You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book shows its readers how to achieve the goal of genuine IT governance. The key here is the successful development of enterprise architecture as the necessary foundation. With its capacity to span and integrate business procedures, IT applications and IT infrastructure, enterprise architecture opens these areas up to analysis and makes them rich sources of critical data. Enterprise architecture thereby rises to the status of a crucial management information system for the CIO. The focused analysis of the architecture (its current and future states) illuminates the path to concrete IT development planning and the cost-effective and beneficial deployment of IT. Profit from the author's firsthand experience - proven approaches firmly based in enterprise reality.
Regimes of Description responds to the perceptionhowever imprecisethat forms of knowledge in every sector of contemporary culture are being fundamentally reshaped by the digital revolution: music, speech, engineering diagrams, weather reports, works of visual art, even the words most of us write are now subject, as Lyotard points out in The Inhuman, to a logic of the bit, the elemental unit of electronic information. It is now possible to slice, graft, and splice this knowledge in ways never before imagined using technologies that treat vast bodies of information as a stream of data bits. Programs and technical algorithms specify the criteria for discriminating between the data stream of a Mozart string quartet and the CAT scan of a diseased organ. But are these machine instructions and design parameters descriptions, or merely mechanical filters? And if the latter, what constitutes a description of digitally encoded knowledge? As a group, the essays in this volume pose that question as a first attempt to write the archaeology of the nature and history of description in the digital age.
This book constitutes the refereed proceedings of the 15th International GI/ITG Conference on "Measurement, Modelling and Evaluation of Computing Systems" and "Dependability and Fault Tolerance", held in Essen, Germany, in March 2010. The 19 revised full papers presented together with 5 tool papers and 2 invited lectures were carefully reviewed and selected from 42 initial submissions. The papers cover all aspects of performance and dependability evaluation of systems including networks, computer architectures, distributed systems, software, fault-tolerant and secure systems.
An account of a major international art movement originating in the former Yugoslavia in the 1960s, which anticipated key aspects of information aesthetics. New Tendencies, a nonaligned modernist art movement, emerged in the early 1960s in the former Yugoslavia, a nonaligned country. It represented a new sensibility, rejecting both Abstract Expressionism and socialist realism in an attempt to formulate an art adequate to the age of advanced mass production. In this book, Armin Medosch examines the development of New Tendencies as a major international art movement in the context of social, political, and technological history. Doing so, he traces concurrent paradigm shifts: the change from F...
In the era of cybernetics, architects suddenly encountered entirely new ways of operating technical systems: buildings could be calculated using circuit diagrams, creativity and imagination were confronted with the technical intelligence of thinking machines. Architects found themselves in the crosshairs of cybernetics. At stake was nothing less than the continued existence of the architect’s inventive intelligence in a techno-scientific world. Today, we see computing machines, once so heavy, losing weight while gaining power. Computers are fully colonizing the human environment, creating their own digital ecosystems, and giving rise to forms of society and ways of being that cannot even be explained without big data. Available for the first time in English as a new edition.
None
MPEG audio coding became popular under the name MP3. It is now the most important means of delivering high quality audio over the internet and will play the lead role in digital movie sound as well as in digital audio broadcast. This book explains the ideas, the concepts, and the implementation of MP3. Reading it requires no special prerequisites, but still, the book is detailed enough to include a fully executable highly efficient MP3 decoding engine. Not only understandable but even enjoyable.
This volume, containing the proceedings of IVA 2003, held at Kloster Irsee, in Germany, September 15–17, 2003, is testimony to the growing importance of IntelligentVirtualAgents(IVAs) asaresearch?eld.Wereceived67submissions, nearly twice as many as for IVA 2001, not only from European countries, but from China, Japan, and Korea, and both North and South America. As IVA research develops, a growing number of application areas and pl- forms are also being researched. Interface agents are used as part of larger - plications, often on the Web. Education applications draw on virtual actors and virtual drama, while the advent of 3D mobile computing and the convergence of telephones and PDAs produce geographically-aware guides and mobile - tertainment applications. A theme that will be apparent in a number of the papers in this volume is the impact of embodiment on IVA research – a char- teristic di?erentiating it to some extent from the larger ?eld of software agents.
10 practical Actions for IT management to improve your business and reach compliance at the same time. How to make sense of SOX, COBIT, CoSo, ISO 20000, BS7799/ISO17799. "Beyond Compliance" provides a structured and yet practical approach to improve IT Governance and implement IT Risk Management to comply with regulatory and auditory requirements and increase the benefits IT delivers to the business. Ralf -T. Grünendahl and Peter H.L.Will argue that you should use the momentum SOX or other external triggers provide to reorganise the way you handle your IT.
This analysis of the relationship between science and totalitarian rule in one of the most technically advanced countries in the East bloc examines professional autonomy under dictatorship and the place of technology in Communist ideology. In Cold War-era East Germany, the German tradition of science-based technology merged with a socialist system that made technological progress central to its ideology. Technology became an important part of East German socialist identity--crucial to how Communists saw their system and how citizens saw their state. In Red Prometheus, Dolores Augustine examines the relationship between a dictatorial system and the scientific and engineering communities in Ea...