Leverage digital technologies to achieve competitive advantage through market-leading processes, products and services, customer relationships, and innovation How does Information Technology enable competitive advantage? Digital Disciplines details four strategies that exploit today's digital technologies to create unparalleled customer value. Using non-technical language, this book describes the blueprints that any company, large or small, can use to gain or retain market leadership, based on insights derived from examining modern digital giants such as Amazon, Netflix, and Uber, established firms such as Burberry, GE, Nike, and Procter & Gamble, and lesser-known innovators such as Alvio, Fruition Sciences, Opower, and Quirky. Companies can develop a competitive edge through four digital disciplines information excellence, solution leadership, collective intimacy, and accelerated innovation that exploit cloud computing, big data and analytics, mobile and wireline networks, social media, and the Internet of Things. These four disciplines extend and update the value disciplines of operational excellence, product leadership, and customer intimacy originally defined by Michael Treacy and Fred Wiersema in their bestselling business classic The Discipline of Market Leaders. * Operational excellence must now be complemented by information excellence leveraging automation, information, analytics, and sophisticated algorithms to make processes faster, better, and more cost-effective, seamlessly fuse digital and physical worlds, and generate new revenue through techniques such as exhaust data monetization * Product leadership must be extended to solution leadership smart digital products and services ranging from wind turbines and wearables to connected healthcare, linked to each other, cloud services, social networks, and partner ecosystems, focused on customer outcomes and creating experiences and transformations * Customer intimacy is evolving to collective intimacy as face-to-face relationships not only go online, but are collectively analyzed to provide individually targeted recommendations and personalized services ranging from books and movies to patient-specific therapies * Traditional innovation is no longer enough accelerated innovation goes beyond open innovation to exploit crowdsourcing, idea markets, innovation networks, challenges, and contest economics to dramatically improve processes, products, and relationships This book provides a strategy framework, empirical data, case studies, deep insights, and pragmatic steps for any enterprise to follow and attain market leadership in today's digital era. It addresses improved execution through techniques such as gamification, and pitfalls to beware, including cybersecurity, privacy, and unintended consequences. Digital Disciplines can be exploited by existing firms or start-ups to disrupt established ways of doing business through innovative, digitally enabled value propositions to win in competitive markets in today's digital era.
Millions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to:
- Use OAuth to access Twitter data
- Create and analyze graphs of retweet relationships
- Use the streaming API to harvest tweets in realtime
- Harvest and analyze friends and followers
- Discover friendship cliques
- Summarize webpages from short URLs
This book is a perfect companion to O’Reilly's Mining the Social Web.
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include:
- USB Hacksaw
- USB Switchblade
- USB Based Virus/Malicous Code Launch
- USB Device Overflow
- Pod Slurping
- Social Engineering and USB Technology
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable
Sustainable and resilient critical infrastructure systems is an emerging paradigm in an evolving era of depleting assets in the midst of natural and man-made threats to provide a sustainable and high quality of life with optimized resources from social, economic, societal and environmental considerations. The increasing complexity and interconnectedness of civil and other interdependent infrastructure systems (electric power, energy, cyber-infrastructures, etc.) require inter- and multidisciplinary expertise required to engineer, monitor, and sustain these distributed large-scale complex adaptive infrastructure systems. This edited book is motivated by recent advances in simulation, modeling, sensing, communications/information, and intelligent and sustainable technologies that have resulted in the development of sophisticated methodologies and instruments to design, characterize, optimize, and evaluate critical infrastructure systems, their resilience, and their condition and the factors that cause their deterioration.
Specific topics discussed in this book include, but are not limited to: optimal infrastructure investment allocation for sustainability, framework for manifestation of tacit critical infrastructure knowledge, interdependencies between energy and transportation systems for national long term planning, intelligent transportation infrastructure technologies, emergent research issues in infrastructure interdependence research, framework for assessing the resilience of infrastructure and economic systems, maintenance optimization for heterogeneous infrastructure systems, optimal emergency infrastructure inspection scheduling, and sustainable rehabilitation of deteriorated transportation infrastructure systems.
Facebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to combine social web data, analysis techniques, and visualization to help you find what you've been looking for in the social haystack, as well as useful information you didn't know existed.
Each standalone chapter introduces techniques for mining data in different areas of the social Web, including blogs and email. All you need to get started is a programming background and a willingness to learn basic Python tools.
- Get a straightforward synopsis of the social web landscape
- Use adaptable scripts on GitHub to harvest data from social network APIs such as Twitter, Facebook, and LinkedIn
- Learn how to employ easy-to-use Python tools to slice and dice the data you collect
- Explore social connections in microformats with the XHTML Friends Network
- Apply advanced mining techniques such as TF-IDF, cosine similarity, collocation analysis, document summarization, and clique detection
“Let Matthew Russell serve as your guide to working with social data sets old (email, blogs) and new (Twitter, LinkedIn, Facebook). Mining the Social Web is a natural successor to Programming Collective Intelligence: a practical, hands-on approach to hacking on data from the social Web with Python.”
–Jeff Hammerbacher, Chief Scientist, Cloudera
“A rich, compact, useful, practical introduction to a galaxy of tools, techniques, and theories for exploring structured and unstructured data.”
–Alex Martelli, Senior Staff Engineer, Google