Creating smart enterprises: leveraging cloud, big data, web, social media, mobile and IoT technologies
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press
[2018]
|
Schriftenreihe: | An Auerbach books
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxvii, 380 pages 24 cm |
ISBN: | 9781498751285 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044737022 | ||
003 | DE-604 | ||
005 | 20180524 | ||
007 | t | ||
008 | 180130s2018 xxu |||| 00||| eng d | ||
010 | |a 017019839 | ||
020 | |a 9781498751285 |c hbk |9 978-1-4987-5128-5 | ||
035 | |a (OCoLC)1024145315 | ||
035 | |a (DE-599)BVBBV044737022 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-473 | ||
050 | 0 | |a HD45 | |
082 | 0 | |a 658.4/0630285 |2 23 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Kale, Vivek |e Verfasser |0 (DE-588)184116449 |4 aut | |
245 | 1 | 0 | |a Creating smart enterprises |b leveraging cloud, big data, web, social media, mobile and IoT technologies |c by Vivek Kale |
264 | 1 | |a Boca Raton |b CRC Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xxvii, 380 pages |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach books | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Technological innovations |x Management | |
650 | 4 | |a Information technology |x Management | |
776 | 0 | 8 | |i Erscheint auch als |n Onlineausgabe, pdf |z 978-1-4987-5129-2 |
776 | 0 | 8 | |i Erscheint auch als |n Onlineausgabe |z 978-1-351-64849-3 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030132958 |
Datensatz im Suchindex
_version_ | 1804178237521133568 |
---|---|
adam_text | Contents
List of Figures.........................................................xv
List of Tables...................................................... xvii
Preface................................................................xix
Acknowledgments......................................................xxiii
Author.................................................................xxv
Other Books by Vivek Kale............................................xxvii
1 VUCA Ecosystem..................................................**.1
1.1 VUCA Ecosystem................................................1
1.2 Four Industrial Generations...................................3
1.3 Trends........................................................4
1.3.1 Social Trends.........................................4
1.3.2 Organizational Trends.................................5
1.3.3 Business Model Trends.................................7
1.3.4 Technology Trends.....................................8
1.4 From Products to Services to Experiences......................9
1.5 Technology Advancements......................................10
1.6 Digital Economy..............................................14
1.7 Intelligent Analysis.........................................17
1.7.1 Intelligence Maturity Model (IMM)....................19
1.7.1.1 Data....................................... 20
1.7.1.2 Communication................................20
1.7.1.3 Information..................................20
1.7.1.4 Concept......................................21
1.7.1.5 Knowledge.................................. 21
1.7.1.6 Intelligence.................................23
1.7.1.7 Wisdom.......................................24
1.8 SMACT Technologies......................................... 24
1.9 Summary......................................................26
2 Aligning Business and IT Strategy.................................27
2.1 Business Strategy............................................28
2.1.1 Evolution of Strategy Management.....................28
vii
viii ■ Contents
2.1.2 Sustaining Competitive Advantage.........................30
2.1.2.1 Competitive Priorities..........................31
2.1.2.2 Porter s Five Forces Model.......................32
2.1.2.3 Porters Framework of Generic Strategies..........34
2.1.2.4 Porters Value Chain.............................36
2.2 Information Technology and Information Systems (IT/IS)...........40
2.2.1 Evolution of IT..........................................41
2.2.2 Evolution of IS..........................................43
2.2.3 IS/IT Governance.........................................44
2.2.3.1 Alignment IT/IS with Business Strategy..........45
2.2.3.2 Aligning Business Goals and IT Goals.............48
2.2.3.3 Aligning Business with IT/IS and Business
Value from IT..................................49
2.2.3.4 Governance Frameworks............................49
2.3 Summary..........................................................53
3 Enterprise Security.......................*............................55
3.1 Concept of Security..............................................56
3.1.1 The Triad of Confidentiality, Integrity, and Availability.56
3.1.1.1 Confidentiality.................................56
3.1.1.2 Integrity........................................56
3.1.1.3 Availability....................................57
3.1.2 Types of Attacks.........................................57
3.1.2.1 Interception............................57
3.1.2.2 Interruption.......................... 57
3.1.2.3 Modification....................................57
3.1.2.4 Fabrication.....................................58
3.1.3 Threats, Vulnerabilities, and Risk.......................58
3.1.3.1 Threats.........................................58
3.1.3.2 Vulnerabilities............................... 58
3.1.3.3 Risk.......................................... 58
3.1.4 Controls.................................................59
3.1.4.1 Physical........................................59
3.1.4.2 Logical.........................................59
3.1.4.3 Administrative................................ 59
3.1.5 Defense in Depth.........................................60
3.2 Identification................;...................................60
3.2.1 Identity Verification....................................62
3.2.2 Identity Falsification...................................63
3.3 Authentication....................................................63
3.3.1 Mutual Authentication....................................66
3.3.2 Multi-Factor Authentication..............................66
3.4 Authorization.....................................................66
Contents ■ ix
3.5 Access Control.............................................67
3.5.1 Access Control Models............................. 70
3.6 Accountability.............................................72
3.6.1 Non-repudiation.................................... 73
3.6.2 Deterrence..........................................73
3.6.3 Intrusion Detection and Prevention..................73
3.6.4 Admissibility of Records............................74
3.7 Audit......................................................74
3.7.1 Logging.............................................75
3.7.2 Monitoring........................................ 76
3.7.3 Assessments.........................................76
3.8 Summary....................................................77
4 Process-Driven Organization........................................79
4.1 Process-Oriented Enterprise................................80
4.1.1 Value-Add Driven Enterprise.........................81
4.2 Concept of Business Process Management (BPM)...............82
4.2.1 Business Process.................................. 84
4.3 Business Process Management (BPM)..........................85
4.4 Enterprise BPM Methodology.................................87
4.4.1 Strategic Planning for Enterprise BPM...............89
4.4.1.1 Identifying the Business Processes in the
Company................................... 90
4.4.2 Selecting Business Processes for BPM................90
4.4.3 Creating Process Maps............................. 91
4.4.4 Analyzing Processes for Breakthrough Improvements...92
4.4.5 Innovative Breakthrough Improvement in Processes....93
4.4.6 Implementing Designed Processes.....................93
4.4.7 Measuring the Performance of Designed Processes.....94
4.5 Business Process Reengineering (BPR)..................... 94
4.6 Management by Collaboration (MBC)..........................98
4.7 Collaboration Technologies................................100
4.7.1 Synchronous Communication Tools....................103
4.7.2 Asynchronous Communication Tools...................104
4.8 Collaborative Systems and Tools...........................105
4.8.1 Skype..............................................105
4.8.2 Dropbox............................................105
4.8.3 Google Drive and Google Docs..................... 105
4.8.4 Microsoft SkyDrive.................................106
4.8.5 Microsoft OneNote..................................106
4.9 Summary...................................................107
5 Analytics........................................................109
5.1 Decisions.................................................110
x ■ Contents
5.1.1 Types of Decisions...................................110
5.1.2 Scope of Decisions...................................Ill
5.2 Decision-Making Process.................................. 112
5.3 Decision-Making Techniques...................................114
5.3.1 Mathematical Programming.............................114
5.3.2 Multi-Criteria Decision Making.......................115
5.3.3 Case-Based Reasoning.................................115
5.3.4 Data Warehouse and Data Mining.......................117
5.3.5 Decision Tree...................................... 118
5.3.6 Fuzzy Sets and Systems...............................118
5.4 Decision-Support Systems................................. 118
5.4.1 Multi-Source Driven DSSs.............................119
5.4.2 Generic DSS Architecture.............................121
5.5 Analytics...................................................126
5-5.1 Descriptive Analytics ...............................127
5.5.2 Predictive Analytics .............................. 127
5.5.3 Prescriptive Analytics............................. 127
5.6 Data Science Techniques.....................................128
5.6.1 Database Systems.............................. .....128
5.6.2 Statistical Inference................................128
5.6.3 Regression and Classification........................129
5.6.4 Data Mining and Machine Learning.....................130
5.6.5 Data Visualization...................................131
5.6.6 Text Analytics.......................................131
5.6.7 Time Series and Market Research Models ..............133
5.7 Snapshot of Data Analysis Techniques and Tasks..............135
5.8 Summary.....................................................139
6 Cloud Computing Basics............................................141
6.1 Cloud Definition............................................142
6.2 Cloud Characteristics.......................................142
6.2.1 Cloud Storage Infrastructure Requirements........... 145
6.3 Cloud Delivery Models.......................................146
6.3.1 Infrastructure as a Service (IaaS)................. 147
6.3.2 Platform as a Service (PaaS).........................148
6.3-3 Software as a Service (SaaS).........................149
6.4 Cloud Deployment Models.....................................150
6.4.1 Private Clouds..................................... 150
6.4.2 Public Clouds....................................... 150
6.4.3 Hybrid Clouds....................................... 152
6.4.4 Community Clouds.....................................152
6.5 Cloud Benefits............................. ................152
Contents ■ xi
6.6 Cloud Technologies..........................................155
6.6.1 Virtualization.......................................155
6.6.1.1 Characteristics of Virtualized Environment..157
6.6.2 Service-Oriented Computing...........................160
6.6.2.1 Advantages of SOA...........................161
6.6.2.2 Layers in SOA.............................. 163
6.6.3 Business Processes with SOA..........................164
6.6.3.1 Process.................................... 165
6.6.3.2 Workflow............................. .167
6.6.3.3 Business Process Management (BPM)...........168
6.6.3.4 Business Processes via Web Services.........169
6.7 Summary.....................................................171
Big Data Computing............................................. 173
7.1 Big Data....................................................174
7.1.1 What Is Big Data?....................................174
7.1.1.1 Data Volume.................................174
7.1.1.2 Data Velocity...............................177
7.1.1.3 Data Variety................................178
7.1.1.4 Data Veracity...............................178
7.1.2 Common Characteristics of Big Data Computing
Systems..............................................179
7.1.3 Big Data Appliances..................................182
7.2 Tools and Techniques of Big Data............................183
7.2.1 Processing Approach..................................183
7.2.2 Big Data System Architecture....................... 185
7.2.2.1 Brewers CAP (Consistency Availability
Partition) Theorem..........................185
7.2.2.2 BASE (Basically Available, Soft State,
Eventual Consistency)................... 189
7.2.2.3 Functional Decomposition....................190
7.2.2.4 Master-Slave Replication....................190
7.2.3 Row Partitioning or Sharding.........................190
7.2.4 Row versus Column-Oriented Data Layouts..............191
7.2.5 NoSQL Data Management.......:...................... 192
7.2.6 In-Memory Computing..................................194
7.2.7 Developing Big Data Applications.....................194
7.3 NoSQL Databases........................................... 196
7.3.1 Column-Oriented Stores or Databases................ 196
7.3.2 Key-Value Stores (K-V Store) or Databases............196
7.3.3 Document-Oriented Databases..........................197
7.3.4 Graph Stores or Databases............................199
xii ■ Contents
7 A Aadhaar Project..............................................199
7.5 Summary......................................................202
8 Web Applications .*...............................................203
8.1 Web-Based Applications.......................................203
8.1.1 Reference Architecture...............................204
8.1.1.1 User Interaction Architecture............. 205
8.1.1.2 Service-Based Architecture..................205
8.1.1.3 Business Object Architecture ..............206
8.1.2 Realization of the Reference Architecture in J2EE....207
8.1.2.1 JavaServer Pages and Java Servlets as the User
Interaction Components......................207
8.1.2.2 Session Bean EJBs as Service-Based
Components..................................207
8.1.2.3 Entity Bean EJBs as the Business Object
Components................................. 208
8.1.2.4 Distributed Java Components.................208
8.1.2.5 J2EE Access to the EIS (Enterprise
Information Systems) Tier...................208
8.1.3 Model-View-Controller Architecture...................209
8.2 Evolution of the Web.........................................209
8.2.1 Web 1.0............................................ 209
8.2.2 Web 2.0..............................................210
8.2.3 Web 3.0..............................................214
8.2.4 Mobile Web...........................................215
8.2.5 The Semantic Web.....................................215
8.2.6 Rich Internet Applications...........................216
8.3 Web Applications......................................... 217
8.3.1 Web Applications Dimensions..........................218
8.4 Search Analysis............................................ 220
8.4.1 SLA Process......................................... 221
8.5 Web Analysis............................................... 224
8.5.1 Veracity of Log Files data......................... .227
8.5.1.1 Unique Visitors.............................227
8.5.1.2 Visitor Count...............................228
8.5.1.3 Visit Duration............................. 228
8.5.2 Web Analysis Tools.................................. 228
8.5.3 Common Analysis and Reports..........................229
8.6 Summary.................................................. 231
9 Social Networks...............♦............................ «.•..233
9.1 Networks.....................................................234
9.1.1 Concept of Networks..................................234
9.1.2 Principles of Networks...............................235
Contents ■ xiii
9.1.2.1 Metcalfe’s Law.............................235
9.1.2.2 Power Law..................................236
9.1.2.3 Small Worlds Networks (SWNs)...............236
9.2 Computer Networks..........................................237
9.2.1 Internet.......................................... 237
9.2.2 World Wide Web (WWW).............................. 238
9.3 Social Networks............................................239
9.3.1 Popular Social Networks.............................244
9.3.1.1 Linkedln............................. ....244
9.3.1.2 Facebook................................. 244
9.3.1.3 Twitter....................................246
9.3.1.4 Google+................................ 246
9.3.1.5 Other Social Networks......................247
9.4 Social Network Analysis (SNA)............................ 248
9.5 Text Analysis............................................ 250
9.5.1 Defining Text Analysis............................ 251
9.5.1.1 Document Collection........................251
9.5.1.2 Document................................. 252
9.5.1.3 Document Features....................... .252
9.5.1.4 Domain Knowledge...........................255
9.5.1.5 Search for Patterns and Trends.............256
9.5.1.6 Results Presentation..................... 256
9.6 Sentiment Analysis....................................... 257
9.6.1 Sentiment Analysis and Natural Language Processing
(NLP)............................................. 258
9.6.2 Applications...................................... 260
9.7 Summary....................................................261
10 Mobile Applications..............................................263
10.1 Mobile Computing Applications..............................263
10.1.1 Generations of Communication Systems................265
10.1.1.1 1st Generation: Analog.....................265
10.1.1.2 2nd Generation: CDMA, TDM A and GSM........265
10.1.1.3 2.5 Generation: GPRS, EDGE and
CDMA 2000..................................267
10.1.1.4 3rd Generation: wCDMA, UMTS, and iMode.... 268
10.1.1.5 4th Generation...........................:. 268
10.1.2 Mobile Operating Systems............................268
10.1.2.1 Symbian....................................270
10.1.2.2 BlackBerry OS..............................270
10.1.2.3 Google Android.............................271
10.1.2.4 Apple iOS..................................271
10.1.2.5 Windows Phone..............................271
xiv ■ Contents
10.2 Mobile Web Services........................................273
10.2.1 Mobile Field Cloud Services........................277
10.3 Context-Aware Mobile Applications...........................279
10.3.1 Ontology-Based Context Model........................280
10.3.2 Context S upport for User Interaction...............281
10.4 Mobile Web 2.0..............................................282
10.5 Mobile Analytics...........................................284
10.5.1 Mobile Site Analytics..............................284
10.5.2 Mobile Clustering Analysis.........................284
10.5.3 Mobile Text Analysis...............................285
10.5.4 Mobile Classification Analysis.....................286
10.5.5 Mobile Streaming Analysis..........................287
10.6 Summary................................................. 288
11 Internet of Things (IoT) Technologies..............................289
11.1 Internet of Things..........................................290
11.1.1 IoT Building Blocks............................... 292
11.1.2 IoT Architecture................................ 295
11.2 RFID (Radio Frequency Identification).......................297
11.3 Sensor Networks........................................... 299
11.3.1 Wireless Networks............................... 299
11.3.2 Sensors.............................................304
11.3.3 Wireless Sensor Networks............................309
11.3.3.1 WSN Characteristics........................312
11.3.3.2 WSN Design Challenges......................313
11.3.3.3 WSN Design Objectives......................314
11.3.3.4 WSN Architecture...........................315
11.4 Sensor Data Processing......................................324
11.4.1 Sensor Data-Gathering and Data-Dissemination
Mechanisms..........................................324
11.5 Sensor Database........................................... 325
11.6 Summary................................................. 328
Appendix A: Internet as Extended Brain.................................329
References.............................................................367
Index..................................................................369
Contents
List of Figures.........................................................xv
List of Tables...................................................... xvii
Preface................................................................xix
Acknowledgments......................................................xxiii
Author.................................................................xxv
Other Books by Vivek Kale............................................xxvii
1 VUCA Ecosystem..................................................**.1
1.1 VUCA Ecosystem................................................1
1.2 Four Industrial Generations...................................3
1.3 Trends........................................................4
1.3.1 Social Trends.........................................4
1.3.2 Organizational Trends.................................5
1.3.3 Business Model Trends.................................7
1.3.4 Technology Trends.....................................8
1.4 From Products to Services to Experiences......................9
1.5 Technology Advancements......................................10
1.6 Digital Economy..............................................14
1.7 Intelligent Analysis.........................................17
1.7.1 Intelligence Maturity Model (IMM)....................19
1.7.1.1 Data....................................... 20
1.7.1.2 Communication................................20
1.7.1.3 Information..................................20
1.7.1.4 Concept......................................21
1.7.1.5 Knowledge.................................. 21
1.7.1.6 Intelligence.................................23
1.7.1.7 Wisdom.......................................24
1.8 SMACT Technologies......................................... 24
1.9 Summary......................................................26
2 Aligning Business and IT Strategy.................................27
2.1 Business Strategy............................................28
2.1.1 Evolution of Strategy Management.....................28
vii
viii ■ Contents
2.1.2 Sustaining Competitive Advantage.........................30
2.1.2.1 Competitive Priorities..........................31
2.1.2.2 Porter s Five Forces Model.......................32
2.1.2.3 Porters Framework of Generic Strategies..........34
2.1.2.4 Porters Value Chain.............................36
2.2 Information Technology and Information Systems (IT/IS)...........40
2.2.1 Evolution of IT..........................................41
2.2.2 Evolution of IS..........................................43
2.2.3 IS/IT Governance.........................................44
2.2.3.1 Alignment IT/IS with Business Strategy..........45
2.2.3.2 Aligning Business Goals and IT Goals.............48
2.2.3.3 Aligning Business with IT/IS and Business
Value from IT..................................49
2.2.3.4 Governance Frameworks............................49
2.3 Summary..........................................................53
3 Enterprise Security.......................*............................55
3.1 Concept of Security..............................................56
3.1.1 The Triad of Confidentiality, Integrity, and Availability.56
3.1.1.1 Confidentiality.................................56
3.1.1.2 Integrity........................................56
3.1.1.3 Availability....................................57
3.1.2 Types of Attacks.........................................57
3.1.2.1 Interception............................57
3.1.2.2 Interruption.......................... 57
3.1.2.3 Modification....................................57
3.1.2.4 Fabrication.....................................58
3.1.3 Threats, Vulnerabilities, and Risk.......................58
3.1.3.1 Threats.........................................58
3.1.3.2 Vulnerabilities............................... 58
3.1.3.3 Risk.......................................... 58
3.1.4 Controls.................................................59
3.1.4.1 Physical........................................59
3.1.4.2 Logical.........................................59
3.1.4.3 Administrative................................ 59
3.1.5 Defense in Depth.........................................60
3.2 Identification................;...................................60
3.2.1 Identity Verification....................................62
3.2.2 Identity Falsification...................................63
3.3 Authentication....................................................63
3.3.1 Mutual Authentication....................................66
3.3.2 Multi-Factor Authentication..............................66
3.4 Authorization.....................................................66
Contents ■ ix
3.5 Access Control.............................................67
3.5.1 Access Control Models............................. 70
3.6 Accountability.............................................72
3.6.1 Non-repudiation.................................... 73
3.6.2 Deterrence..........................................73
3.6.3 Intrusion Detection and Prevention..................73
3.6.4 Admissibility of Records............................74
3.7 Audit......................................................74
3.7.1 Logging.............................................75
3.7.2 Monitoring........................................ 76
3.7.3 Assessments.........................................76
3.8 Summary....................................................77
4 Process-Driven Organization........................................79
4.1 Process-Oriented Enterprise................................80
4.1.1 Value-Add Driven Enterprise.........................81
4.2 Concept of Business Process Management (BPM)...............82
4.2.1 Business Process.................................. 84
4.3 Business Process Management (BPM)..........................85
4.4 Enterprise BPM Methodology.................................87
4.4.1 Strategic Planning for Enterprise BPM...............89
4.4.1.1 Identifying the Business Processes in the
Company................................... 90
4.4.2 Selecting Business Processes for BPM................90
4.4.3 Creating Process Maps............................. 91
4.4.4 Analyzing Processes for Breakthrough Improvements...92
4.4.5 Innovative Breakthrough Improvement in Processes....93
4.4.6 Implementing Designed Processes.....................93
4.4.7 Measuring the Performance of Designed Processes.....94
4.5 Business Process Reengineering (BPR)..................... 94
4.6 Management by Collaboration (MBC)..........................98
4.7 Collaboration Technologies................................100
4.7.1 Synchronous Communication Tools....................103
4.7.2 Asynchronous Communication Tools...................104
4.8 Collaborative Systems and Tools...........................105
4.8.1 Skype..............................................105
4.8.2 Dropbox............................................105
4.8.3 Google Drive and Google Docs..................... 105
4.8.4 Microsoft SkyDrive.................................106
4.8.5 Microsoft OneNote..................................106
4.9 Summary...................................................107
5 Analytics........................................................109
5.1 Decisions.................................................110
x ■ Contents
5.1.1 Types of Decisions...................................110
5.1.2 Scope of Decisions...................................Ill
5.2 Decision-Making Process.................................. 112
5.3 Decision-Making Techniques...................................114
5.3.1 Mathematical Programming.............................114
5.3.2 Multi-Criteria Decision Making.......................115
5.3.3 Case-Based Reasoning.................................115
5.3.4 Data Warehouse and Data Mining.......................117
5.3.5 Decision Tree...................................... 118
5.3.6 Fuzzy Sets and Systems...............................118
5.4 Decision-Support Systems................................. 118
5.4.1 Multi-Source Driven DSSs.............................119
5.4.2 Generic DSS Architecture.............................121
5.5 Analytics...................................................126
5-5.1 Descriptive Analytics ...............................127
5.5.2 Predictive Analytics .............................. 127
5.5.3 Prescriptive Analytics............................. 127
5.6 Data Science Techniques.....................................128
5.6.1 Database Systems.............................. .....128
5.6.2 Statistical Inference................................128
5.6.3 Regression and Classification........................129
5.6.4 Data Mining and Machine Learning.....................130
5.6.5 Data Visualization...................................131
5.6.6 Text Analytics.......................................131
5.6.7 Time Series and Market Research Models ..............133
5.7 Snapshot of Data Analysis Techniques and Tasks..............135
5.8 Summary.....................................................139
6 Cloud Computing Basics............................................141
6.1 Cloud Definition............................................142
6.2 Cloud Characteristics.......................................142
6.2.1 Cloud Storage Infrastructure Requirements........... 145
6.3 Cloud Delivery Models.......................................146
6.3.1 Infrastructure as a Service (IaaS)................. 147
6.3.2 Platform as a Service (PaaS).........................148
6.3-3 Software as a Service (SaaS).........................149
6.4 Cloud Deployment Models.....................................150
6.4.1 Private Clouds..................................... 150
6.4.2 Public Clouds....................................... 150
6.4.3 Hybrid Clouds....................................... 152
6.4.4 Community Clouds.....................................152
6.5 Cloud Benefits............................. ................152
Contents ■ xi
6.6 Cloud Technologies..........................................155
6.6.1 Virtualization.......................................155
6.6.1.1 Characteristics of Virtualized Environment..157
6.6.2 Service-Oriented Computing...........................160
6.6.2.1 Advantages of SOA...........................161
6.6.2.2 Layers in SOA.............................. 163
6.6.3 Business Processes with SOA..........................164
6.6.3.1 Process.................................... 165
6.6.3.2 Workflow............................. .167
6.6.3.3 Business Process Management (BPM)...........168
6.6.3.4 Business Processes via Web Services.........169
6.7 Summary.....................................................171
Big Data Computing............................................. 173
7.1 Big Data....................................................174
7.1.1 What Is Big Data?....................................174
7.1.1.1 Data Volume.................................174
7.1.1.2 Data Velocity...............................177
7.1.1.3 Data Variety................................178
7.1.1.4 Data Veracity...............................178
7.1.2 Common Characteristics of Big Data Computing
Systems..............................................179
7.1.3 Big Data Appliances..................................182
7.2 Tools and Techniques of Big Data............................183
7.2.1 Processing Approach..................................183
7.2.2 Big Data System Architecture....................... 185
7.2.2.1 Brewers CAP (Consistency Availability
Partition) Theorem..........................185
7.2.2.2 BASE (Basically Available, Soft State,
Eventual Consistency)................... 189
7.2.2.3 Functional Decomposition....................190
7.2.2.4 Master-Slave Replication....................190
7.2.3 Row Partitioning or Sharding.........................190
7.2.4 Row versus Column-Oriented Data Layouts..............191
7.2.5 NoSQL Data Management.......:...................... 192
7.2.6 In-Memory Computing..................................194
7.2.7 Developing Big Data Applications.....................194
7.3 NoSQL Databases........................................... 196
7.3.1 Column-Oriented Stores or Databases................ 196
7.3.2 Key-Value Stores (K-V Store) or Databases............196
7.3.3 Document-Oriented Databases..........................197
7.3.4 Graph Stores or Databases............................199
xii ■ Contents
7 A Aadhaar Project..............................................199
7.5 Summary......................................................202
8 Web Applications .*...............................................203
8.1 Web-Based Applications.......................................203
8.1.1 Reference Architecture...............................204
8.1.1.1 User Interaction Architecture............. 205
8.1.1.2 Service-Based Architecture..................205
8.1.1.3 Business Object Architecture ..............206
8.1.2 Realization of the Reference Architecture in J2EE....207
8.1.2.1 JavaServer Pages and Java Servlets as the User
Interaction Components......................207
8.1.2.2 Session Bean EJBs as Service-Based
Components..................................207
8.1.2.3 Entity Bean EJBs as the Business Object
Components................................. 208
8.1.2.4 Distributed Java Components.................208
8.1.2.5 J2EE Access to the EIS (Enterprise
Information Systems) Tier...................208
8.1.3 Model-View-Controller Architecture...................209
8.2 Evolution of the Web.........................................209
8.2.1 Web 1.0............................................ 209
8.2.2 Web 2.0..............................................210
8.2.3 Web 3.0..............................................214
8.2.4 Mobile Web...........................................215
8.2.5 The Semantic Web.....................................215
8.2.6 Rich Internet Applications...........................216
8.3 Web Applications......................................... 217
8.3.1 Web Applications Dimensions..........................218
8.4 Search Analysis............................................ 220
8.4.1 SLA Process......................................... 221
8.5 Web Analysis............................................... 224
8.5.1 Veracity of Log Files data......................... .227
8.5.1.1 Unique Visitors.............................227
8.5.1.2 Visitor Count...............................228
8.5.1.3 Visit Duration............................. 228
8.5.2 Web Analysis Tools.................................. 228
8.5.3 Common Analysis and Reports..........................229
8.6 Summary.................................................. 231
9 Social Networks...............♦............................ «.•..233
9.1 Networks.....................................................234
9.1.1 Concept of Networks..................................234
9.1.2 Principles of Networks...............................235
Contents ■ xiii
9.1.2.1 Metcalfe’s Law.............................235
9.1.2.2 Power Law..................................236
9.1.2.3 Small Worlds Networks (SWNs)...............236
9.2 Computer Networks..........................................237
9.2.1 Internet.......................................... 237
9.2.2 World Wide Web (WWW).............................. 238
9.3 Social Networks............................................239
9.3.1 Popular Social Networks.............................244
9.3.1.1 Linkedln............................. ....244
9.3.1.2 Facebook................................. 244
9.3.1.3 Twitter....................................246
9.3.1.4 Google+................................ 246
9.3.1.5 Other Social Networks......................247
9.4 Social Network Analysis (SNA)............................ 248
9.5 Text Analysis............................................ 250
9.5.1 Defining Text Analysis............................ 251
9.5.1.1 Document Collection........................251
9.5.1.2 Document................................. 252
9.5.1.3 Document Features....................... .252
9.5.1.4 Domain Knowledge...........................255
9.5.1.5 Search for Patterns and Trends.............256
9.5.1.6 Results Presentation..................... 256
9.6 Sentiment Analysis....................................... 257
9.6.1 Sentiment Analysis and Natural Language Processing
(NLP)............................................. 258
9.6.2 Applications...................................... 260
9.7 Summary....................................................261
10 Mobile Applications..............................................263
10.1 Mobile Computing Applications..............................263
10.1.1 Generations of Communication Systems................265
10.1.1.1 1st Generation: Analog.....................265
10.1.1.2 2nd Generation: CDMA, TDM A and GSM........265
10.1.1.3 2.5 Generation: GPRS, EDGE and
CDMA 2000..................................267
10.1.1.4 3rd Generation: wCDMA, UMTS, and iMode.... 268
10.1.1.5 4th Generation...........................:. 268
10.1.2 Mobile Operating Systems............................268
10.1.2.1 Symbian....................................270
10.1.2.2 BlackBerry OS..............................270
10.1.2.3 Google Android.............................271
10.1.2.4 Apple iOS..................................271
10.1.2.5 Windows Phone..............................271
xiv ■ Contents
10.2 Mobile Web Services........................................273
10.2.1 Mobile Field Cloud Services........................277
10.3 Context-Aware Mobile Applications...........................279
10.3.1 Ontology-Based Context Model........................280
10.3.2 Context S upport for User Interaction...............281
10.4 Mobile Web 2.0..............................................282
10.5 Mobile Analytics...........................................284
10.5.1 Mobile Site Analytics..............................284
10.5.2 Mobile Clustering Analysis.........................284
10.5.3 Mobile Text Analysis...............................285
10.5.4 Mobile Classification Analysis.....................286
10.5.5 Mobile Streaming Analysis..........................287
10.6 Summary................................................. 288
11 Internet of Things (IoT) Technologies..............................289
11.1 Internet of Things..........................................290
11.1.1 IoT Building Blocks............................... 292
11.1.2 IoT Architecture................................ 295
11.2 RFID (Radio Frequency Identification).......................297
11.3 Sensor Networks........................................... 299
11.3.1 Wireless Networks............................... 299
11.3.2 Sensors.............................................304
11.3.3 Wireless Sensor Networks............................309
11.3.3.1 WSN Characteristics........................312
11.3.3.2 WSN Design Challenges......................313
11.3.3.3 WSN Design Objectives......................314
11.3.3.4 WSN Architecture...........................315
11.4 Sensor Data Processing......................................324
11.4.1 Sensor Data-Gathering and Data-Dissemination
Mechanisms..........................................324
11.5 Sensor Database........................................... 325
11.6 Summary................................................. 328
Appendix A: Internet as Extended Brain.................................329
References.............................................................367
Index..................................................................369
|
any_adam_object | 1 |
author | Kale, Vivek |
author_GND | (DE-588)184116449 |
author_facet | Kale, Vivek |
author_role | aut |
author_sort | Kale, Vivek |
author_variant | v k vk |
building | Verbundindex |
bvnumber | BV044737022 |
callnumber-first | H - Social Science |
callnumber-label | HD45 |
callnumber-raw | HD45 |
callnumber-search | HD45 |
callnumber-sort | HD 245 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)1024145315 (DE-599)BVBBV044737022 |
dewey-full | 658.4/0630285 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/0630285 |
dewey-search | 658.4/0630285 |
dewey-sort | 3658.4 6630285 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01880nam a2200421 c 4500</leader><controlfield tag="001">BV044737022</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180524 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180130s2018 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017019839</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498751285</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-4987-5128-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1024145315</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044737022</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD45</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/0630285</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kale, Vivek</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)184116449</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Creating smart enterprises</subfield><subfield code="b">leveraging cloud, big data, web, social media, mobile and IoT technologies</subfield><subfield code="c">by Vivek Kale</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvii, 380 pages</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach books</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technological innovations</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Onlineausgabe, pdf</subfield><subfield code="z">978-1-4987-5129-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Onlineausgabe</subfield><subfield code="z">978-1-351-64849-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030132958</subfield></datafield></record></collection> |
id | DE-604.BV044737022 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:00:47Z |
institution | BVB |
isbn | 9781498751285 |
language | English |
lccn | 017019839 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030132958 |
oclc_num | 1024145315 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xxvii, 380 pages 24 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach books |
spelling | Kale, Vivek Verfasser (DE-588)184116449 aut Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies by Vivek Kale Boca Raton CRC Press [2018] © 2018 xxvii, 380 pages 24 cm txt rdacontent n rdamedia nc rdacarrier An Auerbach books Includes bibliographical references and index Technological innovations Management Information technology Management Erscheint auch als Onlineausgabe, pdf 978-1-4987-5129-2 Erscheint auch als Onlineausgabe 978-1-351-64849-3 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kale, Vivek Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies Technological innovations Management Information technology Management |
title | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies |
title_auth | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies |
title_exact_search | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies |
title_full | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies by Vivek Kale |
title_fullStr | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies by Vivek Kale |
title_full_unstemmed | Creating smart enterprises leveraging cloud, big data, web, social media, mobile and IoT technologies by Vivek Kale |
title_short | Creating smart enterprises |
title_sort | creating smart enterprises leveraging cloud big data web social media mobile and iot technologies |
title_sub | leveraging cloud, big data, web, social media, mobile and IoT technologies |
topic | Technological innovations Management Information technology Management |
topic_facet | Technological innovations Management Information technology Management |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030132958&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kalevivek creatingsmartenterprisesleveragingcloudbigdatawebsocialmediamobileandiottechnologies |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis