The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight

Architecture for the Intelligent Enterprise: Powerful New Ways to Maximize the Real-time Value of Information Tomorrows winning Intelligent Enterprises will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments. In this book, a team of IBMs leading information management experts guide you on a journey that will take you from where you are today toward becoming an Intelligent Enterprise. Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprisefrom the shop floor to the top floor. Coverage Includes Highlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding Information as a Service and Info 2.0, the information delivery side of Web 2.0

[1]  Frank B. Schmuck,et al.  GPFS: A Shared-Disk File System for Large Computing Clusters , 2002, FAST.

[2]  Peter Sommerlad Reverse Proxy Patterns , 2003, EuroPLoP.

[3]  W. H. Inmon,et al.  Building the Operational Data Store , 1995 .

[4]  Dan Volitich IBM Cognos 8 Business Intelligence: The Official Guide , 2008 .

[5]  D. Redmond-Pyle,et al.  A Standard for Architecture Description , 1999, IBM Syst. J..

[6]  John Lamb The Greening of IT: How Companies Can Make a Difference for the Environment , 2009 .

[7]  Rick F. van der Lans,et al.  Introduction to SQL: Mastering the Relational Database Language (4th Edition) , 2006 .

[8]  Glenn Cater,et al.  Service Oriented Architecture (SOA) , 2011, Encyclopedia of Information Assurance.

[9]  Ibm Redbooks IBM Tivoli Application Dependency Discovery Manager Capabilities and Best Practices , 2008 .

[10]  David Mellor,et al.  Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration , 2001 .

[11]  Bill Inmon,et al.  Business Metadata: Capturing Enterprise Knowledge , 2007 .

[12]  Parag Agrawal,et al.  Trio-One: Layering Uncertainty and Lineage on a Conventional DBMS (Demo) , 2007, CIDR.

[13]  Tim Gough Anti-money laundering : a guide for financial firms , 2005 .

[14]  Ivan M. Milman,et al.  Enterprise Master Data Management: An SOA Approach to Managing Core Information , 2008 .

[15]  Bobby Woolf,et al.  Enterprise Integration Patterns , 2003 .

[16]  Andy Neely,et al.  Business performance measurement: Unifying theories and integrating practice, second edition , 2007 .

[17]  W. H. Inmon,et al.  Building the data warehouse , 1992 .

[18]  David A Chappell,et al.  Enterprise Service Bus , 2004 .

[19]  Ralph Kimball,et al.  The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling , 1996 .

[20]  Parag Agrawal,et al.  Trio: a system for data, uncertainty, and lineage , 2006, VLDB.

[21]  Debbra Wetteroth OSI Reference Model for Telecommunications , 2001 .

[22]  H. Wegener Aligning Business and IT with Metadata: The Financial Services Way , 2007 .

[23]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[24]  Jackie Zhu Wei-Dong Content Manager Backup/Recovery and High Availability: Strategies, Options, and Procedures (IBM Redbooks) , 2004 .

[25]  Ibm Redbooks,et al.  Enterprise Security Architecture Using IBM Tivoli Security Solutions , 2004 .

[26]  Alex Berson,et al.  Master Data Management And Customer Data Integration For A Global Enterprise , 2007 .

[27]  Michael Jennings,et al.  Universal Meta Data Models , 2004 .