Active Execution Management captures radio frequency identification (RFID) and electronic product code (EPC) data and integrates it into the supply chain business process. AXM associates individual EPC events (the observation of an EPC tag at an RFID reader) with the supply chain transaction
that is currently being executed and then determines if that supply chain transaction
is executing as planned. AXM is able to make this determination by comparing key performance indicators of the supply chain transaction
with the characteristics of the EPC event. The paper describes multiple business cases, such as promotions management, deductions management, complex international shipments, and spoilage management, and shows how RFID data can be leveraged to improve supply chain performance. PubDate: 9/18/2005 10:25:00 PM
Abstract: We got many letters for more ideas and details, so we are doing a more in-depth series for supply chain software leaders. In this article we will discuss the issue of completing the whole transaction—the complete solution—which is key to continued revenue growth.
Abstract: Many large organizations are struggling to manage all their software systems—let alone the different software versions across departments. In his article, TEC principal analyst P.J. Jakovljevic discusses how SAP Solution Manager, a unique offering for centralized support and system management, covers all aspects of system deployment, operations, and continuous improvement, to ease customer pain with their complex IT environment.
Abstract: To retain the integrity and availability of your key operational data, your server infrastructure must provide effective data backup and recovery. When used with a storage area network (SAN), a data protection manager (DPM) can help increase your storage space, reduce time needed to create backup, and allow for quick recovery of data when disaster strikes. Learn more about this scalable and cost-effective solution.
Abstract: Virtual data centers must enable increased physical server use and central management of virtual machine infrastructure. A clustered file system, with a virtual machine manager (VMM), can add critical new management and migration capability to current virtual servers. Before installing and configuring VMM, find out the hardware and software required for migration and integration, and helpful “how-to” pointers.
Abstract: Network-level behaviors can impact the determinism of call admission control decisions for a particular bandwidth management deployment. However, different network routing and forwarding models can have different impacts when used in conjunction with the bandwidth manager. We examine these models, considering their ability to provide the deterministic admission control capabilities available within the public switched telephone network (PSTN).
Abstract: In order for employee self-service (ESS) and manager self-service (MSS) technology to be effective, it must serve multiple purposes for multiple business units while blending seamlessly with existing systems. This white paper provides insight into how ESS
Abstract: In September 2009, IBM Tivoli commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) of deploying monitoring solutions from IBM Tivoli—the IBM Tivoli Monitoring (ITM) and IBM Tivoli Composite Application Manager (ITCAM) family of products. This paper provides a framework to evaluate the potential financial impact of those products on your organization.
Abstract: With an increasing number of enterprise applications and access points, organizations face the challenge of providing convenient access while ensuring strong security. Enterprises need software solutions to help ensure that the right users have access to the right information in a timely manner. This white paper describes Tivoli Access Manager for Enterprise Single Sign-On, including its key features and benefits.
Abstract: Leapfrogging the rest of the transaction-processing world, IBM has posted TPC-C results more than tripling the highest current transaction-per-minute figure.
Abstract: Getting ERP transaction data into a summarized form that is useful to knowledge workers is one way to extend the value of your ERP system. This article discusses the advantages that can be gained by moving ERP and other transaction data to a data warehouse.
Abstract: No doubt about it: the project manager is essential for the successful completion of any project. But supporting the project manager—and the goal of reaching the target within the defined time and budget frame—is a solid project management system. Discover the vital elements of project planning and management, and how you can optimize communication by standardizing information formats in a project management system.
Abstract: Senior finance executives in all industries recognize the long-term benefits of transaction-processing automation on resource allocation. Transaction automation frees time and resources that can be allocated for decision support and financial planning and analysis. The result: sustained, profitable top-line growth and risk reduction. Find out other benefits of improving your back-office processes through automation.
Abstract: Microsoft System Management Server 2003 and Operations Manager 2005 storage monitoring solutions provide the necessary tools to centrally manage and monitor Windows client and server infrastructure. Now, Sanbolic’s LaScala clustered volume manager and related products offer a complementary toolkit which enables administrators to centrally configure and assign storage assets in a storage area network (SAN) environment.
Abstract: SQL Server deployments can be large and complex. However, Auto-Snapshot Manager simplifies data management tasks and offers a comprehensive approach to SQL Server protection by providing both local and remote database protection, allowing for quick data recovery in case of data loss or site failure. Find out more about how Auto-Snapshot Manager can provide you with the safety net you need for effective disaster recovery.
Abstract: The FDIC imposes IT integrity ratings on financial institutions. These ratings are known as URSIT ratings and are not disclosed to the public. There is no easy discernable way to know how safe your on-line transactions are.
Abstract: There is a common perception that supply chain automation has created an environment in which transactions move quickly and efficiently in industries such as the retail supply chain and high-tech manufacturing. However, this perception is challenged by a recent research study, based on interviews with 400 management representatives of medium to large organizations in the USA, UK, Germany, and France.
Abstract: Even in the best economic times, businesses must be vigilant against unnecessary costs and risks. But not just businesses need to be vigilant—states and other tax authorities are feeling the same economic pinch, and are ready to seek out non-compliers with tax reporting. Get tips on how to survive sales and use tax audits, starting with understanding your exposure to audits and how to avoid them right from the start.
Abstract: As business performance management (BPM) has expanded into virtually all areas of business, project managers have been broadening their soft management skills. Learn what project managers can borrow from BPM to streamline service delivery, optimize operations, and improve customer satisfaction.