دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Vivek Kale
سری:
ISBN (شابک) : 1138553786, 9781138553781
ناشر: CRC Press
سال نشر: 2019
تعداد صفحات: 557
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب Digital Transformation of Enterprise Architecture به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تحول دیجیتالی معماری سازمانی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
"In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture … this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library."
―John D. McDowall, Author of Complex Enterprise Architecture
Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems.
This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability.
This pragmatic book:
Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.
Cover Half Title Title Page Copyright Page Dedication Table of Contents Foreword Preface Acknowledgments Author Other Books by Vivek Kale Prologue: Digital Storms 1: Agile Enterprise Architecture 1.1 Age of Transformation 1.1.1 VUCA Ecosystem 1.2 Four Industrial Generations 1.3 Trends 1.3.1 Social Trends 1.3.2 Organizational Trends 1.3.3 Business Model Trends 1.3.4 Technology Trends 1.4 From Products to Services to Experiences 1.5 Agile Enterprises 1.5.1 Stability versus Agility 1.5.2 Aspects of Agility 1.5.3 Principles of Built-for-Change Systems 1.5.4 Framework for Change Proficiency 1.6 Digital Transformation of EA Attributes 1.7 Summary Section I: Genesis of Digital Transformation of Enterprise Architecture 2: Systems Theory 2.1 Systems Thinking 2.1.1 Systems Science 2.1.2 Principles of Systems Science 2.2 Systems Engineering 2.2.1 System Dynamics via Simulation Modeling 2.2.2 Changeable Systems 2.3 Systems Architecting 2.3.1 Systems Architecture 2.3.1.1 Functional Architectural Requirements 2.3.1.2 Nonfunctional Architectural Requirements 2.3.2 Enterprise Architecture 2.3.2.1 Business Architecture 2.3.2.2 Information Architecture 2.3.2.3 Application Architecture 2.3.2.4 Technical Architecture 2.4 Enterprise Processes 2.5 Summary 3: Digital Transformation of Enterprises 3.1 Digital Transformation of Enterprises 3.2 Business Model Innovation 3.2.1 Business Model 3.2.1.1 Osterwalder and Pigneur’s Business Model Canvas 3.2.1.2 Design Thinking for Business Model Design 3.2.1.3 Business Model Design and Enterprise Architecture 3.3 Enterprise Architecture 3.3.1 Architectural Element 3.3.2 System Structures 3.3.2.1 Attribute Tradeoffs 3.3.3 Candidate Architecture 3.3.4 Stakeholders 3.4 Viewpoints and Views 3.5 Perspectives 3.5.1 Change Perspective 3.5.2 Scalability Perspective 3.5.3 Availability Perspective 3.6 Enterprise Architecture Frameworks 3.7 Summary 4: Distributed Systems 4.1 Distributed Systems 4.1.1 Distributed Computing 4.1.1.1 System Architectural Styles 4.1.1.2 Software Architectural Styles 4.1.1.3 Technologies for Distributed Computing 4.2 Distributed Databases 4.2.1 Characteristics of Distributed Databases 4.2.1.1 Transparency 4.2.1.2 Availability and Reliability 4.2.1.3 Scalability and Partition Tolerance 4.2.1.4 Autonomy 4.2.2 Advantages and Disadvantages of Distributed Databases 4.2.2.1 Advantages of Distributed Databases 4.2.2.2 Disadvantages of Distributed Databases 4.2.3 Data Replication and Allocation 4.2.4 Concurrency Control and Recovery in Distributed Databases 4.2.4.1 Distributed Recovery 4.2.5 Rules for Distributed Databases 4.3 Summary Section II: Road to Digital Transformation of Enterprise Architecture 5: Dependability 5.1 Introduction to Dependability 5.1.1 Faults, Errors, and Failures 5.1.1.1 Faults 5.1.1.2 Errors 5.1.1.3 Failures 5.2 Fault Tolerance 5.3 Summary Appendix 5A: Reliability 6: Performability 6.1 Introduction to Performability 6.1.1 Managing the Resource Demand 6.1.2 Managing Resources 6.2 Performance Evaluation 6.2.1 Performance Evaluation Framework 6.2.1.1 Evaluation Methods 6.2.1.2 Evaluation Results 6.3 Summary Appendix 6A: Queuing Systems 7: Interoperability 7.1 Introduction to Interoperability 7.1.1 Framework for Enterprise Interoperability (FEI) 7.1.2 Maturity Model for Enterprise Interoperability 7.1.3 Standards for Enterprise Interoperability 7.1.4 Basic Model of System Interaction 7.2 Model-Based Interoperability 7.2.1 Model Driven Architecture 7.2.2 Model Driven Interoperability (MDI) 7.3 Aspects of Interoperability for Internet of Things (IoT) 7.4 Summary Appendix 7A: Integration 8: Scalability 8.1 Introduction to Scalability 8.1.1 Load Balancing for Scalability 8.2 Load Balancing Schemes 8.2.1 Static Load Balancing 8.2.2 Dynamic Load Balancing 8.2.2.1 Discrete Event Simulation 8.2.2.2 Stream Based Scenarios 8.2.2.3 Cloud Computing 8.3 Load Balancing in Peer-to-Peer Systems 8.3.1 Static Load Balancing 8.3.2 Dynamic Load Balancing 8.3.3 Performing Load Balancing 8.4 Summary Appendix 8A: Virtualization 9: Availability 9.1 Introduction to Availability 9.1.1 Availability Maturity Model 9.1.2 Disaster Recovery and Business Continuity Planning (BCP) 9.2 Availability and Repair 9.2.1 Basics of Probability 9.2.2 Failure Rate 9.2.3 Mean Time to Failure 9.2.4 Mean Time to Repair 9.2.5 Mean Time Between Failures 9.3 Availability of Services 9.3.1 Service-Level Agreements (SLAs) 9.3.2 Quality of Service (QoS) 9.3.3 Metrics for Interfacing to Cloud Service Providers 9.4 Summary Appendix 9A: Replication 10: Mobility 10.1 Introduction to Mobility 10.2 Mobility Management 10.2.1 Protocol Reference Model 10.2.1.1 Data Plane 10.2.1.2 Control Plane 10.2.1.3 Management Plane 10.2.2 Network Reference Model 10.3 Moving Objects 10.3.1 Aspects of MOD 10.4 Summary Appendix 10A: Spatio-Temporal Databases 11: Ubiquity 11.1 Introduction to Ubiquity 11.2 Ubiquitous Computing Fundamentals 11.3 Ubiquitous Computing Core Properties 11.4 Smart Devices 11.4.1 Smart Dust 11.4.2 Skin 11.4.3 Clay 11.5 Smart Environment 11.5.1 Tagging 11.5.2 Sensing 11.5.3 Controlling 11.6 Smart Interaction 11.6.1 Basic Interaction 11.6.2 Smart Interaction 11.7 Summary Appendix 11A: Embedded Systems 12: Security 12.1 Introduction to Security 12.1.1 Triad of Confidentiality, Integrity, and Availability 12.1.2 Types of Attacks 12.1.3 Threats, Vulnerabilities, and Risk 12.1.4 Controls 12.1.5 Defense in Depths 12.2 Identification 12.3 Authentication 12.4 Authorization 12.5 Access Control 12.5.1 Access Control Models 12.6 Accountability 12.7 Audit 12.8 Summary Appendix 12A: Cryptography 13: Analyticity 13.1 Introduction to Analytics 13.1.1 Descriptive Analytics 13.1.2 Predictive Analytics 13.1.3 Prescriptive Analytics 13.2 Data Science Techniques 13.2.1 Database Systems 13.2.2 Statistical Inference 13.2.3 Regression and Classification 13.2.4 Data Mining and Machine Learning 13.2.5 Data Visualization 13.2.6 Text Analytics 13.2.7 Time Series and Market Research Models 13.3 Snapshot of Data Analysis Techniques and Tasks 13.4 Summary Appendix 13A: Data Mining 14: Usability 14.1 Introduction to Usability 14.2 Concept of Usability 14.3 Usability Principles 14.4 Usability Specifications 14.5 Interactions and the Quality of Experience 14.5.1 Factors Influencing Quality of Experience 14.5.1.1 Human Influence Factors 14.5.1.2 System Influence Factors 14.5.1.3 Context Influence Factors 14.5.2 Features of Quality of Experience 14.5.2.1 Feature Levels 14.6 Usability of Interactive Systems 14.7 Summary Appendix 14A: Interactive Interfaces Section III: Digital Transformation of Enterprise Architecture 15: Service-Oriented Computing 15.1 Introduction to Service-Oriented Architecture 15.1.1 Defining SOA 15.1.1.1 Services 15.2 SOA Benefits 15.3 Characteristics of SOA 15.4 Advantages of SOA 15.5 SOA Applications 15.5.1 Rapid Application Integration 15.5.2 Multichannel Access 15.5.3 Business Process Management 15.6 SOA Ingredients 15.6.1 Objects, Services, and Resources 15.6.1.1 Objects 15.6.1.2 Services 15.6.1.3 Resources 15.6.2 SOA and Web Services 15.6.3 SOA and RESTful Services 15.7 Enterprise Service Bus 15.8 Summary 16: Cloud Computing 16.1 Introduction to Cloud Computing 16.2 Cloud Characteristics 16.3 Cloud Delivery Models 16.3.1 Infrastructure as a Service (IaaS) 16.3.2 Platform as a Service (PaaS) 16.3.3 Software as a Service (SaaS) 16.4 Cloud Deployment Models 16.4.1 Private Clouds 16.4.2 Public Clouds 16.4.3 Hybrid Clouds 16.4.4 Community Clouds 16.5 Cloud Benefits 16.6 Cloud Challenges 16.6.1 Scalability 16.6.2 Multi-Tenancy 16.6.3 Availability 16.7 Cloud Technologies 16.7.1 Virtualization 16.7.1.1 Characteristics of Virtualized Environment 16.7.2 Service-Oriented Computing 16.7.2.1 Layers in SOA 16.8 Summary 17: Big Data Computing 17.1 Introduction to Big Data 17.1.1 What Is Big Data? 17.1.1.1 Data Volume 17.1.1.2 Data Velocity 17.1.1.3 Data Variety 17.1.1.4 Data Veracity 17.1.2 Common Characteristics of Big Data Computing Systems 17.2 Tools and Techniques of Big Data 17.2.1 Processing Approach 17.2.2 Big Data System Architecture 17.2.2.1 BASE (Basically Available, Soft State, Eventual Consistency) 17.2.2.2 Functional Decomposition 17.2.2.3 Master–Slave Replication 17.2.3 Row Partitioning or Sharding 17.2.4 Row versus Column-Oriented Data Layouts 17.2.5 NoSQL Data Management 17.3 NoSQL Databases 17.3.1 Column-Oriented Stores or Databases 17.3.2 Key–Value Stores (K–V Store) or Databases 17.3.3 Document-Oriented Databases 17.3.4 Graph Stores or Databases 17.4 Aadhaar Project 17.5 Summary 18: Context-Aware Computing 18.1 Introduction to Context 18.2 Context-Aware Applications 18.2.1 Types of Context-Awareness 18.2.2 Types of Contexts 18.2.3 Context Acquisition 18.2.4 Context Models 18.2.5 Generic Context-Aware Application Architecture 18.2.6 Illustrative Context-Aware Applications 18.3 Location Based Systems 18.3.1 Sources of Location Data 18.3.1.1 Cellular Systems 18.3.1.2 Multireference Point Systems 18.3.1.3 Tagging 18.3.2 Mobility Data 18.3.2.1 Mobility Data Mining 18.4 Context-Aware Recommender Systems 18.5 Summary 19: Internet of Things (IoT) Computing 19.1 Introduction to Internet of Things 19.1.1 IoT Building Blocks 19.1.2 IoT Architecture 19.1.3 Widened Address Space with IPv6 19.2 RFID (Radio Frequency Identification) 19.3 Sensor Networks 19.3.1 Wireless Networks 19.3.2 Sensor 19.3.3 Wireless Sensor Networks 19.3.3.1 WSN Characteristics 19.4 Summary 20: Blockchain Computing 20.1 Peer-to-Peer Systems 20.1.1 Overlay Routing versus IP Routing 20.2 Blockchain 20.2.1 Blockchain Transaction 20.2.2 Blockchain Features 20.2.3 Blockchain Benefits 20.2.4 Blockchain Architecture 20.3 Blockchain Security 20.4 Blockchain Security Architecture for Internet of Things 20.4.1 Hierarchical Blockchain Architecture 20.5 Summary 21: Soft Computing 21.1 Artificial Neural Networks 21.1.1 The Biological Neuron 21.1.2 Model of an Artificial Neuron 21.1.2.1 Activation Function 21.1.3 Artificial Neural Network 21.1.3.1 Processing Units 21.1.3.2 ANN Processing 21.1.3.3 ANN Topologies 21.1.3.4 Training of ANN 21.1.3.5 ANN Applications 21.2 Fuzzy Systems 21.2.1 Fuzzy Controller 21.2.1.1 Example of a Fuzzy Logic Controller 21.3 Evolutionary Algorithms 21.3.1 Fundamentals of Evolutionary Algorithms 21.3.2 Genetic Algorithms 21.3.2.1 Benefits of GA 21.3.2.2 Description of a Simple GA 21.3.2.3 General Presentation of GA Using Binary Coding 21.4 Rough Sets 21.5 Summary 22: Interactive Computing 22.1 Business Processes and Human Interactions 22.1.1 Human Interaction Management 22.1.2 Human Interaction Management System 22.1.3 Comparing HIM and BPM 22.1.4 Humanedj Human Interaction Management Systems 22.2 Interaction Architectures 22.2.1 Presentation Abstraction Controller (PAC) 22.2.2 Model View Controller (MVC) 22.2.3 Data Context Interaction (DCI) 22.2.4 Micro-Service Architecture (MSA) 22.3 Customer Interaction Systems 22.3.1 Spoken Language Recognition 22.3.2 Spoken Language Understanding 22.3.3 Dialog Management 22.3.4 Natural Language Generation 22.3.5 Text-to-Speech Synthesis 22.4 Implementing Customer Interaction Systems 22.5 Summary Epilogue: Blown to Bits Bibliography Index