Angebote zu "Capability" (12 Treffer)

Kategorien

Shops

Einflussfaktoren für Team Capability Accelerati...
34,99 € *
ggf. zzgl. Versand

Bachelorarbeit aus dem Jahr 2016 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,3, Technische Hochschule Köln, ehem. Fachhochschule Köln (Informatik), Sprache: Deutsch, Abstract: Im Rahmen der folgenden Bachelor-Thesis wird analysiert, was die Einfluss- und Erfolgsfaktoren der Team Capability beziehungsweise der Zusammenarbeit sind. Es werden hierzu existierende Methoden betrachtet, mit denen über Key Performance Indikatoren (KPI) sichtbar gemacht wird, wie schnell und gut sich ein Team entwickelt und wo sich Verbesserungspotentiale verbergen. Gut funktionierende Teams sind in der Softwareentwicklung ein wichtiger Erfolgsfaktor. In den vergangenen 20 Jahren hat die Verbreitung von Agile dabei auch zu signifikanten Veränderungen in der Teamarbeit geführt. Die Team-Capability ist hierbei ein Aspekt, der die Schnittstelle von sozialen und technischen Faktoren darstellt - Peopleware als dritte Betrachtungsdimension für Softwareentwicklungsteams. Hierbei stellt das Agile-Team lediglich nur einen Faktor in der Betrachtung des Ziel-, Handlungs- und Verantwortungskomplexes dar. Zwar wird die Arbeitsgeschwindigkeit von vielen Faktoren innerhalb und außerhalb des Agile- Teams beeinflusst, doch muss der übergeordnete Nutzen im Hinblick auf die Qualität und das Endergebnis im Fokus der Betrachtung bleiben.

Anbieter: ciando eBooks
Stand: 07.11.2017
Zum Angebot
Code Generation with Roslyn
24,99 € *
ggf. zzgl. Versand

Learn how Roslyns new code generation capability will let you write software that is more concise, runs faster, and is easier to maintain. You will learn from real-world business applications to create better software by letting the computer write its own code based on your business logic already defined in lookup tables. Code Generation with Rosyln is the first book to cover this new capability. You will learn how these techniques can be used to simplify systems integration so that if one system already defines business logic through lookup tables, you can integrate a new system and share business logic by allowing the new system to write its own business logic based on already existing table-based business logic. One of the many benefits you will discover is that Roslyn uses an innovative approach to compiler design, opening up the inner workings of the compiler process. You will learn how to see the syntax tree that Roslyn is building as it compiles your code. Additionally, you will learn to feed it your own syntax tree that you create on the fly. What You Will Learn: • Structure logic to be stored in database design • Build complex conditional logic based on lookup data in the database • Compile code that you generate programmatically • Discover generated code and run it dynamically to implement new business logic • Debug problems in generated code • Deploy and access generated code Who This Book Is For: Back end developers in very dynamic fast-paced business environments. Developers focused on integrating different systems across an enterprise should also find this information useful. di Nick Harrison is a Software Architect and .NET advocate in Columbia, SC. Nick has over 20 years experience in software developing, starting with Unix system programming and then progressing to the DotNet platform.

Anbieter: ciando eBooks
Stand: 02.04.2018
Zum Angebot
Six Sigma for IT Management
46,99 € *
ggf. zzgl. Versand

This is the first book to provide a coherent view and guidance for using the Six Sigma approach successfully in IT service organisations. It particularly aims to merge ITIL and Six Sigma into a single approach for continuous improvement of IT service organisations. Six Sigma provides a quantitative methodology of continuous (process) improvement and cost reduction, by reducing the amount of variation in process outcomes. The production of a product, be it a tangible product like a car or a more abstract product like a service, consists of a series of processes. All processes consist of a series of steps, events, or activities. Six Sigma measures every step of the process by breaking apart the elements within each process, identifying the critical characteristics, defining and mapping the related processes, understanding the capability of each process, discovering the weak links, and then upgrading the capability of the process. It is only by taking these steps that a business can raise the high-water mark of its performance. IT is now a fundamental part of business and business processes; this book demonstrates how IT can be made to work as an enabler to better business processes, and how the Six Sigma approach can be used to provide a consistent framework for measuring process outcomes. ITIL defines the what of Service Management; Six Sigma defines the ´´how´´ process improvement; together they are a perfect fit of improving the quality of IT service delivery and support. The Six Sigma approach also provides measures of process outcomes, and prescribes a consistent approach in how to use these metrics.

Anbieter: buecher.de
Stand: 05.04.2018
Zum Angebot
Achieving and Sustaining Secured Business Opera...
29,99 € *
ggf. zzgl. Versand

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What Youll Learn Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models Who This Book Is For Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects Neelesh Ajmani has over 28 years of experience in solving critical business issues in public and private sectors, with expertise in digital transformation, risk management, secured business operations, strategic planning, organizational design, agile program management, enterprise architecture, and information management. He is a specialist advisor in healthcare and life sciences for NTT Data Services. Being an entrepreneur, he is also affiliated with Mitovia, Inc. as Chief Services Officer, advising and developing a body of knowledge and services offerings, including content and services for achieving and sustaining secured business operations. Neelesh worked at Cisco for 15 years in advisory, delivery, and leadership roles, specializing in Internet commerce, identity and access management, and manufacturing solutions. He has delivered business solutions with state-of-the art technology solutions for many Fortune 500 organizations in the manufacturing and banking industries, for the Supreme Court of India, and for the federal government of India. Neelesh has an MBA from San Jose State University, and an MS in Computer Applications from Jawaharlal Nehru University, India. He is certified in Advanced Program Management from Stanford University, PMP, TOGAF Enterprise Architecture, and is an ITIL V3 Expert. His current research is focused on planning and managing business information risk and security management. Dinesh Kumar is co-founder and CTO at Mitovia, Inc., and has over 30 years of experience in technology business management, strategic planning, value measurement and communication, capability assessment and planning, and governance. At Mitovia he is driving business-minded, knowledge-driven practices and solutions for planning and managing organizational capabilities, including digital, security, competency, and shared services management. Dinesh has filed a patent on capability-driven, service-oriented planning. He is also an adjunct professor at Stevens Institute of Technology, teaching technology business management and process innovation courses to MBA and MSIS students. He is a board member and principal at the Innovation Value Institute, where he is developing and driving capability models and practices for managing IT for business value. He is a founding member and major contributor at The Value Council, a non-profit organization focused on improving value management practices. Dinesh has held a broad variety of sales, consulting, and management roles at Microsoft, Informix, and Unisys. He has an MBA degree from Penn State University, and

Anbieter: ciando eBooks
Stand: 02.04.2018
Zum Angebot
Togaf Version 9.1
59,99 € *
ggf. zzgl. Versand

TOGAF is a framework - a detailed method and a set of supporting tools - for developing an enterprise architecture, developed by members of The Open Group Architecture Forum. TOGAF Version 9.1 is a maintenance update to TOGAF 9, addressing comments raised since the introduction of TOGAF 9 in 2009. It retains the major features and structure of TOGAF 9, thereby preserving existing investment in TOGAF, and adds further detail and clarification to what is already proven.It may be used freely by any organization wishing to develop an enterprise architecture for use within that organization (subject to the Conditions of Use). This Book is divided into seven parts: Part I - Introduction This part provides a high-level introduction to the key concepts of enterprise architecture and in particular the TOGAF approach. It contains the definitions of terms used throughout TOGAF and release notes detailing the changes between this version and the previous version of TOGAF. Part II - Architecture Development Method This is the core of TOGAF. It describes the TOGAF Architecture Development Method (ADM) a step-by-step approach to developing an enterprise architecture. Part III - ADM Guidelines & Techniques This part contains a collection of guidelines and techniques available for use in applying TOGAF and the TOGAF ADM. Part IV - Architecture Content Framework This part describes the TOGAF content framework, including a structured metamodel for architectural artifacts, the use of re-usable architecture building blocks, and an overview of typical architecture deliverables. Part V - Enterprise Continuum & Tools This part discusses appropriate taxonomies and tools to categorize and store the outputs of architecture activity within an enterprise. Part VI - TOGAF Reference Models This part provides a selection of architectural reference models, which includes the TOGAF Foundation Architecture, and the Integrated Information Infrastructure Reference Model (III-RM). Part VII Architecture Capability Framework This section looks at roles, Governance, compliance skills and much more practical guidance

Anbieter: buecher.de
Stand: 22.04.2018
Zum Angebot
NTP Security - A Quick-Start Guide
26,99 € *
ggf. zzgl. Versand

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks in daily deployment. Disruption of NTP services can interrupt communication between servers on the network and take an entire network offline. Beyond disrupting communication, flaws in the NTP daemon itself can make servers vulnerable to external attack-attacks that often go unnoticed. NTP is being used more frequently in Distributed Denial of Service (DDoS) attacks. It is a User Datagram Protocol (UDP) with encryption schemes that are not often used or are poorly implemented, making it susceptible to spoofing. Despite all of the security challenges, the fact is that NTP is critical to most modern networks. It is one of those set it and forget it protocols that network administrators and even security professionals dont understand in depth. However, an attacker who does understand the security flaws can wreak havoc on an insecure network. NTP Security: A Quick-Start Guide provides a deeper understanding of the protocol itself and how to deploy a strategy using the protocol throughout a network in a secure manner. Your security team will be able to provide better guidance to the system and network teams who will then be able to better manage the day-to-day implementation. This succinct resource offers practical guidance to an underserved topic (actually, not served at all). Coverage includes: An understanding of NTP and the importance of time synchronization in modern networks Issues in NTP security, including an analysis of NTP traffic A review of the vulnerabilities and flaws in the protocol Practical solutions for securing NTP and building a robust infrastructure Effective alternatives to NTP What youll learn A better understanding of the risks associated with the Network Time protocol (NTP) How to configure NTP on servers and workstations in the network in a more secure manner How to configure NTP on network platforms in a secure manner Ways to bring more NTP capability inside the network, thus creating a smaller attack surface Alternatives to NTP, including how to synchronize network clocks in other ways Who This Book Is For System Administrators, Network Engineers, and Security Analysts Allan Liska is a Consulting Systems Engineer with FireEye, and has more than 16 years of experience in the world of information security. He has worked both as a security practitioner and an ethical hacker, so he is familiar with both sides of the security aisle and, through his work at Symantec and iSIGHT Partners, has helped countless organizations improve their security posture using more effective intelligence. In addition to security experience, Mr. Liska also authored The Practice of Network Security , Building an Intelligence-Led Security Program , and contributed the security-focused chapters to The Apache Administrators Handbook .

Anbieter: ciando eBooks
Stand: 02.04.2018
Zum Angebot
Building Responsive Data Visualization for the Web
30,99 € *
ggf. zzgl. Versand

Unchain your data from the desktop with responsive visualizations Building Responsive Data Visualization for the Web is a handbook for any front-end development team needing a framework for integrating responsive web design into the current workflow. Written by a leading industry expert and design lead at Starbase Go, this book provides a wealth of information and practical guidance from the perspective of a real-world designer. Youll walk through the process of building data visualizations responsively as you learn best practices that build upon responsive web design principles, and get the hands-on practice you need with exercises, examples, and source code provided in every chapter. These strategies are designed to be implemented by teams large and small, with varying skill sets, so you can apply these concepts and skills to your project right away. Responsive web design is the practice of building a website to suit base browser capability, then adding features that enhance the experience based on the users devices capabilities. Applying these ideas to data produces visualizations that always look as if they were designed specifically for the device through which they are viewed. This book shows you how to incorporate these principles into your current practices, with highly practical hands-on training. Examine the hard data surrounding responsive design Master best practices with hands-on exercises Learn data-based document manipulation using D3.js Adapt your current strategies to responsive workflows Data is growing exponentially, and the need to visualize it in any context has become crucial. Traditional visualizations allow important data to become lost when viewed on a small screen, and the web traffic speaks for itself - viewers repeatedly demonstrate their preference for responsive design. If youre ready to create more accessible, take-anywhere visualizations, Building Responsive Data Visualization for the Web is your tailor-made solution. BILL HINDERMAN is the lead site optimization UI engineer for Orbitz Worldwide, where he designs, prototypes, develops, and A/B tests experimental new products for Orbitzs customer-facing brands. He is also founder and creative lead at Starbase Go, a digital creative studio that works with designers to create innovative web products. Bill is passionate about creating web experiences that work beautifully and look even better.

Anbieter: ciando eBooks
Stand: 12.12.2017
Zum Angebot
Security and Privacy in Cyber-Physical Systems ...
97,99 € *
ggf. zzgl. Versand

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what todays simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS. Houbing Song, PhD is an assistant professor in the Department of Electrical, Computer, Software, and Systems Engineering at Embry-Riddle Aeronautical University, Daytona Beach, Florida, and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab, www.SONGLab.us). Glenn A. Fink, PhD is a cyber security researcher with the National Security Directorate, Pacific Northwest National Laboratory.He was the lead inventor of PNNLs Digital Ants technology. Sabina Jeschke, Dr. rer. nat. is a professor in the Department of Mechanical Engineering, RWTH Aachen University, Germany and Head of the Cybernetics Lab IMA/ZLW & IfU.

Anbieter: ciando eBooks
Stand: 07.11.2017
Zum Angebot
Security and Privacy in Cyber-Physical Systems ...
97,99 € *
ggf. zzgl. Versand

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what todays simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS. HOUBING SONG, PhD is an assistant professor in the Department of Electrical, Computer, Software, and Systems Engineering at Embry-Riddle Aeronautical University, Daytona Beach, Florida, and the Director of the Security and Optimization for Networked Globe Laboratory (SONG Lab, www.SONGLab.us ). GLENN A. FINK, PhD is a cyber security researcher with the National Security Directorate, Pacific Northwest National Laboratory. He was the lead inventor of PNNLs Digital Ants technology. SABINA JESCHKE, Dr. rer. nat. is a professor in the Department of Mechanical Engineering, RWTH Aachen University, Germany, and Head of the Cybernetics Lab IMA/ZLW & IfU.

Anbieter: ciando eBooks
Stand: 07.11.2017
Zum Angebot
Building Responsive Data Visualization for the Web
30,99 € *
ggf. zzgl. Versand

Unchain your data from the desktop with responsive visualizations Building Responsive Data Visualization for the Web is a handbook for any front-end development team needing a framework for integrating responsive web design into the current workflow. Written by a leading industry expert and design lead at Starbase Go, this book provides a wealth of information and practical guidance from the perspective of a real-world designer. Youll walk through the process of building data visualizations responsively as you learn best practices that build upon responsive web design principles, and get the hands-on practice you need with exercises, examples, and source code provided in every chapter. These strategies are designed to be implemented by teams large and small, with varying skill sets, so you can apply these concepts and skills to your project right away. Responsive web design is the practice of building a website to suit base browser capability, then adding features that enhance the experience based on the users devices capabilities. Applying these ideas to data produces visualizations that always look as if they were designed specifically for the device through which they are viewed. This book shows you how to incorporate these principles into your current practices, with highly practical hands-on training. Examine the hard data surrounding responsive design Master best practices with hands-on exercises Learn data-based document manipulation using D3.js Adapt your current strategies to responsive workflows Data is growing exponentially, and the need to visualize it in any context has become crucial. Traditional visualizations allow important data to become lost when viewed on a small screen, and the web traffic speaks for itself - viewers repeatedly demonstrate their preference for responsive design. If youre ready to create more accessible, take-anywhere visualizations, Building Responsive Data Visualization for the Web is your tailor-made solution. BILL HINDERMAN is the lead site optimization UI engineer for Orbitz Worldwide, where he designs, prototypes, develops, and A/B tests experimental new products for Orbitzs customer-facing brands. He is also founder and creative lead at Starbase Go, a digital creative studio that works with designers to create innovative web products. Bill is passionate about creating web experiences that work beautifully and look even better.

Anbieter: ciando eBooks
Stand: 07.11.2017
Zum Angebot