作者:
Ulrik FrankeFOI
Swedish Defence Research Agency Stockholm Sweden
enterprise Architecture (EA) is a discipline designed to cope withthe complexity of modern enterprises at the intersection of information technology and business operations. this article demonstrates how EA models ca...
详细信息
ISBN:
(纸本)9781479954711
enterprise Architecture (EA) is a discipline designed to cope withthe complexity of modern enterprises at the intersection of information technology and business operations. this article demonstrates how EA models can be enriched withthe production function concept from microeconomics, enabling new and business relevant kinds of analysis. the approach is demonstrated through examples regarding growth strategies, architectural efficiency with changing relative prices, and strategies for high availability IT services.
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever techniq...
详细信息
ISBN:
(纸本)9789380544120
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in which presence of secret message cannot be detected and we can use it as a tool for security purpose to transmit the cofidential information in a secure way. It is an ongoing research area having vast number of applications in distinct fields such as defense and intelligence, medical, on-line banking, on-line transaction, to stop music piracy and other financial and commercial purposes. there are various steganography approaches exist and they differs depending upon message to be embedded, use of file type as carrier or compression method used etc. the focus of this paper is to classify distinct image steganography techniques besides giving overview, importance and challenges of steganography techniques. Other related security techniques are also been discussed in brief in this paper. the classification of steganography techniques may provide not only understanding and guidelines to researchers in this field but also provide directions for future work in this field.
Cloud computing has been rapidly adopted by enterprises worldwide in the recent years. During this period, both best practices and lessons learned have been accumulated and have been put into practice. However, few sy...
详细信息
Cloud computing has been rapidly adopted by enterprises worldwide in the recent years. During this period, both best practices and lessons learned have been accumulated and have been put into practice. However, few systematic works focus on engineering enterprise applications specifically for the cloud, or on re-engineering and migrating existing ones. the international Workshop on Engineering Cloud Applications & Services (EnCASE) aims to address this deficit by providing a venue for the discussion on innovative engineering methods and techniques in the context of enterprisecomputing.
Modern enterprises aim to implement increasingly efficient working methods. One of the trends is the use of process knowledge to guide users about the proper way of performing specific tasks, getting rid of the mislea...
详细信息
Summary form only given. Process mining provides new ways to utilize the abundance of data in enterprises. Suddenly many organizations realize thatsurvival is not possible without exploiting available data intelligent...
详细信息
Summary form only given. Process mining provides new ways to utilize the abundance of data in enterprises. Suddenly many organizations realize thatsurvival is not possible without exploiting available data intelligently. A new profession is emerging: the data scientist. Justlike computer science emerged as a new discipline from mathematics when computers became abundantly available, we nowsee the birth of data science as a new discipline driven by the torrents of data available today. Process mining will be anintegral part of the data scientist's toolbox. Also enterprisecomputing will need to focus on process innovation through theintelligent use of event *** keynote talk will focus on challenges related to 'process mining in the large', i.e., dealing with many processes, manyactors, many data sources, and huge amounts of data at the same time. By adequately addressing these challenges (e.g., usingprocess cubes) we get a new kind of superglue that will impact the future of enterprisecomputing.
A number of frameworks suggest artifacts and practices to develop the components of enterprise Architecture (EA). However, when analyzing the representations proposed, several concerns are scattered and tangled within...
详细信息
A number of frameworks suggest artifacts and practices to develop the components of enterprise Architecture (EA). However, when analyzing the representations proposed, several concerns are scattered and tangled within the essential elements. It harms reuse, making it difficult both to understand and maintain the EA representations. In order to address this issue, we present a method to identify and represent the crosscutting concerns at an enterprise Architecture level. the solution is based on enterprise Ontology and Aspect-Oriented approaches. A case study was performed in an organization to evaluate the proposal.
Today's enterprises exist in highly dynamic environment. While enterprise-architecture (EA) based models help in holistic treatment of enterprise aspects, they are static in nature and do not represent the complex...
详细信息
Today's enterprises exist in highly dynamic environment. While enterprise-architecture (EA) based models help in holistic treatment of enterprise aspects, they are static in nature and do not represent the complex dynamic behavior of enterprise as it evolves over time. Instead of relying on guideline for simulating EA models as in other approaches, we propose a comprehensive metamodel of system dynamics and provide relation-based mapping to EA metamodel. Ongoing explorations suggest that while several challenges of simulating enterprise aspects remain unaddressed, in the least we take a step toward making simulation of EA models more structured.
Companies today interact in an increasingly competitive environment and seek to leverage the potentials of IT for generating new business models and for changing existing ones. For these business models, companies hav...
详细信息
Companies today interact in an increasingly competitive environment and seek to leverage the potentials of IT for generating new business models and for changing existing ones. For these business models, companies have to align the respective business and IT architectures. this task can be supported by using enterprise architecture management. In this paper, we first analyze the potentials for integrating enterprise architecture (management) and business model (management). Second, the components of different approaches for describing business models are compared to each other. third, we present a concept for integrating business models into enterprise architectures. Fourth, we outline an integration of business model management and enterprise architecture management processes.
enterprise Architecture Management relies on information from different management levels, functional areas and for example in case of holdings or mergers from different organizations. this results in a variety of too...
详细信息
enterprise Architecture Management relies on information from different management levels, functional areas and for example in case of holdings or mergers from different organizations. this results in a variety of tools, models, and model schemata that cover EAM aspects. At the same time, there is a desire for interchangeability and reuse of EA models. Here, model transformation is a promising approach. However, the heterogeneity of EA models causes problems here. We describe heterogeneities by examples from both, language constructs and EA models. Furthermore possible solutions to problems imposed for model transformation are discussed. this is done on the example of ArchiMate and Troux Semantics.
Today's enterprises exist in highly dynamic environment. Simulation could be used to reveal complex dynamic behavior of enterprise, especially for playing out dynamic what-if scenarios, in determining enterprise...
详细信息
Today's enterprises exist in highly dynamic environment. Simulation could be used to reveal complex dynamic behavior of enterprise, especially for playing out dynamic what-if scenarios, in determining enterprise's response to a change. Instead of relying on guidelines for simulating prescriptive models of enterprise as in other approaches including our own in which we simulated intentional models of enterprise, we propose a comprehensive metamodel of system dynamics and provide relation-based mapping to intentional metamodel. Ongoing explorations suggest that while several challenges of simulating enterprise aspects for what-if analyses remain unaddressed, in the least we take a step toward making simulation of intentional models more structured.
暂无评论