The SAIC Solution


Book Description

Can an employee-owned company succeed? Here is the inside story of one that thrived and grew to become a significant force in the nation’s scientific and technical markets. In 1969, Dr. J. Robert Beyster founded Science Applications International Corporation (SAIC) with a unique vision of creating an employee-owned organization run according to 12 principles of success that encourage entrepreneurship and accountability. Today, SAIC has grown from a handful of scientists to over 43,000 employees–most of whom hold company equity–and more than $8 billion in annual revenue, a steadily rising stock price, and top rankings as a contractor to government and business organizations. In this book, Dr. Beyster tells the story of SAIC, and offers valuable lessons to entrepreneurs and managers on how to build a company in which loyalty to values goes hand in hand with success. Dr. J. Robert Beyster (La Jolla, CA) is the founder of Science Applications International Corp. (SAIC). He served as CEO and chairman of the company for 35 years. Beyster continues to promote innovation and employee ownership through his Foundation for Enterprise Development and the Beyster Institute at the Rady School of Management at the University of California, San Diego. Peter Economy (La Jolla, CA) is Associate Editor of Leader to Leader, the award-winning publication for the Leader to Leader Institute, and a bestselling author of titles such as The Management Bible (0-471-70545-4) and Enterprising Nonprofits: A Toolkit for Social Entrepreneurs (0-471-39735-0).




The SAIC Solution


Book Description

In The SAIC Solution, 2nd Edition, Dr. J. Robert Beyster - who founded SAIC in 1969, and grew it into the nation's largest employee-owned research and engineering company - examines recent issues faced by the company, including its 2006 IPO, the dismantling of its employee-ownership culture, significant decline in shareholder value, and its eventual split into two separate companies. This book is a guide to implementing principles and practices developed and used by SAIC to drive exponential growth, global expansion, and diversification across science and technology customers and markets. Topics include: sustaining a people-first culture, linking contribution to rewards, experimenting with management structures and business investment, and balancing reasonable profit with sustainable, accelerating growth. This book also provides a cautionary tale for entrepreneurs, company founders, and executives who seek to sustain their organizations in the 21st century.




Architecting Enterprise Blockchain Solutions


Book Description

Demystify architecting complex blockchain applications in enterprise environments Architecting Enterprise Blockchain Solutions helps engineers and IT administrators understand how to architect complex blockchain applications in enterprise environments. The book takes a deep dive into the intricacies of supporting and securing blockchain technology, creating and implementing decentralized applications, and incorporating blockchain into an existing enterprise IT infrastructure. Blockchain is a technology that is experiencing massive growth in many facets of business and the enterprise. Most books around blockchain primarily deal with how blockchains are related to cryptocurrency or focus on pure blockchain development. This book teaches what blockchain technology is and offers insights into its current and future uses in high performance networks and complex ecosystems. Provides a practical, hands-on approach Demonstrates the power and flexibility of enterprise blockchains such as Hyperledger and R3 Corda Explores how blockchain can be used to solve complex IT support and infrastructure problems Offers numerous hands-on examples and diagrams Get ready to learn how to harness the power and flexibility of enterprise blockchains!




Computational Ocean Acoustics


Book Description

Senior level/graduate level text/reference presenting state-of-the- art numerical techniques to solve the wave equation in heterogeneous fluid-solid media. Numerical models have become standard research tools in acoustic laboratories, and thus computational acoustics is becoming an increasingly important branch of ocean acoustic science. The first edition of this successful book, written by the recognized leaders of the field, was the first to present a comprehensive and modern introduction to computational ocean acoustics accessible to students. This revision, with 100 additional pages, completely updates the material in the first edition and includes new models based on current research. It includes problems and solutions in every chapter, making the book more useful in teaching (the first edition had a separate solutions manual). The book is intended for graduate and advanced undergraduate students of acoustics, geology and geophysics, applied mathematics, ocean engineering or as a reference in computational methods courses, as well as professionals in these fields, particularly those working in government (especially Navy) and industry labs engaged in the development or use of propagating models.




Handbook of Mobile Ad Hoc Networks for Mobility Models


Book Description

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.




Spies for Hire


Book Description

Reveals the formidable organization of intelligence outsourcing that has developed between the U.S. government and private companies since 9/11, in a report that reveals how approximately seventy percent of the nation's funding for top-secret tasks is now being funneled to higher-cost third-party contractors. 35,000 first printing.




Enterprise Cybersecurity


Book Description

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.




Architecting Cloud Computing Solutions


Book Description

Accelerating Business and Mission Success with Cloud Computing. Key Features A step-by-step guide that will practically guide you through implementing Cloud computing services effectively and efficiently. Learn to choose the most ideal Cloud service model, and adopt appropriate Cloud design considerations for your organization. Leverage Cloud computing methodologies to successfully develop a cost-effective Cloud environment successfully. Book Description Cloud adoption is a core component of digital transformation. Scaling the IT environment, making it resilient, and reducing costs are what organizations want. Architecting Cloud Computing Solutions presents and explains critical Cloud solution design considerations and technology decisions required to choose and deploy the right Cloud service and deployment models, based on your business and technology service requirements. This book starts with the fundamentals of cloud computing and its architectural concepts. It then walks you through Cloud service models (IaaS, PaaS, and SaaS), deployment models (public, private, community, and hybrid) and implementation options (Enterprise, MSP, and CSP) to explain and describe the key considerations and challenges organizations face during cloud migration. Later, this book delves into how to leverage DevOps, Cloud-Native, and Serverless architectures in your Cloud environment and presents industry best practices for scaling your Cloud environment. Finally, this book addresses (in depth) managing essential cloud technology service components such as data storage, security controls, and disaster recovery. By the end of this book, you will have mastered all the design considerations and operational trades required to adopt Cloud services, no matter which cloud service provider you choose. What you will learn Manage changes in the digital transformation and cloud transition process Design and build architectures that support specific business cases Design, modify, and aggregate baseline cloud architectures Familiarize yourself with cloud application security and cloud computing security threats Design and architect small, medium, and large cloud computing solutions Who this book is for If you are an IT Administrator, Cloud Architect, or a Solution Architect keen to benefit from cloud adoption for your organization, then this book is for you. Small business owners, managers, or consultants will also find this book useful. No prior knowledge of Cloud computing is needed.




Building Successful Information Systems


Book Description

Information systems are a critical component of business success today. Unfortunately, many companies do not truly understand what an information system is; where, when, and how it should be implemented; or the effects of integrating it into the organization. As such, we continue to see implementation horror stories of projects run amuck— going over time and over budget—or information systems that never get fully implemented, requiring “work-around” by employees in order to get things done. Sound familiar? If so, you’ll want to learn just why information systems can be poorly developed, and how to fix them. Inside, you’ll learn what information systems are and how to integrate them into your business processes with real specifics. This books gives you and other decision makers details on how information systems work, and, most importantly, what constitutes a successful information system—how to make them better and to last longer. And in the conclusion, you’ll have a keen sense of how data is created, transferred, analyzed, and used within your organization. From this understanding, you’ll be able to design, build, and implement information systems that accurately reflect the flow of the business processes; adjust quickly to support critical functions; and provide efficient and effective value-added services to employees to maximize the profitability of the company




Quality of Service in IP Networks


Book Description

Quality of Service (QoS) is a standards effort to provide consistent levels of service despite delivery problems. Providing students with an understanding of the technologies and techniques that will enable Internet QoS, this book is for courses in network management.