Home > Chapters & Articles

Chapters & Articles

All Articles

Showing 1-20 of 227

Sort by Date | Title

Page: 1 2 3 4 5 Next >

Structural Patterns for the Common Information Model
By Mandy Chessell, Ray Harishankar, Kerard Hogg, Gandhi Sivakumar, Dan Wolfson
May 18, 2015
This chapter from Common Information Models for an Open, Analytical, and Agile World covers five software design patterns that illustrate different approaches to structuring your common information model.
The Inefficiency of Multitasking: Why Your Smartphone Is a 'Weapon of Mass Distraction'
By Scott Will
Mar 20, 2015
Scott Will, co-author of Being Agile: Eleven Breakthrough Techniques to Keep You from "Waterfalling Backward", will convince you that multitasking simply wastes time and energy. Learn how to give up multitasking - and get more done.
How Search Marketing Works
By Mike Moran, Bill Hunt
Dec 12, 2014
To maximize the number of searchers coming to your site, however, you must take specific actions to attract visitors to your site from search sites. That’s search marketing. This chapter from Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Website, 3rd Edition explains why search marketing is important, why it is difficult, what search marketing is, and how to get started.
Five Common Challenges of Implementing Information Governance
By Anthony David Giordano
Nov 10, 2014
Anthony David Giordano, author of Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work, explains the main objections that prevent organizations from implementing information governance, or that keep information governance from being successful once implemented. Learn how to overcome these challenges, as well as how information governance can add value when performed in your organization.
Beyond Big Data: Understanding Social MDM Reference Architecture
By Martin Oberhofer, Eberhard Hechler, Ivan Milman, Scott Schumacher, Dan Wolfson
Nov 5, 2014
Reference architectures encapsulate architectural best practices harvested and harnessed from a series of implementations. In this chapter from Beyond Big Data: Using Social MDM to Drive Deep Customer Insight, the authors introduce the Social MDM Reference Architecture regarding its key capabilities based on the capability framework. The primary purpose of this chapter is to enable you to understand the relevant components, their relationships, and interactions for building MDM solutions—specifically for Social MDM use cases.
Information Governance & EIM Overview Governance
By Anthony David Giordano
Oct 8, 2014
This chapter from Performing Information Governance: A Step-by-step Guide to Making Information Governance Work focuses on each of the functions within EIM in terms of their purpose, unique artifacts that are used to design and maintain the applications, and how they are built. It explains how these different functions interconnect to provide an entire information environment for an organization.
The Evolution of Technical Information: Introduction to a Handbook for Writers and Editors
By Michelle Carey, Moira McFadden Lanyi, Deirdre Longo, Eric Radzinski, Shannon Rouiller, Elizabeth Wilde
Jul 31, 2014
The authors of Developing Quality Technical Information: A Handbook for Writers and Editors, 3rd Edition introduce their book and discuss how writing and presenting technical information has evolved over the years.
REST Web Services in WebSphere Liberty
By Kyle Brown, Roland Barcia, Karl Bishop, Matthew Perrins
Jun 30, 2014
This chapter covers REST Web Services in WebSphere Liberty, including discussions of JAX-RS, JSON Serialization, and RESTful SOA.
Why Big Data and Analytics?
By Brenda L. Dietrich, Maureen F. Norton, Emily C. Plachy
Jun 12, 2014
Get the inside story of how analytics is being used across the IBM enterprise in this introduction to Analytics Across the Enterprise: How IBM Realizes Business Value from Big Data and Analytics.
Ten Tips to Realize Value from Big Data and Analytics
By Brenda L. Dietrich, Maureen F. Norton, Emily C. Plachy
Jun 10, 2014
What does it really take to derive value from Big Data and Analytics? Co-authors of Analytics Across the Enterprise: How IBM Realizes Business Value from Big Data and Analytics, Brenda Dietrich, Emily Plachy and Maureen Norton, identify 10 top tips based on their years of experience at IBM “eating their own cooking.” Interviews with more than 70 executives, managers and analytic practitioners across IBM yielded 31 case studies across 9 different business functions which show the breadth challenges, outcomes, analytics techniques, and lessons learned to make your analytics journey to realize business value successful.
XPages Mobile Application Development
By Martin Donnelly, Tony McGuckin, Mark Wallace
Apr 30, 2014
This chapter focuses on best practices and design patterns for XPages Mobile Application Development. So even if you are familiar with building mobile applications with XPages, this chapter contains some discussion that you will find interesting.
My Life in Tech: Q&A with IBM Distinguished Engineer Mandy Chessell
By InformIT Editorial Team, Mandy Chessell
Dec 10, 2013
Mandy Chessell talks to InformIT about what's changed at IBM over the last quarter-century, how she was inspired to work at IBM at age 14, and advice for those interested in building a successful career in technology.
Using Database Tools and Utilities in DB2
By Raul F. Chong, Clara Liu
Nov 19, 2013
How do you work with DB2? How do you issue SQL and/or XQuery statements and enter DB2 commands? Are there graphical tools that can make your administration tasks easier? This chapter provides the answers to all of these questions. DB2 provides a wide range of tools, both graphical and command-driven, to help you work with DB2.
Agile Breakthrough Techniques to Keep You from "Waterfalling Backward": Whole Teams
By Leslie Ekas, Scott Will
Nov 15, 2013
This chapter describes why whole teams experience better communication, productivity, and collective knowledge sharing than traditional silo’d teams. It makes a case for keeping teams intact as well as protecting them from interruption during a product release.
How “Go To” People Help Make Agile Software Development Work (and How You Can Become One)
By Leslie Ekas
Nov 12, 2013
Leslie Ekas explains who "go to" people are (you know them already—the ones you contact first to find out what's going on) and why they are particularly beneficial for teams who plan on adopting agile.
My Life in Tech: Q&A with Diana Stepner, Head of Future Technologies at Pearson
By Diana Stepner, InformIT Editorial Team
Oct 10, 2013
InformIT (a part of Pearson) talks with Diana Stepner, the Head of Future Technologies at Pearson, about trends in the education and consumer spaces, her roles models, and the most exciting thing happening in tech right now.
Top 10 Mobile Strategy Myths
By Dirk Nicol
Aug 19, 2013
Mobile technology offers companies tremendous opportunities to transform their business. However, there are many myths and misconceptions about how to embrace mobile technologies to win in the market. Dirk Nicol, author of Mobile Strategy, walks you through the top 10 mobile myths.
Introduction to Patterns of Information Management
By Mandy Chessell, Harald Smith
Jun 26, 2013
In software engineering, we are taught that abstraction, modularity, and information hiding are useful approaches when breaking down a set of requirements into manageable chunks for implementation. In this introduction to Patterns of Information Management , Mandy Chessell and Harald Smith explain how their book makes use of these principles to tackle the synchronization of information between IT systems.
Mobile Strategy for Your Company: SoCloDaMo (Social + Cloud + Big Data + Mobile)
By Dirk Nicol
May 7, 2013
This chapter outlines the key capabilities and trends around cloud, social, and big data as it relates to mobile. The chapter then covers how these four major trends come together to offer a set of new capabilities for businesses that compliments an overall mobile strategy.
Secure Communications on the Cloud with a SOCKS Proxy
By Alex Amies, Qiang Guo Tong
Feb 21, 2013
IBM Senior Software Engineer Alexander Amies and Advisory Software Engineer Qiang Guo Tong, co-authors on Developing and Hosting Applications on the Cloud, discuss how to use the SOCKet Secure (SOCKS) protocol, working through the cloud to access resources on your local virtual machines and VLANs, even if they're protected by firewall.

Page: 1 2 3 4 5 Next >