antalya escort
Program Management

The TEM Disciplines


There are many disciplines required to deploy a fully functional TEM initiative: 

(a) Inventory Management

Inventory is the center of the TEM universe. It goes without saying that you can’t manage what you don’t know exists. It is critical for large enterprises to have a central repository of every circuit, service, router, PBX, cell phone, order, invoice, card, computer, monitor, etc. It is also critical for the organization to know how that inventory is configured, what its purpose for existing is, and how it is related to all the other inventory elements.

(b) Order Management

Once you have an inventory, it is critical to keep it accurate. The way to do this is to put in place a best practice repeatable process to enter items into the inventory, change those items, and eventually remove those items from inventory. Technology can really help in this area by providing software-based workflow engines that enforce the company rules for how these inventory updates happen. Not only will these processes ensure the accuracy of the inventory, but they will also provide a ton of business intelligence regarding the process: how it works, how it breaks down, how long it takes, etc.

(c) Financial Management

Financial Management deals with the dollars and cents portion of operating the network and allocating the cost of the network back to the various users in the corporation. The simplest form of Financial Management is paying the bills for the purchase/lease of various network assets. Part of this process is to validate that what is being billed is actually what is being used. In the telecom portion of the TEM space, this means checking each line item from all invoices and comparing them to the inventory. Another part of this process is validating that the amount being billed is accurate. This is accomplished by checking the detailed elements of the bill against the configuration of the telecom service, the tariff, and the contract on a monthly basis.

(d) Contract Management

Contracts contain the terms and conditions of the customer’s relationship with its carriers. It is critical to manage these contracts as you would manage any of your corporate contracts. You need to ensure that the terms and conditions are met by both parties. The most obvious entity to manage as part of your contract is your price. You need to make sure you are being billed the correct amount of money on your contract. You also need to negotiate your contracts on a regular basis to ensure that you are paying the best rates available in the industry at that time. Finally, you will want to manage your annual commitments, and your Service Level Agreements.

(e) Business Intelligence/Reporting

It is one thing to maintain an inventory, pay bills or put processes in place to ensure accuracy. It is totally another to take all the data that is generated from following the TEM processes, and analyze the data for the company’s benefit. This is the role of Business Intelligence in TEM. You need to harness the value of your data to budget and forecast your telecom spend, perform “What if” analyses on network conversions or contractual terms, or simply distribute pertinent performance data about the telecom network and its cost to all the consumers of those services that are paying for them. Business Intelligence can also be used to measure the performance of your telecom network by using Key Performance Indicators (KPI) that will automatically alert managers when certain thresholds have been exceeded.

(f) Network Management

The next piece of the TEM puzzle is the tie-in to network management systems. This is the management phase of the inventory life cycle. On a day to day basis, assets break, change, etc. The only way network management systems can monitor the network is to know what is out there, how it is used, who uses it, etc. This goes back to the importance of the inventory. Network management can only be as good as the inventory. In the network centric world that corporate America is transforming into, it is critical to keep all network assets working 24/7. A single $500 circuit going down can cause multi-million dollar losses for a company.

(g) Incident Management

Network Management systems identify potential issues that require resolution from various organizations. Incident Management logs the issue, and gets the problem into the hands of the correct person to resolve the problem. Once again, the inventory plays a critical role in providing the correct information to the person trying to resolve the problem. The logged information can play a huge role as well in case some changes were recently logged on a particular piece of inventory that might account for the incident happening in the first place. Another side benefit of Incident Management is that organizations need to measure their service level agreements to see how well the network is performing. These service levels could be internal (for Ethernets that might go down or slow down at certain times each day) or they could be external with Service Providers such as telephone companies, wiring companies, equipment installation crews, etc.

(h) Design and Optimization

Telecom design is a very mature craft for seasoned telecom professionals. TEM can leverage all the information in a database to help your engineers design the highest performing network, hopefully for the most economical price. TEM provides timely information to provisioning staff as to when capacity needs to be upgraded or downgraded. This is called “Just in Time Provisioning.” TEM is also used to design future network architectures supporting applications like VoIP or video that require inputs from multiple sources. Capacity Management is another aspect of TEM that is included in this category for convenience. It is critical to manage the slots on your network elements, as well as over and under-subscription levels on Frame, ATM, or MPLS networks.

(i) Security Management

Security has been a growing concern over the last decade and it will continue to be so with the growth of wireless access happening. Tying this back to the other segments of TEM, you can’t do great security management unless you know every device plugged into the network, what software it is running, when it was installed, and who uses the device, which ties back to the importance of accurate inventory. The installation process is critical as a repeatable process to ensure that all devices plugged into the network get installed in the same way every time. From verifying the correct security patches, turning off the correct ports, to making sure the passwords are strong enough. Wireless throws another wrinkle into the equation as now devices can just appear on the wireless network. How will people know if these devices are allowed to connect?

It is a well-known fact that corporations are spending at least 10% more on their telecom bills than they should due to the lack of decent technology and processes set up internally to manage their telecom invoices. This makes the Financial Management discipline of TEM one area that can lead to some of the hardest ROI dollars for a company implementing TEM. Most companies could easily payback the cost of a TEM initiative within six months to a year by reducing their telecom expenses by 10%.

(j) Cost Allocation

The next part of Financial Management involves allocation of costs. Once bills are paid accurately, the next piece is to allocate those charges fairly to the users within the organizations. Allocation can be straightforward in some scenarios. For example, the allocation of a cell phone monthly charge is a simple matter of taking the entire monthly charge for that phone and charging it back to the organization of the person that uses the phone. In the case of charge back of network utilization, this can be much more problematic. In this case, your TEM solution needs to have access to network utilization information that can be used to determine how much of a circuit is used for what purposes. This example is one of the most advanced examples of TEM allocation; however, it is an area that many Telecom Managers should be looking at implementing over the years to come.


bornova escort izmir öğrenci escort izmir fetiş escort izmir amerikan sakso escort kepez escort antalya anal escort
denizli sınırsız escort
izmir çıtır escort
sıhhıye escort cankaya escort alanya rus escort antalya sınırsız escort
Group Sex Travesti porno Ankara sınırsız escort