KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

Size: px
Start display at page:

Download "KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems"

Transcription

1 Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University Website : KM road map 2 Technology Components of KM a balance between must have tools and should have tools (constrained by time/costs) Needs to support both tacit and explicit knowledge processes Technology is an enabler of KM systems 3 1

2 Knowledge Processes and Technology Enablers Objective Technology Enablers Find knowledge Knowledge bases, Search and retrieval tools, Employee skills yellow pages. Create new knowledge Collaborative decision-making processes, Notes databases, DSS Tools Package and assemble Customized publishing tools, Customized discussion groups, Push technology Apply knowledge Search, retrieval, and storage tools Reuse and revalidate Customer support knowledge, knowledge Knowledge bases, CoP, past project record databases 4 KM Architecture Layer..... User 1 User 2 User n User Interface (Web browser software installed on each user s PC) Authorized access control (e.g., security, passwords, firewalls, authentication) Collaborative intelligence and filtering (intelligent agents, network mining, customization, personalization) Knowledge-enabling applications (customized applications, skills directories, videoconferencing, decision support systems, group decision support systems tools) Transport ( , Internet/Web site, TCP/IP protocol to manage traffic flow) Middleware (specialized software for network management, security, etc.) The Physical Layer (repositories, cables) Databases Legacy applications Groupware Data warehousing (e.g., payroll) (document exchange, (data cleansing, 5. KM Platform Knowledge Management Systems- Dr. collaboration) Owlia- Yazd University data 3-5 mining) 5 KM Architecture Visualize the building blocks of a KM system in the form of layers User Interface being the least technical, and data repository the most technical These layers represent internal technologies of the company 6 2

3 The User Interface (Layer 1) What user actually see... Interface between users and the KM system Usually as a web browser Channels for Tacit and Explicit Knowledge Platform Independent 7 Intranet An intranet is the main tool for sharing knowledge and allowing staff to tap the organisations know how. Primary aim Create and distribute up-to-date information Give access to information resources within organisation Give access to historical information Create and maintain organisational memory Link people Targets Knowledge repositories Mostly structured information (reports, manuals, and documents) Discussion databases/listservers for sharing information Hyperlink-connected Internet documents Groupware databases 8 Portals A simple concept: a personalized and customised Web-based interface that consolidates access to information, services and applications provides an Information Ecology for KM facilitates knowledge sharing facilitates knowledge transfer Makes organizational processes more transparent is a front end and a major component of KMS 9 3

4 Types of KM Portals Informationportal provides instant access to personalised content and services. Collaborationportal facilitates online real time communication, brainstorming sessions and allows selective push for relevant information. Teamportal monitors efficient workflow-based task management among teams & members, sharing of skill sets. Expertiseportal connects organisational experts to members who need their help (eg yellow pages, profiling, push/pull facilities, interactive sessions with experts). Learningportal maintains skill inventory, facilitates skill upgrading through online learning sessions. (accessed 2001) 10 Authorized Access Control (Layer 2) Maintains security and ensures authorized access to the knowledge stored in company s repositories Access points can be intranet, Internet, and extranet 11 Authorized Access Control (Layer 2) Internet Public News/events Marketing E-commerce Careers Intranet Company Human resource information Production information Sales information Strategic plans Extranet Clients Suppliers Vendors Partners Customers Product information Sales information Collaboration/cooperat ion 12 4

5 Authorized Access Control (Layer 2) Access privileges:assign rights to permit different levels of access to data such as read-only, write, edit, and delete capabilities. Firewalls:Construct a firewall between the extranet and Internet. Backups:Create backups, staging areas, and mirror sites. 13 Collaborative Intelligence and Filtering (Layer 3) Personalized views based on roles and stored knowledge Intelligent agents to reduce search time for needed information 14 From Client/server to Agent Computing in the client/ server setup, the network load primarily exists between the client and the server in the agent/ computing model, this load is shifted to the space between the agent and the server 15 5

6 Knowledge Delivery PULL Approach User Choice : Users want the knowledge PUSH Approach You want the users to have the knowledge 16 Pull Approach User needs to be actively involved in the search of information/knowledge They need to go and get what they want when they want it Agents and web crawlers/spiders can be set up to help with topicbased search 17 Push Approach Identifies what knowledge you need to perform your task and provides it to you at the right time and in a right form; Based on knowledge replication; Organisational level decision on what is needed; Can include setting up training sessions for staff; Ease of use : workgroup 18 6

7 Levels of Granularity 19 Customer Support and Knowledge levels 20 Tagging Attributes for Knowledge Content Searching on the basis of textual string matching Content (both formal and informal) should be tagged with attributes Tagging attributes A D F T P I L Activities Domain Form Type Products and services time Location 21 7

8 Form Attribute paper electronic formal (file, word document, spreadsheet) informal (multimedia, sound, video tape) tacit or mental knowledge pointer (to person who has solved a problem of that nature before) 22 Type Attribute procedure guideline protocol manual reference worst practice report best practice report note memo failure report success report press report competitive intelligence report 23 Product and Service Attribute Strategic consulting Implementation consulting e-commerce consulting 24 8

9 Knowledge-Enabling Application (Layer 4) Referred to as value-added layer Provides knowledge bases, discussion databases, automation tools, etc. Video conference Yellow pages Digital whiteboard Electronic Forums DSS Tools 25 Knowledge-Enabling Application (Layer 4) 26 Role of Intelligent Technology Modeling expertise expert systems approach ( objectified knowledge canned in a computerised form) Solving problems by analogy Case Based Reasoning (CBR) approach Simulating problem solving neural networks Dealing with ambiguity fuzzy logic Deriving rules from data machine learning Evolving solutions genetic algorithms 27 9

10 A Comparison of Intelligence Tools 28 Transport Layer (Layer 5) Most technical layer to implement Includes LANs, WANs, intranets, extranets, and the Internet Ensures that the company will become a network of relationships Considers multimedia, URLs, graphics, connectivity speeds, and bandwidths 29 Middleware (Layer 6) Focus on interfacing with legacy systems and programs residing on other platforms Designer should address databases and applications with which KM system interfaces Makes it possible to connect between old and new data formats 30 10

11 Physical Repositories (Layer 7) Bottom layer in the KM architecture Represents the physical layer where repositories are installed Includes data warehouses, legacy applications, operational databases, and special applications for security and traffic management 31 Supporting Technology and Functionality local area network (LAN) intranet-based webs on-line publishing application distribution on-line search distributed databases multimedia data management archives frequently asked questions minutes of the meetings product information business intelligence project management reports news personal homepages videoconferences 32 KM Platform Basic Needs Efficient Protocol : secure and fast sharing of content across locations, mobile clients Portable operation : support OS environment in different departments Consistent and easy to use client interfaces Scalability Legacy integration from mainframe database Security Flexibility and customizability : in term of... What the user sees and needs to see 33 11

12 Currently Use of KM Technologies Source: S.Zyngier, KM Survey in Australian corporate environment 34 Issues for the Technology Infrastructure Privacy Intellectual property Confidentiality Copyright Change of media Change of work practices (20%technology-80%culture) 35 Assignment > 7!"# $%& ' ( ) *+,-."+./ 36 12

Technologies for Knowledge Management WK-7

Technologies for Knowledge Management WK-7 Technologies for Knowledge Management WK-7 Technologies for Knowledge (D&P) KM is much more than technology Techknowledgy is part of KM Availability of WWW and Lotus Notes Since knowledge and the value

More information

Knowledge Management

Knowledge Management Knowledge Management Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents

More information

Understand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives

Understand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives IMS9043 IT in Organisations Lecture objectives Week 3 IT Architecture and Infrastructure Understand the strategic arrangement of IS/IT in modern organisations 1 2 Information Systems & People Information

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Knowledge Management Enabling technologies

Knowledge Management Enabling technologies Knowledge Management Enabling technologies ICT support to KM Types of knowledge enabling technologies 3Cs of Knowledge Enabling Technologies References 1 According to Despres and Chauvel (2000), KM is

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc.

Chapter 13: Knowledge Management In Nutshell. Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc. Chapter 13: Knowledge Management In Nutshell Information Technology For Management Turban, McLean, Wetherbe John Wiley & Sons, Inc. Objectives Define knowledge and describe the different types of knowledge.

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33 contents CHAPTER 1 Information Systems in Business 1 INTRODUCTION 5 Apple Merging Section 1.1 Information Systems in Business 5 INFORMATION TECHNOLOGY'S ROLE IN BUSINESS 5 Information Technology's Impact

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom: Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires

More information

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011 TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Outline Announcements Review Alibris Case Study Information Technology Student Presentations Client-Server

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Applications. Internetworked E-business enterprises

More information

Chapter 9 Knowledge Management

Chapter 9 Knowledge Management Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 9 Knowledge Management 9-1 Learning Objectives Define knowledge. Learn the characteristics of knowledge

More information

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE

APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE APPENDIX A WORK PROCESS SCHEDULE RELATED INSTRUCTION OUTLINE E COMMERCE SPECIALIST PAGE 1 OF 11 WORK PROCESS SCHEDULE E COMMERCE SPECIALIST (ECS) O*NET SOC CODE: 15 1099.99 RAIS CODE: 1054CB DESCRIPTION:

More information

Soar Technology Knowledge Management System (KMS)

Soar Technology Knowledge Management System (KMS) Soar Technology Knowledge Management System (KMS) A system that will capture information and make it accessible to the staff in the form of meaningful knowledge. This project will consist of various systems

More information

LUCENT S ENTRY INTO NETWORK SECURITY

LUCENT S ENTRY INTO NETWORK SECURITY LUCENT S ENTRY INTO NETWORK SECURITY and Distributed System Security Symposium March 12, 1998 H. M. Gittleson Director, Internet Security Products Group 1 Traffic Growth In Voice And Data Services 250

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

ICS 434 Advanced Database Systems

ICS 434 Advanced Database Systems ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi sukairi@kfupm.edu.sa Second Semester 2003-2004 (032) King Fahd University of Petroleum & Minerals Information & Computer Science Department Outline

More information

Convergence: The Foundation for Unified Communications

Convergence: The Foundation for Unified Communications Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

1 Product. Open Text is the leading fax server vendor in the world. *

1 Product. Open Text is the leading fax server vendor in the world. * 1 Product Open Text Fax s Replace fax machines and inefficient paper processes with efficient and secure computer-based faxing and electronic document delivery Open Text is the leading fax server vendor

More information

Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2

Information Systems Perspective 1. An Introduction to Information Systems in Organizations 2 Contents Preface Information Systems Perspective 1 An Introduction to Information Systems in Organizations 2 Spain 3 Information Concepts 5 Data, Information, and Knowledge 5 The Characteristics of Valuable

More information

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing

More information

Document control for sensitive company information and large complex projects.

Document control for sensitive company information and large complex projects. Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Applying Internet Technology to Production Environment Monitoring

Applying Internet Technology to Production Environment Monitoring Applying Internet Technology to Production Environment Monitoring Alberto Tafur Project Manager CIMTEC Charlotte, NC 28273 Jeff Fleming Project Engineer CIMTEC Charlotte, NC 28273 KEYWORDS John B. Weber

More information

Day 7 Business Information Systems-- the portfolio. Today s Learning Objectives

Day 7 Business Information Systems-- the portfolio. Today s Learning Objectives Day 7 Business Information Systems-- the portfolio MBA 8125 Information technology Management Professor Duane Truex III Today s Learning Objectives 1. Define and describe the repository components of business

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

BULLETIN 2003 17 Date: May 28, 2003

BULLETIN 2003 17 Date: May 28, 2003 BULLETIN 2003 17 Date: May 28, 2003 U.S. Department of Labor Employment and Training Administration Office of Apprenticeship Training, Employer and Labor Services (OTELS) Washington, D.C. 20210 Distribution:

More information

This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:

This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, Broadening Our Horizons: This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

White paper on. From. Hexaware Technologies Limited (HTL)

White paper on. From. Hexaware Technologies Limited (HTL) White paper on ewise Knowledge Management Framework TM From Hexaware Technologies Limited (HTL) Hexaware Technologies Limited. All rights reserved. Copying or Distributing without prior permission is prohibited

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

AS/400 System Overview

AS/400 System Overview Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence

More information

Transformation of POS Operations at

Transformation of POS Operations at Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail

More information

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

More information

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient

More information

E-commerce. Web Servers Hardware and Software

E-commerce. Web Servers Hardware and Software E-commerce Web Servers Hardware and Software Basic technical requirements of a Web site that can support E-commerce operations and match business needs. Oct 22, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

9. Technology in KM. ETL525 Knowledge Management Tutorial Four. 16 January 2009. K.T. Lam lblkt@ust.hk

9. Technology in KM. ETL525 Knowledge Management Tutorial Four. 16 January 2009. K.T. Lam lblkt@ust.hk 9. Technology in KM ETL525 Knowledge Management Tutorial Four 16 January 2009 K.T. Lam lblkt@ust.hk Last updated: 15 January 2009 Technology is KM Enabler Technology is one of the Four Pillars of KM, which

More information

Artificial Intelligence & Knowledge Management

Artificial Intelligence & Knowledge Management Artificial Intelligence & Knowledge Management Nick Bassiliades, Ioannis Vlahavas, Fotis Kokkoras Aristotle University of Thessaloniki Department of Informatics Programming Languages and Software Engineering

More information

Integrating Netezza into your existing IT landscape

Integrating Netezza into your existing IT landscape Marco Lehmann Technical Sales Professional Integrating Netezza into your existing IT landscape 2011 IBM Corporation Agenda How to integrate your existing data into Netezza appliance? 4 Steps for creating

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Preparation Guide. EXIN Cloud Computing Foundation

Preparation Guide. EXIN Cloud Computing Foundation Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Materials Software Systems Inc (MSSI). Mobile Web Application Technology Service White Paper

Materials Software Systems Inc (MSSI). Mobile Web Application Technology Service White Paper Materials Software Systems Inc (MSSI). Mobile Web Application Technology Service White Paper A New Generation of application technology is on the horizon of businesses and consumers MSSI powers a mobile

More information

E-Business Technologies

E-Business Technologies E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications

More information

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Fluency With Information Technology CSE100/IMT100

Fluency With Information Technology CSE100/IMT100 Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999

More information

NGSS. Evolutionary Safeguards Surveillance. Nuclear measurement solutions for safety and security. NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NAS

NGSS. Evolutionary Safeguards Surveillance. Nuclear measurement solutions for safety and security. NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NAS Nuclear measurement solutions for safety and security. NAS DCM-C5 Camera NAS Reader UPS NGSS Evolutionary Safeguards Surveillance NUCLEAR MEASUREMENTS BUSINESS UNIT OF AREVA NGSS The NGSS is a modular,

More information

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:

More information

Introduction to Business Information Systems

Introduction to Business Information Systems Rolf T. Wigand Peter Mertens Freimut Bodendorf Wolfgang Konig Arnold Picot Matthias Schumann Introduction to Business Information Systems With 79 Figures Springer Contents The Subject of Business Information

More information

WS_FTP: The smarter way to transfer files

WS_FTP: The smarter way to transfer files WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.

More information

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

TRANSFORMATION OPPORTUNITIES WITH THE ALCATEL-LUCENT OPENTOUCH SUITE OPTIMIZING CONVERSATION DELIVERY OVER CENTRALIZED COMMUNICATIONS NETWORKS

TRANSFORMATION OPPORTUNITIES WITH THE ALCATEL-LUCENT OPENTOUCH SUITE OPTIMIZING CONVERSATION DELIVERY OVER CENTRALIZED COMMUNICATIONS NETWORKS TRANSFORMATION OPPORTUNITIES WITH THE ALCATEL-LUCENT OPENTOUCH SUITE OPTIMIZING CONVERSATION DELIVERY OVER CENTRALIZED COMMUNICATIONS NETWORKS Application Note Table of contents Abstract / New Opportunities

More information

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways

More information

Digital Asset Management

Digital Asset Management A collaborative digital asset management system for marketing organizations that improves performance, saves time and reduces costs. MarketingPilot provides powerful digital asset management software for

More information

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security

More information

Information Systems and Technologies in Organizations

Information Systems and Technologies in Organizations Information Systems and Technologies in Organizations Information System One that collects, processes, stores, analyzes, and disseminates information for a specific purpose Is school register an information

More information

Computer Information Systems

Computer Information Systems Computer Information System Courses Description 0309331 0306331 0309332 0306332 0309334 0306334 0309341 0306341 0309353 0306353 Database Systems Introduction to database systems, entity-relationship data

More information

Documentation for data centre migrations

Documentation for data centre migrations Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed

More information

Chapter 5. Warehousing, Data Acquisition, Data. Visualization

Chapter 5. Warehousing, Data Acquisition, Data. Visualization Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives

More information

SCHOOL DISTRICT OF ESCAMBIA COUNTY

SCHOOL DISTRICT OF ESCAMBIA COUNTY SCHOOL DISTRICT OF ESCAMBIA COUNTY JOB DESCRIPTION Programmer Analyst I Web Technologies PROGRAMMER ANALYST I WEB TECHNOLOGIES QUALIFICATIONS: (1) Bachelor s Degree from an accredited educational institution

More information

An ITIL-based Solution to Record and Retrieve Tacit and Explicit Knowledge based on Giga Knowledge Management Framework in the SME Companies

An ITIL-based Solution to Record and Retrieve Tacit and Explicit Knowledge based on Giga Knowledge Management Framework in the SME Companies An ITIL-based Solution to Record and Retrieve Tacit and Explicit Knowledge based on Giga Knowledge Management Framework in the SME Companies 231 An ITIL-based Solution to Record and Retrieve Tacit and

More information

Nettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration

Nettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration Nettech White Paper: Mobile Middleware: The Next Frontier in Enterprise Application Integration By, Tamara Kanoc, Director of Marketing, Nettech Systems, Inc. Nettech Systems, Inc. 600 Alexander Road Princeton,

More information

Enhancing Business Intelligence Using Information Systems

Enhancing Business Intelligence Using Information Systems Chapter Enhancing Business Intelligence Using Information Systems Use of outdated information systems can be costly. A software glitch at the Tokyo Stock Exchange cost Misuho Securities Co. U.S.$350 million.

More information

ThreatSpike Dome: A New Approach To Security Monitoring

ThreatSpike Dome: A New Approach To Security Monitoring ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

KNOWLEDGE MANAGEMENT: COLLABORATIVE INFRASTRUCTURES!!!

KNOWLEDGE MANAGEMENT: COLLABORATIVE INFRASTRUCTURES!!! INTERNATIONAL CONFERENCE ON BUSINESS MANAGEMENT NIRMA INSTITUTE OF M ANAGEMENT PAPER 310 KNOWLEDGE MANAGEMENT: COLLABORATIVE INFRASTRUCTURES!!! SAURABH GUPTA 1 KNOWLEDGE MANAGEMENT: COLLABORATIVE INFRASTUCTURES!!!

More information

E-Business: How Businesses Use Information Systems

E-Business: How Businesses Use Information Systems Chapter 2 E-Business: How Businesses Use Information Systems 2.1 2007 by Prentice Hall Business Processes and Information Systems Business processes: Workflows of material, information, knowledge Sets

More information

Chapter 11 MANAGING KNOWLEDGE

Chapter 11 MANAGING KNOWLEDGE MANAGING THE DIGITAL FIRM, 12 TH EDITION Learning Objectives Chapter 11 MANAGING KNOWLEDGE VIDEO CASES Case 1: L'Oréal: Knowledge Management Using Microsoft SharePoint Case 2: IdeaScale Crowdsourcing:

More information

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d. C H A P T E R 7 The Internet, Intranets, and Extranets What is the Internet Millions of computers, all linked together on a computer network. A home computer usually links to the Internet using a phone

More information

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.

Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise. Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital

More information

SAN MATEO COUNTY OFFICE OF EDUCATION

SAN MATEO COUNTY OFFICE OF EDUCATION SAN MATEO COUNTY OFFICE OF EDUCATION CLASS TITLE: NETWORK ENGINEER BASIC FUNCTION: Under the direction of the Manager, Network Services, perform a variety of highly complex and specialized activities involved

More information

Table of Content. TAG E-Solutions Brief information... 3. Our Products Educational Products... 4. Our Products Intellectual Property Products...

Table of Content. TAG E-Solutions Brief information... 3. Our Products Educational Products... 4. Our Products Intellectual Property Products... Table of Content TAG E-Solutions Brief information.... 3 Our Products Educational Products... 4 Our Products Intellectual Property Products... 5 Our Products Corporates Products..... 5 TAG E-Solutions

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

CWA Flow. CWA Flow 8D Report. The flexibly configurable software. Claim and Complaint Management. User-defined forms and processes

CWA Flow. CWA Flow 8D Report. The flexibly configurable software. Claim and Complaint Management. User-defined forms and processes CWA Flow 8D Report Web- and workflow-based software for claims, problems and 8D reports CWA Flow Claim and Complaint Management The flexibly configurable software User-defined forms and processes Workflow

More information

Development of a Learning Content Management Systems

Development of a Learning Content Management Systems Development of a Learning Content Management Systems Lejla Abazi-Bexheti Abstract Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today

More information

Data Integration Checklist

Data Integration Checklist The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media

More information

Contents. Overview. The solid foundation for your entire, enterprise-wide business intelligence system

Contents. Overview. The solid foundation for your entire, enterprise-wide business intelligence system Data Warehouse The solid foundation for your entire, enterprise-wide business intelligence system The core of the high-performance intelligence delivery infrastructure, designed to meet even the most demanding

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

Global E-Business: How Businesses Use Information Systems

Global E-Business: How Businesses Use Information Systems Introduction to Information Management IIM, NCKU Learning Objectives (2/2) Global E-Business: How Businesses Use Information Systems Explain the difference between e-business, e- commerce, and e-government.

More information

IBM Tivoli Storage Manager

IBM Tivoli Storage Manager Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing

More information

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants

IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar

More information

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

Office SharePoint Server 2007

Office SharePoint Server 2007 Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Chapter 14! Enterprise Computing!

Chapter 14! Enterprise Computing! Chapter 14 Enterprise Computing Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information