The motivation behind the conception of this monograph was to advance scientific knowledge about the design and control of workflow processes. A workflow pr- ess (or workflow for short) is a specific type of business process, a way of or- nizing work and resources. Workflows are commonly found within large admin- trative organizations such as...
Cisco authorized self-study book for CCDA foundation learning
* Prepare for CCDA certification while mastering the network design process * Learn to characterize existing networks and determine new customer requirements * Develop appropriate network topologies for various environments * Design device naming schemes and IP...
Capture customers and sales with social media commerce
Social media commerce is a booming industry. By using social networks in the context of e-commerce transactions, brands large and small are making their products more available and more convenient for customers. This one-of-a-kind guide introduces you to social media...
The dot-com collapse generally discredited the idea of leveraging the Internet to build viable businesses. Many market pundits have decried the concept without examining the underlying dynamics associated with these companies' failures. The truth is, prior business models were built on a flawed business case, not bad technology....
An updated and expanded Second Edition of the popular guide to social media for the business community
Marketers must look to the Web for new ways of finding customers and communicating with them, rather than at them. From Facebook and YouTube to blogs and Twitter-ing, social media on the Internet is the most promising new way to...
Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and...
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...
With the increasing focus on IT Security comes a higher demand for identity management
in the modern business. This requires a flexible, scalable, and secure authentication
method. Identity control is made mandatory by many public standards, such as PCI, and
PKI is an essential component to set up authentication in many technologies,...
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.
Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects...