SlideShare a Scribd company logo
1 of 5
Download to read offline
7 Steps to Selecting Software

Instructor Portal

Downloads

Newsletters

---------------------------------------------

DITY™ Newsletter
Vol. 3.14 • April 4, 2007

7 Steps to Selecting Software

Print page

digg (discuss or comment) on this article. Show your support for DITY!
Subscribe Its Free!

RSS Stay up to date!

PDF Pass it around!

I believe that all ITSM enabling software solutions should carry a warning label that says,
“Caveat Emptor.” It is up to you, not the software company or some "paid verifier” to
understand your needs and validate your decision...
By David Nichols

Who is Billy Mays and why does he always seem to be yelling at us? You know, he’s
the guy who pitches products like Oxiclean on TV; where he extols the virtues of the
product with a booming voice that is at least several decibels above pain … and urges
you to act “right now” … and if you do he’ll see to it personally that your order is
doubled (of course there are those shipping and handling fees). What got me thinking
about Billy Mays was some recent research I’d done on software products that claim everything

from “ITIL Compatibility” to “Ensuring IT Alignment with the Business” … almost forgot “ITIL in
a Box.”
Before I go too far in this article, I think it would be best if I clearly stated my biases on the subject
of software companies and products in the IT Service Management space. First of all, for quite
http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (1 of 4)4/3/2007 8:28:40 AM
itSM Solutions®
DITY™ Newsletter
Reprint
This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and
have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals
who want a workable, practical guide to implementing ITIL best practices -- without the hype.

become a member
(It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm)

Publisher
itSM Solutions™ LLC
31 South Talbert Blvd #295
Lexington, NC 27292
Phone (336) 510-2885
Fax (336) 798-6296
Find us on the web at: http://www.itsmsolutions.com.
To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com
For information on obtaining copies of this guide contact: sales@itsmsolutions.com
Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the
permission of the Controller of HMSO and the Office of Government Commerce.
Notice of Rights / Restricted Rights Legend
All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of
the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner
License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof
beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited.
Notice of Liability
This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not
limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor
itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused
directly or indirectly by the contents of this guide.
Trademarks
itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a
Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent
and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No.
0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC
under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be
trademarks or registered trademarks of their respective companies.
7 Steps to Selecting Software

some time, many software companies have jumped on the ITIL bandwagon, marketing their
products as “ITIL compatible and verified.” Because IT Service Management (ITSM) is a
descriptive, not prescriptive, framework, the whole situation would have been laughable except for
the fact that a significant number of IT shops bought these “compatible” and “verified” software
products, thinking it would accelerate their ITIL adoption efforts.
It got worse when the IT shops discovered that the products came in a “few processes short,” and
they only learned after the fact that “compatible” really meant compatible in ITIL terms only and

“verified” meant nothing as there was no standard to verify the product against.
I have both purchased and built ITSM enabling software for the IT organizations I have run.
Based on my 27 years experience working with IT and ITSM enabling software, following I present
my 7 steps to properly choosing a software vendor and package.
7 Steps
Today there is a whole new generation of software products that deliver the value IT practitioners
are looking for. Many have been “purpose built” to “deliver the capabilities required to operate as a

service provider integrated into the enterprise or mission value chain.” Some of the larger software
companies have banded together to establish a configuration management database (CMDB)
standard that will enable various point solutions to be integrated into this evolving ITSM software
“ecotechture.”
But, are they right for YOU? Here are seven time-tested, easy-to-follow steps when selecting
enabling software technology.
Analyze Your Needs

While this seems saliently obvious, I’ve lost count of the number of IT shops I’ve worked with over
the years that started with a product search as opposed to a clearly defined need. This normally
goes hand-in-hand with “doing ITIL” without understanding their current capability or a desired
end-state of the ITSM processes in mind. A needs analysis is fundamental, and addresses the
definition of the goals and objectives to be achieved as the result of acquiring new software. It’s
critical that any needs analysis should be conducted in parallel with an IT Service Management
process maturity assessment.
Specify the Requirements

Specifying requirements entails more than just writing down selected features from the vendors’
marketing material. Your requirements are your requirements and should reflect what the product
must do to enable the process that you either have or wish to have. Among the deliverables of your
process design or redesign phase of a process implementation program should be a requirements
definition.

Identify Suppliers

http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (2 of 4)4/3/2007 8:28:40 AM
7 Steps to Selecting Software

Before you start looking for suppliers, your organization
should determine its appetite for risk. Factors to consider
include your current vendor, ability to integrate products
from several vendors vs. a single-vendor product suite. No
matter what the vendor or vendors tell you, “Some assembly
is required.” The scope of that assembly is where risks need

to be assessed. The industry is trending toward the adoption
of point solutions that are very good at what they do; but they
don’t do everything. If you can tolerate an appetite for risk
associated with building a “best-of-breed” solution then those
are the vendors you need to find.

Continuous Improvement
How to Succeed with ITIL
If you have been struggling to put
together a IT Service Management
(ITSM) plan that deals with IT service
quality, escalating management costs,
regulatory compliance issues and the
onset of Utility Computing this program
is for you.
Optimization 1 Workshop
Plan and deliver IT services with the
availability, supporting organization and
processes to significantly impact IT
service availability, resource utilization,
and customer satisfaction.

If you want a “one-size-fits-all” solution, then your risks are associated with product limitations
(“best practices” are defined by the vendor’s product limitations).Do Research
Probably this should read “Do your own research.” In other words, the due diligence you put into
this will directly impact the quality of your product decision. There is no substitute for hands-on

research. That doesn’t mean that you should preclude the use of analyst firms, as long as you
understand where they make their money and how it might impact the inclusion (or exclusion) of
various vendors or products. So, do some research on your own. You may find products or vendors
that haven’t made it through the analyst maze (yet), but are worth a look.
Kick the Tires

I’d prefer a test drive, but this is where you get into some level of detail in the actual evaluation of
the product. If you didn’t take someone’s word that the product was “compatible” and “verified,”
and you have a good requirements list you can drill down to the necessary level of detail to
determine the product’s actual capability to meet YOUR REQUIREMENTS. While you’ll be hard

pressed to get a perfect match, at least you can avoid sitting in front of some of those pesky “C”level folks explaining that it really depends on your definition of “compatible” and that “verify” is a
verb and “capability” is a noun. You should be able to clearly identify what works the way you
want it to work, what can be “configured” to work the way you want it to work, and what you’ll
need to find another way to accomplish (yes, accomplish because you are selecting a product from a
list of requirements, not a feature list).
Recommend

By this time you should be able to recommend a product, set of products or a suite of products and
what it’s going to take to make them work; now it is time to go on the hook. Your recommendation
and how you arrived at it should be open and transparent to any stakeholder in the process. It
should clearly document the process to this point and be able to withstand the scrutiny of any the
interested parties.
Talk to Your Peers

Once you’ve made your recommendation it’s a good idea to seek out others using these products in

a similar fashion (size, volume, etc). It’s probably a good idea to reach out to these folks via a user’s
group or other non-vendor controlled association. Its one thing to see a demo, do a test drive and a

http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (3 of 4)4/3/2007 8:28:40 AM
7 Steps to Selecting Software

detailed requirements evaluation. But it’s another to have actually lived through implementation,
configuration, integration and normal operations. This is also when you get the straight scoop on
how things actually work. If things still look good at this point you’ve got a lot of work in front of
you getting it installed, tested and into production enabling your IT Service Management
processes . . . but that’s the topic for another DITY.
Summary
I really believe that all software products should have a warning label that says, “Caveat Emptor.”
It is up to you, not the software companies (or their paid “verifiers”), to do the work necessary to
understand your needs, articulate your requirements, understand your appetite for risk, qualify
prospective vendors, validate the product’s capability to meet your requirements, and validate your
selection/recommendation with others in the IT Service Management practitioner community.
Please forward this story to a manager, co-worker or a friend.
Where to go from here
q
q
q
q

digg (discuss or comment) on this article. Show your support for DITY!
Subscribe to our newsletter and get new skills delivered right to your Inbox, click here.
Download this article in PDF format for use at your own convenience, click here.
Use your favorite RSS reader to stay up to date, click here.

Related programs
q

q

How to Succeed with ITIL
Optimization 1 Workshop

Related articles
q
q
q

A prescription for ITIL, by Hank Marquis
10 Traits of Successful ITIL Adopters, by Hank Marquis
Browse back-issues of the DITY Newsletter, click here.

Home

Methodology

http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (4 of 4)4/3/2007 8:28:40 AM

About Us

Products

Contact Us

More Related Content

Viewers also liked

Viewers also liked (12)

Dit yvol3iss40
Dit yvol3iss40Dit yvol3iss40
Dit yvol3iss40
 
Dit yvol3iss49
Dit yvol3iss49Dit yvol3iss49
Dit yvol3iss49
 
Dit yvol2iss34
Dit yvol2iss34Dit yvol2iss34
Dit yvol2iss34
 
Dit yvol3iss32
Dit yvol3iss32Dit yvol3iss32
Dit yvol3iss32
 
Dit yvol3iss29
Dit yvol3iss29Dit yvol3iss29
Dit yvol3iss29
 
Dit yvol2iss40
Dit yvol2iss40Dit yvol2iss40
Dit yvol2iss40
 
Dit yvol3iss46
Dit yvol3iss46Dit yvol3iss46
Dit yvol3iss46
 
Dit yvol2iss45
Dit yvol2iss45Dit yvol2iss45
Dit yvol2iss45
 
Dit yvol4iss39
Dit yvol4iss39Dit yvol4iss39
Dit yvol4iss39
 
Dit yvol2iss27
Dit yvol2iss27Dit yvol2iss27
Dit yvol2iss27
 
Dit yvol3iss24
Dit yvol3iss24Dit yvol3iss24
Dit yvol3iss24
 
Dit yvol2iss8
Dit yvol2iss8Dit yvol2iss8
Dit yvol2iss8
 

Similar to Dit yvol3iss14

Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Balanced Insight, Inc.
 
Implementing business intelligence
Implementing business intelligenceImplementing business intelligence
Implementing business intelligenceAlistair Sergeant
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection ProcessAnthony D'Ugo
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionBenjamin Decowski
 
What to Know about Enterprise PM by IHS Markit Dir of Product
What to Know about Enterprise PM by IHS Markit Dir of ProductWhat to Know about Enterprise PM by IHS Markit Dir of Product
What to Know about Enterprise PM by IHS Markit Dir of ProductProduct School
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoMark Walker
 

Similar to Dit yvol3iss14 (20)

Dit yvol5iss25
Dit yvol5iss25Dit yvol5iss25
Dit yvol5iss25
 
Dit yvol2iss2
Dit yvol2iss2Dit yvol2iss2
Dit yvol2iss2
 
Dit yvol2iss10
Dit yvol2iss10Dit yvol2iss10
Dit yvol2iss10
 
Dit yvol2iss19
Dit yvol2iss19Dit yvol2iss19
Dit yvol2iss19
 
Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?Webinar: Are your users suffering from "metrics confusion"?
Webinar: Are your users suffering from "metrics confusion"?
 
Dit yvol1iss4
Dit yvol1iss4Dit yvol1iss4
Dit yvol1iss4
 
Implementing business intelligence
Implementing business intelligenceImplementing business intelligence
Implementing business intelligence
 
Dit yvol5iss29
Dit yvol5iss29Dit yvol5iss29
Dit yvol5iss29
 
Dit yvol2iss26
Dit yvol2iss26Dit yvol2iss26
Dit yvol2iss26
 
Top Tips for eDiscovery Software Demo iControl ESI
Top Tips for eDiscovery Software Demo iControl ESITop Tips for eDiscovery Software Demo iControl ESI
Top Tips for eDiscovery Software Demo iControl ESI
 
Dit yvol1iss7
Dit yvol1iss7Dit yvol1iss7
Dit yvol1iss7
 
Dit yvol2iss7
Dit yvol2iss7Dit yvol2iss7
Dit yvol2iss7
 
Build vs buy
Build vs buyBuild vs buy
Build vs buy
 
Surviving the Software Selection Process
Surviving the Software Selection ProcessSurviving the Software Selection Process
Surviving the Software Selection Process
 
How to Create B2B Content That Engages IT Buyers
How to Create B2B Content That Engages IT BuyersHow to Create B2B Content That Engages IT Buyers
How to Create B2B Content That Engages IT Buyers
 
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-SolutionCipher_Guide-To-Selecting-the-Right-CI-Software-Solution
Cipher_Guide-To-Selecting-the-Right-CI-Software-Solution
 
Dit yvol1iss3
Dit yvol1iss3Dit yvol1iss3
Dit yvol1iss3
 
What to Know about Enterprise PM by IHS Markit Dir of Product
What to Know about Enterprise PM by IHS Markit Dir of ProductWhat to Know about Enterprise PM by IHS Markit Dir of Product
What to Know about Enterprise PM by IHS Markit Dir of Product
 
Dit yvol2iss16
Dit yvol2iss16Dit yvol2iss16
Dit yvol2iss16
 
Top Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software DemoTop Tips to a Successful eDiscovery Software Demo
Top Tips to a Successful eDiscovery Software Demo
 

More from Rick Lemieux

More from Rick Lemieux (20)

IT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT AlignementIT Service Management (ITSM) Model for Business & IT Alignement
IT Service Management (ITSM) Model for Business & IT Alignement
 
Dit yvol5iss41
Dit yvol5iss41Dit yvol5iss41
Dit yvol5iss41
 
Dit yvol5iss40
Dit yvol5iss40Dit yvol5iss40
Dit yvol5iss40
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
Dit yvol5iss37
Dit yvol5iss37Dit yvol5iss37
Dit yvol5iss37
 
Dit yvol5iss36
Dit yvol5iss36Dit yvol5iss36
Dit yvol5iss36
 
Dit yvol5iss35
Dit yvol5iss35Dit yvol5iss35
Dit yvol5iss35
 
Dit yvol5iss34
Dit yvol5iss34Dit yvol5iss34
Dit yvol5iss34
 
Dit yvol5iss31
Dit yvol5iss31Dit yvol5iss31
Dit yvol5iss31
 
Dit yvol5iss33
Dit yvol5iss33Dit yvol5iss33
Dit yvol5iss33
 
Dit yvol5iss32
Dit yvol5iss32Dit yvol5iss32
Dit yvol5iss32
 
Dit yvol5iss30
Dit yvol5iss30Dit yvol5iss30
Dit yvol5iss30
 
Dit yvol5iss28
Dit yvol5iss28Dit yvol5iss28
Dit yvol5iss28
 
Dit yvol5iss26
Dit yvol5iss26Dit yvol5iss26
Dit yvol5iss26
 
Dit yvol5iss24
Dit yvol5iss24Dit yvol5iss24
Dit yvol5iss24
 
Dit yvol5iss23
Dit yvol5iss23Dit yvol5iss23
Dit yvol5iss23
 
Dit yvol5iss22
Dit yvol5iss22Dit yvol5iss22
Dit yvol5iss22
 
Dit yvol5iss21
Dit yvol5iss21Dit yvol5iss21
Dit yvol5iss21
 
Dit yvol5iss20
Dit yvol5iss20Dit yvol5iss20
Dit yvol5iss20
 
Dit yvol5iss19
Dit yvol5iss19Dit yvol5iss19
Dit yvol5iss19
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Dit yvol3iss14

  • 1. 7 Steps to Selecting Software Instructor Portal Downloads Newsletters --------------------------------------------- DITY™ Newsletter Vol. 3.14 • April 4, 2007 7 Steps to Selecting Software Print page digg (discuss or comment) on this article. Show your support for DITY! Subscribe Its Free! RSS Stay up to date! PDF Pass it around! I believe that all ITSM enabling software solutions should carry a warning label that says, “Caveat Emptor.” It is up to you, not the software company or some "paid verifier” to understand your needs and validate your decision... By David Nichols Who is Billy Mays and why does he always seem to be yelling at us? You know, he’s the guy who pitches products like Oxiclean on TV; where he extols the virtues of the product with a booming voice that is at least several decibels above pain … and urges you to act “right now” … and if you do he’ll see to it personally that your order is doubled (of course there are those shipping and handling fees). What got me thinking about Billy Mays was some recent research I’d done on software products that claim everything from “ITIL Compatibility” to “Ensuring IT Alignment with the Business” … almost forgot “ITIL in a Box.” Before I go too far in this article, I think it would be best if I clearly stated my biases on the subject of software companies and products in the IT Service Management space. First of all, for quite http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (1 of 4)4/3/2007 8:28:40 AM
  • 2. itSM Solutions® DITY™ Newsletter Reprint This is a reprint of an itSM Solutions® DITY™ Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles in our archives. DITY is the newsletter for IT professionals who want a workable, practical guide to implementing ITIL best practices -- without the hype. become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/DITY.htm) Publisher itSM Solutions™ LLC 31 South Talbert Blvd #295 Lexington, NC 27292 Phone (336) 510-2885 Fax (336) 798-6296 Find us on the web at: http://www.itsmsolutions.com. To report errors please send a note to the editor, Hank Marquis at hank.marquis@itsmsolutions.com For information on obtaining copies of this guide contact: sales@itsmsolutions.com Copyright © 2006 Nichols-Kuhn Group. ITIL Glossaries © Crown Copyright Office of Government Commerce. Reproduced with the permission of the Controller of HMSO and the Office of Government Commerce. Notice of Rights / Restricted Rights Legend All rights reserved. Reproduction or transmittal of this guide or any portion thereof by any means whatsoever without prior written permission of the Publisher is prohibited. All itSM Solutions products are licensed in accordance with the terms and conditions of the itSM Solutions Partner License. No title or ownership of this guide, any portion thereof, or its contents is transferred, and any use of the guide or any portion thereof beyond the terms of the previously mentioned license, without written authorization of the Publisher, is prohibited. Notice of Liability This guide is distributed "As Is," without warranty of any kind, either express or implied, respecting the content of this guide, including but not limited to implied warranties for the guide's quality, performance, merchantability, or fitness for any particular purpose. Neither the authors, nor itSM Solutions LLC, its dealers or distributors shall be liable with respect to any liability, loss or damage caused or alleged to have been caused directly or indirectly by the contents of this guide. Trademarks itSM Solutions is a trademark of itSM Solutions LLC. Do IT Yourself™ and DITY™ are trademarks of Nichols-Kuhn Group. ITIL ® is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office, and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). IT Infrastructure Library ® is a Registered Trade Mark of the Office of Government Commerce and is used here by itSM Solutions LLC under license from and with the permission of OGC (Trade Mark License No. 0002). Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies.
  • 3. 7 Steps to Selecting Software some time, many software companies have jumped on the ITIL bandwagon, marketing their products as “ITIL compatible and verified.” Because IT Service Management (ITSM) is a descriptive, not prescriptive, framework, the whole situation would have been laughable except for the fact that a significant number of IT shops bought these “compatible” and “verified” software products, thinking it would accelerate their ITIL adoption efforts. It got worse when the IT shops discovered that the products came in a “few processes short,” and they only learned after the fact that “compatible” really meant compatible in ITIL terms only and “verified” meant nothing as there was no standard to verify the product against. I have both purchased and built ITSM enabling software for the IT organizations I have run. Based on my 27 years experience working with IT and ITSM enabling software, following I present my 7 steps to properly choosing a software vendor and package. 7 Steps Today there is a whole new generation of software products that deliver the value IT practitioners are looking for. Many have been “purpose built” to “deliver the capabilities required to operate as a service provider integrated into the enterprise or mission value chain.” Some of the larger software companies have banded together to establish a configuration management database (CMDB) standard that will enable various point solutions to be integrated into this evolving ITSM software “ecotechture.” But, are they right for YOU? Here are seven time-tested, easy-to-follow steps when selecting enabling software technology. Analyze Your Needs While this seems saliently obvious, I’ve lost count of the number of IT shops I’ve worked with over the years that started with a product search as opposed to a clearly defined need. This normally goes hand-in-hand with “doing ITIL” without understanding their current capability or a desired end-state of the ITSM processes in mind. A needs analysis is fundamental, and addresses the definition of the goals and objectives to be achieved as the result of acquiring new software. It’s critical that any needs analysis should be conducted in parallel with an IT Service Management process maturity assessment. Specify the Requirements Specifying requirements entails more than just writing down selected features from the vendors’ marketing material. Your requirements are your requirements and should reflect what the product must do to enable the process that you either have or wish to have. Among the deliverables of your process design or redesign phase of a process implementation program should be a requirements definition. Identify Suppliers http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (2 of 4)4/3/2007 8:28:40 AM
  • 4. 7 Steps to Selecting Software Before you start looking for suppliers, your organization should determine its appetite for risk. Factors to consider include your current vendor, ability to integrate products from several vendors vs. a single-vendor product suite. No matter what the vendor or vendors tell you, “Some assembly is required.” The scope of that assembly is where risks need to be assessed. The industry is trending toward the adoption of point solutions that are very good at what they do; but they don’t do everything. If you can tolerate an appetite for risk associated with building a “best-of-breed” solution then those are the vendors you need to find. Continuous Improvement How to Succeed with ITIL If you have been struggling to put together a IT Service Management (ITSM) plan that deals with IT service quality, escalating management costs, regulatory compliance issues and the onset of Utility Computing this program is for you. Optimization 1 Workshop Plan and deliver IT services with the availability, supporting organization and processes to significantly impact IT service availability, resource utilization, and customer satisfaction. If you want a “one-size-fits-all” solution, then your risks are associated with product limitations (“best practices” are defined by the vendor’s product limitations).Do Research Probably this should read “Do your own research.” In other words, the due diligence you put into this will directly impact the quality of your product decision. There is no substitute for hands-on research. That doesn’t mean that you should preclude the use of analyst firms, as long as you understand where they make their money and how it might impact the inclusion (or exclusion) of various vendors or products. So, do some research on your own. You may find products or vendors that haven’t made it through the analyst maze (yet), but are worth a look. Kick the Tires I’d prefer a test drive, but this is where you get into some level of detail in the actual evaluation of the product. If you didn’t take someone’s word that the product was “compatible” and “verified,” and you have a good requirements list you can drill down to the necessary level of detail to determine the product’s actual capability to meet YOUR REQUIREMENTS. While you’ll be hard pressed to get a perfect match, at least you can avoid sitting in front of some of those pesky “C”level folks explaining that it really depends on your definition of “compatible” and that “verify” is a verb and “capability” is a noun. You should be able to clearly identify what works the way you want it to work, what can be “configured” to work the way you want it to work, and what you’ll need to find another way to accomplish (yes, accomplish because you are selecting a product from a list of requirements, not a feature list). Recommend By this time you should be able to recommend a product, set of products or a suite of products and what it’s going to take to make them work; now it is time to go on the hook. Your recommendation and how you arrived at it should be open and transparent to any stakeholder in the process. It should clearly document the process to this point and be able to withstand the scrutiny of any the interested parties. Talk to Your Peers Once you’ve made your recommendation it’s a good idea to seek out others using these products in a similar fashion (size, volume, etc). It’s probably a good idea to reach out to these folks via a user’s group or other non-vendor controlled association. Its one thing to see a demo, do a test drive and a http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (3 of 4)4/3/2007 8:28:40 AM
  • 5. 7 Steps to Selecting Software detailed requirements evaluation. But it’s another to have actually lived through implementation, configuration, integration and normal operations. This is also when you get the straight scoop on how things actually work. If things still look good at this point you’ve got a lot of work in front of you getting it installed, tested and into production enabling your IT Service Management processes . . . but that’s the topic for another DITY. Summary I really believe that all software products should have a warning label that says, “Caveat Emptor.” It is up to you, not the software companies (or their paid “verifiers”), to do the work necessary to understand your needs, articulate your requirements, understand your appetite for risk, qualify prospective vendors, validate the product’s capability to meet your requirements, and validate your selection/recommendation with others in the IT Service Management practitioner community. Please forward this story to a manager, co-worker or a friend. Where to go from here q q q q digg (discuss or comment) on this article. Show your support for DITY! Subscribe to our newsletter and get new skills delivered right to your Inbox, click here. Download this article in PDF format for use at your own convenience, click here. Use your favorite RSS reader to stay up to date, click here. Related programs q q How to Succeed with ITIL Optimization 1 Workshop Related articles q q q A prescription for ITIL, by Hank Marquis 10 Traits of Successful ITIL Adopters, by Hank Marquis Browse back-issues of the DITY Newsletter, click here. Home Methodology http://www.itsmsolutions.com/newsletters/DITYvol3iss14.htm (4 of 4)4/3/2007 8:28:40 AM About Us Products Contact Us