Flylib.com
Internet-Enabled Business Intelligence
Internet-Enabled Business Intelligence
ISBN: 0130409510
EAN: 2147483647
Year: 2002
Pages: 113
Authors:
William A. Giovinazzo
,
W. A. Giovinazzo
BUY ON AMAZON
Main Page
Table of Contents
Copyright
Acknowledgments
Introduction
Part 1: The Solution
Chapter 1. The Solution
Chapter 2. Evolution to e-Enterprise
2.1 The Internet: Hype or Hope?
2.2 Building the Internet
2.3 The Evolution to e-Commerce
2.4 The Internet Marketplace
2.5 Conclusion
Chapter 3. Internet-Enabled Business Intelligence
3.1 Intelligence
3.2 Anatomy of Business Intelligence
3.3 Conclusion
Part 2: Making the Internet Work
Chapter 4. The Web-Enabled Information Infrastructure
Chapter 5. Servers: The Heart of IEBI
5.1 The Server
5.2 The Mainframe
5.3 ClientServer Architecture: The Upstart Crow
5.4 The Internet
5.5 The Oracle 9 Internet Application Server
5.6 Conclusion
Chapter 6. The Internet Network
6.1 Standards Bodies
6.2 The ISOOSI Reference Model
6.3 IEEE 802 Specifications
6.4 TCPIP
6.5 Talking Over the Internet
6.6 Dynamic Host Configuration Protocol
6.7 Conclusion
Part 3: The Software of the Internet
Chapter 7. Empowering the Internet-Enabled Information Infrastructure
Chapter 8. Java
8.1 Object Orientation
8.2 The Java Programming Language
8.3 Introduction to the Java Platform
8.4 Java Specification Request (JSR)
8.5 JavaBeans
8.6 Conclusion
Chapter 9. eXtensible Markup Language
9.1 The Origins of XML
9.2 XML as a Medium of Exchange
9.3 The All-Powerful Wizard of XML
9.4 Parsers: Nothing Happens Until Someone Sells Something
9.5 XSL: The Internet s Rosetta Stone
9.6 XML in the Real World
9.7 Conclusion
Chapter 10. Common Warehouse Metadata
10.1 What Is Metadata ?
10.2 Metadata and IEBI
10.3 Types of Metadata
10.4 The Central Metadata Repository
10.5 Enterprise Data Model
10.6 OMG OMA
10.7 Common Warehouse Metadata Interchange
10.8 The CWMI Architecture
10.9 XML Metadata Interchange
10.10 Summary
Part 4: Building Relationships Over the Internet
Chapter 11. Look Outward Angel
Chapter 12. CRM in the Internet Age
12.1 The Customer-Driven Organization
12.2 The Ultimate in Customer-Driven
12.3 CRM in the Internet Age
12.4 Conclusion
Chapter 13. Swimming in the Clickstream
13.1 The Importance of Customer Identification
13.2 Understanding Customer Behavior in the Internet Age
13.3 The Clickstream
13.4 Cookies
13.5 Conclusion
Chapter 14. Personalization
14.1 Defining Personalization
14.2 Data Mining
14.3 The Data Mining Process
14.4 Summary
Chapter 15. The Road Goes Ever Onward
15.1 One Last Visit with Billy Boy
15.2 Web Services
15.3 Go Gently Into that Dark Night
15.4 Summary
Appendix A. Recommended Reading
Appendix B. Glossary
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Internet-Enabled Business Intelligence
ISBN: 0130409510
EAN: 2147483647
Year: 2002
Pages: 113
Authors:
William A. Giovinazzo
,
W. A. Giovinazzo
BUY ON AMAZON
Developing Tablet PC Applications (Charles River Media Programming)
Object-Oriented Programming with VB .NET
Tablet PC Full Screen Utility
Using Gestures to Control Tablet Media Player
Speech Input with SAPI
Pong Game
MySQL Cookbook
Sorting a Result Set
Introduction
Changing a Table Type
Eliminating Duplicates by Adding an Index
Assigning Ranks
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 1. Set Up Bluetooth on Linux
Hack 16. Control Your Home Theater from Your Palm
Hacks 2339: Introduction
Hack 25. Detect Networks with Handheld PCs
Hack 59. Scan for Wireless Networks Automatically
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Starting Diagrams by Using Templates
Storing and Displaying Employee Information in Organization Charts
Laying Out Office Spaces
Key Points
Glossary
Cultural Imperative: Global Trends in the 21st Century
Cross-Century Worldviews
Cultural Spectacles
Culture and Globalization
Conclusion
Epilogue After September 11
MPLS Configuration on Cisco IOS Software
BGP PE-CE Routing Protocol Overview, Configuration, and Verification
Case Study-Hub and Spoke MPLS VPN Network Using BGP PE-CE Routing for Sites Using Unique AS Numbers
Carrier Supporting Carriers Overview
TE Basics
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies