Abstract
Technology landscape provides opportunities and challenges, and it is essential for an organization to understand the structured way to lead the business. In this chapter, readers will get exposed to the detail aspects related to the CABology. It will give business of all sizes a structured and comprehensive way of discovering the real benefits, usage, and operationalization aspects of utilizing the Trio Wave—cloud, analytics, and big data in delivering true business value.
I think the next [21st] century will be the century of complexity. We have already discovered the basic laws that govern matter and understand all the normal situations. We don’t know how the laws fit together, and what happens under extreme conditions. But I expect we will find a complete unified theory sometime this century. There is no limit to the complexity that we can build using those basic laws.
—Stephen W. Hawking
“Unified Theory” Is Getting Closer, Hawking Predicts’, interview in San Jose Mercury News. (23 Jan 2000), 29A
Give me six hours to chop down a tree and I will spend the first four sharpening the axe.
―Abraham Lincoln
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aramaki, E., Maskawa, S., & Morita, M. (2011). Twitter catches the Flu: Detecting influenza epidemics usin Twitter. EMNLP ’11 Proceedings of the Conference on Empirical Methods in Natural Language Processing, 1568–1576.
Culotta, A. (2010). Towards detecting influenza epidemics by analyzing Twitter messages. 1st Workshop on Social Media Analytics, (May), 115–122. https://doi.org/10.1145/1964858.1964874.
Fan, S., Lau, R. Y. K., & Zhao, J. L. (2015). Demystifying big data analytics for business intelligence through the lens of marketing mix. Big Data Research, 2(1), 28–32. https://doi.org/10.1016/j.bdr.2015.02.006.
GI Cloud ( Meghraj) Adoption and Implementation Roadmap. (2013), (April 2013).
Ginsberg, J., Mohebbi, M. H., Patel, R. S., Brammer, L., Smolinski, M. S., & Brilliant, L. (2009). Detecting influenza epidemics using search engine query data. Nature, 457(7232), 1012–1014. https://doi.org/10.1038/nature07634.
Gould, R. W. (2012). Open innovation and stakeholder engagement, Journal of Technology Management & Innovation, 7(3), 1–11.
Greengard, S. (2014). Big data = big challenges. CIO Insight, 1.
Integrating Performance Measures in Project Portfolios. (n.d.).
Knoke, B. (2013). A Short paper on innovation capability maturity within collaborations. NGEBIS Short Papers. Retrieved from http://www.bik.uni-bremen.de/BIK_Daten/pdf_daten/6_2013_Kno_717.pdf.
Larai, M. B. (2015). A review of service selection in cloud computing, (October).
Olsen, T. O., & Welo, T. (2011). Management & innovation maximizing product innovation through adaptive application of user-centered methods for defining customer value, Journal of Technology Management & Innovation, 6(4).
Opresnik, D., & Taisch, M. (2015). The value of big data in servitization. International Journal of Production Economics, 165, 174–184. https://doi.org/10.1016/j.ijpe.2014.12.036.
Singh, S., & Singh, N. (2012). Big Data analytics. 2012 International Conference on Communication, Information & Computing Technology (ICCICT), 1–4. https://doi.org/10.1109/ICCICT.2012.6398180.
Solutions, S. I. T., Ceos, W., It, T., & Value, B. (2009). Cloud computing—Business models, value creation dynamics and advantages for customers. Computing, 15, 1–8. Retrieved from http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Cloud+Computing+?+Business+Models,+Value+Creation+Dynamics+and+Advantages+for+Customers#0.
Thaduri, A., Galar, D., & Kumar, U. (2015). Railway assets: A potential domain for big data analytics. Procedia Computer Science, 53(1), 457–467. https://doi.org/10.1016/j.procs.2015.07.323.
The, U., Of, V., Teradata, T. H. E., Data, U., & With, A. (n.d.). Unleashing the value of the teradata unified data architecture, 1–7.
Vouk, M. A. (2008). Cloud computing—Issues, research and implementations. Proceedings of the International Conference on Information Technology Interfaces, ITI, 31–40. https://doi.org/10.1109/ITI.2008.4588381.
Wu, L., Kumar Garg, S., & Buyya, R. (2012). SLA-based admission control for a software-as-a-service provider in cloud computing environments. Journal of Computer and System Sciences, 78(5), 1280–1299. https://doi.org/10.1016/j.jcss.2011.12.014.
Zardari, S. (n.d.). Using obstacles for systematically modeling, analysing, and mitigating risks in cloud adoption, 275–296. https://doi.org/10.4018/978-1-4666-2199-2.ch014.
Zardari, S. (2014). Cloud adoption : Prioritizing obstacles and obstacles resolution tactics using AHP.
Zhou, J., Leppanen, T., Harjula, E., Ylianttila, M., Ojala, T., Yu, C., et al. (2013). CloudThings: A common architecture for integrating the Internet of Things with cloud computing. Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2013, 651–657. https://doi.org/10.1109/CSCWD.2013.6581037.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Upadhyay, N. (2018). CABology—What Is In It?. In: CABology: Value of Cloud, Analytics and Big Data Trio Wave. Springer, Singapore. https://doi.org/10.1007/978-981-10-8675-5_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-8675-5_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8674-8
Online ISBN: 978-981-10-8675-5
eBook Packages: Computer ScienceComputer Science (R0)