Softmart Company Facts
Established: 1982; Status:
Regional offices throughout the
Global partnerships in all world
Business Strategy – Focus on
“As a privately held company, Softmart
manages to the expectations of our
customers, not Wall Street. We believe
the true measure of our success is
Analytics Advantage Program
Numerous Microsoft Awards
Let’s get started
Rapidly create solutions
configuring the basic
building blocks of
functionality available in
SharePoint 2013, and in
many cases, Microsoft
Lists, Libraries, Views
List Forms, InfoPath, 3rd Party Forms
Workflows – SharePoint Designer, Visio, 3rd
Party Workflow Tools
Power Pivot / Power View
To leverage your SharePoint
To help reduce duplicate content
To unlock the value of Line-of-
Business (LOB) data
To rapidly create a business
solution without dependence on
technical staff (DIY)
Because your End User Adoption
Relies Upon it
Risk Prepare Risk Mitigation Plans if Necessary
Approval Do you have the proper permission to build such
Solution? Obtain Proper Approval to Build the
Adoption Does this solve users’ needs? Why would they use it?
WIIFM. Define the value proposition before you build
3rd Party Applications / Solutions Are you recreating the wheel? Does the solution
better integrate if built on SharePoint? Etc…
Training What kind of learning curve will the users have?
Prepare a training plan for go-live.
Governance Policies Determine how existing governance policies should
affect your solution/application. What permission
groups should exist. Can you use pre-existing
Step 1: Think it through; get your users involved!
Step 2: Sample Questions
Identify Requirements From Your End Users
What processes are you currently doing with Email & Office today?
Do you have any paper based processes?
What do you track in your department? How do you track it?
What kind of reports do you look at? How are they distributed to you? Is
the data static?
How do you collaborate on documents today?
What kind of forms are required in your department? How do you
distribute them and how do the users execute them?