Author: Annelies van der Veen
Publisher: Van Haren
ISBN: 9087535864
Category : Architecture
Languages : en
Pages : 233
Book Description
Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan
Capacity Management - A Practitioner Guide
Author: Annelies van der Veen
Publisher: Van Haren
ISBN: 9087535864
Category : Architecture
Languages : en
Pages : 233
Book Description
Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan
Publisher: Van Haren
ISBN: 9087535864
Category : Architecture
Languages : en
Pages : 233
Book Description
Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan
The Practitioner's Guide to POLCA
Author: Rajan Suri
Publisher: CRC Press
ISBN: 1351170759
Category : Business & Economics
Languages : en
Pages : 436
Book Description
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures that upstream operations use their capacity effectively by working on jobs that are needed downstream, while at the same time preventing excessive work-in-process (WIP) build-ups when bottlenecks appear unexpectedly. POLCA is particularly suited to companies manufacturing high-mix, low-volume and customized products. Such companies struggle with long lead times, late deliveries, and daily expediting to meet delivery dates. ERP systems are not designed to deal with this highly variable environment, and add-on software such as Finite Capacity Scheduling systems can require complex installation. Also, the Kanban system does not work well with low-volume or custom production. POLCA has delivered impressive results in such environments. It does not require any complex software implementation: it can be used without an ERP system or it can seamlessly complement an existing ERP system. This book: Provides a step-by-step roadmap on how to implement POLCA; invaluable for both companies that wish to implement POLCA as well as consultants and academics advising such companies. Explains the concepts in practical and easy-to-understand terms by showing detailed shop-floor examples. Includes more than 100 illustrations for understanding how POLCA works as well as for elaborating on details of the implementation steps. Contains case studies written by company owners and executives documenting their POLCA implementation process and the results achieved in various industries in six countries.
Publisher: CRC Press
ISBN: 1351170759
Category : Business & Economics
Languages : en
Pages : 436
Book Description
POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures that upstream operations use their capacity effectively by working on jobs that are needed downstream, while at the same time preventing excessive work-in-process (WIP) build-ups when bottlenecks appear unexpectedly. POLCA is particularly suited to companies manufacturing high-mix, low-volume and customized products. Such companies struggle with long lead times, late deliveries, and daily expediting to meet delivery dates. ERP systems are not designed to deal with this highly variable environment, and add-on software such as Finite Capacity Scheduling systems can require complex installation. Also, the Kanban system does not work well with low-volume or custom production. POLCA has delivered impressive results in such environments. It does not require any complex software implementation: it can be used without an ERP system or it can seamlessly complement an existing ERP system. This book: Provides a step-by-step roadmap on how to implement POLCA; invaluable for both companies that wish to implement POLCA as well as consultants and academics advising such companies. Explains the concepts in practical and easy-to-understand terms by showing detailed shop-floor examples. Includes more than 100 illustrations for understanding how POLCA works as well as for elaborating on details of the implementation steps. Contains case studies written by company owners and executives documenting their POLCA implementation process and the results achieved in various industries in six countries.
A Practitioner's Guide to Adapting the NIST Cybersecurity Framework
Author: David Moskowitz
Publisher: TSO
ISBN: 0117093963
Category : Business & Economics
Languages : en
Pages : 434
Book Description
The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute’s CPD Model, and existing digital business systems
Publisher: TSO
ISBN: 0117093963
Category : Business & Economics
Languages : en
Pages : 434
Book Description
The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute’s CPD Model, and existing digital business systems
Linking Community Visioning and Highway Capacity Planning
Author: Planning Communities, Inc
Publisher: Transportation Research Board
ISBN: 0309129095
Category : Business & Economics
Languages : en
Pages : 90
Book Description
TRB’s second Strategic Highway Research Program (SHRP 2) Report S2-C08-RR-1: Linking Community Visioning and Highway Capacity Planning explores community visioning efforts, identifies steps and activities that might be considered when engaging in visioning, and highlights the links between vision outcomes and transportation planning and project development processes.
Publisher: Transportation Research Board
ISBN: 0309129095
Category : Business & Economics
Languages : en
Pages : 90
Book Description
TRB’s second Strategic Highway Research Program (SHRP 2) Report S2-C08-RR-1: Linking Community Visioning and Highway Capacity Planning explores community visioning efforts, identifies steps and activities that might be considered when engaging in visioning, and highlights the links between vision outcomes and transportation planning and project development processes.
Model-Driven Online Capacity Management for Component-Based Software Systems
Author: André van Hoorn
Publisher: BoD – Books on Demand
ISBN: 3735751180
Category : Computers
Languages : en
Pages : 362
Book Description
Capacity management is a core activity when designing and operating distributed software systems. Particularly, enterprise application systems are exposed to highly varying workloads. Employing static capacity management, this leads to unnecessarily high total cost of ownership due to poor resource usage efficiency. This thesis introduces a model-driven online capacity management approach for distributed component-based software systems, called SLAstic. The core contributions of this approach are a) modeling languages to capture relevant architectural information about a controlled software system, b) an architecture-based online capacity management framework based on the common MAPE-K control loop architecture, c) model-driven techniques supporting the automation of the approach, d) architectural runtime reconfiguration operations for controlling a system’s capacity, as well as e) an integration of the Palladio Component Model. A qualitative and quantitative evaluation of the approach is performed by case studies, lab experiments, and simulation.
Publisher: BoD – Books on Demand
ISBN: 3735751180
Category : Computers
Languages : en
Pages : 362
Book Description
Capacity management is a core activity when designing and operating distributed software systems. Particularly, enterprise application systems are exposed to highly varying workloads. Employing static capacity management, this leads to unnecessarily high total cost of ownership due to poor resource usage efficiency. This thesis introduces a model-driven online capacity management approach for distributed component-based software systems, called SLAstic. The core contributions of this approach are a) modeling languages to capture relevant architectural information about a controlled software system, b) an architecture-based online capacity management framework based on the common MAPE-K control loop architecture, c) model-driven techniques supporting the automation of the approach, d) architectural runtime reconfiguration operations for controlling a system’s capacity, as well as e) an integration of the Palladio Component Model. A qualitative and quantitative evaluation of the approach is performed by case studies, lab experiments, and simulation.
A Practitioner's Guide to Data Governance
Author: Uma Gupta
Publisher: Emerald Group Publishing
ISBN: 1789735696
Category : Business & Economics
Languages : en
Pages : 112
Book Description
Data governance looks simple on paper, but in reality it is a complex issue facing organizations. In this practical guide, data experts Uma Gupta and San Cannon look to demystify data governance through pragmatic advice based on real-world experience and cutting-edge academic research.
Publisher: Emerald Group Publishing
ISBN: 1789735696
Category : Business & Economics
Languages : en
Pages : 112
Book Description
Data governance looks simple on paper, but in reality it is a complex issue facing organizations. In this practical guide, data experts Uma Gupta and San Cannon look to demystify data governance through pragmatic advice based on real-world experience and cutting-edge academic research.
Practitioner's Guide to Operationalizing Data Governance
Author: Mary Anne Hopper
Publisher: John Wiley & Sons
ISBN: 1119851432
Category : Computers
Languages : en
Pages : 246
Book Description
Discover what does—and doesn’t—work when designing and building a data governance program In A Practitioner’s Guide to Operationalizing Data Governance, veteran SAS and data management expert Mary Anne Hopper walks readers through the planning, design, operationalization, and maintenance of an effective data governance program. She explores the most common challenges organizations face during and after program development and offers sound, hands-on advice to meet tackle those problems head-on. Ideal for companies trying to resolve a wide variety of issues around data governance, this book: Offers a straightforward starting point for companies just beginning to think about data governance Provides solutions when company employees and leaders don’t—for whatever reason—trust the data the company has Suggests proven strategies for getting a data governance program that’s gone off the rails back on track Complete with visual examples based in real-world case studies, A Practitioner’s Guide to Operationalizing Data Governance will earn a place in the libraries of information technology executives and managers, data professionals, and project managers seeking a one-stop resource to help them deliver practical data governance solutions.
Publisher: John Wiley & Sons
ISBN: 1119851432
Category : Computers
Languages : en
Pages : 246
Book Description
Discover what does—and doesn’t—work when designing and building a data governance program In A Practitioner’s Guide to Operationalizing Data Governance, veteran SAS and data management expert Mary Anne Hopper walks readers through the planning, design, operationalization, and maintenance of an effective data governance program. She explores the most common challenges organizations face during and after program development and offers sound, hands-on advice to meet tackle those problems head-on. Ideal for companies trying to resolve a wide variety of issues around data governance, this book: Offers a straightforward starting point for companies just beginning to think about data governance Provides solutions when company employees and leaders don’t—for whatever reason—trust the data the company has Suggests proven strategies for getting a data governance program that’s gone off the rails back on track Complete with visual examples based in real-world case studies, A Practitioner’s Guide to Operationalizing Data Governance will earn a place in the libraries of information technology executives and managers, data professionals, and project managers seeking a one-stop resource to help them deliver practical data governance solutions.
Practitioner's Guide to Business Impact Analysis
Author: Priti Sikdar
Publisher: CRC Press
ISBN: 1351741438
Category : Business & Economics
Languages : en
Pages : 388
Book Description
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements
Publisher: CRC Press
ISBN: 1351741438
Category : Business & Economics
Languages : en
Pages : 388
Book Description
This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements
Greening Development Enhancing Capacity for Environmental Management and Governance
Author: OECD
Publisher: OECD Publishing
ISBN: 9264167897
Category :
Languages : en
Pages : 103
Book Description
This policy guidance outlines a number of steps to be considered when building capacity for greening national development planning, national budgetary processes and key economic sector strategies.
Publisher: OECD Publishing
ISBN: 9264167897
Category :
Languages : en
Pages : 103
Book Description
This policy guidance outlines a number of steps to be considered when building capacity for greening national development planning, national budgetary processes and key economic sector strategies.
Principles of Secure Processor Architecture Design
Author: Jakub Szefer
Publisher: Springer Nature
ISBN: 3031017609
Category : Technology & Engineering
Languages : en
Pages : 154
Book Description
With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered). This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.
Publisher: Springer Nature
ISBN: 3031017609
Category : Technology & Engineering
Languages : en
Pages : 154
Book Description
With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered). This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.