Capacity Management - A Practitioner Guide


Book Description

Capacity Management is described in most key ITSM frameworks: ITIL, ISO 20000 Microsoft Operations Framework (MOF) and the Application Service Library (ASL) all note the importance of Capacity Management. This major title meets the need for an in-depth practical guide to this critical process. Written and reviewed by some of the world s most respected experts in this field it shows how Capacity Management best practice can support provision of a consistent, acceptable service level at a known and controlled cost. Practical advice covers the essential control of two balances: Supply versus demand and resources versus cost. In times of mean, frugal economic measures, it is essential to focus on those practices that are effective and yield practical results. In enlightened times of sustainability, it is also a requirement to find solutions that satisfy the criteria for 'greenness'. This excellent title shows how Capacity Management works not only within an IT environment but also why it is pivotal in meeting high profile business demands. Aligns with ISO/IEC 20000 and ITIL® ISO/IEC lists a set of required capacity management deliverables ITIL outlines what should be done in capacity management this book starts to describe how to do it Covers details of what capacity management is all about: what is capacity management why do it benefits and cost-benefit analysis how to do it data-flows and activities who does it roles and perspectives implementation, maintenance, improvement, tools Provides comprehensive templates and checklists: objectives, interfaces and data-flows, sub-practices and activities metrics, application sizing parameters, data for modelling deliverables, reports, CMMI levels, KPIs, risk matrix sample capacity plan




The Practitioner's Guide to POLCA


Book Description

POLCA (Paired-cell Overlapping Loops of Cards with Authorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures that upstream operations use their capacity effectively by working on jobs that are needed downstream, while at the same time preventing excessive work-in-process (WIP) build-ups when bottlenecks appear unexpectedly. POLCA is particularly suited to companies manufacturing high-mix, low-volume and customized products. Such companies struggle with long lead times, late deliveries, and daily expediting to meet delivery dates. ERP systems are not designed to deal with this highly variable environment, and add-on software such as Finite Capacity Scheduling systems can require complex installation. Also, the Kanban system does not work well with low-volume or custom production. POLCA has delivered impressive results in such environments. It does not require any complex software implementation: it can be used without an ERP system or it can seamlessly complement an existing ERP system. This book: Provides a step-by-step roadmap on how to implement POLCA; invaluable for both companies that wish to implement POLCA as well as consultants and academics advising such companies. Explains the concepts in practical and easy-to-understand terms by showing detailed shop-floor examples. Includes more than 100 illustrations for understanding how POLCA works as well as for elaborating on details of the implementation steps. Contains case studies written by company owners and executives documenting their POLCA implementation process and the results achieved in various industries in six countries.




A Practitioner's Guide to Adapting the NIST Cybersecurity Framework


Book Description

The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute’s CPD Model, and existing digital business systems




Linking Community Visioning and Highway Capacity Planning


Book Description

TRB’s second Strategic Highway Research Program (SHRP 2) Report S2-C08-RR-1: Linking Community Visioning and Highway Capacity Planning explores community visioning efforts, identifies steps and activities that might be considered when engaging in visioning, and highlights the links between vision outcomes and transportation planning and project development processes.




Model-Driven Online Capacity Management for Component-Based Software Systems


Book Description

Capacity management is a core activity when designing and operating distributed software systems. Particularly, enterprise application systems are exposed to highly varying workloads. Employing static capacity management, this leads to unnecessarily high total cost of ownership due to poor resource usage efficiency. This thesis introduces a model-driven online capacity management approach for distributed component-based software systems, called SLAstic. The core contributions of this approach are a) modeling languages to capture relevant architectural information about a controlled software system, b) an architecture-based online capacity management framework based on the common MAPE-K control loop architecture, c) model-driven techniques supporting the automation of the approach, d) architectural runtime reconfiguration operations for controlling a system’s capacity, as well as e) an integration of the Palladio Component Model. A qualitative and quantitative evaluation of the approach is performed by case studies, lab experiments, and simulation.




A Practitioner's Guide to Data Governance


Book Description

Data governance looks simple on paper, but in reality it is a complex issue facing organizations. In this practical guide, data experts Uma Gupta and San Cannon look to demystify data governance through pragmatic advice based on real-world experience and cutting-edge academic research.




Practitioner's Guide to Operationalizing Data Governance


Book Description

Discover what does—and doesn’t—work when designing and building a data governance program In A Practitioner’s Guide to Operationalizing Data Governance, veteran SAS and data management expert Mary Anne Hopper walks readers through the planning, design, operationalization, and maintenance of an effective data governance program. She explores the most common challenges organizations face during and after program development and offers sound, hands-on advice to meet tackle those problems head-on. Ideal for companies trying to resolve a wide variety of issues around data governance, this book: Offers a straightforward starting point for companies just beginning to think about data governance Provides solutions when company employees and leaders don’t—for whatever reason—trust the data the company has Suggests proven strategies for getting a data governance program that’s gone off the rails back on track Complete with visual examples based in real-world case studies, A Practitioner’s Guide to Operationalizing Data Governance will earn a place in the libraries of information technology executives and managers, data professionals, and project managers seeking a one-stop resource to help them deliver practical data governance solutions.




Practitioner's Guide to Business Impact Analysis


Book Description

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements







Principles of Secure Processor Architecture Design


Book Description

With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book aims to give readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered). This book aims to present the different challenges of secure processor architecture design to graduate students interested in research on architecture and hardware security and computer architects working in industry interested in adding security features to their designs. It aims to educate readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, this book presents numerous design suggestions, as well as discusses pitfalls and fallacies that designers should avoid.