Browse Definitions :
Definition

operating model

An operating model is a visual representation of how an organization delivers value to its internal and external customers. Operating models, which may also be called value-chain maps, are created to help employees visualize and understand the role each part of an organization plays in meeting the needs of other components.

Operating models are useful tools for helping managers understand how changes to one part of the organization might impact the value other parts are tasked with delivering. They are usually organized from the top down and can be very high level or very granular. A large organization may find it necessary to create dozens of operating models to accurately capture the steps each department must go through to successfully meet the needs of other parts of the business and customers.

Operational models are typically documented by internal design teams with visualization expertise in large organizations, but are often simply created with flowcharts in smaller companies. It can take a few days or a few months to document an operational model, depending on the complexity of the organization’s goals and the amount of detail required.

Although operating models often evolve ad hoc, they can also be designed using frameworks such as the Operating Model Canvas (OMC) developed by Andrew Campbell. OMCs capture six elements that play an important role in delivering value: processes, organization, location, information, suppliers and management system (POLISM).

This was last updated in October 2017

Continue Reading About operating model

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close