ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Digital Transformation of Enterprise Architecture

دانلود کتاب تحول دیجیتالی معماری سازمانی

Digital Transformation of Enterprise Architecture

مشخصات کتاب

Digital Transformation of Enterprise Architecture

ویرایش: 1 
نویسندگان:   
سری:  
ISBN (شابک) : 1138553786, 9781138553781 
ناشر: CRC Press 
سال نشر: 2019 
تعداد صفحات: 557 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 48,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 14


در صورت تبدیل فایل کتاب Digital Transformation of Enterprise Architecture به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تحول دیجیتالی معماری سازمانی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تحول دیجیتالی معماری سازمانی


توضیحاتی درمورد کتاب به خارجی

"In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture … this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library."

―John D. McDowall, Author of Complex Enterprise Architecture

Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems.

This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability.

This pragmatic book:

  • Identifies three parts effort for any digital transformation: Business Models, Enterprise Architectures and Enterprise Processes.
  • Describes eight attributes of EA: interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.
  • Explains the corresponding technologies of service-oriented, cloud, big data, context-aware, Internet of Things (IoT), blockchain, soft, and interactive computing.
  • Briefs on auxiliary technologies like integration, virtualization, replication, spatio-temporal databases, embedded systems, cryptography, data mining, and interactive interfaces that are essential for digital transformation of enterprise architecture.
  • Introduces interactive interfaces like voice, gaze, gesture and 3D interfaces.
  • Provides an overview of blockchain computing, soft computing, and customer interaction systems.

Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgments
Author
Other Books by Vivek Kale
Prologue: Digital Storms
1: Agile Enterprise Architecture
	1.1 Age of Transformation
		1.1.1 VUCA Ecosystem
	1.2 Four Industrial Generations
	1.3 Trends
		1.3.1 Social Trends
		1.3.2 Organizational Trends
		1.3.3 Business Model Trends
		1.3.4 Technology Trends
	1.4 From Products to Services to Experiences
	1.5 Agile Enterprises
		1.5.1 Stability versus Agility
		1.5.2 Aspects of Agility
		1.5.3 Principles of Built-for-Change Systems
		1.5.4 Framework for Change Proficiency
	1.6 Digital Transformation of EA Attributes
	1.7 Summary
Section I: Genesis of Digital Transformation of Enterprise Architecture
	2: Systems Theory
		2.1 Systems Thinking
			2.1.1 Systems Science
			2.1.2 Principles of Systems Science
		2.2 Systems Engineering
			2.2.1 System Dynamics via Simulation Modeling
			2.2.2 Changeable Systems
		2.3 Systems Architecting
			2.3.1 Systems Architecture
				2.3.1.1 Functional Architectural Requirements
				2.3.1.2 Nonfunctional Architectural Requirements
			2.3.2 Enterprise Architecture
				2.3.2.1 Business Architecture
				2.3.2.2 Information Architecture
				2.3.2.3 Application Architecture
				2.3.2.4 Technical Architecture
		2.4 Enterprise Processes
		2.5 Summary
	3: Digital Transformation of Enterprises
		3.1 Digital Transformation of Enterprises
		3.2 Business Model Innovation
			3.2.1 Business Model
				3.2.1.1 Osterwalder and Pigneur’s Business Model Canvas
				3.2.1.2 Design Thinking for Business Model Design
				3.2.1.3 Business Model Design and Enterprise Architecture
		3.3 Enterprise Architecture
			3.3.1 Architectural Element
			3.3.2 System Structures
				3.3.2.1 Attribute Tradeoffs
			3.3.3 Candidate Architecture
			3.3.4 Stakeholders
		3.4 Viewpoints and Views
		3.5 Perspectives
			3.5.1 Change Perspective
			3.5.2 Scalability Perspective
			3.5.3 Availability Perspective
		3.6 Enterprise Architecture Frameworks
		3.7 Summary
	4: Distributed Systems
		4.1 Distributed Systems
			4.1.1 Distributed Computing
				4.1.1.1 System Architectural Styles
				4.1.1.2 Software Architectural Styles
				4.1.1.3 Technologies for Distributed Computing
		4.2 Distributed Databases
			4.2.1 Characteristics of Distributed Databases
				4.2.1.1 Transparency
				4.2.1.2 Availability and Reliability
				4.2.1.3 Scalability and Partition Tolerance
				4.2.1.4 Autonomy
			4.2.2 Advantages and Disadvantages of Distributed Databases
				4.2.2.1 Advantages of Distributed Databases
				4.2.2.2 Disadvantages of Distributed Databases
			4.2.3 Data Replication and Allocation
			4.2.4 Concurrency Control and Recovery in Distributed Databases
				4.2.4.1 Distributed Recovery
			4.2.5 Rules for Distributed Databases
		4.3 Summary
Section II: Road to Digital Transformation of Enterprise Architecture
	5: Dependability
		5.1 Introduction to Dependability
			5.1.1 Faults, Errors, and Failures
				5.1.1.1 Faults
				5.1.1.2 Errors
				5.1.1.3 Failures
		5.2 Fault Tolerance
		5.3 Summary
		Appendix 5A: Reliability
	6: Performability
		6.1 Introduction to Performability
			6.1.1 Managing the Resource Demand
			6.1.2 Managing Resources
		6.2 Performance Evaluation
			6.2.1 Performance Evaluation Framework
				6.2.1.1 Evaluation Methods
				6.2.1.2 Evaluation Results
		6.3 Summary
		Appendix 6A: Queuing Systems
	7: Interoperability
		7.1 Introduction to Interoperability
			7.1.1 Framework for Enterprise Interoperability (FEI)
			7.1.2 Maturity Model for Enterprise Interoperability
			7.1.3 Standards for Enterprise Interoperability
			7.1.4 Basic Model of System Interaction
		7.2 Model-Based Interoperability
			7.2.1 Model Driven Architecture
			7.2.2 Model Driven Interoperability (MDI)
		7.3 Aspects of Interoperability for Internet of Things (IoT)
		7.4 Summary
		Appendix 7A: Integration
	8: Scalability
		8.1 Introduction to Scalability
			8.1.1 Load Balancing for Scalability
		8.2 Load Balancing Schemes
			8.2.1 Static Load Balancing
			8.2.2 Dynamic Load Balancing
				8.2.2.1 Discrete Event Simulation
				8.2.2.2 Stream Based Scenarios
				8.2.2.3 Cloud Computing
		8.3 Load Balancing in Peer-to-Peer Systems
			8.3.1 Static Load Balancing
			8.3.2 Dynamic Load Balancing
			8.3.3 Performing Load Balancing
		8.4 Summary
		Appendix 8A: Virtualization
	9: Availability
		9.1 Introduction to Availability
			9.1.1 Availability Maturity Model
			9.1.2 Disaster Recovery and Business Continuity Planning (BCP)
		9.2 Availability and Repair
			9.2.1 Basics of Probability
			9.2.2 Failure Rate
			9.2.3 Mean Time to Failure
			9.2.4 Mean Time to Repair
			9.2.5 Mean Time Between Failures
		9.3 Availability of Services
			9.3.1 Service-Level Agreements (SLAs)
			9.3.2 Quality of Service (QoS)
			9.3.3 Metrics for Interfacing to Cloud Service Providers
		9.4 Summary
		Appendix 9A: Replication
	10: Mobility
		10.1 Introduction to Mobility
		10.2 Mobility Management
			10.2.1 Protocol Reference Model
				10.2.1.1 Data Plane
				10.2.1.2 Control Plane
				10.2.1.3 Management Plane
			10.2.2 Network Reference Model
		10.3 Moving Objects
			10.3.1 Aspects of MOD
		10.4 Summary
		Appendix 10A: Spatio-Temporal Databases
	11: Ubiquity
		11.1 Introduction to Ubiquity
		11.2 Ubiquitous Computing Fundamentals
		11.3 Ubiquitous Computing Core Properties
		11.4 Smart Devices
			11.4.1 Smart Dust
			11.4.2 Skin
			11.4.3 Clay
		11.5 Smart Environment
			11.5.1 Tagging
			11.5.2 Sensing
			11.5.3 Controlling
		11.6 Smart Interaction
			11.6.1 Basic Interaction
			11.6.2 Smart Interaction
		11.7 Summary
		Appendix 11A: Embedded Systems
	12: Security
		12.1 Introduction to Security
			12.1.1 Triad of Confidentiality, Integrity, and Availability
			12.1.2 Types of Attacks
			12.1.3 Threats, Vulnerabilities, and Risk
			12.1.4 Controls
			12.1.5 Defense in Depths
		12.2 Identification
		12.3 Authentication
		12.4 Authorization
		12.5 Access Control
			12.5.1 Access Control Models
		12.6 Accountability
		12.7 Audit
		12.8 Summary
		Appendix 12A: Cryptography
	13: Analyticity
		13.1 Introduction to Analytics
			13.1.1 Descriptive Analytics
			13.1.2 Predictive Analytics
			13.1.3 Prescriptive Analytics
		13.2 Data Science Techniques
			13.2.1 Database Systems
			13.2.2 Statistical Inference
			13.2.3 Regression and Classification
			13.2.4 Data Mining and Machine Learning
			13.2.5 Data Visualization
			13.2.6 Text Analytics
			13.2.7 Time Series and Market Research Models
		13.3 Snapshot of Data Analysis Techniques and Tasks
		13.4 Summary
		Appendix 13A: Data Mining
	14: Usability
		14.1 Introduction to Usability
		14.2 Concept of Usability
		14.3 Usability Principles
		14.4 Usability Specifications
		14.5 Interactions and the Quality of Experience
			14.5.1 Factors Influencing Quality of Experience
				14.5.1.1 Human Influence Factors
				14.5.1.2 System Influence Factors
				14.5.1.3 Context Influence Factors
			14.5.2 Features of Quality of Experience
				14.5.2.1 Feature Levels
		14.6 Usability of Interactive Systems
		14.7 Summary
		Appendix 14A: Interactive Interfaces
Section III: Digital Transformation of Enterprise Architecture
	15: Service-Oriented Computing
		15.1 Introduction to Service-Oriented Architecture
			15.1.1 Defining SOA
				15.1.1.1 Services
		15.2 SOA Benefits
		15.3 Characteristics of SOA
		15.4 Advantages of SOA
		15.5 SOA Applications
			15.5.1 Rapid Application Integration
			15.5.2 Multichannel Access
			15.5.3 Business Process Management
		15.6 SOA Ingredients
			15.6.1 Objects, Services, and Resources
				15.6.1.1 Objects
				15.6.1.2 Services
				15.6.1.3 Resources
			15.6.2 SOA and Web Services
			15.6.3 SOA and RESTful Services
		15.7 Enterprise Service Bus
		15.8 Summary
	16: Cloud Computing
		16.1 Introduction to Cloud Computing
		16.2 Cloud Characteristics
		16.3 Cloud Delivery Models
			16.3.1 Infrastructure as a Service (IaaS)
			16.3.2 Platform as a Service (PaaS)
			16.3.3 Software as a Service (SaaS)
		16.4 Cloud Deployment Models
			16.4.1 Private Clouds
			16.4.2 Public Clouds
			16.4.3 Hybrid Clouds
			16.4.4 Community Clouds
		16.5 Cloud Benefits
		16.6 Cloud Challenges
			16.6.1 Scalability
			16.6.2 Multi-Tenancy
			16.6.3 Availability
		16.7 Cloud Technologies
			16.7.1 Virtualization
				16.7.1.1 Characteristics of Virtualized Environment
			16.7.2 Service-Oriented Computing
				16.7.2.1 Layers in SOA
		16.8 Summary
	17: Big Data Computing
		17.1 Introduction to Big Data
			17.1.1 What Is Big Data?
				17.1.1.1 Data Volume
				17.1.1.2 Data Velocity
				17.1.1.3 Data Variety
				17.1.1.4 Data Veracity
			17.1.2 Common Characteristics of Big Data Computing Systems
		17.2 Tools and Techniques of Big Data
			17.2.1 Processing Approach
			17.2.2 Big Data System Architecture
				17.2.2.1 BASE (Basically Available, Soft State, Eventual Consistency)
				17.2.2.2 Functional Decomposition
				17.2.2.3 Master–Slave Replication
			17.2.3 Row Partitioning or Sharding
			17.2.4 Row versus Column-Oriented Data Layouts
			17.2.5 NoSQL Data Management
		17.3 NoSQL Databases
			17.3.1 Column-Oriented Stores or Databases
			17.3.2 Key–Value Stores (K–V Store) or Databases
			17.3.3 Document-Oriented Databases
			17.3.4 Graph Stores or Databases
		17.4 Aadhaar Project
		17.5 Summary
	18: Context-Aware Computing
		18.1 Introduction to Context
		18.2 Context-Aware Applications
			18.2.1 Types of Context-Awareness
			18.2.2 Types of Contexts
			18.2.3 Context Acquisition
			18.2.4 Context Models
			18.2.5 Generic Context-Aware Application Architecture
			18.2.6 Illustrative Context-Aware Applications
		18.3 Location Based Systems
			18.3.1 Sources of Location Data
				18.3.1.1 Cellular Systems
				18.3.1.2 Multireference Point Systems
				18.3.1.3 Tagging
			18.3.2 Mobility Data
				18.3.2.1 Mobility Data Mining
		18.4 Context-Aware Recommender Systems
		18.5 Summary
	19: Internet of Things (IoT) Computing
		19.1 Introduction to Internet of Things
			19.1.1 IoT Building Blocks
			19.1.2 IoT Architecture
			19.1.3 Widened Address Space with IPv6
		19.2 RFID (Radio Frequency Identification)
		19.3 Sensor Networks
			19.3.1 Wireless Networks
			19.3.2 Sensor
			19.3.3 Wireless Sensor Networks
				19.3.3.1 WSN Characteristics
		19.4 Summary
	20: Blockchain Computing
		20.1 Peer-to-Peer Systems
			20.1.1 Overlay Routing versus IP Routing
		20.2 Blockchain
			20.2.1 Blockchain Transaction
			20.2.2 Blockchain Features
			20.2.3 Blockchain Benefits
			20.2.4 Blockchain Architecture
		20.3 Blockchain Security
		20.4 Blockchain Security Architecture for Internet of Things
			20.4.1 Hierarchical Blockchain Architecture
		20.5 Summary
	21: Soft Computing
		21.1 Artificial Neural Networks
			21.1.1 The Biological Neuron
			21.1.2 Model of an Artificial Neuron
				21.1.2.1 Activation Function
			21.1.3 Artificial Neural Network
				21.1.3.1 Processing Units
				21.1.3.2 ANN Processing
				21.1.3.3 ANN Topologies
				21.1.3.4 Training of ANN
				21.1.3.5 ANN Applications
		21.2 Fuzzy Systems
			21.2.1 Fuzzy Controller
				21.2.1.1 Example of a Fuzzy Logic Controller
		21.3 Evolutionary Algorithms
			21.3.1 Fundamentals of Evolutionary Algorithms
			21.3.2 Genetic Algorithms
				21.3.2.1 Benefits of GA
				21.3.2.2 Description of a Simple GA
				21.3.2.3 General Presentation of GA Using Binary Coding
		21.4 Rough Sets
		21.5 Summary
	22: Interactive Computing
		22.1 Business Processes and Human Interactions
			22.1.1 Human Interaction Management
			22.1.2 Human Interaction Management System
			22.1.3 Comparing HIM and BPM
			22.1.4 Humanedj Human Interaction Management Systems
		22.2 Interaction Architectures
			22.2.1 Presentation Abstraction Controller (PAC)
			22.2.2 Model View Controller (MVC)
			22.2.3 Data Context Interaction (DCI)
			22.2.4 Micro-Service Architecture (MSA)
		22.3 Customer Interaction Systems
			22.3.1 Spoken Language Recognition
			22.3.2 Spoken Language Understanding
			22.3.3 Dialog Management
			22.3.4 Natural Language Generation
			22.3.5 Text-to-Speech Synthesis
		22.4 Implementing Customer Interaction Systems
		22.5 Summary
Epilogue: Blown to Bits
Bibliography
Index




نظرات کاربران