SlideShare a Scribd company logo
IS Agility Building Activity Environmental Change Factors Internal Change Factors Rate of Changes in Business Requirements Business Requirements Process Discrepancy Rate of changes in IS IS Inertia IS  Appropriateness Pressure to Change IS Business Performance Business Agility Rate of changes in Core Business Process Business Appropriateness Organizational Inertia Migration Cost projection Requirement of Business Process Transparency Standardization Technology Technology Appropriateness Pressure to Change Business Competence Diffusion of Emerging Technology Pressure to adopt Emerging Technology Process and Service Complexity Security Requirements Systems performance Requirements Skill Gaps Need to expand Skill sets Training Turnover Recruit Contract Business Agility Building Activity Skills Set - - Value = Agility Skill Management Skill obsolesce + - + + - + - + - + + + + + + - - - + - - + + - + - - - - IT-Business Discrepancy + + - Adaptation + - - - + + ,[object Object],Business Driven Strategy for Service-Oriented Architecture: A Systems Dynamics Approach, Jae Choi,  Proceedings of IBM PhD Student Symposium at ICSOC 200 7, September 2007, pp. 19-24  IS Agility ,[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Every Click Can Be A Customer - Online Advertising Made Simple
Every Click Can Be A Customer - Online Advertising Made SimpleEvery Click Can Be A Customer - Online Advertising Made Simple
Every Click Can Be A Customer - Online Advertising Made Simple
Internet Marketing Software - WordStream
 
The 20 Minute PPC Work Week
The 20 Minute PPC Work WeekThe 20 Minute PPC Work Week
The 20 Minute PPC Work Week
Internet Marketing Software - WordStream
 
Nutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
Nutrition for Healthy Growth in Children By Dr. Zubeda TumbiNutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
Nutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
Health Education Library for People
 
Validación de métodos analíticos fisicoquímicos
Validación de métodos analíticos fisicoquímicosValidación de métodos analíticos fisicoquímicos
Validación de métodos analíticos fisicoquímicos
Nombre Apellidos
 
Big Data Usecases
Big Data UsecasesBig Data Usecases
Big Data Usecases
Vishal Shukla
 
Message Match: Make Money from PPC with Copy Continuity
Message Match: Make Money from PPC with Copy ContinuityMessage Match: Make Money from PPC with Copy Continuity
Message Match: Make Money from PPC with Copy Continuity
Internet Marketing Software - WordStream
 
Integrated utilization of high-throughput bioreactors & high-throughput analy...
Integrated utilization of high-throughput bioreactors & high-throughput analy...Integrated utilization of high-throughput bioreactors & high-throughput analy...
Integrated utilization of high-throughput bioreactors & high-throughput analy...
KBI Biopharma
 
Manejo de resultados fuera de especificaciones y tendencia
Manejo de resultados fuera de especificaciones y tendenciaManejo de resultados fuera de especificaciones y tendencia
Manejo de resultados fuera de especificaciones y tendencia
Nombre Apellidos
 
The Countdown to ETAs
The Countdown to ETAsThe Countdown to ETAs
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
SoftServe
 
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop
p6academy
 
Oracle Primavera P6 16.1 Released - Everything You Need To Know
Oracle Primavera P6 16.1 Released - Everything You Need To KnowOracle Primavera P6 16.1 Released - Everything You Need To Know
Oracle Primavera P6 16.1 Released - Everything You Need To Know
Plan Academy - Online Primavera P6 Training
 
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
Global Risk Forum GRFDavos
 
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINS
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINSPublic Cyclone Shelters in Queensland, Australia, Peter James MULLINS
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINS
Global Risk Forum GRFDavos
 
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
Global Risk Forum GRFDavos
 
National Peer Review Process from the HFA to post-2015, Marc GORDON
National Peer Review Processfrom the HFA to post-2015, Marc GORDONNational Peer Review Processfrom the HFA to post-2015, Marc GORDON
National Peer Review Process from the HFA to post-2015, Marc GORDON
Global Risk Forum GRFDavos
 
Japan Building Vulnerability Characteristics, Nozar KISHI
Japan Building Vulnerability Characteristics, Nozar KISHIJapan Building Vulnerability Characteristics, Nozar KISHI
Japan Building Vulnerability Characteristics, Nozar KISHI
Global Risk Forum GRFDavos
 
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Global Risk Forum GRFDavos
 
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
Global Risk Forum GRFDavos
 

Viewers also liked (20)

Understandchild
UnderstandchildUnderstandchild
Understandchild
 
Every Click Can Be A Customer - Online Advertising Made Simple
Every Click Can Be A Customer - Online Advertising Made SimpleEvery Click Can Be A Customer - Online Advertising Made Simple
Every Click Can Be A Customer - Online Advertising Made Simple
 
The 20 Minute PPC Work Week
The 20 Minute PPC Work WeekThe 20 Minute PPC Work Week
The 20 Minute PPC Work Week
 
Nutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
Nutrition for Healthy Growth in Children By Dr. Zubeda TumbiNutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
Nutrition for Healthy Growth in Children By Dr. Zubeda Tumbi
 
Validación de métodos analíticos fisicoquímicos
Validación de métodos analíticos fisicoquímicosValidación de métodos analíticos fisicoquímicos
Validación de métodos analíticos fisicoquímicos
 
Big Data Usecases
Big Data UsecasesBig Data Usecases
Big Data Usecases
 
Message Match: Make Money from PPC with Copy Continuity
Message Match: Make Money from PPC with Copy ContinuityMessage Match: Make Money from PPC with Copy Continuity
Message Match: Make Money from PPC with Copy Continuity
 
Integrated utilization of high-throughput bioreactors & high-throughput analy...
Integrated utilization of high-throughput bioreactors & high-throughput analy...Integrated utilization of high-throughput bioreactors & high-throughput analy...
Integrated utilization of high-throughput bioreactors & high-throughput analy...
 
Manejo de resultados fuera de especificaciones y tendencia
Manejo de resultados fuera de especificaciones y tendenciaManejo de resultados fuera de especificaciones y tendencia
Manejo de resultados fuera de especificaciones y tendencia
 
The Countdown to ETAs
The Countdown to ETAsThe Countdown to ETAs
The Countdown to ETAs
 
Advanced Analytics and Data Science Expertise
Advanced Analytics and Data Science ExpertiseAdvanced Analytics and Data Science Expertise
Advanced Analytics and Data Science Expertise
 
20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop20160405 How to Install Primavera P6 16.1 Professional desktop
20160405 How to Install Primavera P6 16.1 Professional desktop
 
Oracle Primavera P6 16.1 Released - Everything You Need To Know
Oracle Primavera P6 16.1 Released - Everything You Need To KnowOracle Primavera P6 16.1 Released - Everything You Need To Know
Oracle Primavera P6 16.1 Released - Everything You Need To Know
 
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
Integrating Partners and Resources to Enhance Community Preparedness, Amanda ...
 
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINS
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINSPublic Cyclone Shelters in Queensland, Australia, Peter James MULLINS
Public Cyclone Shelters in Queensland, Australia, Peter James MULLINS
 
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
Making DiDRR a Reality A Three Step Approach to Empowering People with Disabi...
 
National Peer Review Process from the HFA to post-2015, Marc GORDON
National Peer Review Processfrom the HFA to post-2015, Marc GORDONNational Peer Review Processfrom the HFA to post-2015, Marc GORDON
National Peer Review Process from the HFA to post-2015, Marc GORDON
 
Japan Building Vulnerability Characteristics, Nozar KISHI
Japan Building Vulnerability Characteristics, Nozar KISHIJapan Building Vulnerability Characteristics, Nozar KISHI
Japan Building Vulnerability Characteristics, Nozar KISHI
 
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
Adapting Mass Casualty Response In An Era Of Increased Active Shooter Inciden...
 
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
Terrorism and the Challenges of Conflict-induced Disasters in Nigeria, Asimiy...
 

Similar to Business Technology Value Model

Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
Henry Chandra
 
Tss Reference Architecture Reduced
Tss Reference Architecture   ReducedTss Reference Architecture   Reduced
Tss Reference Architecture Reducedaadly
 
Ngceap
NgceapNgceap
Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009hanshantson
 
Itil service desk business case
Itil service desk business caseItil service desk business case
Itil service desk business case
David Lutes
 
Evolution of it management
Evolution of it managementEvolution of it management
Evolution of it management
Samah SAFI, MBA
 
SAP Enterprise Modeling Applications (ARIS)
SAP Enterprise Modeling Applications (ARIS)SAP Enterprise Modeling Applications (ARIS)
SAP Enterprise Modeling Applications (ARIS)Palisade Corporation
 
Soa maturity business model
Soa maturity business modelSoa maturity business model
Soa maturity business modelYuval Birenboum
 
Business process-reengineering
Business process-reengineeringBusiness process-reengineering
Business process-reengineering
sagvid
 
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0Dr. Mohan K. Bavirisetty
 
Developing an SOA Strategy
Developing an SOA StrategyDeveloping an SOA Strategy
Developing an SOA Strategydreamforce2006
 
Spca2014 holme end to end share point service delivery
Spca2014 holme   end to end share point service deliverySpca2014 holme   end to end share point service delivery
Spca2014 holme end to end share point service deliveryNCCOMMS
 
Helping Business Leaders Get Over Their Learning Curve in Advanced Analytics
Helping Business Leaders Get Over Their Learning Curve in Advanced AnalyticsHelping Business Leaders Get Over Their Learning Curve in Advanced Analytics
Helping Business Leaders Get Over Their Learning Curve in Advanced Analytics
IDEAS - Int'l Data Engineering and Science Association
 
Building a Business Technology Alignment: Techniques to Gaining HR Business T...
Building a Business Technology Alignment: Techniques to Gaining HR Business T...Building a Business Technology Alignment: Techniques to Gaining HR Business T...
Building a Business Technology Alignment: Techniques to Gaining HR Business T...
HR Network marcus evans
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omahakmansour
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?
Denis Gagné
 
M2MSys BPM Executive Summary
M2MSys BPM Executive SummaryM2MSys BPM Executive Summary
M2MSys BPM Executive Summary
Filipe Pinto
 
Transformation in large Telecommunications Providers
Transformation in large Telecommunications ProvidersTransformation in large Telecommunications Providers
Transformation in large Telecommunications Providersbasmeh
 
Dr MR Spano Career 1 Page
Dr MR Spano Career 1 PageDr MR Spano Career 1 Page
Dr MR Spano Career 1 Page
Dr. Michael Spano
 

Similar to Business Technology Value Model (20)

Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
 
Tss Reference Architecture Reduced
Tss Reference Architecture   ReducedTss Reference Architecture   Reduced
Tss Reference Architecture Reduced
 
Ngceap
NgceapNgceap
Ngceap
 
Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009Ascentn Ms Soa Bpm Conf Jan 2009
Ascentn Ms Soa Bpm Conf Jan 2009
 
Itil service desk business case
Itil service desk business caseItil service desk business case
Itil service desk business case
 
Evolution of it management
Evolution of it managementEvolution of it management
Evolution of it management
 
SAP Enterprise Modeling Applications (ARIS)
SAP Enterprise Modeling Applications (ARIS)SAP Enterprise Modeling Applications (ARIS)
SAP Enterprise Modeling Applications (ARIS)
 
Soa maturity business model
Soa maturity business modelSoa maturity business model
Soa maturity business model
 
Business process-reengineering
Business process-reengineeringBusiness process-reengineering
Business process-reengineering
 
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0Mohan k. bavirisetty    introduction to semantic soa & bpm sept 14 2010 v 1.0
Mohan k. bavirisetty introduction to semantic soa & bpm sept 14 2010 v 1.0
 
Developing an SOA Strategy
Developing an SOA StrategyDeveloping an SOA Strategy
Developing an SOA Strategy
 
Spca2014 holme end to end share point service delivery
Spca2014 holme   end to end share point service deliverySpca2014 holme   end to end share point service delivery
Spca2014 holme end to end share point service delivery
 
Helping Business Leaders Get Over Their Learning Curve in Advanced Analytics
Helping Business Leaders Get Over Their Learning Curve in Advanced AnalyticsHelping Business Leaders Get Over Their Learning Curve in Advanced Analytics
Helping Business Leaders Get Over Their Learning Curve in Advanced Analytics
 
Building a Business Technology Alignment: Techniques to Gaining HR Business T...
Building a Business Technology Alignment: Techniques to Gaining HR Business T...Building a Business Technology Alignment: Techniques to Gaining HR Business T...
Building a Business Technology Alignment: Techniques to Gaining HR Business T...
 
Isrc Architectingfor Agility J.Ross
Isrc Architectingfor Agility J.RossIsrc Architectingfor Agility J.Ross
Isrc Architectingfor Agility J.Ross
 
Ciber Soa April 2007 Omaha
Ciber Soa April 2007 OmahaCiber Soa April 2007 Omaha
Ciber Soa April 2007 Omaha
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?
 
M2MSys BPM Executive Summary
M2MSys BPM Executive SummaryM2MSys BPM Executive Summary
M2MSys BPM Executive Summary
 
Transformation in large Telecommunications Providers
Transformation in large Telecommunications ProvidersTransformation in large Telecommunications Providers
Transformation in large Telecommunications Providers
 
Dr MR Spano Career 1 Page
Dr MR Spano Career 1 PageDr MR Spano Career 1 Page
Dr MR Spano Career 1 Page
 

More from Richard Claassens CIPPE

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Richard Claassens CIPPE
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Richard Claassens CIPPE
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...
Richard Claassens CIPPE
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming
Richard Claassens CIPPE
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)
Richard Claassens CIPPE
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016
Richard Claassens CIPPE
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)
Richard Claassens CIPPE
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitief
Richard Claassens CIPPE
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 Amsterdam
Richard Claassens CIPPE
 
Verkenning internet of things
Verkenning internet of thingsVerkenning internet of things
Verkenning internet of things
Richard Claassens CIPPE
 
A taxonomy of personal data by origin
A taxonomy of personal data by origin A taxonomy of personal data by origin
A taxonomy of personal data by origin
Richard Claassens CIPPE
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Richard Claassens CIPPE
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningen
Richard Claassens CIPPE
 
Verkenning geo services
Verkenning geo services Verkenning geo services
Verkenning geo services
Richard Claassens CIPPE
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things Diensten
Richard Claassens CIPPE
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiek
Richard Claassens CIPPE
 
Authenticatie
AuthenticatieAuthenticatie
Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)
Richard Claassens CIPPE
 
Cloud computing overzicht
Cloud computing overzichtCloud computing overzicht
Cloud computing overzicht
Richard Claassens CIPPE
 

More from Richard Claassens CIPPE (20)

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitief
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 Amsterdam
 
Verkenning internet of things
Verkenning internet of thingsVerkenning internet of things
Verkenning internet of things
 
A taxonomy of personal data by origin
A taxonomy of personal data by origin A taxonomy of personal data by origin
A taxonomy of personal data by origin
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningen
 
Verkenning geo services
Verkenning geo services Verkenning geo services
Verkenning geo services
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things Diensten
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiek
 
Kennismaking sfdc v1
Kennismaking sfdc v1Kennismaking sfdc v1
Kennismaking sfdc v1
 
Authenticatie
AuthenticatieAuthenticatie
Authenticatie
 
Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)
 
Cloud computing overzicht
Cloud computing overzichtCloud computing overzicht
Cloud computing overzicht
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Business Technology Value Model

  • 1.