Narrow your search
Listing 1 - 10 of 68 << page
of 7
>>
Sort by

Book
Outcomes from the first Wingman software-in-the-loop integration event: January 2017
Authors: ---
Year: 2017 Publisher: [Adelphi, Md.] : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Outcomes from the first Wingman software-in-the-loop integration event: January 2017
Authors: ---
Year: 2017 Publisher: [Adelphi, Md.] : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Confessions of an Enterprise Architect
Author:
ISBN: 1000915018 1003414281 1003414281 1000914992 Year: 2024 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The book discusses how to succeed as a software systems architect despite the politics, budgets, setbacks, personnel issues, and technological challenges. It features numerous 'confessions,' which are pragmatic tips, warnings, and guidance from a practicing architect garnered over a career in independent practice.


Book
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author:
Year: 2023 Publisher: Karlsruhe, Germany : KIT Scientific Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.


Book
ArchiMate® 3. 0. 1 - a Pocket Guide.
Authors: ---
Year: 2017 Publisher: Hertogenbosch : Van Haren Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author:
Year: 2023 Publisher: Karlsruhe, Germany : KIT Scientific Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.


Book
Enterprise android : programming android database applications for the enterprise
Authors: ---
ISBN: 1118227476 Year: 2014 Publisher: Indianapolis, Indiana : John Wiley & Sons,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The definitive guide to building data-driven Android applications for enterprise systems Android devices represent a rapidly growing share of the mobile device market. With the release of Android 4, they are moving beyond consumer applications into corporate/enterprise use. Developers who want to start building data-driven Android applications that integrate with enterprise systems will learn how with this book. In the tradition of Wrox Professional guides, it thoroughly covers sharing and displaying data, transmitting data to enterprise applications, and much more. Shows Android developer


Book
Enterprise interoperability : smart services and business impact of enterprise interoperability
Author:
ISBN: 1119564107 1119564026 1119564034 Year: 2018 Publisher: London, United Kingdom : Hoboken, New Jersey : ISTE ; Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (EI) research is therefore to address the effectiveness of solutions that will successfully prepare organizations for the advent and uptake of new technologies. This volume outlines results and practical concepts from recent and ongoing European research studies in EI, and examines the results of research and discussions cultivated at the I-ESA 2018 conference, “Smart services and business impact of enterprise interoperability”. The conference, designed to encourage collaboration between academic inquiry and real-world industry applications, addressed a number of advanced multidisciplinary topics including Industry 4.0, Big Data, the Internet of Things, Cloud computing, ontology, artificial intelligence, virtual reality and enterprise modelling for future “smart” manufacturing. Readers will find this book to be a source of invaluable knowledge for enterprise architects in a range of industries and organizations.


Book
Odoo 12 development essentials : fast-track your Odoo development skills to build powerful business applications
Author:
Year: 2018 Publisher: Birmingham ; Mumbai : Packt Publishing Ltd,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Extend your skills with Odoo 12 to build resourceful and open source business applications Key Features Explore Odoo 12 capabilities to develop business applications Program business logic and manipulate data to implement specific business rules in your applications Integrate Python APIs for building customizable and scalable business logic Book Description Odoo is one of the best platforms for open source ERP and CRM. Its latest version, Odoo 12, brings with it new features and updates in Python packages to develop more customizable applications with additional cloud capabilities. The book begins by covering the development essentials for building business applications. You will start your journey by learning how to install and configure Odoo, and then transition from having no specific knowledge of Odoo to being ready for application development. You will develop your first Odoo application and understand topics such as models and views. Odoo 12 Development Essentials will also guide you in using server APIs to add business logic, helping you lay a solid foundation for advanced topics. As you progress through the chapters, you will be equipped to build and customize your applications and explore the new features in Odoo 12, such as cloud integration, to scale your business applications. You will get insights into building business logic and integrating various APIs into your application. By the end of the book, you will be able to build a business application from scratch by using the latest version of Odoo. What you will learn Manage Odoo server instances Create a new Odoo application from scratch using the most frequently used elements Develop new models and use inheritance to extend existing models Use ORM methods in the Odoo server and from external clients Create Kanban views using QWeb effectively Build custom web and website CMS pages Use external APIs to integrate Odoo with external applications Add automated tests and techniques to debug module business logic Who this book is for If you are a developer familiar with Python and MVC design and want to build business applications using Odoo, this book is for you.


Book
Architectural Alignment of Access Control Requirements Extracted from Business Processes
Author:
Year: 2023 Publisher: Karlsruhe, Germany : KIT Scientific Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a. access permissions for role-based access control and b. architectural data flow constraints to identify violations of access control in enterprise application architectures.

Listing 1 - 10 of 68 << page
of 7
>>
Sort by