Inicio > > Ciencias de la computación > Inteligencia artificial > Embedding Artificial Intelligence into ERP Software
Embedding Artificial Intelligence into ERP Software

Embedding Artificial Intelligence into ERP Software

Siar Sarferaz

69,18 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2024
Materia
Inteligencia artificial
ISBN:
9783031542480
69,18 €
IVA incluido
Disponible
Añadir a favoritos

This book explains how to embed artificial intelligence in digitized business processes of ERP software by solving the two related substantial challenges: how can artificial intelligence be systematically integrated into ERP business processes for ease of consumption, and how can artificial intelligence be made enterprise-ready by covering ERP qualities like compliance, lifecycle management, extensibility, or scalability?As a general introduction, the first part of this book takes the reader through a historical journey towards intelligent ERP systems. In addition, reference processes and a reference architecture for ERP systems are proposed which build the foundation for the suggested subsequent solution concept, including a method for operationalizing intelligence for ERP business processes. Subsequently, in the second part detailed concepts of embedding artificial intelligence into ERP software are proposed. In this context the suggested solution architecture is depicted, and specific topics are resolved like data integration, model validation, explainability, data protection and privacy, model degradation and performance. In the last part an implementation framework is suggested which enables the previously introduced concepts and harmonizes the development and operations of artificial intelligent ERP applications. This part concludes with case studies considering artificial intelligence scenarios of SAP S/4HANA in the areas of logistics, finance and sales which apply the defined solution approach and shows its real-world feasibility.This book is written for professionals who want to implement (as developers) or exploit (as business analysts or consultants) or consider/plan the implementation/exploitation (as managers) of artificial intelligence in business information systems.

Artículos relacionados

  • Strategic Data-Based Wisdom in the Big Data Era
    Deanna Klein / John Girard / Kristi Berg
    The ability to uncover, share, and utilize knowledge is one of the most vital components to the success of any organization. While new technologies and techniques of knowledge dissemination are promising, there is still a struggle to derive and circulate meaningful information from large data sets. Strategic Data-Based Wisdom in the Big Data Era combines the latest empirical re...
    Disponible

    268,95 €

  • Enterprise Service Computing
    Robin G. Qiu / Robin GQiu
    ...
    Disponible

    125,53 €

  • Harnessing Knowledge Dynamics
    Mark E. Nissen / Mark ENissen
    ...
    Disponible

    118,53 €

  • Effective Cybersecurity Operations for Enterprise-Wide Systems
    Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on...
    Disponible

    248,86 €

  • IT for Business
    John Young
    IT for Business: A Student’s Guide to the Technology of Business provides readers with a comprehensive understanding of the role and application of information technology in the business world. Each chapter in the book focuses on a different aspect of IT as it relates to business. The opening chapter sets the stage by discussing the importance of developing a keen understanding...
    Disponible

    140,50 €

  • Evolution of Cross-Sector Cyber Intelligent Markets
    Eugene J. Lewis
    In today’s digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of the...
    Disponible

    275,51 €