The document discusses common reasons why asset management system software implementations fail. It identifies 5 critical points of failure: 1) poorly defined project scope, 2) not prioritizing the most impactful parts of the system, 3) unresponsive technical support, 4) lack of benchmarks, and 5) ineffective training. It stresses the importance of managing expectations, including customer objectives, required customization, and responsibilities of each party. Clear expectations help address many potential points of failure.
Offshore outsourcing comes with its set of risks and it known to fail at times. If one analyzes reasons for failures one will clearly realize that most of these risks can be mitigated. All it takes is a management commitment, mature process and mitigation plan.
The Knowledge Management Role In Mitigating Operational RiskEduardo Longo
Paper presented by Eduardo C. F. Longo at the European Conference on Intellectual Capital, INHolland University of Applied Sciences, Haarlem, The Netherlands, 28-29 April 2009.
Offshore outsourcing comes with its set of risks and it known to fail at times. If one analyzes reasons for failures one will clearly realize that most of these risks can be mitigated. All it takes is a management commitment, mature process and mitigation plan.
Offshore outsourcing comes with its set of risks and it known to fail at times. If one analyzes reasons for failures one will clearly realize that most of these risks can be mitigated. All it takes is a management commitment, mature process and mitigation plan.
The Knowledge Management Role In Mitigating Operational RiskEduardo Longo
Paper presented by Eduardo C. F. Longo at the European Conference on Intellectual Capital, INHolland University of Applied Sciences, Haarlem, The Netherlands, 28-29 April 2009.
Offshore outsourcing comes with its set of risks and it known to fail at times. If one analyzes reasons for failures one will clearly realize that most of these risks can be mitigated. All it takes is a management commitment, mature process and mitigation plan.
Information Age of Now: 6 Innovative Approaches that Change The Way Businesse...ibmvietnam
Fundemental rules in business have changed. In the trend of exploding information, outstanding CEOs often consider 6 innovative approaches to bring more revenues to their organization. Those are: Free, Transparency, Networking, Simplicity, Share of time and Less is More.
Delivering Business Value By Applying Agile Principles To Business Continuity...Ken Collins
Agile methodologies clearly work well in the world of software development—the evidence is overwhelming. But how does Agile apply to other disciplines like business continuity management? Can the Agile philosophy help mitigate power disruptions and improve pandemic planning?
Mr. Collins illustrates how one client in the financial services sector successfully applied Agile principles to a recent business continuity initiative.
This session is intended for executives and project managers charged with developing business continuity and IT disaster recovery plans.
Learning Objectives
• Describe typical challenges as businesses try to build competency with business continuity management.
• Learn how Agile principles can shape the vision and scope of business continuity initiatives.
• Understand how Agile can enhance accountability, motivate teams, deliver short-term wins and generate real business value.
zNextGen Project Opening and Keynote at SHARE in Seattle 2010: Lessons Learne...Sam Knutson
Keynote delivered for the zNextGen Project Opening during SHARE in Seattle 2010.
Abstract:
In today’s tough economic times, IT executives are looking for inventive ways to cut costs and maximize their ROI on corporate IT spending. The IBM System z mainframe can deliver a highly scalable, low cost, robust, and highly available infrastructure to support mission-critical web and legacy applications.
Sam Knutson has spent his entire professional career to date working with IBM mainframes and has a ideas to share that you may find useful. He will talk about why mainframe is a good choice as a business platform and a career. Some tips for practioneers who support mainframe infrastructure will be related. A few life and work lessons learned will be shared related to how to succeed, tools you might use, community you can embrace, and where to find sources of inspiration to energize you. I want you to have fun and make a good living doing this!
The Stream Process™ for Defining ProjectsOneSpring LLC
The Stream Process™ from OneSpring is a revolutionary new process for defining software applications - web sites, mobile, enterprise software, intranets and so much more.
Stream is a methodology that offers companies a collaborative and highly-visual approach to creating superior products and solutions in less time, with reduced project re-work.
Think of it as a better way to translate what the business (marketing, product management, etc.) wants into something the development team can build.
This helps companies dramatically improve productivity, quality and customer satisfaction. Learn more at www.onespring.net or contact us at sales@onespring.net.
Advanced Maintenance And Reliability (Best Maintenance and Reliability Practi...Ricky Smith CMRP, CMRT
Maintenance and reliability has taken great strides toward managing asset reliability by applying known best practices in maintenance and reliability finding that they can optimize reliability and reduce total cost and reduce risk by applying known best practices. However, if not most organizations are still trapped in the old way of thinking. Read this article and see where you stand.
Information Age of Now: 6 Innovative Approaches that Change The Way Businesse...ibmvietnam
Fundemental rules in business have changed. In the trend of exploding information, outstanding CEOs often consider 6 innovative approaches to bring more revenues to their organization. Those are: Free, Transparency, Networking, Simplicity, Share of time and Less is More.
Delivering Business Value By Applying Agile Principles To Business Continuity...Ken Collins
Agile methodologies clearly work well in the world of software development—the evidence is overwhelming. But how does Agile apply to other disciplines like business continuity management? Can the Agile philosophy help mitigate power disruptions and improve pandemic planning?
Mr. Collins illustrates how one client in the financial services sector successfully applied Agile principles to a recent business continuity initiative.
This session is intended for executives and project managers charged with developing business continuity and IT disaster recovery plans.
Learning Objectives
• Describe typical challenges as businesses try to build competency with business continuity management.
• Learn how Agile principles can shape the vision and scope of business continuity initiatives.
• Understand how Agile can enhance accountability, motivate teams, deliver short-term wins and generate real business value.
zNextGen Project Opening and Keynote at SHARE in Seattle 2010: Lessons Learne...Sam Knutson
Keynote delivered for the zNextGen Project Opening during SHARE in Seattle 2010.
Abstract:
In today’s tough economic times, IT executives are looking for inventive ways to cut costs and maximize their ROI on corporate IT spending. The IBM System z mainframe can deliver a highly scalable, low cost, robust, and highly available infrastructure to support mission-critical web and legacy applications.
Sam Knutson has spent his entire professional career to date working with IBM mainframes and has a ideas to share that you may find useful. He will talk about why mainframe is a good choice as a business platform and a career. Some tips for practioneers who support mainframe infrastructure will be related. A few life and work lessons learned will be shared related to how to succeed, tools you might use, community you can embrace, and where to find sources of inspiration to energize you. I want you to have fun and make a good living doing this!
The Stream Process™ for Defining ProjectsOneSpring LLC
The Stream Process™ from OneSpring is a revolutionary new process for defining software applications - web sites, mobile, enterprise software, intranets and so much more.
Stream is a methodology that offers companies a collaborative and highly-visual approach to creating superior products and solutions in less time, with reduced project re-work.
Think of it as a better way to translate what the business (marketing, product management, etc.) wants into something the development team can build.
This helps companies dramatically improve productivity, quality and customer satisfaction. Learn more at www.onespring.net or contact us at sales@onespring.net.
Advanced Maintenance And Reliability (Best Maintenance and Reliability Practi...Ricky Smith CMRP, CMRT
Maintenance and reliability has taken great strides toward managing asset reliability by applying known best practices in maintenance and reliability finding that they can optimize reliability and reduce total cost and reduce risk by applying known best practices. However, if not most organizations are still trapped in the old way of thinking. Read this article and see where you stand.
How good is your organization at identifying failures? Sure you see failures when they occur, but can you identify when recurring failures are creating serious equipment reliability.
Giving data governance recommendations is easy
but implementing them is altogether a different
ball game. Organizations do realize the
importance and value of data governance
initiatives but when it comes to funding and
prioritization of such initiatives, it always takes a lower priority. Over a period, governance becomes the root cause of a handful of the organizational issues and it is then when the organizations start to prioritize DG and bring in experts to set things
right. This article tries to throw light on the expectations of these organizations, what they get from the experts and how much of the recommendation can be converted or is converted to reality.
Why Midsize Companies Need Business Intelligence Solutions in this uncertain ...FindWhitePapers
Learn how midsize companies are putting in place a business intelligence information infrastructure - making them more likely to adhere to their budgets and deadlines, concentrate on improving the overall business rather than just one department, and reward employees accordingly.
Top 10 Network Operation Center Best Practices
In this free ebook you'll find tips
and best practices related to:
5 Essential tools NOC must have:
1. How to develop and maintain team knowledge and skills
2. Training new NOC Team
3. Improving communication and collaboration within and outside the NOC
4. Escalating, prioritizing, and handling problems
This documents provides helpful tips to nonprofit and higher education organizations regarding disaster preparedness and business systems continuity.
It is only a guide and should not substitute comprehensive business continuity planning.
Cloud Scars: Lessons from the Enterprise PioneersDave Roberts
Cloud computing is revolutionizing the IT market. But if you aren't careful, you're cloud project can end in disaster. This presentation gathers some lessons learned by the early adopters, so you can avoid their mistakes and double-down on their successes.
Cloud scars: Lessons from the Enterprise PioneersServiceMesh
ServiceMesh's Dave Roberts presented for Focus webinars, June 27, 2011.
Cloud computing is revolutionizing the IT market. But if you aren't careful, you're cloud project can end in disaster. This presentation gathers some lessons learned by the early adopters, so you can avoid their mistakes and double-down on their successes.
Traditionally, royalty management systems were not high on the priority list of corporate decision-makers. When royalty management was simpler, the potential returns didn’t seem to justify the investment.
Several factors have combined to change that.
Digital storage has allowed companies to accumulate huge libraries of assets—and huge numbers of potential royalty obligations. IP has become more complex, touching a wide audience, numerous demographics, and a multitude of device types.
Without clear visibility into royalties, many companies are forced to overpay deliberately in order to mitigate the risk of a dispute. Those who don’t take that approach, or don’t properly track their obligations, face an increasing number of disputes, audits, and lawsuits.
To take a recent example, Jillian Michaels, the fitness trainer and former host of NBC’s “The Biggest Loser” reality show, filed a $10 million lawsuit against entertainment company Lionsgate over YouTube videos posted to its channel. Michaels alleges that Lionsgate posted more videos to YouTube than were permitted under her contract, and failed to pay her any royalties.
Implementing a royalty management system is not without its challenges. However, better systems can help companies achieve big efficiency gains, mitigate risk, and assist in identifying opportunities to monetize IP. By avoiding the biggest royalty management mistakes when putting in place a system, companies can maximize their chances of a smooth implementation and realize their desired return on investment.
• Moving towards automation: identifying pain points and benefits to ensure a smooth transition
• Examining the costs savings of automation in areas such as headcount and administration
• Improving turnaround times and increasing efficiency by automating workflows
• Measuring the success of automating workflows
The Importance of a CMMS as a Knowledge Management ToolTranscendent
Learn how integrating a simple checklist into your facility maintenance plan can increase productivity, decrease error, and keep employees accountable.
How a Checklist can Boost Efficiency and Reduce MistakesTranscendent
Learn how The Checklist Manifesto can be incorporated into your industry and learn how a simple checklist can reduce mistakes, increase productivity, and keep revenue flowing properly.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Part II - Why-asset-management-system-software-implementations-fail
1. 15/10/2010 21:10
blog.mintek.com
Why Asset Management System
Software Implementations Fail
Part II - Why Asset Management System having the right tools or resources for the
Software Implementations Fail task at hand.
2. The low hanging fruit is not being col-
I
n our prior post, Why Asset Management System lected. Recognize that 80% of the benefits
Implementations Fail - Part I, we described the come from 20% of the system; therefore it
roles of the key players for implementing asset makes sense to give the 20% a higher prio-
management system software. Each party brings rity.
a different skill set to the table which great facili- 3. Unresponsive technical support or ope-
tators strive to recognize. These skill sets are used rational staffs. Staff can be unresponsive
to provide the expertise and buy-in from others. for any number of reasons ranging from a
personality conflict to just having a really
bad day. Once the trust is gone, almost no-
thing can bring it back (Something Deloitte
and SAP should have recognized early on).
All vendor staff or consultants should know
basic problem resolution techniques.
4. Benchmarks are not set. We live in a show
me the money business world. To avoid
show stopping surprises from the customer,
it is important to be able to measure the
success of the implementation at given time
frames. My guess is this was not adequately
done with Marin County.
Click here to send your feedback
5. Training is ineffective, delayed or pus-
hed aside. Asset system training is the
most underestimated value of implemen-
Critical Points of Failure tation. Ineffective or non-existent training
will result in lower system adoption rates,
At the same time, organizational leaders must be end user resistance to using the system,
wary of as many crucial failure points as possible. fewer people having a strong working
Some of the more notable points of failure for an knowledge of the system, and far less of the
implementation are: system being utilized.
joliprint
1. The scope of the project is not adequa- Because training is very labor intensive, it is often
tely defined. This occurs when the objec- front loaded and intense. This brings out other issues
tives of the customer and the vendor do not such as the staff’s ability able to retain more than
match up. For example, the vendor brings 10-20% of what has been taught and a significant
Printed with
in an energy efficiency expert to map out dependence on vendor technical support. If tur-
a plan, but the client really wants an auto- nover is a problem for the customer it is possible
mated work order system. The result is not that within a year or two, no facility employee will
http://blog.mintek.com/Enterprise_Asset_Management/bid/52196/Part-II-Why-Asset-Management-System-Software-Implementations-
Page 1
2. 15/10/2010 21:10
blog.mintek.com
Why Asset Management System Software Implementations Fail
have sufficient system knowledge to accomplish the they bring in unwanted negativity that can
desired objectives. derail an implementation by encouraging
others not to buy-into the program. Dragons
• Running out of time and/or money to can normally be stopped by including them
collect asset detail set-up. System output is in the implementation or selling them on
only as good as the information fed into it how the change will help them do their job
(garbage in=garbage out). Collecting asset better.
detail is a time consuming process and often • The operations team is not empowered
requires that manpower be taken offline to to make the necessary changes to processes.
gather the needed information. The operations implementation team has to
have the ability to draw upon whatever re-
For example, a facilities manager might be expected sources they need to execute change. When
to use their maintenance teams to collect asset detail. cooperation with the implementation team
But if they do this they may not have the resources is optional, the plan will unravel.
to perform maintenance and repairs when needed.
Without careful planning, resistance to the new asset Why Setting Expectations are
management system software will grow. Important
• The emergence of Dragons. A dragon is a Many of the points of failure can be addressed by
p the vendor making sure they have a clear unders-
tanding of the customer’s expectations for bet-
ter asset management and measuring results.
Other issues, such as unresponsive support, are
an opportunity for vendors to exceed customer
expectations. My experience leads me to firmly
believe that clients are more likely to leave be-
cause of how a problem was handled then over
the problem itself.
Click here to send your feedback
As mentioned previously, the setting of expecta-
tions begins with the vendor salesperson and the
executive or decision makers for the customer.
The process does not stop once the implementa-
tion has started. This is because of things rarely
go according to plan. Parties should be willing to
adjust their expectations should unanticipated
events occur.
joliprint
Many of the actual customer expectations are
going to be handled with the sales contract. It is
not possible for me to list all the items that could
be in a contract but it is possible to identify a few
Printed with
of the major expectations.
erson who is either resistant to change or
feels threatened by change. Left unchecked,
http://blog.mintek.com/Enterprise_Asset_Management/bid/52196/Part-II-Why-Asset-Management-System-Software-Implementations-
Page 2
3. 15/10/2010 21:10
blog.mintek.com
Why Asset Management System Software Implementations Fail
Expectations that Should be Addressed If you liked this article you may also enjoy reading:
• The overall scope of the implementation in-
cluding who will be involved and what they
will be accountable for. Register for your chance to
• A listing of customer objectives such as
win a Free EAM & CMMS Worth
work order automation, knowledge trans-
fer, space planning $23,000
• A listing of vendor responses to the cus-
tomer that describes what can be done to If you want a EAM & CMMS sys-
meet the customer’s objectives such using tem, but can’t afford to implement one this budget
mobile handheld devices, document han- year; then this contest is perfect for you. We are offe-
dling and so on. ring a chance to win a FREE EAM & CMMS software
• How much customization will be required suite. Contest includes a 1-year site license, 10 web/
and what are the costs. mobile licenses and support, as well as, training
• Who will perform the set-up of the asset and implementation.
detail (customer staff, vendor, 3rd party)
• The amount of training and the realistic re-
sults of proposed asset management system
training.
• Who will be trained, how and where will
this occur.
• How often will they be retrained.
• Roll out schedule for large organizations or
multiple properties.
• Benchmarks of success, how will the client
know the system is working as sold?
Click here to send your feedback
The purpose of these items is simply to make sure
that the vendor understands the clients expectations
and that the client is fully aware of the changes
being implemented and what is required on their
part to make this occur.
By understanding the roles of the players, critical
points of failure and expectations, clients and ven-
dors can now review their resources to see if a third
party is needed. The final post of this series will
joliprint
take a look at some of the reasons a 3rd party may
be needed to ensure a successful implementation.
Share with us the problems with implementations
Printed with
that you have witnessed. How many of the issues
could have been resolved with better communi-
cation?
http://blog.mintek.com/Enterprise_Asset_Management/bid/52196/Part-II-Why-Asset-Management-System-Software-Implementations-
Page 3