Artificial intelligence and machine learning are integral parts of every business today, in areas ranging from finance, strategic decision-making, HR operations, and sales and marketing to manufacturing and more.
Executives, engineering managers, project managers, engineers, and process improvement experts within engineering organizations need a resource that systematically translates the requirements of ISO 9001:2000 into a usable specification for engineers.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
If your business uses warehouses to deal with the sales of goods, then you know that facility operations, shipping, and customer service are important to your company's health.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
This proceedings set contains selected Computer, Information and Education Technology related papers from the 2015 International Conference on Computer, Intelligent Computing and Education Technology (CICET 2015), to be held April 11-12, 2015 in Guilin, P.
Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
The 2015 International Congress on Economics, Social Sciences and Information Management (ICESSIM 2015), held 28-29 March 2015 in Bali, Indonesia, aimed to provide a platform for the sharing of valuable knowledge and experience in the context of changing economics and social settings.
The Project Management Office (PMO) is a rapidly emerging concept in project management that has evolved in terms of its application, sophistication, and proven results.
Project leaders, managers, and team members, as well as cost engineers, analysts, and students in project management and planning, can glean ideas and methods for managing multiple projects from this reference.
This proceedings volume brings together selected peer-reviewed papers presented at the 2015 International Conference on Architectural, Energy and Information Engineering (AEIE 2015), held July 15-16, 2015 in Hong Kong, China.
The ROI from Software Quality provides the tools needed for software engineers and project managers to calculate how much they should invest in quality, what benefits the investment will reap, and just how quickly those benefits will be realized.
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
Virtual Project Management: Software Solutions for Today and the Future explores the technical management issues involved in the revolutionary new way of building complex software intensive systems faster and cheaper by employing the power of distributed operations.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Any supply chain improvement project, even if well conceived, has a good chance of failing, unless the accompanying information technology enables the design.
Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness.
Knowledge management (KM) is the identification and analysis of available and required knowledge, and the subsequent planning and control of actions, to develop "e;knowledge assets"e; that enable businesses to generate profits and improve their competitive positions.