Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Creating smart enterprises
PREMIUM
Số trang
409
Kích thước
4.4 MB
Định dạng
PDF
Lượt xem
1028

Creating smart enterprises

Nội dung xem thử

Mô tả chi tiết

Creating Smart Enterprises

Leveraging Cloud, Big Data,

Web, Social Media, Mobile and

IoT Technologies

Creating Smart Enterprises

Leveraging Cloud, Big Data,

Web, Social Media, Mobile and

IoT Technologies

By

Vivek Kale

CRC Press

Taylor & Francis Group

6000 Broken Sound Parkway NW, Suite 300

Boca Raton, FL 33487-2742

© 2018 Vivek Kale

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-5128-5 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have

been made to publish reliable data and information, but the author and publisher cannot assume responsibility for

the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the

copyright holders of all material reproduced in this publication and apologize to copyright holders if permission

to publish in this form has not been obtained. If any copyright material has not been acknowledged please write

and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted,

or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including

photocopying, microfilming, and recording, or in any information storage or retrieval system, without written

permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com

(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,

Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration

for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system

of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only

for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Kale, Vivek, author.

Title: Creating smart enterprises : leveraging cloud, big data, web, social

media, mobile and IoT technologies / Vivek Kale.

Description: Boca Raton, FL : CRC Press, 2017.

Identifiers: LCCN 2017019839 | ISBN 9781498751285 (hb : alk. paper)

Subjects: LCSH: Technological innovations--Management. | Information

technology--Management.

Classification: LCC HD45 .K285 2017 | DDC 658.4/0630285--dc23

LC record available at https://lccn.loc.gov/2017019839

Visit the Taylor & Francis Web site at

http://www.taylorandfrancis.com

and the CRC Press Web site at

http://www.crcpress.com

To

My wife, Girija

who made me a better man,

And whose smile brings light into my days.

Your love and support encouraged

me to chase my dreams,

And any small success I have reached

is as much yours as it is mine.

vii

Contents

List of Figures....................................................................................................xv

List of Tables ...................................................................................................xvii

Preface ..............................................................................................................xix

Acknowledgments..........................................................................................xxiii

Author.............................................................................................................. xxv

Other Books by Vivek Kale ..........................................................................xxvii

1 VUCA Ecosystem ...................................................................................1

1.1 VUCA Ecosystem .............................................................................1

1.2 Four Industrial Generations ..............................................................3

1.3 Trends ...............................................................................................4

1.3.1 Social Trends ........................................................................4

1.3.2 Organizational Trends ..........................................................5

1.3.3 Business Model Trends .........................................................7

1.3.4 Technology Trends................................................................8

1.4 From Products to Services to Experiences..........................................9

1.5 Technology Advancements ..............................................................10

1.6 Digital Economy .............................................................................14

1.7 Intelligent Analysis..........................................................................17

1.7.1 Intelligence Maturity Model (IMM)...................................19

1.7.1.1 Data .....................................................................20

1.7.1.2 Communication...................................................20

1.7.1.3 Information..........................................................20

1.7.1.4 Concept ...............................................................21

1.7.1.5 Knowledge...........................................................21

1.7.1.6 Intelligence...........................................................23

1.7.1.7 Wisdom ...............................................................24

1.8 SMACT Technologies.....................................................................24

1.9 Summary.........................................................................................26

2 Aligning Business and IT Strategy.......................................................27

2.1 Business Strategy .............................................................................28

2.1.1 Evolution of Strategy Management.....................................28

viii ◾ Contents

2.1.2.3 Porter’s Framework of Generic Strategies ............ 34

2.1.2.4 Porter’s Value Chain.............................................36

2.2 Information Technology and Information Systems (IT/IS)............. 40

2.2.1 Evolution of IT ...................................................................41

2.2.2 Evolution of IS ....................................................................43

2.2.3 IS/IT Governance.............................................................. 44

2.2.3.1 Alignment IT/IS with Business Strategy ..............45

2.2.3.2 Aligning Business Goals and IT Goals.................48

2.2.3.3 Aligning Business with IT/IS and Business

Value from IT ......................................................49

2.2.3.4 Governance Frameworks......................................49

2.3 Summary.........................................................................................53

3 Enterprise Security...............................................................................55

3.1 Concept of Security.........................................................................56

3.1.1 The Triad of Confidentiality, Integrity, and Availability......56

3.1.1.1 Confidentiality.....................................................56

3.1.1.2 Integrity ...............................................................56

3.1.1.3 Availability...........................................................57

3.1.2 Types of Attacks..................................................................57

3.1.2.1 Interception..........................................................57

3.1.2.2 Interruption .........................................................57

3.1.2.3 Modification ........................................................57

3.1.2.4 Fabrication...........................................................58

3.1.3 Threats, Vulnerabilities, and Risk .......................................58

3.1.3.1 Threats.................................................................58

3.1.3.2 Vulnerabilities......................................................58

3.1.3.3 Risk......................................................................58

3.1.4 Controls..............................................................................59

3.1.4.1 Physical................................................................59

3.1.4.2 Logical .................................................................59

3.1.4.3 Administrative .....................................................59

3.1.5 Defense in Depth................................................................60

3.2 Identification ...................................................................................60

3.2.1 Identity Verification ............................................................62

3.2.2 Identity Falsification ...........................................................63

3.3 Authentication.................................................................................63

3.3.1 Mutual Authentication ...................................................... 66

3.3.2 Multi-Factor Authentication .............................................. 66

3.4 Authorization ................................................................................. 66

3.5 Access Control.................................................................................67

3.5.1 Access Control Models........................................................70

3.6 Accountability .................................................................................72

Contents ◾ ix

3.6.1 Non-repudiation .................................................................73

3.6.2 Deterrence ..........................................................................73

3.6.3 Intrusion Detection and Prevention....................................73

3.6.4 Admissibility of Records .....................................................74

3.7 Audit ...............................................................................................74

3.7.1 Logging...............................................................................75

3.7.2 Monitoring .........................................................................76

3.7.3 Assessments.........................................................................76

3.8 Summary........................................................................................ 77

4 Process-Driven Organization...............................................................79

4.1 Process-Oriented Enterprise ............................................................80

4.1.1 Value-Add Driven Enterprise..............................................81

4.2 Concept of Business Process Management (BPM)...........................82

4.2.1 Business Process................................................................. 84

4.3 Business Process Management (BPM).............................................85

4.4 Enterprise BPM Methodology .........................................................87

4.4.1 Strategic Planning for Enterprise BPM ...............................89

4.4.1.1 Identifying the Business Processes in the

Company ............................................................ 90

4.4.2 Selecting Business Processes for BPM ................................ 90

4.4.3 Creating Process Maps........................................................91

4.4.4 Analyzing Processes for Breakthrough Improvements.........92

4.4.5 Innovative Breakthrough Improvement in Processes...........93

4.4.6 Implementing Designed Processes ......................................93

4.4.7 Measuring the Performance of Designed Processes.............94

4.5 Business Process Reengineering (BPR) ............................................94

4.6 Management by Collaboration (MBC)............................................98

4.7 Collaboration Technologies...........................................................100

4.7.1 Synchronous Communication Tools.................................103

4.7.2 Asynchronous Communication Tools...............................104

4.8 Collaborative Systems and Tools....................................................105

4.8.1 Skype................................................................................105

4.8.2 Dropbox............................................................................105

4.8.3 Google Drive and Google Docs........................................105

4.8.4 Microsoft SkyDrive...........................................................106

4.8.5 Microsoft OneNote...........................................................106

4.9 Summary.......................................................................................107

5 Analytics.............................................................................................109

5.1 Decisions.......................................................................................110

5.1.1 Types of Decisions ............................................................110

5.1.2 Scope of Decisions ............................................................ 111

5.2 Decision-Making Process ..............................................................112

x ◾ Contents

5.3 Decision-Making Techniques........................................................ 114

5.3.1 Mathematical Programming ............................................. 114

5.3.2 Multi-Criteria Decision Making ....................................... 115

5.3.3 Case-Based Reasoning ...................................................... 115

5.3.4 Data Warehouse and Data Mining ................................... 117

5.3.5 Decision Tree.................................................................... 118

5.3.6 Fuzzy Sets and Systems..................................................... 118

5.4 Decision-Support Systems ............................................................. 118

5.4.1 Multi-Source Driven DSSs ............................................... 119

5.4.2 Generic DSS Architecture.................................................121

5.5 Analytics .......................................................................................126

5.5.1 Descriptive Analytics .......................................................127

5.5.2 Predictive Analytics .........................................................127

5.5.3 Prescriptive Analytics .......................................................127

5.6 Data Science Techniques ...............................................................128

5.6.1 Database Systems..............................................................128

5.6.2 Statistical Inference...........................................................128

5.6.3 Regression and Classification ............................................129

5.6.4 Data Mining and Machine Learning ................................130

5.6.5 Data Visualization ............................................................131

5.6.6 Text Analytics...................................................................131

5.6.7 Time Series and Market Research Models .......................133

5.7 Snapshot of Data Analysis Techniques and Tasks..........................135

5.8 Summary.......................................................................................139

6 Cloud Computing Basics....................................................................141

6.1 Cloud Definition...........................................................................142

6.2 Cloud Characteristics ....................................................................142

6.2.1 Cloud Storage Infrastructure Requirements......................145

6.3 Cloud Delivery Models .................................................................146

6.3.1 Infrastructure as a Service (IaaS).......................................147

6.3.2 Platform as a Service (PaaS)..............................................148

6.3.3 Software as a Service (SaaS)..............................................149

6.4 Cloud Deployment Models ...........................................................150

6.4.1 Private Clouds...................................................................150

6.4.2 Public Clouds....................................................................150

6.4.3 Hybrid Clouds.................................................................. 152

6.4.4 Community Clouds.......................................................... 152

6.5 Cloud Benefits............................................................................... 152

6.6 Cloud Technologies....................................................................... 155

6.6.1 Virtualization.................................................................... 155

6.6.1.1 Characteristics of Virtualized Environment .......157

Contents ◾ xi

6.6.2 Service-Oriented Computing ...........................................160

6.6.2.1 Advantages of SOA ............................................161

6.6.2.2 Layers in SOA....................................................163

6.6.3 Business Processes with SOA ............................................164

6.6.3.1 Process ...............................................................165

6.6.3.2 Workflow...........................................................167

6.6.3.3 Business Process Management (BPM)................168

6.6.3.4 Business Processes via Web Services...................169

6.7 Summary.......................................................................................171

7 Big Data Computing ..........................................................................173

7.1 Big Data ........................................................................................ 174

7.1.1 What Is Big Data?............................................................. 174

7.1.1.1 Data Volume...................................................... 174

7.1.1.2 Data Velocity .....................................................177

7.1.1.3 Data Variety.......................................................178

7.1.1.4 Data Veracity .....................................................178

7.1.2 Common Characteristics of Big Data Computing

Systems .............................................................................179

7.1.3 Big Data Appliances..........................................................182

7.2 Tools and Techniques of Big Data .................................................183

7.2.1 Processing Approach.........................................................183

7.2.2 Big Data System Architecture...........................................185

7.2.2.1 Brewer’s CAP (Consistency Availability

Partition) Theorem.............................................185

7.2.2.2 BASE (Basically Available, Soft State,

Eventual Consistency)........................................189

7.2.2.3 Functional Decomposition.................................190

7.2.2.4 Master–Slave Replication...................................190

7.2.3 Row Partitioning or Sharding ...........................................190

7.2.4 Row versus Column-Oriented Data Layouts.....................191

7.2.5 NoSQL Data Management...............................................192

7.2.6 In-Memory Computing ....................................................194

7.2.7 Developing Big Data Applications ....................................194

7.3 NoSQL Databases.........................................................................196

7.3.1 Column-Oriented Stores or Databases..............................196

7.3.2 Key–Value Stores (K–V Store) or Databases......................196

7.3.3 Document-Oriented Databases.........................................197

7.3.4 Graph Stores or Databases ................................................199

7.4 Aadhaar Project.............................................................................199

7.5 Summary.......................................................................................202

xii ◾ Contents

8 Web Applications ...............................................................................203

8.1 Web-Based Applications................................................................203

8.1.1 Reference Architecture..................................................... 204

8.1.1.1 User Interaction Architecture.............................205

8.1.1.2 Service-Based Architecture.................................205

8.1.1.3 Business Object Architecture ............................ 206

8.1.2 Realization of the Reference Architecture in J2EE............207

8.1.2.1 JavaServer Pages and Java Servlets as the User

Interaction Components ....................................207

8.1.2.2 Session Bean EJBs as Service-Based

Components.......................................................207

8.1.2.3 Entity Bean EJBs as the Business Object

Components...................................................... 208

8.1.2.4 Distributed Java Components ........................... 208

8.1.2.5 J2EE Access to the EIS (Enterprise

Information Systems) Tier................................. 208

8.1.3 Model–View–Controller Architecture...............................209

8.2 Evolution of the Web.....................................................................209

8.2.1 Web 1.0.............................................................................209

8.2.2 Web 2.0 ............................................................................210

8.2.3 Web 3.0 ............................................................................214

8.2.4 Mobile Web ...................................................................... 215

8.2.5 The Semantic Web ............................................................ 215

8.2.6 Rich Internet Applications................................................216

8.3 Web Applications ..........................................................................217

8.3.1 Web Applications Dimensions ..........................................218

8.4 Search Analysis............................................................................. 220

8.4.1 SLA Process ......................................................................221

8.5 Web Analysis.................................................................................224

8.5.1 Veracity of Log Files data ..................................................227

8.5.1.1 Unique Visitors ..................................................227

8.5.1.2 Visitor Count.................................................... 228

8.5.1.3 Visit Duration................................................... 228

8.5.2 Web Analysis Tools.......................................................... 228

8.5.3 Common Analysis and Reports ........................................229

8.6 Summary.......................................................................................231

9 Social Networks..................................................................................233

9.1 Networks...................................................................................... 234

9.1.1 Concept of Networks....................................................... 234

9.1.2 Principles of Networks......................................................235

9.1.2.1 Metcalfe’s Law ...................................................235

9.1.2.2 Power Law..........................................................236

Contents ◾ xiii

9.1.2.3 Small Worlds Networks (SWNs)........................236

9.2 Computer Networks......................................................................237

9.2.1 Internet.............................................................................237

9.2.2 World Wide Web (WWW)..............................................238

9.3 Social Networks ............................................................................239

9.3.1 Popular Social Networks.................................................. 244

9.3.1.1 LinkedIn........................................................... 244

9.3.1.2 Facebook........................................................... 244

9.3.1.3 Twitter .............................................................. 246

9.3.1.4 Google+ ............................................................ 246

9.3.1.5 Other Social Networks.......................................247

9.4 Social Network Analysis (SNA).....................................................248

9.5 Text Analysis .................................................................................250

9.5.1 Defining Text Analysis......................................................251

9.5.1.1 Document Collection.........................................251

9.5.1.2 Document..........................................................252

9.5.1.3 Document Features............................................252

9.5.1.4 Domain Knowledge...........................................255

9.5.1.5 Search for Patterns and Trends...........................256

9.5.1.6 Results Presentation ...........................................256

9.6 Sentiment Analysis ........................................................................257

9.6.1 Sentiment Analysis and Natural Language Processing

(NLP) ...............................................................................258

9.6.2 Applications..................................................................... 260

9.7 Summary.......................................................................................261

10 Mobile Applications ...........................................................................263

10.1 Mobile Computing Applications ...................................................263

10.1.1 Generations of Communication Systems ..........................265

10.1.1.1 1st Generation: Analog.......................................265

10.1.1.2 2nd Generation: CDMA, TDMA and GSM .....265

10.1.1.3 2.5 Generation: GPRS, EDGE and

CDMA 2000 .....................................................267

10.1.1.4 3rd Generation: wCDMA, UMTS, and iMode.... 268

10.1.1.5 4th Generation.................................................. 268

10.1.2 Mobile Operating Systems............................................... 268

10.1.2.1 Symbian.............................................................270

10.1.2.2 BlackBerry OS ...................................................270

10.1.2.3 Google Android .................................................271

10.1.2.4 Apple iOS ..........................................................271

10.1.2.5 Windows Phone.................................................271

10.2 Mobile Web Services .....................................................................273

10.2.1 Mobile Field Cloud Services..............................................277

xiv ◾ Contents

10.3 Context-Aware Mobile Applications..............................................279

10.3.1 Ontology-Based Context Model ...................................... 280

10.3.2 Context Support for User Interaction................................281

10.4 Mobile Web 2.0.............................................................................282

10.5 Mobile Analytics .......................................................................... 284

10.5.1 Mobile Site Analytics....................................................... 284

10.5.2 Mobile Clustering Analysis.............................................. 284

10.5.3 Mobile Text Analysis.........................................................285

10.5.4 Mobile Classification Analysis.......................................... 286

10.5.5 Mobile Streaming Analysis ...............................................287

10.6 Summary.......................................................................................288

11 Internet of Things (IoT) Technologies................................................289

11.1 Internet of Things..........................................................................290

11.1.1 IoT Building Blocks..........................................................292

11.1.2 IoT Architecture................................................................295

11.2 RFID (Radio Frequency Identification).........................................297

11.3 Sensor Networks............................................................................299

11.3.1 Wireless Networks ............................................................299

11.3.2 Sensors............................................................................. 304

11.3.3 Wireless Sensor Networks.................................................309

11.3.3.1 WSN Characteristics..........................................312

11.3.3.2 WSN Design Challenges....................................313

11.3.3.3 WSN Design Objectives ....................................314

11.3.3.4 WSN Architecture............................................. 315

11.4 Sensor Data Processing..................................................................324

11.4.1 Sensor Data-Gathering and Data-Dissemination

Mechanisms......................................................................324

11.5 Sensor Database.............................................................................325

11.6 Summary.......................................................................................328

Appendix A: Internet as Extended Brain.....................................................329

References ...................................................................................................367

Index ...........................................................................................................369

Tải ngay đi em, còn do dự, trời tối mất!