by
Ishikawa, Akira, 1934-
Call Number
658.4038 22
Publication Date
2007
Summary
"This book deals with knowledge management with an emphasis on knowledge risk, i.e., a general trend of knowledge value getting shorter and becoming temporary. The shortening of knowledge value lifespan will have a profound impact on companies? employment policies, and employees? strategies for gaining knowledge. How to manage knowledge selection, including personnel management, will be the key to survival for companies, when corporate competency shifts from stable business contacts to the quality of their offers, and when the value of knowledge, which is the foundation of products and services"--Publisher description.
Format:
Electronic Resources
Relevance:
57340.3672
by
Lientz, Bennet P.
Call Number
004.1681 LIE
Publication Date
2006
Summary
The authors "show you how to identify and track the recurring issues leading to failure in IT projects, and [they] provide a proven, modern method for addressing them. By following the recommendations in this book, readers will significanctly reduce the risk of IT failures and increase the rate of success." [Back cover].
Format:
Books
Relevance:
43632.2109
View Other Search Results
by
Betz, Charles T.
Call Number
004 22
Publication Date
2007
Summary
How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles? This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," IT Resource Planning, and related terms. This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself. Features The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise. He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences. He is the sole author of the popular www.erp4it.com weblog. Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help? Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management? Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real? Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow? The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. Among the specific topics addressed are: * ITIL recommendations from a practical systems implementation point of view * Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals. * Interrelationships between IT portfolio planning, solutions development, and IT operations * The relationship between application development and hosting (infrastructure) organizations * Business intelligence, performance management, and metrics for the IT capability itself * Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications * IT portfolio degradation through complexity * Detailed models of IT information * The various classes of systems used internally by large scale IT organizations * The concept of "repository" and its relationship to the Configuration Management Database (CMDB) * Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management. * Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.
Format:
Electronic Resources
Relevance:
41501.0977
4.
by
Mendoza, Alfredo.
Call Number
004.068 22
Publication Date
2007
Summary
Utility computing is an increasingly important architectural model that allows IT service oriented organizations and departments to make computing resources available to the end user on an as needed basis. The goal of utility computing is to maximize the efficient use of computing resources and minimize associated costs. Providing professionals with expert guidance on integrating utility computing within their organization, this timely, easy-to-understand resource offers a unified view of this service-provisioning model.
Format:
Electronic Resources
Relevance:
1.3242
by
Calder, Alan, 1957-
Call Number
658.4038 22
Publication Date
2009
Summary
This new book sets out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. It provides practical guidance on how board executives and IT professionals can navigate, integrate and deploy to best corporate and commercial advantage the most widely used frameworks and standards.
Format:
Electronic Resources
Relevance:
1.2872
by
Karten, Naomi.
Call Number
658.406 22
Publication Date
2009
Format:
Electronic Resources
Relevance:
0.8737
by
Lahti, Christian.
Call Number
658.4038 22
Publication Date
2007
Summary
"Regardless of what your IT landscape may comprise, there are many opportunities to make your life easier and even reduce the amount your audit may cost in terms of resources and money by employing Open Source technologies to help in the monitoring, process, and documentation of the various items that come under the SOX microscope. With this book, you can now regain control of your budget and schedule. This fully integrated book and bootable "live" DVD provides all the information and the Open Source tools for you to use to meet the mandatory compliance requirements of the Sarbanes-Oxley Act."--Jacket.
Format:
Electronic Resources
Relevance:
0.5715
Limit Search Results
Narrowed by: