SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
7 Steps for Selecting Software Redux

The workable, practical guide to Do IT Yourself

Page 1 of 3

Vol. 5.25 • June 23, 2009

7 Steps for Selecting Software Redux
By David Nichols

I believe that all ITSM enabling software solutions should carry a warning label that says,
“Caveat Emptor.” It is up to you, not the software company or some "paid verifier” to
understand your needs and validate your decision...
That is how I started this DITY over two years ago. This spring the OGC announced a new
certification scheme for “ITIL Compliant Software.” APMG, the ITIL Accreditor is administering the
scheme and has already certified two software products. The industry buzz was mostly negative and
in some cases scathing. Since I wrote this article, the ITIL remains a descriptive framework, and it
still takes a Clintonesque approach to defining words to apply “compliant” to anything associated
with ITIL’s guidance. And as long as “it depends” is the most common answer provided to students
and clients when asking about how something in ITIL is implemented, I felt it was only appropriate to
dust this article off and run it again.
Who is Billy Mays and why does he always seem to be yelling at us? You know, he’s the guy who pitches products like
Oxiclean on TV; where he extols the virtues of the product with a booming voice that is at least several decibels above pain
… and urges you to act “right now” … and if you do he’ll see to it personally that your order is doubled (of course there are
those shipping and handling fees). What got me thinking about Billy Mays was some recent research I’d done on software
products that claim everything from “ITIL Compatibility” to “Ensuring IT Alignment with the Business” … almost forgot
“ITIL in a Box.”
Before I go too far in this article, I think it would be best if I clearly stated my biases on the subject of software companies
and products in the IT Service Management space. First of all, for quite some time, many software companies have
jumped on the ITIL bandwagon, marketing their products as “ITIL compatible and verified.” Because IT Service
Management (ITSM) is a descriptive, not prescriptive, framework, the whole situation would have been laughable except
for the fact that a significant number of IT shops bought these “compatible” and “verified” software products, thinking it
would accelerate their ITIL adoption efforts.
It got worse when the IT shops discovered that the products came in a “few processes short,” and they only learned after
the fact that “compatible” really meant compatible in ITIL terms only and “verified” meant nothing as there was no
standard to verify the product against.
I have both purchased and built ITSM enabling software for the IT organizations I have run. Based on my 29 years
experience working with IT and ITSM-enabling software, following I present my 7 steps to properly choosing a software
vendor and package.

7 Steps
Today there is a whole new generation of software products that deliver the value IT practitioners are looking for. Many
have been “purpose built” to “deliver the capabilities required to operate as a service provider integrated into the
enterprise or mission value chain.” Some of the larger software companies have banded together to establish a
configuration management database (CMDB) standard that will enable various point solutions to be integrated into this
evolving ITSM software “ecotechture.” (See http://cmdbf.org/ for more on the CMDB Federation Working Group.)
But, are they right for YOU? Here are seven time-tested, easy-to-follow steps when selecting enabling software
technology.

1. Analyze Your Needs

http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm

6/23/2009
7 Steps for Selecting Software Redux

Page 2 of 3

While this seems blatantly obvious, I’ve lost count of the number of IT shops I’ve worked with over the years that started
with a product search as opposed to a clearly defined need. This normally goes hand-in-hand with “doing ITIL” without
understanding their current capability or a desired end-state of the ITSM processes in mind. A needs analysis is
fundamental, and addresses the definition of the goals and objectives to be achieved as the result of acquiring new
software. It’s critical that any needs analysis should be conducted in parallel with an IT Service Management process
maturity assessment.

2. Specify the Requirements
Specifying requirements entails more than just writing down selected features from the vendors’ marketing material.
Your requirements are your requirements and should reflect what the product must do to enable the process that you
either have or wish to have. Among the deliverables of your process design or redesign phase of a process implementation
program should be a requirements definition.

3. Identify Suppliers
Before you start looking for suppliers, your organization should determine its appetite for risk. Factors to consider include
your current vendor, ability to integrate products from several vendors vs. a single-vendor product suite. No matter what
the vendor or vendors tell you, “Some assembly is required.” The scope of that assembly is where risks need to be
assessed. The industry is trending toward the adoption of point solutions that are very good at what they do; but they
don’t do everything. If you can tolerate an appetite for risk associated with building a “best-of-breed” solution then those
are the vendors you need to find.
If you want a “one-size-fits-all” solution, then your risks are associated with product limitations (“best practices” are
defined by the vendor’s product limitations).

4. Do Research
Probably this should read “Do your own research.” In other words, the due diligence you put into this will directly impact
the quality of your product decision. There is no substitute for hands-on research. That doesn’t mean that you should
preclude the use of analyst firms, as long as you understand where they make their money and how it might impact the
inclusion (or exclusion) of various vendors or products. So, do some research on your own. You may find products or
vendors that haven’t made it through the analyst maze (yet), but are worth a look.

5. Kick the Tires
I’d prefer a test drive, but this is where you get into some level of detail in the actual evaluation of the product. If you
didn’t take someone’s word that the product was “compatible” and “verified,” and you have a good requirements list you
can drill down to the necessary level of detail to determine the product’s actual capability to meet YOUR
REQUIREMENTS. While you’ll be hard pressed to get a perfect match, at least you can avoid sitting in front of some of
those pesky “C”-level folks explaining that it really depends on your definition of “compatible” and that “verify” is a verb
and “capability” is a noun. You should be able to clearly identify what works the way you want it to work, what can be
“configured” to work the way you want it to work, and what you’ll need to find another way to accomplish (yes, accomplish
because you are selecting a product from a list of requirements, not a feature list).

6. Recommend
By this time you should be able to recommend a product, set of products or a suite of products and what it’s going to take
to make them work; now it is time to go on the hook. Your recommendation and how you arrived at it should be open and
transparent to any stakeholder in the process. It should clearly document the process to this point and be able to
withstand the scrutiny of any of the interested parties.

7. Talk to Your Peers
Once you’ve made your recommendation it’s a good idea to seek out others using these products in a similar fashion (size,
volume, etc). It’s probably a good idea to reach out to these folks via a user’s group or other non-vendor controlled
association. It’s one thing to see a demo, do a test drive and a detailed requirements evaluation. But it’s another to have
actually lived through implementation, configuration, integration and normal operations. This is also when you get the
straight scoop on how things actually work. If things still look good at this point you’ve got a lot of work in front of you

http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm

6/23/2009
7 Steps for Selecting Software Redux

Page 3 of 3

getting it installed, tested and into production enabling your IT Service Management processes . . . but that’s the topic for
another DITY.

Summary
I really believe that all software products should have a warning label that says, “Caveat Emptor.” It is up to you, not the
software companies (or their paid “verifiers”), to do the work necessary to understand your needs, articulate your
requirements, understand your appetite for risk, qualify prospective vendors, validate the product’s capability to meet
your requirements, and validate your selection/recommendation with others in the IT Service Management practitioner
community.
Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved.
ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002).

http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm

6/23/2009

Contenu connexe

Similaire à Dit yvol5iss25

QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEeAuditor Audits & Inspections
 
Implementing business intelligence
Implementing business intelligenceImplementing business intelligence
Implementing business intelligenceAlistair Sergeant
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoMark Walker
 
Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Balanced Insight, Inc.
 
The principles of agile development
The principles of agile developmentThe principles of agile development
The principles of agile developmentRajat Samal
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection ProcessAnthony D'Ugo
 
OrangeHills - Business Design Overview
OrangeHills - Business Design OverviewOrangeHills - Business Design Overview
OrangeHills - Business Design OverviewMarcin Kokott
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionBenjamin Decowski
 
Presented at Ford's 2017 Global IT Learning Summit (GLITS)
Presented at Ford's 2017 Global IT Learning Summit (GLITS)Presented at Ford's 2017 Global IT Learning Summit (GLITS)
Presented at Ford's 2017 Global IT Learning Summit (GLITS)Ron Lazaro
 
Enterprise Software Buying Guide
Enterprise Software Buying GuideEnterprise Software Buying Guide
Enterprise Software Buying Guidesourcingdoctor
 
5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics ImplementationObservePoint
 
Value proposition
Value propositionValue proposition
Value propositionremark55
 
How to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHow to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHelen Coyne
 

Similaire à Dit yvol5iss25 (20)

Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Top Tips for eDiscovery Software Demo iControl ESI
Top Tips for eDiscovery Software Demo iControl ESITop Tips for eDiscovery Software Demo iControl ESI
Top Tips for eDiscovery Software Demo iControl ESI
 
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUEQUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
QUALITY AUDIT TRACKING: THE KEY TO EFFICIENCY, EFFECTIVENESS AND VALUE
 
Implementing business intelligence
Implementing business intelligenceImplementing business intelligence
Implementing business intelligence
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software Demo
 
Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?
 
The principles of agile development
The principles of agile developmentThe principles of agile development
The principles of agile development
 
Build vs buy
Build vs buyBuild vs buy
Build vs buy
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection Process
 
Agile user story mapping
Agile user story mappingAgile user story mapping
Agile user story mapping
 
OrangeHills - Business Design Overview
OrangeHills - Business Design OverviewOrangeHills - Business Design Overview
OrangeHills - Business Design Overview
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
 
Presented at Ford's 2017 Global IT Learning Summit (GLITS)
Presented at Ford's 2017 Global IT Learning Summit (GLITS)Presented at Ford's 2017 Global IT Learning Summit (GLITS)
Presented at Ford's 2017 Global IT Learning Summit (GLITS)
 
Enterprise Software Buying Guide
Enterprise Software Buying GuideEnterprise Software Buying Guide
Enterprise Software Buying Guide
 
5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation5 Tips to Bulletproof Your Analytics Implementation
5 Tips to Bulletproof Your Analytics Implementation
 
Value proposition
Value propositionValue proposition
Value proposition
 
Dit yvol4iss34
Dit yvol4iss34Dit yvol4iss34
Dit yvol4iss34
 
Beyond Lean by Jamie Flinchbaugh
Beyond  Lean by Jamie FlinchbaughBeyond  Lean by Jamie Flinchbaugh
Beyond Lean by Jamie Flinchbaugh
 
How to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation SolutionHow to Choose a Legal Document Automation Solution
How to Choose a Legal Document Automation Solution
 
Bd conversion mapping
Bd conversion mappingBd conversion mapping
Bd conversion mapping
 

Plus de Rick Lemieux

Plus de Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 
Dit yvol5iss19
Dit yvol5iss19Dit yvol5iss19
Dit yvol5iss19
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Dit yvol5iss25

  • 1. 7 Steps for Selecting Software Redux The workable, practical guide to Do IT Yourself Page 1 of 3 Vol. 5.25 • June 23, 2009 7 Steps for Selecting Software Redux By David Nichols I believe that all ITSM enabling software solutions should carry a warning label that says, “Caveat Emptor.” It is up to you, not the software company or some "paid verifier” to understand your needs and validate your decision... That is how I started this DITY over two years ago. This spring the OGC announced a new certification scheme for “ITIL Compliant Software.” APMG, the ITIL Accreditor is administering the scheme and has already certified two software products. The industry buzz was mostly negative and in some cases scathing. Since I wrote this article, the ITIL remains a descriptive framework, and it still takes a Clintonesque approach to defining words to apply “compliant” to anything associated with ITIL’s guidance. And as long as “it depends” is the most common answer provided to students and clients when asking about how something in ITIL is implemented, I felt it was only appropriate to dust this article off and run it again. Who is Billy Mays and why does he always seem to be yelling at us? You know, he’s the guy who pitches products like Oxiclean on TV; where he extols the virtues of the product with a booming voice that is at least several decibels above pain … and urges you to act “right now” … and if you do he’ll see to it personally that your order is doubled (of course there are those shipping and handling fees). What got me thinking about Billy Mays was some recent research I’d done on software products that claim everything from “ITIL Compatibility” to “Ensuring IT Alignment with the Business” … almost forgot “ITIL in a Box.” Before I go too far in this article, I think it would be best if I clearly stated my biases on the subject of software companies and products in the IT Service Management space. First of all, for quite some time, many software companies have jumped on the ITIL bandwagon, marketing their products as “ITIL compatible and verified.” Because IT Service Management (ITSM) is a descriptive, not prescriptive, framework, the whole situation would have been laughable except for the fact that a significant number of IT shops bought these “compatible” and “verified” software products, thinking it would accelerate their ITIL adoption efforts. It got worse when the IT shops discovered that the products came in a “few processes short,” and they only learned after the fact that “compatible” really meant compatible in ITIL terms only and “verified” meant nothing as there was no standard to verify the product against. I have both purchased and built ITSM enabling software for the IT organizations I have run. Based on my 29 years experience working with IT and ITSM-enabling software, following I present my 7 steps to properly choosing a software vendor and package. 7 Steps Today there is a whole new generation of software products that deliver the value IT practitioners are looking for. Many have been “purpose built” to “deliver the capabilities required to operate as a service provider integrated into the enterprise or mission value chain.” Some of the larger software companies have banded together to establish a configuration management database (CMDB) standard that will enable various point solutions to be integrated into this evolving ITSM software “ecotechture.” (See http://cmdbf.org/ for more on the CMDB Federation Working Group.) But, are they right for YOU? Here are seven time-tested, easy-to-follow steps when selecting enabling software technology. 1. Analyze Your Needs http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm 6/23/2009
  • 2. 7 Steps for Selecting Software Redux Page 2 of 3 While this seems blatantly obvious, I’ve lost count of the number of IT shops I’ve worked with over the years that started with a product search as opposed to a clearly defined need. This normally goes hand-in-hand with “doing ITIL” without understanding their current capability or a desired end-state of the ITSM processes in mind. A needs analysis is fundamental, and addresses the definition of the goals and objectives to be achieved as the result of acquiring new software. It’s critical that any needs analysis should be conducted in parallel with an IT Service Management process maturity assessment. 2. Specify the Requirements Specifying requirements entails more than just writing down selected features from the vendors’ marketing material. Your requirements are your requirements and should reflect what the product must do to enable the process that you either have or wish to have. Among the deliverables of your process design or redesign phase of a process implementation program should be a requirements definition. 3. Identify Suppliers Before you start looking for suppliers, your organization should determine its appetite for risk. Factors to consider include your current vendor, ability to integrate products from several vendors vs. a single-vendor product suite. No matter what the vendor or vendors tell you, “Some assembly is required.” The scope of that assembly is where risks need to be assessed. The industry is trending toward the adoption of point solutions that are very good at what they do; but they don’t do everything. If you can tolerate an appetite for risk associated with building a “best-of-breed” solution then those are the vendors you need to find. If you want a “one-size-fits-all” solution, then your risks are associated with product limitations (“best practices” are defined by the vendor’s product limitations). 4. Do Research Probably this should read “Do your own research.” In other words, the due diligence you put into this will directly impact the quality of your product decision. There is no substitute for hands-on research. That doesn’t mean that you should preclude the use of analyst firms, as long as you understand where they make their money and how it might impact the inclusion (or exclusion) of various vendors or products. So, do some research on your own. You may find products or vendors that haven’t made it through the analyst maze (yet), but are worth a look. 5. Kick the Tires I’d prefer a test drive, but this is where you get into some level of detail in the actual evaluation of the product. If you didn’t take someone’s word that the product was “compatible” and “verified,” and you have a good requirements list you can drill down to the necessary level of detail to determine the product’s actual capability to meet YOUR REQUIREMENTS. While you’ll be hard pressed to get a perfect match, at least you can avoid sitting in front of some of those pesky “C”-level folks explaining that it really depends on your definition of “compatible” and that “verify” is a verb and “capability” is a noun. You should be able to clearly identify what works the way you want it to work, what can be “configured” to work the way you want it to work, and what you’ll need to find another way to accomplish (yes, accomplish because you are selecting a product from a list of requirements, not a feature list). 6. Recommend By this time you should be able to recommend a product, set of products or a suite of products and what it’s going to take to make them work; now it is time to go on the hook. Your recommendation and how you arrived at it should be open and transparent to any stakeholder in the process. It should clearly document the process to this point and be able to withstand the scrutiny of any of the interested parties. 7. Talk to Your Peers Once you’ve made your recommendation it’s a good idea to seek out others using these products in a similar fashion (size, volume, etc). It’s probably a good idea to reach out to these folks via a user’s group or other non-vendor controlled association. It’s one thing to see a demo, do a test drive and a detailed requirements evaluation. But it’s another to have actually lived through implementation, configuration, integration and normal operations. This is also when you get the straight scoop on how things actually work. If things still look good at this point you’ve got a lot of work in front of you http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm 6/23/2009
  • 3. 7 Steps for Selecting Software Redux Page 3 of 3 getting it installed, tested and into production enabling your IT Service Management processes . . . but that’s the topic for another DITY. Summary I really believe that all software products should have a warning label that says, “Caveat Emptor.” It is up to you, not the software companies (or their paid “verifiers”), to do the work necessary to understand your needs, articulate your requirements, understand your appetite for risk, qualify prospective vendors, validate the product’s capability to meet your requirements, and validate your selection/recommendation with others in the IT Service Management practitioner community. Entire Contents © 2009 itSM Solutions® LLC. All Rights Reserved. ITIL ® and IT Infrastructure Library ® are Registered Trade Marks of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). http://www.itsmsolutions.com/newsletters/DITYvol5iss25.htm 6/23/2009