How Chinese hospitals have been growing and adopting international standards such as JCI and HIMSS EMRAM to fuel their advancements is not well-known to the western world.
UML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization.
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
Written by one of the nation's most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a combined project and business management solution that any can be readily applied in any industry by both novice and certified project managers.
Detailing powerful methods for reducing the energy costs associated with operating a data center, Making Your Data Center Energy Efficient examines both equipment and building facilities.
Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics.
An accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain.
Explaining how going green can pay for itself, Green Computing: Tools and Techniques for Saving Energy, Money, and Resources ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management.
Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers to focus on technology as a way to improve the health of the population, while engaging patients and encouraging them to take accountability for maintaining their own health.
This is a collection of essays from key researchers in the field of project management who describe what they feel are the most impactful findings from research.
This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business.
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge.
An up-to-date guide to the economic issues in telecommunications, delivering a comprehensive overview from mathematical models to practical applications.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime.
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially.
Project leaders, managers, and team members, as well as cost engineers, analysts, and students in project management and planning, can glean ideas and methods for managing multiple projects from this reference.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
This comprehensive guide explores the fundamentals of digital business, from understanding digital business models to leveraging emerging technologies and trends.
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges.
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone.
SHELVING GUIDE: Project ManagementThis hands-on guide is written for project professionals seeking to find an optimized way of performing project management.
Managing IT Performance to Create Business Value provides examples, case histories, and current research for critical business issues such as performance measurement and management, continuous process improvement, knowledge management, risk management, benchmarking, metrics selection, and people management.
Knowledge Management (KM) is strongly rooted in the discipline of Knowledge Engineering (KE), which in turn grew partly out of the artificial intelligence field.
A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches.
In Offshore Software Development: Making It Work, hands-on managers of Offshore solutions help you answer these questions:What is Offshore and why is it an IT imperative?
While many students, parents, educators, and organizations who hire their graduates hold US universities in high regard, the cost of higher education has risen much faster than the rate of inflation.