In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Big Data: A Business and Legal Guide supplies a clear understanding of the interrelationships between Big Data, the new business insights it reveals, and the laws, regulations, and contracting practices that impact the use of the insights and the data.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
Explaining how going green can pay for itself, Green Computing: Tools and Techniques for Saving Energy, Money, and Resources ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management.
Advance Praise for Partnering with Microsoft: 'Partnering with Microsoft is the first great book about the breathtaking culture, opportunity and roadmap for joining Microsoft's 850,000 partners cutting an impressive B swath in the marketpl
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Giving organizations the ability to track, secure, and manage items from the time they are raw materials through the life-cycle of the product, radio frequency identification (RFID) makes internal processes more efficient and improves overall supply chain responsiveness.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI) issued its first Standard on Portfolio Management in 2006.
Most people marvel at the level of innovation demonstrated by the biopharmaceutical industry in bringing new products to the market - especially in the past 20 years.
Completely revised and updated, ERP: Tools, Techniques, and Applications for Integrating the Supply Chain, Second Edition describes, from the perspective of a business manager, concepts and tools for enterprise planning, management, and execution.
Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist.
Software engineers are increasingly becoming business people; Professional Issues in Software Engineering, 3rd Edition gives them comprehensive coverage of the issues they should know about.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Examining the project environment from the perspective of project team members, this book re-interprets project management methodologies and behaviors using a bottom-up approach.
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information.
One of the most difficult, yet important, questions regarding projects is "e;What advantages will this project create for the investors and key stakeholders?
Discover why routers in the Juniper MX Serieswith their advanced feature sets and record-breaking scaleare so popular among enterprises and network service providers.
The discipline of Knowledge Management (KM) is rapidly becoming established as an essential course or module in both information systems and management programs around the world.
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint.