Browse Results

Showing 33,826 through 33,850 of 55,971 results

Managing Online Instructor Workload

by Rosemary M. Lehman Simone C.O. Conceição

A large number of institutions are now providing online programs, requiring instructors to change the way they think about teaching and master a distinct set of workload management skills. The first book to discuss workload management for online instructors, Managing Online Instructor Workload offers practical strategies, advice, and examples for how to prioritize, balance, and manage an online teaching workload. Based on surveys and interviews, the timely and comprehensive insight in this book is essential for online instructors, instructional designers, faculty developers and others involved in online learning.

Managing Online Learning: The Life-Cycle of Successful Programs

by John Vivolo

Managing Online Learning is a comprehensive guide to planning and executing effective online learning programs. Featuring contributions from experienced professionals across operations in university and corporate settings, this all-in-one resource provides leaders and administrators with informed strategies for supporting learners’ and instructors’ evolving needs, implementing and evaluating pedagogically sound technologies, projecting revenue-generating models, and anticipating future scaling challenges. These highly applied chapters cover essential topics such as unit design, management of staff and finances, student engagement, user experience and interface, data analytics, and more.

Managing Online Reputation: How to Protect Your Company on Social Media (Palgrave Pocket Consultants)

by Charlie Pownall

Managing Online Reputation is a comprehensive look at online reputation management. Drawing on recent examples of organizations managing their online reputations effectively and ineffectively, it provides a practical and visual tool-kit of processes and techniques to help limit and respond effectively to negative situations on social media.

Managing Open Innovation Technologies

by Mikael Wiberg Jenny S. Eriksson Lundström Mats Edenius Pär J. Ågerfalk Stefan Hrastinski

Open innovation increases the profit of companies and organizations via the input and the adoption of new ideas that are transformed into new processes, products, and services. Yet, how do we ensure that adopters of such innovations focus on relevant problems and use appropriate methods? How should we manage open innovation technologies? How can we exploit distributed knowledge and inventions? And how can we promote them successfully on the market? With valuable lessons to be learned from academic research and industrial experiences of e.g. Intel, Nokia, Philips Healthcare, small municipalities, e-learning platforms and user communities, this book focuses on some of the key dimensions of open innovation and open innovation technologies. It is divided into three themes: theme 1 deals with open innovation as it is in use today, including theoretical underpinnings and lessons from related research fields. Theme 2 analyzes the use of open innovation in organizations today in order to extract best practices. Theme 3 presents forward-looking theoretical research as well as practical future uses of open innovation. Each chapter addresses the particular topics by presenting experiences and results gained in real life projects and/or by empirical research, and clearly states its purpose and how readers are supposed to benefit from it. Overall, the objectives of this book are to advance and disseminate research on systematic open innovation, and to make its results available to practitioners. Thus, the intended target audience includes the international academic community, industrial enterprises, and public authorities.

Managing Open Systems (Open and Flexible Learning Series)

by Freeman, Richard

The author of this text concentrates on the management and support systems needed in open and distance learning, to help the reader decide whether an open learning system is appropriate for their given situation.

Managing PeopleSoft on the Oracle Cloud: Best Practices with PeopleSoft Cloud Manager

by Aaron Engelsrud

Transition from hosting your PeopleSoft applications in a traditional, on-premises data center to hosting those same applications in the Oracle Cloud infrastructure. This functional and technical book helps you install and support PeopleSoft Cloud Manager and makes the case for moving applications to the Oracle Cloud technology stack. You will learn about the use and cost of PeopleSoft instances in the cloud and how to configure your PeopleSoft environments to take advantage of the Oracle Cloud platform. Managing PeopleSoft on the Oracle Cloud is a resource for the functional analyst or IT manager tasked with moving PeopleSoft to the Oracle Cloud, as well as for the PeopleSoft system administrator or developer tasked with keeping a PeopleSoft installation running smoothly. Multiple cloud use cases illustrate PeopleSoft system configuration best practices, spell out specific requirements for running PeopleSoft Cloud Manager on the Oracle Cloud, and outline tips and tricks for running PeopleSoft instances in the cloud.What You'll LearnInstall and configure PeopleSoft Cloud ManagerSubscribe to maintenance releases and updatesCreate new topologies and build new environment templatesInstantiate and manage PeopleSoft instances using Cloud ManagerTransition PeopleSoft from on site to in the cloudWho This Book Is ForTechnical PeopleSoft administrators looking for best practices, tips, and tricks for moving PeopleSoft to the Oracle Cloud, as well as for IT managers building a case for such a move. The book is an excellent choice for both functional and technical teams who are just starting out on their PeopleSoft cloud journey.

Managing Privacy through Accountability

by Daniel Guagnin Leon Hempel Carla Ilten Inga Kroener Daniel Neyland Hector Postigo

Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.

Managing Project Competence: The Lemon and the Loop (Best Practices in Portfolio, Program, and Project Management)

by Rolf Medina

For companies to be successful, the management of an organization needs to understand how competence evolves and how it can be utilized and linked to the organization’s goals. When executive managers understand this, there is a higher probability that the people working in the organization will be more satisfied with their working situation. Satisfaction increases because competence will likely be central in the organization, with focus on motivating people to develop new competence, healthy internal mobility, and organizational learning. Positively managing competence in most cases leads to a win–win situation for the company and the individual. <P><P>This book describes how we as individuals, as well as organizations, can be efficient in the development and utilization of competence. It takes two perspectives of competence and connects them in a project-intensive and knowledge-intensive context. The first perspective is the "Lemon," which focuses on individual competence and the role of organizational culture. <P><P>The Lemon framework takes the concept of competence based on knowledge and experience and explains how a person can apply knowledge and experience to different contexts. It changes the concept of competence from being static to being agile and dynamic. The second perspective of competence is the "Loop," which models how organizations can manage not only to the benefit of organizational strategies and goals but also to an individual’s future career. The Lemon and the Loop are the basic tools to make competence and performance management agile and effective. <P><P>This book presents practical ways to acquire new knowledge and skills. One method is REPI (Reflection, Elaboration, Practicing/Participation, and Investigation), which can be used for training, coaching, competence development, agile performance management, and much more. Readers of the book are given new insight into the concept of competence and how both people and organizations can be more competitive, innovative, and open to learning. In addition, the readers get practical tools and advice on how to act in different situations to manage both organizational and individual learning. <P><P>Managing Project Competence: The Lemon and the Loop breaks old views of looking at competence and brings competence into the knowledge-intensive age.

Managing Projects in the Real World

by Melanie Mcbride

Managing Projects in the Real World provides clear and actionable advice to project managers for recognizing, anticipating, and overcoming challenges associated with the human component of leading others. The mechanics of project management are rational and straightforward to learn. The art of project management is irrational and complex to learn. Project managers need to develop a repertoire of soft skills that are typically hard for them, since they rose through the ranks to that position by virtue of superior reasoning skills. But if a project manager cannot adjudicate the clash of personalities, finesse the friction between assigned and preferred roles, steer clear of hidden hazards, and diplomatically resolve overlapping assertions of competing authority--that project manager is in a world of trouble. From the human perils of project management, nobody is better qualified to rescue beleaguered project managers than Melanie McBride--veteran PM and author of the Intel blog, The Accidental Profession. She sheds light on those dark, dusty places that fall between the cracks of theory and best practice out in the real world where irate colleagues, unrealistic product launch dates, and virtual meetings reign supreme and run amok. In this book you'll find targeted discussions and specific techniques to empower you to meet the challenges that project managers face every day. The book is structured into project phases to help any project manager on any kind of project jump right to the tried and true solution for the challenge at hand. What you'll learn After reading Managing Projects in the Real World: The Tips and Tricks No One Tells You About When You Start, project managers will know: How to execute basic project management tasks such as building dynamic schedules, developing risk management plans, holding others accountable, and conducting effective meetings. How to navigate the tricky bits, such as unrealistic due dates and virtual meetings with multitasking attendees. How to communicate effectively with project stakeholders and manage their expectations and different communication styles. How to deal with stakeholders with classically difficult personas, such as bullies, micromanagers, visionaries, and prisoners. How to continually improve in your PM craft and decision-making abilities. Who this book is for Primary: project, program, and product managers Secondary: any team leader or director Table of Contents How to Figure Out What's Really Going On Effective Meetings in The Real World Team Building The "Special" Ones You Have to Do the Work How to Develop a Robust Schedule How To Say "No" to Unrealistic Target Dates A Special Case: Planning for the Holiday Season Leadership Showtime Decision Making Presenting Project Updates Stakeholder Management Communicating with Difficult People Is Your Team Ready to Release Leading When the Music Stops You Really Ought to Be Doing This Is Project Management Right for You? Are You a Professional? Getting Better at It

Managing Projects in Trouble: Achieving Turnaround and Success (Systems Innovation Book Ser.)

by PMP, Ralph Kliem

Whether you use budget, schedule, quality, or other criteria, the statistics by think tanks, institutes, associations, and other trade organizations all point to one inescapable conclusion: your project has a greater chance of getting into trouble than staying out of it.Based on the lessons learned by the author during a quarter of a century of lea

Managing Projects with GNU Make

by Robert Mecklenburg

The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make, readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make, which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make, 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.

Managing Projects with GNU Make, 3rd Edition

by Robert Mecklenburg

The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make , readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make , which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make , 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.

Managing Projects with Microsoft® Visual Studio® Team System

by Joel Semeniuk Martin Danner

Get the practical reference for using Visual Studio Team System in your software development lifecycle--and maximize project success. Designed for software project managers, this book offers straightforward product information and expert insights for collaborating with architects, developers, and testers in one integrated development environment. Discover how to use Team System to: Support key activities from the Project Management Book of Knowledge (PMBOK) Set up your team project using Microsoft Solutions Framework process templates Manage project activities, requirements, and risks Monitor and control scope, cost, schedule, and quality Customize role-based work items, queries, reports, and iterations Create a process improvement framework and fine-tune development efforts Plus--Learn details of Agile development and Capability Maturity Model Integration (CMMI)

Managing RAID on Linux

by Derek Vadala

Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of computer systems that support mission-critical services like file sharing, mail exchange, or Web servers. RAID offers two benefits to these essential systems: improved I/O performance and fail-safe data storage. Although bandwidth problems on networks are well documented, the internal data transfer bottleneck that exists at the hardware level in each system can also leave you with perplexing performance issues. RAID is a cost-effective and easy-to-manage way to alleviate this bandwidth problem by distributing the I/O load seamlessly across multiple disks and controllers. RAID also provides uninterrupted data access through disk mirroring and parity algorithms. That means systems can remain online even during a disk or controller failure. RAID is scalable, making it robust enough for large, high-traffic sites and small, critical systems. By using RAID, system administrators can combine single disks into terabytes worth of data storage. Managing RAID on Linux covers everything system administrators need to know to put together a system that can support RAID. You will learn about the different types of RAID, along with associated technologies and issues, and how to choose the best RAID system for your needs. With a step-by-step, hands-on approach, the author guides you through the installation of either Linux software RAID or a hardware RAID card. The book shows how to build an array and optionally install a high-performance file system. Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. Written for system administrators, power users, tech managers, and anyone who wants to learn about RAID technology, Managing RAID on Linux sidesteps the often-confusing vendor-specific approach you'll find elsewhere to give you the straight story on RAID. Even non-Linux users will find this book full of valuable material.

Managing Requirements Knowledge

by Anil Kumar Thurimella Walid Maalej

Requirements engineering is one of the most complex and at the same time most crucial aspects of software engineering. It typically involves different stakeholders with different backgrounds. Constant changes in both the problem and the solution domain make the work of the stakeholders extremely dynamic. New problems are discovered, additional information is needed, alternative solutions are proposed, several options are evaluated, and new hands-on experience is gained on a daily basis. The knowledge needed to define and implement requirements is immense, often interdisciplinary and constantly expanding. It typically includes engineering, management and collaboration information, as well as psychological aspects and best practices. This book discusses systematic means for managing requirements knowledge and its owners as valuable assets. It focuses on potentials and benefits of "lightweight," modern knowledge technologies such as semantic Wikis, machine learning, and recommender systems applied to requirements engineering. The 17 chapters are authored by some of the most renowned researchers in the field, distilling the discussions held over the last five years at the MARK workshop series. They present novel ideas, emerging methodologies, frameworks, tools and key industrial experience in capturing, representing, sharing, and reusing knowledge in requirements engineering. While the book primarily addresses researchers and graduate students, practitioners will also benefit from the reports and approaches presented in this comprehensive work.

Managing Risk and Information Security: Protect to Enable

by Malcolm Harkins

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. The book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen content will be freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven't picked up on the change, impeding their companies' agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think. Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods from dealing with the misperception of risk to how to become a Z-shaped CISO. Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession and should be on the desk of every CISO in the worl

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

by Frank Siepmann

With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and

Managing Risks in Digital Transformation: Navigate the modern landscape of digital threats with the help of real-world examples and use cases

by Ashish Kumar Shashank Kumar Abbas Kudrati Sarah Armstrong- Smith

Secure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesBecome well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What you will learnBecome aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.

Managing RPM-Based Systems with Kickstart and Yum

by Q. Ethan Mccallum

Managing multiple Red Hat-based systems can be easy--with the right tools. The yum package manager and the Kickstart installation utility are full of power and potential for automatic installation, customization, and updates. Here's what you need to know to take control of your systems.

Managing Security Services in Heterogenous Networks: Confidentiality, Integrity, Availability, Authentication, and Access Control

by Dr N. Jeyanthi Dr Kun Ma Dr Thinagaran Perumal Dr R. Thandeeswaran

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Managing Security with Snort and IDS Tools

by Kerry J. Cox Christopher Gerg

This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, Managing Security with Snort and IDS Tools provides step-by-step instructions on getting up and running with Snort 2.1, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.

Managing Security with Snort & IDS Tools

by Christopher Gerg Kerry J. Cox

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you? Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.

Managing Smart Cities: Sustainability and Resilience Through Effective Management

by Anna Visvizi Orlando Troisi

This book adopts the managerial perspective to the study of smart cities. As such, this book is a necessary addition to the existing body of literature on smart cities. The chapters included in this book prove the case that transformation of cities to smart cities is a function of effective and efficient management practices implemented at diverse levels of smart cities. While advances in information and communication technology (ICT) are crucial, it is the ability to apply ICT consciously and efficiently that drives the transformation of cities to smart cities in a manner conducive to cities’ sustainability and resilience.The book covers three sets of interconnected topics:Management and decision-making for urban design and infrastructure developmentManagement and decision-making in context of smart cities developmentWays of promoting and ensuring participation, representation and co-creation in smart cities These three groups of topics offer a great opportunity to acquire a clear, direct, and practice-driven knowledge and understanding of how effective management allows ICT-enhanced tools and applications to change smart cities, possibly making them smarter.

Managing Social Media and Consumerism

by Rajagopal

Categorically reviews the theories of communication, best practices in social media and previous research, and analyzes the corporate involvement towards strategic and tactical stewardship in serving customer-centric business requirements.

Managing Software Crisis: A Smart Way to Enterprise Agility (Smart Innovation, Systems And Technologies #92)

by Sergey V. Zykov

This book discusses smart, agile software development methods and their applications for enterprise crisis management, presenting a systematic approach that promotes agility and crisis management in software engineering. The key finding is that these crises are caused by both technology-based and human-related factors. Being mission-critical, human-related issues are often neglected. To manage the crises, the book suggests an efficient agile methodology including a set of models, methods, patterns, practices and tools. Together, these make a survival toolkit for large-scale software development in crises. Further, the book analyses lifecycles and methodologies focusing on their impact on the project timeline and budget, and incorporates a set of industry-based patterns, practices and case studies, combining academic concepts and practices of software engineering.

Refine Search

Showing 33,826 through 33,850 of 55,971 results