Angebote zu "Optimization" (12 Treffer)

Kategorien

Shops

Microsoft Dynamics 365 for Field Service, Enter...
35,35 € *
ggf. zzgl. Versand

Kurzinfo: Microsoft Dynamics 365 for Field Service, Enterprise Edition - Resource Schedule Optimization - Abonnement-Lizenz - gehostet - Reg. - CSP Gruppe Anwendungen Hersteller Microsoft Hersteller Art. Nr. 39804b12-6330-4b66-a8cd-455955a357c9 EAN/UPC Produktbeschreibung: Microsoft Dynamics 365 for Field Service, Enterprise Edition - Resource Schedule Optimization - Abonnement-Lizenz - 1 Lizenz Produkttyp Abonnement-Lizenz Kategorie Online- & Appliance-basierte Services - Cloud-basierte Verwaltung Installationstyp Gehostet - SaaS Anzahl Lizenzen 1 Lizenz Lizenzpreise Regierung Lizenzprogramm Microsoft Cloud Solution Provider (CSP) Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - Cloud-basierte Verwaltung Produkttyp Abonnement-Lizenz Installationstyp Gehostet - SaaS Lizenzierung Lizenztyp 1 Lizenz Lizenzpreise Regierung Lizenzprogramm Microsoft Cloud Solution Provider (CSP)

Anbieter: JACOB Computer
Stand: 25.10.2020
Zum Angebot
Packt Microsoft Dynamics Sure Step 2010 Softwar...
90,38 € *
ggf. zzgl. Versand

- Learn how to effectively use Microsoft Dynamics Sure Step to implement the right Dynamics business solution with quality, on-time and on-budget results. - Leverage the Decision Accelerator offerings in Microsoft Dynamics Sure Step to create consistent selling motions while helping your customer ascertain the best solution to fit their requirements. - Understand the review and optimization offerings available from Microsoft Dynamics Sure Step to further enhance your business solution delivery during and after go-live. - Gain knowledge of the project and change management content provided in Microsoft Dynamics Sure Step. - Familiarize yourself with the approach to adopting the Microsoft Dynamics Sure Step methodology as your own. - Includes a Foreword by Microsoft Dynamics Sure Step Practitioners. Delivering business solutions is more than just product play. Software is often viewed as the enabler, however, the key to success is how the solution is implemented and how the implementations are managed. With this as the background, Microsoft has developed Microsoft Dynamics Sure Step as the full lifecycle methodology for the Dynamics business solutions portfolio. Microsoft Dynamics Sure Step enables you to maximize your Dynamics investments and increase your efficiency to select, sell, deliver, operate and support your business solution. This book details the use of the Microsoft Dynamics Sure Step methodology to enable the full lifecycle of Microsoft Dynamics Sure Step business solutions engagements. Guidance is provided on the due diligence process for the customer that overlaps the solution selling cycle for the service provider, through to the solution implementation phases, encompassing on-going maintenance and upgrades. This book provides detailed coverage of how to use Microsoft Dynamics Sure Step to successfully deliver Dynamics solutions for your business. The book begins by focusing on the aspects of due diligence and solution selling– whether you are the customer or the service provider, you can learn how you work together to select the right solution to meet the organization’s needs.In the ensuing chapters, you will learn how Microsoft Dynamics Sure Step can help improve the overall quality of your Dynamics business solution, including coverage of proactive and post go-live optimization offerings and a thorough explanation of how to upgrade your Dynamics solutions to the latest release of the products. Finally, the book discusses the essence of Microsoft Dynamics Sure Step projects and how to successfully deliver these business solutions, including project and change management disciplines and processes. Additional key topics such as a guide to adopting Microsoft Dynamics Sure Step are also provided if you are looking to develop a consistent process in your organization. Maximize your Microsoft Dynamics Sure Step investments, from solution selection or solution selling, to solution delivery and support What you will learn from this book : - Understand how to effectively use Microsoft Dynamics Sure Step to implement the right Microsoft Dynamics business solution with quality, on-time and on-budget results. - Learn business solution selling techniques and guidance to accelerate and close a sale, as well as related guidance on specific industries - Discover how Microsoft Dynamics Sure Step support’s your buy cycle, as you progress through your needs assessment, alternatives assessment and risk assessment stages - Examine the different options to choose from for your business solution delivery, including waterfall and agile approaches - Acquire insights into how you can proactively optimize the business solution during implementation, as well as continue to maintain the health of your solution in production - Determine the approach and tools available to upgrade your business solutions to the current product releases - Gain knowledge in key areas such as the project and change management disciplines provided in Microsoft Dynamics Sure Step - Familiarize yourself with the approach to adopting the Microsoft Dynamics Sure Step methodology as your own Who this book is written for If you are a Dynamics consultant, developer, or in a customer resources or sales role that requires guidance and knowledge of the ERP/CRM business solutions space or to deliver business solutions that meet or exceed the expectations of your organization, then this book is ideal for you.

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
Price Analysis of Value Networks in a Cloud ena...
55,90 € *
ggf. zzgl. Versand

4CaaSt is an advanced everything as a service (XaaS) cloud platform. A complex service in its value network can be composed of several products. There a service provider generates revenue from delivering a service to customers but also has to pay for third party cloud products that its service uses. Several price models can be applied to the 4CaaSt products that can take into consideration the actual usage of its customers. The contribution of this Thesis is as follows: identification of appropriate price models for 4CaaSt products, formalization of revenue, costs and profit in a complex service and support for the price discovery and analysis problem of products in the 4CaaSt cloud marketplace. The solution addresses to support deciders to achieve certain business model goals based on the optimization of the prices in the price model of their products. In addition the solution supports to analyze and visualize revenue and cost flow in the product constellation of a service that result at different pricings. The Business Model Simulator (BMS) Web application has been built therefore. The solution of the BMS to address the optimization task is through a meta-heuristic approach. Hence the BMS simulates optimal pricings according to objective functions through a genetic algorithm.

Anbieter: Dodax
Stand: 25.10.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
127,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 25.10.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
100,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 25.10.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
100,00 CHF *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Orell Fuessli CH
Stand: 25.10.2020
Zum Angebot
Deploying Cisco Wide Area Application Services
43,90 CHF *
ggf. zzgl. Versand

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets with far more robust security. And they must do it all while gaining far greater control over cost. Distributing IT resources increases management, hardware, and software overhead, but centralizing IT can worsen application performance. There is a solution to this quandary: Cisco application acceleration and WAN optimization technologies that permit IT to safely centralize distributed IT resources, meeting user performance expectations without replacing existing network infrastructure. Deploying Cisco Wide Area Application Services is the first comprehensive guide to designing and deploying solutions with these Cisco technologies. Zach Seils and Joel Christner show how to deploy Cisco WAAS in a scalable, transparent, and seamless fashion that responds to both your business and technical challenges. Writing for network design and implementation engineers and other networking professionals, they cover the entire planning and configuration process. Drawing on their extensive experience implementing WAAS in the enterprise, they also offer real-world implementation examples and case studies-including full chapters on network, branch office, and data center integration. Zach Seils, CCIE No. 7861, is a technical leader in the Cisco Advanced Services Data Center Networking Practice, where he specializes in designing, deploying, and troubleshooting application acceleration solutions for the largest Cisco enterprise and service provider customers. Joel Christner, CCIE No. 15311, is director of product management for Reconnex Corporation, the industry leader in data loss prevention (DLP) solutions. Prior to Reconnex, Joel was senior manager of technical marketing for the Application Delivery Business Unit (ADBU) at Cisco, where he helped drive the product and technical strategy for Cisco Wide Area Application Services. Christner is coauthor of Application Acceleration and WAN Optimization Fundamentals. Centrally provision applications to employees in any location without compromising performance Reduce costs by centralizing servers, storage, and applications by leveraging optimization capabilities that integrate cleanly with your existing infrastructure Thoroughly understand Cisco Wide Area Application Services (WAAS) and Wide Area Application Engine (WAE) and the business benefits provided by them - - Perform effective WAAS planning, discovery, and analysis - - Use WAAS and interception mechanisms such as WCCP or inline to transparently optimize flows traversing your network for end users accessing centrally deployed and centrally managed applications, files, and other information - - Integrate application acceleration and optimization into data centers, branch offices, and other environments - - Learn how to use the Cisco WAAS Central Manager, WAE device GUI, and command-line interface to configure, manage, and troubleshoot This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Anbieter: Orell Fuessli CH
Stand: 25.10.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
135,99 € *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Thalia AT
Stand: 25.10.2020
Zum Angebot
Resource Optimization and Security for Cloud Se...
92,99 € *
ggf. zzgl. Versand

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Anbieter: Thalia AT
Stand: 25.10.2020
Zum Angebot