Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Creating smart enterprises
Nội dung xem thử
Mô tả chi tiết
Creating Smart Enterprises
Leveraging Cloud, Big Data,
Web, Social Media, Mobile and
IoT Technologies
Creating Smart Enterprises
Leveraging Cloud, Big Data,
Web, Social Media, Mobile and
IoT Technologies
By
Vivek Kale
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2018 Vivek Kale
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
International Standard Book Number-13: 978-1-4987-5128-5 (Hardback)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have
been made to publish reliable data and information, but the author and publisher cannot assume responsibility for
the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the
copyright holders of all material reproduced in this publication and apologize to copyright holders if permission
to publish in this form has not been obtained. If any copyright material has not been acknowledged please write
and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted,
or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com
(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration
for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system
of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only
for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Names: Kale, Vivek, author.
Title: Creating smart enterprises : leveraging cloud, big data, web, social
media, mobile and IoT technologies / Vivek Kale.
Description: Boca Raton, FL : CRC Press, 2017.
Identifiers: LCCN 2017019839 | ISBN 9781498751285 (hb : alk. paper)
Subjects: LCSH: Technological innovations--Management. | Information
technology--Management.
Classification: LCC HD45 .K285 2017 | DDC 658.4/0630285--dc23
LC record available at https://lccn.loc.gov/2017019839
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To
My wife, Girija
who made me a better man,
And whose smile brings light into my days.
Your love and support encouraged
me to chase my dreams,
And any small success I have reached
is as much yours as it is mine.
vii
Contents
List of Figures....................................................................................................xv
List of Tables ...................................................................................................xvii
Preface ..............................................................................................................xix
Acknowledgments..........................................................................................xxiii
Author.............................................................................................................. xxv
Other Books by Vivek Kale ..........................................................................xxvii
1 VUCA Ecosystem ...................................................................................1
1.1 VUCA Ecosystem .............................................................................1
1.2 Four Industrial Generations ..............................................................3
1.3 Trends ...............................................................................................4
1.3.1 Social Trends ........................................................................4
1.3.2 Organizational Trends ..........................................................5
1.3.3 Business Model Trends .........................................................7
1.3.4 Technology Trends................................................................8
1.4 From Products to Services to Experiences..........................................9
1.5 Technology Advancements ..............................................................10
1.6 Digital Economy .............................................................................14
1.7 Intelligent Analysis..........................................................................17
1.7.1 Intelligence Maturity Model (IMM)...................................19
1.7.1.1 Data .....................................................................20
1.7.1.2 Communication...................................................20
1.7.1.3 Information..........................................................20
1.7.1.4 Concept ...............................................................21
1.7.1.5 Knowledge...........................................................21
1.7.1.6 Intelligence...........................................................23
1.7.1.7 Wisdom ...............................................................24
1.8 SMACT Technologies.....................................................................24
1.9 Summary.........................................................................................26
2 Aligning Business and IT Strategy.......................................................27
2.1 Business Strategy .............................................................................28
2.1.1 Evolution of Strategy Management.....................................28
viii ◾ Contents
2.1.2.3 Porter’s Framework of Generic Strategies ............ 34
2.1.2.4 Porter’s Value Chain.............................................36
2.2 Information Technology and Information Systems (IT/IS)............. 40
2.2.1 Evolution of IT ...................................................................41
2.2.2 Evolution of IS ....................................................................43
2.2.3 IS/IT Governance.............................................................. 44
2.2.3.1 Alignment IT/IS with Business Strategy ..............45
2.2.3.2 Aligning Business Goals and IT Goals.................48
2.2.3.3 Aligning Business with IT/IS and Business
Value from IT ......................................................49
2.2.3.4 Governance Frameworks......................................49
2.3 Summary.........................................................................................53
3 Enterprise Security...............................................................................55
3.1 Concept of Security.........................................................................56
3.1.1 The Triad of Confidentiality, Integrity, and Availability......56
3.1.1.1 Confidentiality.....................................................56
3.1.1.2 Integrity ...............................................................56
3.1.1.3 Availability...........................................................57
3.1.2 Types of Attacks..................................................................57
3.1.2.1 Interception..........................................................57
3.1.2.2 Interruption .........................................................57
3.1.2.3 Modification ........................................................57
3.1.2.4 Fabrication...........................................................58
3.1.3 Threats, Vulnerabilities, and Risk .......................................58
3.1.3.1 Threats.................................................................58
3.1.3.2 Vulnerabilities......................................................58
3.1.3.3 Risk......................................................................58
3.1.4 Controls..............................................................................59
3.1.4.1 Physical................................................................59
3.1.4.2 Logical .................................................................59
3.1.4.3 Administrative .....................................................59
3.1.5 Defense in Depth................................................................60
3.2 Identification ...................................................................................60
3.2.1 Identity Verification ............................................................62
3.2.2 Identity Falsification ...........................................................63
3.3 Authentication.................................................................................63
3.3.1 Mutual Authentication ...................................................... 66
3.3.2 Multi-Factor Authentication .............................................. 66
3.4 Authorization ................................................................................. 66
3.5 Access Control.................................................................................67
3.5.1 Access Control Models........................................................70
3.6 Accountability .................................................................................72
Contents ◾ ix
3.6.1 Non-repudiation .................................................................73
3.6.2 Deterrence ..........................................................................73
3.6.3 Intrusion Detection and Prevention....................................73
3.6.4 Admissibility of Records .....................................................74
3.7 Audit ...............................................................................................74
3.7.1 Logging...............................................................................75
3.7.2 Monitoring .........................................................................76
3.7.3 Assessments.........................................................................76
3.8 Summary........................................................................................ 77
4 Process-Driven Organization...............................................................79
4.1 Process-Oriented Enterprise ............................................................80
4.1.1 Value-Add Driven Enterprise..............................................81
4.2 Concept of Business Process Management (BPM)...........................82
4.2.1 Business Process................................................................. 84
4.3 Business Process Management (BPM).............................................85
4.4 Enterprise BPM Methodology .........................................................87
4.4.1 Strategic Planning for Enterprise BPM ...............................89
4.4.1.1 Identifying the Business Processes in the
Company ............................................................ 90
4.4.2 Selecting Business Processes for BPM ................................ 90
4.4.3 Creating Process Maps........................................................91
4.4.4 Analyzing Processes for Breakthrough Improvements.........92
4.4.5 Innovative Breakthrough Improvement in Processes...........93
4.4.6 Implementing Designed Processes ......................................93
4.4.7 Measuring the Performance of Designed Processes.............94
4.5 Business Process Reengineering (BPR) ............................................94
4.6 Management by Collaboration (MBC)............................................98
4.7 Collaboration Technologies...........................................................100
4.7.1 Synchronous Communication Tools.................................103
4.7.2 Asynchronous Communication Tools...............................104
4.8 Collaborative Systems and Tools....................................................105
4.8.1 Skype................................................................................105
4.8.2 Dropbox............................................................................105
4.8.3 Google Drive and Google Docs........................................105
4.8.4 Microsoft SkyDrive...........................................................106
4.8.5 Microsoft OneNote...........................................................106
4.9 Summary.......................................................................................107
5 Analytics.............................................................................................109
5.1 Decisions.......................................................................................110
5.1.1 Types of Decisions ............................................................110
5.1.2 Scope of Decisions ............................................................ 111
5.2 Decision-Making Process ..............................................................112
x ◾ Contents
5.3 Decision-Making Techniques........................................................ 114
5.3.1 Mathematical Programming ............................................. 114
5.3.2 Multi-Criteria Decision Making ....................................... 115
5.3.3 Case-Based Reasoning ...................................................... 115
5.3.4 Data Warehouse and Data Mining ................................... 117
5.3.5 Decision Tree.................................................................... 118
5.3.6 Fuzzy Sets and Systems..................................................... 118
5.4 Decision-Support Systems ............................................................. 118
5.4.1 Multi-Source Driven DSSs ............................................... 119
5.4.2 Generic DSS Architecture.................................................121
5.5 Analytics .......................................................................................126
5.5.1 Descriptive Analytics .......................................................127
5.5.2 Predictive Analytics .........................................................127
5.5.3 Prescriptive Analytics .......................................................127
5.6 Data Science Techniques ...............................................................128
5.6.1 Database Systems..............................................................128
5.6.2 Statistical Inference...........................................................128
5.6.3 Regression and Classification ............................................129
5.6.4 Data Mining and Machine Learning ................................130
5.6.5 Data Visualization ............................................................131
5.6.6 Text Analytics...................................................................131
5.6.7 Time Series and Market Research Models .......................133
5.7 Snapshot of Data Analysis Techniques and Tasks..........................135
5.8 Summary.......................................................................................139
6 Cloud Computing Basics....................................................................141
6.1 Cloud Definition...........................................................................142
6.2 Cloud Characteristics ....................................................................142
6.2.1 Cloud Storage Infrastructure Requirements......................145
6.3 Cloud Delivery Models .................................................................146
6.3.1 Infrastructure as a Service (IaaS).......................................147
6.3.2 Platform as a Service (PaaS)..............................................148
6.3.3 Software as a Service (SaaS)..............................................149
6.4 Cloud Deployment Models ...........................................................150
6.4.1 Private Clouds...................................................................150
6.4.2 Public Clouds....................................................................150
6.4.3 Hybrid Clouds.................................................................. 152
6.4.4 Community Clouds.......................................................... 152
6.5 Cloud Benefits............................................................................... 152
6.6 Cloud Technologies....................................................................... 155
6.6.1 Virtualization.................................................................... 155
6.6.1.1 Characteristics of Virtualized Environment .......157
Contents ◾ xi
6.6.2 Service-Oriented Computing ...........................................160
6.6.2.1 Advantages of SOA ............................................161
6.6.2.2 Layers in SOA....................................................163
6.6.3 Business Processes with SOA ............................................164
6.6.3.1 Process ...............................................................165
6.6.3.2 Workflow...........................................................167
6.6.3.3 Business Process Management (BPM)................168
6.6.3.4 Business Processes via Web Services...................169
6.7 Summary.......................................................................................171
7 Big Data Computing ..........................................................................173
7.1 Big Data ........................................................................................ 174
7.1.1 What Is Big Data?............................................................. 174
7.1.1.1 Data Volume...................................................... 174
7.1.1.2 Data Velocity .....................................................177
7.1.1.3 Data Variety.......................................................178
7.1.1.4 Data Veracity .....................................................178
7.1.2 Common Characteristics of Big Data Computing
Systems .............................................................................179
7.1.3 Big Data Appliances..........................................................182
7.2 Tools and Techniques of Big Data .................................................183
7.2.1 Processing Approach.........................................................183
7.2.2 Big Data System Architecture...........................................185
7.2.2.1 Brewer’s CAP (Consistency Availability
Partition) Theorem.............................................185
7.2.2.2 BASE (Basically Available, Soft State,
Eventual Consistency)........................................189
7.2.2.3 Functional Decomposition.................................190
7.2.2.4 Master–Slave Replication...................................190
7.2.3 Row Partitioning or Sharding ...........................................190
7.2.4 Row versus Column-Oriented Data Layouts.....................191
7.2.5 NoSQL Data Management...............................................192
7.2.6 In-Memory Computing ....................................................194
7.2.7 Developing Big Data Applications ....................................194
7.3 NoSQL Databases.........................................................................196
7.3.1 Column-Oriented Stores or Databases..............................196
7.3.2 Key–Value Stores (K–V Store) or Databases......................196
7.3.3 Document-Oriented Databases.........................................197
7.3.4 Graph Stores or Databases ................................................199
7.4 Aadhaar Project.............................................................................199
7.5 Summary.......................................................................................202
xii ◾ Contents
8 Web Applications ...............................................................................203
8.1 Web-Based Applications................................................................203
8.1.1 Reference Architecture..................................................... 204
8.1.1.1 User Interaction Architecture.............................205
8.1.1.2 Service-Based Architecture.................................205
8.1.1.3 Business Object Architecture ............................ 206
8.1.2 Realization of the Reference Architecture in J2EE............207
8.1.2.1 JavaServer Pages and Java Servlets as the User
Interaction Components ....................................207
8.1.2.2 Session Bean EJBs as Service-Based
Components.......................................................207
8.1.2.3 Entity Bean EJBs as the Business Object
Components...................................................... 208
8.1.2.4 Distributed Java Components ........................... 208
8.1.2.5 J2EE Access to the EIS (Enterprise
Information Systems) Tier................................. 208
8.1.3 Model–View–Controller Architecture...............................209
8.2 Evolution of the Web.....................................................................209
8.2.1 Web 1.0.............................................................................209
8.2.2 Web 2.0 ............................................................................210
8.2.3 Web 3.0 ............................................................................214
8.2.4 Mobile Web ...................................................................... 215
8.2.5 The Semantic Web ............................................................ 215
8.2.6 Rich Internet Applications................................................216
8.3 Web Applications ..........................................................................217
8.3.1 Web Applications Dimensions ..........................................218
8.4 Search Analysis............................................................................. 220
8.4.1 SLA Process ......................................................................221
8.5 Web Analysis.................................................................................224
8.5.1 Veracity of Log Files data ..................................................227
8.5.1.1 Unique Visitors ..................................................227
8.5.1.2 Visitor Count.................................................... 228
8.5.1.3 Visit Duration................................................... 228
8.5.2 Web Analysis Tools.......................................................... 228
8.5.3 Common Analysis and Reports ........................................229
8.6 Summary.......................................................................................231
9 Social Networks..................................................................................233
9.1 Networks...................................................................................... 234
9.1.1 Concept of Networks....................................................... 234
9.1.2 Principles of Networks......................................................235
9.1.2.1 Metcalfe’s Law ...................................................235
9.1.2.2 Power Law..........................................................236
Contents ◾ xiii
9.1.2.3 Small Worlds Networks (SWNs)........................236
9.2 Computer Networks......................................................................237
9.2.1 Internet.............................................................................237
9.2.2 World Wide Web (WWW)..............................................238
9.3 Social Networks ............................................................................239
9.3.1 Popular Social Networks.................................................. 244
9.3.1.1 LinkedIn........................................................... 244
9.3.1.2 Facebook........................................................... 244
9.3.1.3 Twitter .............................................................. 246
9.3.1.4 Google+ ............................................................ 246
9.3.1.5 Other Social Networks.......................................247
9.4 Social Network Analysis (SNA).....................................................248
9.5 Text Analysis .................................................................................250
9.5.1 Defining Text Analysis......................................................251
9.5.1.1 Document Collection.........................................251
9.5.1.2 Document..........................................................252
9.5.1.3 Document Features............................................252
9.5.1.4 Domain Knowledge...........................................255
9.5.1.5 Search for Patterns and Trends...........................256
9.5.1.6 Results Presentation ...........................................256
9.6 Sentiment Analysis ........................................................................257
9.6.1 Sentiment Analysis and Natural Language Processing
(NLP) ...............................................................................258
9.6.2 Applications..................................................................... 260
9.7 Summary.......................................................................................261
10 Mobile Applications ...........................................................................263
10.1 Mobile Computing Applications ...................................................263
10.1.1 Generations of Communication Systems ..........................265
10.1.1.1 1st Generation: Analog.......................................265
10.1.1.2 2nd Generation: CDMA, TDMA and GSM .....265
10.1.1.3 2.5 Generation: GPRS, EDGE and
CDMA 2000 .....................................................267
10.1.1.4 3rd Generation: wCDMA, UMTS, and iMode.... 268
10.1.1.5 4th Generation.................................................. 268
10.1.2 Mobile Operating Systems............................................... 268
10.1.2.1 Symbian.............................................................270
10.1.2.2 BlackBerry OS ...................................................270
10.1.2.3 Google Android .................................................271
10.1.2.4 Apple iOS ..........................................................271
10.1.2.5 Windows Phone.................................................271
10.2 Mobile Web Services .....................................................................273
10.2.1 Mobile Field Cloud Services..............................................277
xiv ◾ Contents
10.3 Context-Aware Mobile Applications..............................................279
10.3.1 Ontology-Based Context Model ...................................... 280
10.3.2 Context Support for User Interaction................................281
10.4 Mobile Web 2.0.............................................................................282
10.5 Mobile Analytics .......................................................................... 284
10.5.1 Mobile Site Analytics....................................................... 284
10.5.2 Mobile Clustering Analysis.............................................. 284
10.5.3 Mobile Text Analysis.........................................................285
10.5.4 Mobile Classification Analysis.......................................... 286
10.5.5 Mobile Streaming Analysis ...............................................287
10.6 Summary.......................................................................................288
11 Internet of Things (IoT) Technologies................................................289
11.1 Internet of Things..........................................................................290
11.1.1 IoT Building Blocks..........................................................292
11.1.2 IoT Architecture................................................................295
11.2 RFID (Radio Frequency Identification).........................................297
11.3 Sensor Networks............................................................................299
11.3.1 Wireless Networks ............................................................299
11.3.2 Sensors............................................................................. 304
11.3.3 Wireless Sensor Networks.................................................309
11.3.3.1 WSN Characteristics..........................................312
11.3.3.2 WSN Design Challenges....................................313
11.3.3.3 WSN Design Objectives ....................................314
11.3.3.4 WSN Architecture............................................. 315
11.4 Sensor Data Processing..................................................................324
11.4.1 Sensor Data-Gathering and Data-Dissemination
Mechanisms......................................................................324
11.5 Sensor Database.............................................................................325
11.6 Summary.......................................................................................328
Appendix A: Internet as Extended Brain.....................................................329
References ...................................................................................................367
Index ...........................................................................................................369