The Visible Ops Handbook: Starting ITIL in 4 Practical Steps


Kevin Behr - 2004
    Visible Ops is comprised of four prescriptive and self-fueling steps that take an organization from any starting point to a continually improving process. MAKING ITIL ACTIONABLE Although the Information Technology Infrastructure Library (ITIL) provides a wealth of best practices, it lacks prescriptive guidance: What do you implement first, and how do you do it? Moreover, the ITIL books remain relatively expensive to distribute. Other information, publicly available from a variety of sources, is too general and vague to effectively aid organizations that need to start or enhance process improvement efforts. The Visible Ops booklet provides a prescriptive roadmap for organizations beginning or continuing their IT process improvement journey. WHY DO WE NEED VISIBLE OPS? The Visible Ops methodology was developed because there was not a satisfactory answer to the question: "I believe in the need for IT process improvement, but where do I start?" Since 2000, Gene Kim and Kevin Behr have met with hundreds of IT organizations and identified eight high-performing IT organizations with the highest service levels, best security, and best efficiencies. For years, they studied these high-performing organizations to figure out the secrets to their success. Visible Ops codifies how these organizations achieved their transformation from good to great, showing how interested organizations can replicate the key processes of these high-performing organizations in just four steps: 1. Stabilize Patient, Modify First Response - Almost 80% of outages are self-inflicted. The first step is to control risky changes and reduce MTTR by addressing how changes are managed and how problems are resolved. 2. Catch and Release, Find Fragile Artifacts - Often, infrastructure exists that cannot be repeatedly replicated. In this step, we inventory assets, configurations and services, to identify those with the lowest change success rates, highest MTTR and highest business downtime costs. 3. Establish Repeatable Build Library - The highest return on investment is implementing effective release management processes. This step creates repeatable builds for the most critical assets and services, to make it "cheaper to rebuild than to repair." 4. Enable Continuous Improvement - The previous steps have progressively built a closed-loop between the Release, Control and Resolution processes. This step implements metrics to allow continuous improvement of all of these process areas, to best ensure that business objectives are met.

Beyond the Twelve-Factor App Exploring the DNA of Highly Scalable, Resilient Cloud Applications


Kevin Hoffman - 2016
    Cloud computing is rapidly transitioning from a niche technology embraced by startups and tech-forward companies to the foundation upon which enterprise systems build their future. In order to compete in today’s marketplace, organizations large and small are embracing cloud architectures and practices.

Essentials of Management Information Systems


Kenneth C. Laudon - 1994
    http://wps.pearsoned.co.uk/ema_ge_lau...

Confident Data Skills: Master the Fundamentals of Working with Data and Supercharge Your Career


Kirill Eremenko - 2018
    From entertainment to politics, from technology to advertising and from science to the business world, understanding and using data is now one of the most transferable and transferable skills out there. Learning how to work with data may seem intimidating or difficult but with Confident Data Skills you will be able to master the fundamentals and supercharge your professional abilities. This essential book covers data mining, preparing data, analysing data, communicating data, financial modelling, visualizing insights and presenting data through film making and dynamic simulations.In-depth international case studies from a wide range of organizations, including Netflix, LinkedIn, Goodreads, Deep Blue, Alpha Go and Mike's Hard Lemonade Co. show successful data techniques in practice and inspire you to turn knowledge into innovation. Confident Data Skills also provides insightful guidance on how you can use data skills to enhance your employability and improve how your industry or company works through your data skills. Expert author and instructor, Kirill Eremenko, is committed to making the complex simple and inspiring you to have the confidence to develop an understanding, adeptness and love of data.

Pivot to the Future: Discovering Value and Creating Growth in a Disrupted World


Omar Abbosh - 2019
    But what is new is the "wise pivot," a replicable strategy for harnessing disruption to survive, grow, and be relevant to the future. It's a strategy for perpetual reinvention across the old, now, and new elements of any business.Rapid recent advances in technology are forcing leaders in every business to rethink long-held beliefs about how to adapt to emerging technologies and new markets. What has become abundantly clear: in the digital age, conventional wisdom about business transformation no longer works, if it ever did.Based on Accenture's own experience of reinventing itself in the face of disruption, the company's real world client work, and a rigorous two-year study of thousands of businesses across 30 industries, Pivot to the Future reveals methodical and bold moves for finding and releasing new sources of trapped value-unlocked by bridging the gap between what is technologically possible and how technologies are being used. The freed value enables companies to simultaneously reinvent their legacy, and current and new businesses.Pivot to the Future is for leaders who seek to turn the existential threats of today and tomorrow into sustainable growth, with the courage to understand that a wise pivot strategy is not a one-time event, but a commitment to a future of perpetual reinvention, where one pivot is followed by the next and the next.

Microsoft Manual of Style


Microsoft Corporation - 2004
    Direct from the Editorial Style Board at Microsoft—you get a comprehensive glossary of both general technology terms and those specific to Microsoft; clear, concise usage and style guidelines with helpful examples and alternatives; guidance on grammar, tone, and voice; and best practices for writing content for the web, optimizing for accessibility, and communicating to a worldwide audience. Fully updated and optimized for ease of use, the Microsoft Manual of Style is designed to help you communicate clearly, consistently, and accurately about technical topics—across a range of audiences and media.

The Guru's Guide to Transact-Sql


Ken Henderson - 2000
    Beginners and intermediate developers will appreciate the comprehensive tutorial that walks step-by-step through building a real client/server database, from concept to deployment and beyond -- and points out key pitfalls to avoid throughout the process. Experienced users will appreciate the book's comprehensive coverage of the Transact-SQL language, from basic to advanced level; detailed ODBC database access information; expert coverage of concurrency control, and more. The book includes thorough, up-to-the-minute guidance on building multi-tier applications; SQL Server performance tuning; and other crucial issues for advanced developers. For all database developers, system administrators, and Web application developers who interact with databases in Microsoft-centric environments.

Complete Guide to High Dynamic Range Digital Photography


Ferrell McCollough - 2008
    High Dynamic Range photography is the process of taking several pictures of a scene at various exposures, then merging them into one file. So the entire photo can look crisp and detailed, from highlights to midtones to shadows—and photographers needn’t sacrifice any part of their image. And the best way to master this exciting technology is with this thorough, easy-to-follow, and visually spectacular guide. No other title does justice to these cutting-edge techniques, which actually take the viewer into worlds far beyond normal photography—sometimes even beyond normal human perception. Ferrell McCollough, a widely respected photographer, pushes the boundaries and inspires others to pursue their artistic vision, too. The amazing results simply can’t be achieved any other way.

The AI Delusion


Gary Smith - 2018
    The Computer Revolution may be even more life-changing than the Industrial Revolution. We can do things with computers that could never be done before, and computers can do things for us that could never be done before.But our love of computers should not cloud our thinking about their limitations.We are told that computers are smarter than humans and that data mining can identify previously unknown truths, or make discoveries that will revolutionize our lives. Our lives may well be changed, but not necessarily for the better. Computers are very good at discovering patterns, but are uselessin judging whether the unearthed patterns are sensible because computers do not think the way humans think.We fear that super-intelligent machines will decide to protect themselves by enslaving or eliminating humans. But the real danger is not that computers are smarter than us, but that we think computers are smarter than us and, so, trust computers to make important decisions for us.The AI Delusion explains why we should not be intimidated into thinking that computers are infallible, that data-mining is knowledge discovery, and that black boxes should be trusted.

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Introduction to Information Systems


James A. O'Brien - 1991
    Reflecting the movement toward enterprise-wide business applications, this work focuses on teaching the general business manager how to use and manage IT technologies such as the Internet, Intranets, and Extranets for enterprise collaboration, and how IT contributes to competitive advantage, reengineering business processes, and decision-making.

Grumby


Andy Kessler - 2010
    In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.

Daniel Silva's Gabriel Allon Collection, Books 11 - 13: Portrait of a Spy / The Fallen Angel / The English Girl


Daniel Silva - 2014
    From #1 New York Times bestselling author Daniel Silva come books 11-13 in his beloved Gabriel Allon series: Portrait of a Spy, The Fallen Angel, and The English Girl.

APIs: A Strategy Guide


Daniel Jacobson - 2011
    Salesforce.com (more than 50%) and Twitter (more than 75% fall into this category. Ebay gets more than 8 billion API calls a month. Facebook and Google, have dozens of APIs that enable both free services and e-commerce, get more than 5 billion API calls each day. Other companies like NetFlix have expanded their service of streaming movies over the the web to dozens of devices using API. At peak times, more than 20 percent of all traffic is accounted for by Netflix through its APIs. Companies like Sears and E-Trade are opening up their catalogs and other services to allow developers and entrepreneurs to create new marketing experiences. Making an API work to create a new channel is not just a matter of technology. An API must be considered in terms of business strategy, marketing, and operations as well as the technical aspects of programming. This book, written by Greg Brail, CTO of Apigee, and Brian Mulloy, VP of Products, captures the knowledge of all these areas gained by Apigee, the leading company in supporting the rollout of high traffic APIs.

IT Savvy: What Top Executives Must Know to Go from Pain to Gain


Peter Weill - 2009
    But in many organizations, returns from IT investments are flatlining, even as technology spending has skyrocketed.These challenges call for new levels of IT savvy: the ability of all managers-IT or non-IT-to transform their company's technology assets into operational efficiencies that boost margins. Companies with IT-savvy managers are 20 percent more profitable than their competitors.In IT Savvy, Peter Weill and Jeanne Ross-two of the world's foremost authorities on using IT in business-explain how non-IT executives can acquire this savvy. Concise and practical, the book describes the practices, competencies, and leadership skills non-IT managers need to succeed in the digital economy. You'll discover how to:-Define your firm's operating model-how IT can help you do business-Revamp your IT funding model to support your operating model-Build a digitized platform of business processes, IT systems, and data to execute on the model-Determine IT decision rights-Extract more business value from your IT assetsPacked with examples and based on research into eighteen hundred organizations in more than sixty countries, IT Savvy is required reading for non-IT managers seeking to push their company's performance to new heights.