed cybersecurity program optimally tailored to your organization How to organize, assess, and score cybersecurity programs using the authors'' enterprise cybersecurity architecture scheme The methodology of targeted attacks and why they succeed The processes of cybersecurity risk management, capability assessment, scope selection, operations, and supporting information systems How to audit and report your cybersecurity program in compliance with regulatory frameworks How cybersecurity is evolving and projected to evolve Who this book is for Enterprise Cybersecurity is for people and organizations interested in modern cybersecurity and who are responsible for leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. Table of Contents Part I: The Cybersecurity Challenge Chapter 1: Defining the Cybersecurity Challenge Chapter 2: Meeting the Cybersecurity Challenge Part II: A New Enterprise Cybersecurity Architecture Chapter 3: Enterprise Cybersecurity Architecture Chapter 4: Implementing Enterprise Cybersecurity Chapter 5: Operating Enterprise Cybersecurity Chapter 6: Enterprise Cybersecurity and the Cloud Chapter 7: Enterprise Cybersecurity for Mobile and BYOD Part III: The Art of Cyberdefense Chapter 8: Building an Effective Defense Chapter 9: Responding to Incidents Chapter 10: Managing a Cybersecurity Crisis Part IV: Enterprise Cyberdefense Assessment Chapter 11: Assessing Enterprise Cybersecurity Chapter 12: Measuring a Cybersecurity Program Chapter 13: Mapping Against Cybersecurity Frameworks Part V: Enterprise Cybersecurity Program Chapter 14: Managing an Enterprise Cybersecurity Program Chapter 15: Looking to the Future Appendices: Appendix A: Common Cyberattacks Appendix B: Cybersecurity Frameworks Appendix C: Enterprise Cybersecurity Capabilities Appendix D: Sample Cybersecurity Policy Appendix E: Cybersecurity Operational Processes Appendix F: Object Measurement Appendix G: Cybersecurity Capability Value Scales Appendix H: Cybersecurity Sample Assessment Appendix I: Net...
Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization
by Ariel EvansCyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.
Enterprise Cybersecurity Study Guide: How To Build A Successful Cyberdefense Program Against Advanced Threats
by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul AslamUse the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.What You’ll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade Who This Book Is For Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.
Enterprise Data at Huawei: Methods and Practices of Enterprise Data Governance
by Yun Ma Hao DuThis book systematically introduces the data governance and digital transformation at Huawei, from the perspectives of technology, process, management, and so on. Huawei is a large global enterprise engaging in multiple types of business in over 170 countries and regions. Its differentiated operation is supported by an enterprise data foundation and corresponding data governance methods. With valuable experience, methodology, standards, solutions, and case studies on data governance and digital transformation, enterprise data at Huawei is ideal for readers to learn and apply, as well as to get an idea of the digital transformation journey at Huawei. This book is organized into four parts and ten chapters. Based on the understanding of “the cognitive world of machines,” the book proposes the prospects for the future of data governance, as well as the imaginations about AI-based governance, data sovereignty, and building a data ecosystem.
The Enterprise Data Catalog: Improve Data Discovery, Ensure Data Governance, and Enable Innovation
by Ole Olesen-BagneuxCombing the web is simple, but how do you search for data at work? It's difficult and time-consuming, and can sometimes seem impossible. This book introduces a practical solution: the data catalog. Data analysts, data scientists, and data engineers will learn how to create true data discovery in their organizations, making the catalog a key enabler for data-driven innovation and data governance. Author Ole Olesen-Bagneux explains the benefits of implementing a data catalog. You'll learn how to organize data for your catalog, search for what you need, and manage data within the catalog. Written from a data management perspective and from a library and information science perspective, this book helps you: Learn what a data catalog is and how it can help your organization Organize data and its sources into domains and describe them with metadataSearch data using very simple-to-complex search techniques and learn to browse in domains, data lineage, and graphsManage the data in your company via a data catalogImplement a data catalog in a way that exactly matches the strategic priorities of your organizationUnderstand what the future has in store for data catalogs
Enterprise Data Governance: Reference and Master Data Management Semantic Modeling
by Pierre BonnetIn an increasingly digital economy, mastering the quality of data is an increasingly vital yet still, in most organizations, a considerable task. The necessity of better governance and reinforcement of international rules and regulatory or oversight structures (Sarbanes Oxley, Basel II, Solvency II, IAS-IFRS, etc.) imposes on enterprises the need for greater transparency and better traceability of their data. All the stakeholders in a company have a role to play and great benefit to derive from the overall goals here, but will invariably turn towards their IT department in search of the answers. However, the majority of IT systems that have been developed within businesses are overly complex, badly adapted, and in many cases obsolete; these systems have often become a source of data or process fragility for the business. It is in this context that the management of ‘reference and master data’ or Master Data Management (MDM) and semantic modeling can intervene in order to straighten out the management of data in a forward-looking and sustainable manner. This book shows how company executives and IT managers can take these new challenges, as well as the advantages of using reference and master data management, into account in answering questions such as: Which data governance functions are available? How can IT be better aligned with business regulations? What is the return on investment? How can we assess intangible IT assets and data? What are the principles of semantic modeling? What is the MDM technical architecture? In these ways they will be better able to deliver on their responsibilities to their organizations, and position them for growth and robust data management and integrity in the future.
Enterprise Data Workflows with Cascading: Streamlined Enterprise Data Management and Analysis
by Paco NathanThere is an easier way to build Hadoop applications. With this hands-on book, you’ll learn how to use Cascading, the open source abstraction framework for Hadoop that lets you easily create and manage powerful enterprise-grade data processing applications—without having to learn the intricacies of MapReduce.Working with sample apps based on Java and other JVM languages, you’ll quickly learn Cascading’s streamlined approach to data processing, data filtering, and workflow optimization. This book demonstrates how this framework can help your business extract meaningful information from large amounts of distributed data.Start working on Cascading example projects right awayModel and analyze unstructured data in any format, from any sourceBuild and test applications with familiar constructs and reusable componentsWork with the Scalding and Cascalog Domain-Specific LanguagesEasily deploy applications to Hadoop, regardless of cluster location or data sizeBuild workflows that integrate several big data frameworks and processesExplore common use cases for Cascading, including features and tools that support themExamine a case study that uses a dataset from the Open Data Initiative
Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3–7, 2022, Proceedings (Lecture Notes in Computer Science #13585)
by João Paulo A. Almeida Dimka Karastoyanova Giancarlo Guizzardi Marco Montali Fabrizio Maria Maggi Claudenir M. FonsecaThis book constitutes the proceedings of the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, which took place in Bozen-Bolzano, Italy, in October 2022. The 15 full papers included in this book were carefully reviewed and selected from 48 submissions. They were organized in topical sections as follows: enterprise security; enterprise architecture; business process modeling and monitoring; business process mining and discovery; and process-driven applications.
Enterprise Design, Operations, and Computing: 27th International Conference, EDOC 2023, Groningen, The Netherlands, October 30 – November 3, 2023, Proceedings (Lecture Notes in Computer Science #14367)
by Henderik A. Proper Luise Pufahl Dimka Karastoyanova Marten Van Sinderen João MoreiraThis book constitutes the refereed proceedings of the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, held in Groningen, The Netherlands, during October 30–November 3, 2023.The 12 full papers included in this book were carefully reviewed and selected from 36submissions. They were organized in topical sections as follows: Enterprise Modeling, Enterprise Architecture & Engineering, Model-Based Software Engineering, Enterprise Analysis with Process Mining, Process Improvement & Engineering, and Modeling in an Enterprise Context.
Enterprise Design, Operations, and Computing. EDOC 2022 Workshops: IDAMS, SoEA4EE, TEAR, EDOC Forum, Demonstrations Track and Doctoral Consortium, Bozen-Bolzano, Italy, October 4–7, 2022, Revised Selected Papers (Lecture Notes in Business Information Processing #466)
by Tiago Prince Sales Henderik A. Proper Giancarlo Guizzardi Marco Montali Fabrizio Maria Maggi Claudenir M. FonsecaThis book constitutes revised selected papers from the international workshops, the EDOC Forum and the Demonstration and Doctoral Consortium track, that were held at the 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022. The conference took place in Bozen-Bolzano, Italy, during October 3–7, 2022.The conference focuses on the area of enterprise computing, this year with the special emphasis on the theme of designing and operating “Flexible Enterprises”. Workshops within EDOC cover more focused topics and allow for the presentation and discussion of work that is in the earlier development stages. The 18 full and 8 short papers included in this volume were carefully reviewed and selected from 82 submissions. They stem from the following satellite events: – Workshop on Intelligent Digital Architecture, Methods, and Services for Industry 4.0 and Society 5.0 (IDAMS) – 14th Workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE) – 17th Workshop on Trends in Enterprise Architecture Research (TEAR) – EDOC Forum – Demonstrations Track – Doctoral Consortium
Enterprise Design, Operations, and Computing. EDOC 2023 Workshops: IDAMS, iRESEARCH, MIDas4CS, SoEA4EE, EDOC Forum, Demonstrations Track and Doctoral Consortium, Groningen, The Netherlands, October 30–November 3, 2023, Revised Selected Papers (Lecture Notes in Business Information Processing #498)
by Tiago Prince Sales Sybren De Kinderen Henderik A. Proper Luise Pufahl Dimka Karastoyanova Marten Van SinderenThis volume constitutes revised selected papers of several workshops, the EDOC Forum and the Demonstrations and Doctoral Consortium track, which were held in conjunction with the 27th International Conference on Enterprise Design, Operations, and Computing, EDOC 2023, in Groningen, The Netherlands, during October 30–November 3, 2023. The 18 revised full papers and 7 short papers presented in this book were carefully reviewed and selected from 37 submissions. They stem from the following satellite events: - Workshop on Intelligent Digital Architecture, Methods, and Services for Industry 4.0 and Society 5.0 (IDAMS)- Workshop on Empirical Methodologies for Research in Enterprise Architecture and Service-Oriented Computing (iRESEARCH)- Workshop on the Modelling and Implementation of Digital Twins for Complex Systems (MIDas4CS)- Workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE)- EDOC Forum- Demonstrations Track- Doctoral Consortium
Enterprise Design, Operations, and Computing. EDOC 2024 Workshops: iRESEARCH, MIDas4CS, Doctoral Consortium, Joint CBI–EDOC Forum and Other Joint CBI-EDOC Events, Vienna, Austria, September 10–13, 2024, Revised Selected Papers (Lecture Notes in Business Information Processing #537)
by Monika Kaczmarek-Heß Kristina Rosenthal Marek Suchánek Miguel Mira Da Silva Henderik A. Proper Marianne SchnellmannThis volume constitutes revised selected papers of two workshops, the Doctoral Consortium, the Joint CBI-EDOC Forum and and other Joint CBI-EDOC event, which were held in conjunction with the 28th International Conference on Enterprise Design, Operations, and Computing, EDOC 2024, in Vienna, Austria, in September 10–13, 2024. The presented revised full papers in this book were carefully reviewed and selected. They stem from the following satellite events: iRESEARCH – 2nd International Workshop on Empirical Methodologies for Research in Enterprise Architecture and Service-oriented Computing MIDas4CS – 2nd Workshop on the Modelling and Implementation of Digital Twins for Complex Systems Joint CBI–EDOC Forum Joint CBI–EDOC Case Reports Track Joint CBI–EDOC Tools & Demos Track EDOC Doctoral Consortium CBI Mini Dagstuhl Seminars
Enterprise Development with Flex: Best Practices for RIA Developers (Adobe Developer Library)
by Yakov Fain Victor Rasputnis Anatole TartakovskyIf you want to use Adobe Flex to build production-quality Rich Internet Applications for the enterprise, this groundbreaking book shows you exactly what's required. You'll learn efficient techniques and best practices, and compare several frameworks and tools available for RIA development -- well beyond anything you'll find in Flex tutorials and product documentation. Through many practical examples, the authors impart their considerable experience to help you overcome challenges during your project's life cycle. Enterprise Development with Flex also suggests proper tools and methodologies, guidelines for determining the skill sets required for the project, and much more. Choose among several frameworks to build Flex applications, including Cairngorm, PureMVC, Mate, and Clear Toolkit Apply selected design patterns with Flex Learn how to extend the Flex framework and build your own component library Develop a sample AIR application that automatically synchronizes local and remote databases to support your sales force Get solutions for leveraging AMF protocol and synchronizing Flex client data modifications with BlazeDS-based servers Determine the actual performance of your application and improve its efficiency
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
by Jeroen MulderAn architect's guide to designing, implementing, and integrating DevOps in the enterpriseKey FeaturesDesign a DevOps architecture that is aligned with the overall enterprise architectureDesign systems that are ready for AIOps and make the move toward NoOpsArchitect and implement DevSecOps pipelines, securing the DevOps enterpriseBook DescriptionDigital transformation is the new paradigm in enterprises, but the big question remains: is the enterprise ready for transformation using native technology embedded in Agile/DevOps? With this book, you'll see how to design, implement, and integrate DevOps in the enterprise architecture while keeping the Ops team on board and remaining resilient. The focus of the book is not to introduce the hundreds of different tools that are available for implementing DevOps, but instead to show you how to create a successful DevOps architecture. This book provides an architectural overview of DevOps, AIOps, and DevSecOps – the three domains that drive and accelerate digital transformation. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this DevOps book will help you to successfully integrate DevOps into enterprise architecture. You'll learn what AIOps is and what value it can bring to an enterprise. Lastly, you will learn how to integrate security principles such as zero-trust and industry security frameworks into DevOps with DevSecOps. By the end of this DevOps book, you'll be able to develop robust DevOps architectures, know which toolsets you can use for your DevOps implementation, and have a deeper understanding of next-level DevOps by implementing Site Reliability Engineering (SRE).What you will learnCreate DevOps architecture and integrate it with the enterprise architectureDiscover how DevOps can add value to the quality of IT deliveryExplore strategies to scale DevOps for an enterpriseArchitect SRE for an enterprise as next-level DevOpsUnderstand AIOps and what value it can bring to an enterpriseCreate your AIOps architecture and integrate it into DevOpsCreate your DevSecOps architecture and integrate it with the existing DevOps setupApply zero-trust principles and industry security frameworks to DevOpsWho this book is forThis book is for enterprise architects and consultants who want to design DevOps systems for the enterprise. It provides an architectural overview of DevOps, AIOps, and DevSecOps. If you're looking to learn about the implementation of various tools within the DevOps toolchain in detail, this book is not for you.
Enterprise DevOps Framework: Transforming It Operations
by Shamayel M. FarooquiTransform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile and DevOps transformation.In Enterprise DevOps Framework author Shamayel Farooqui shows you how agile adoption will enable your organization to stay ahead in an ever-changing business environment and meet your customers’ needs. He includes detailed references to key concepts such as agile, hybrid and cloud technology, infrastructure management, and process automation.What You’ll LearnEstablish the focus areas for your IT organizationPrepare for the challenges of transforming your enterprise to a DevOps, agile organizationKnow the key steps for executing an enterprise DevOps strategyBuild a strong team of DevOps individuals focused on improving the efficiency of your organization through Agile methodologies, automation, cloud adoption, and “infrastructure as code” practicesWho This Book Is For IT administrators, operational personnel, cloud professionals, DevOps professionals, human resources professionals, managers, and C-level staff