نتایج جستجو برای: it

تعداد نتایج: 2839407  

2008
Gordon Simons

ERRATA delete optimal Section accommodate R(t,k) vi ci nity change b-a to a-b Bayes risk It easily follows (by induction) from (9) and (21) ...

2001
David Abramson

Spreadsheets are important business tools. Increasingly they are being used for simulation e.g. to perform risk analysis. Such tasks have far greater computational demands than traditional spreadsheet bookkeeping applications. In this paper we show how spreadsheets can support supercomputing. This is achieved without requiring the spreadsheet user to have specialist tools or knowledge. The key ...

Journal: :Business & Information Systems Engineering 2014
Daniel Beverungen

Business process management is often considered as a top-downmanagement activity. This view is inconsistent with the observation that information infrastructures are at drift, outside top-downmanagement control. To reconcile both views, a meta-framework is presented that frames the interplay of the design and emergence of business processes. Business processes are identified as a particular for...

The increasing dependency of many businesses with information technology (IT)and the high percentage of the IT investment in all invested capital in businessenvironment ask for more attention to this important driver of business. Thelimitation of capital budget forces the managers to look for more wise investment inIT. There are many cost-cutting techniques in the literature and each of them ha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

سازمان ها با نیاز رو به افزایش برای انطباق و انعطاف پذیری، همچنین برای کارایی و مقرون بصرفه بودن روبرو هستند. فناوری اطلاعات پیچیده تر و اغلب محدود به توانایی یک سازمان برای تغییر شده است. حاکمیت فناوری اطلاعات روشی است که برای کمک به سازمان ها در تضمین ارزش از فناوری اطلاعات و مدیریت تغییرات در نظر گرفته شده است. از میان چارچوب های موجود val it چارچوبی حاکمیتی برای کمک به سازمان ها جهت بهینه...

2015
Hromada Martin

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and with...

1995
Simon R. Monk Ian Sommerville Jean Michel Pendaries Bernard Durin

In this paper, a system for capturing and maintaining design rationale is described. The significant contribution of this work is to address the problem of ensuring that the model is followed by the user and to extend the model to include risk analysis. This is accomplished using a software tool (PPIS) that allows the structure of the argumentation process to be made explicit and visible in the...

2014
Cecil Eng Huang Chua Veda C. Storey Langtao Chen

Shadow Information Technology (IT) occurs when users develop systems outside of the central information technology department. It provides both benefits and risks. Users procuring shadow IT often do not consider integration with existing enterprise architecture, privacy and security protection, maintenance cost, and legal ramifications. Problems with shadow IT must often be resolved by central ...

2007
HENRY H. WILLIS

The study and application of risk analysis provides a set of tools with a strong methodological foundation. This chapter describes how risk analysis can be integrated into the intelligence cycle for producing terrorism threat assessments and warnings. Intelligence professionals can use the risk analyst’s toolbox to sharpen conclusions that are made in intelligence products by providing support ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید