SlideShare a Scribd company logo
1 of 55
Commercial -of-the-shelves R.H.W. Claassens, 2001
Table of content ,[object Object],[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object],[object Object]
What are COTS software components (or Objects) ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A kind of  Reusable components… Acquired Source : [R3]
Why COTS software components ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R3] (SLOC = Source Lines Of Code)
Build, Buy and Blend Time-to- Market Flexibility High Slow Low High Develop from Scratch Packages Busines Process Components Application Templates Source : Gartnergroup
Productivity through Component reuse = Bought/ Subscripted = Built = Wrapped Legacy Package TC TC BC BC BC BC BC BC Application B Application A Application C Application D TC  = Technical component BC  = Business component Source : Gartnergroup
A Spectrum COTS-based Systems COTS-Based  Systems COTS-Intensive Systems (CIS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R1] COTS-Solutions Systems (CSS)
COTS-Solutions Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R1]
Simple life cycle for COTS-intensive systems P P P Cots market Qualify Adapt Assemble Examine which product ? Select which product ? Use which product features ? Insulate which products ?  Which design gets the most from the products ? Which design best meets market ?  Upgrade the product? Switch to compelling technology ?  Switch to competing technology ?  Source : [R1] Update
Table of content ,[object Object],[object Object],[object Object],[object Object]
Evaluation is ubiquitous across the COTS life cycle  P P P Cots market Qualify Adapt Assemble Update Evolution does not only appear in the step, where products are qualified and selected… In each of these activities there is an element of choice, decision, and selection and hence of evaluation   Source : [R1]
Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R1]
Two Extreme roles of evaluation Define all characteristics of all product we might select “ Pick a horse and ride it until its legs fall off” -Buy something that looks like it might work, and use it as long we can - In the design of COTS-Intensive systems  Is more common; Surprisingly, it is the less risky of the the two extremes I) II) ,[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R1]
How COTS software influence the design process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source : [R1]
Formative evaluation (e1) ,[object Object],[object Object],Source : [R1]
Design and decision making  Future commitments Current commitments Fielded Time Number Of Commitments Source : [R1] ,[object Object],[object Object],[object Object],[object Object]
An evaluation timeline  Future commitments Current commitments Fielded Time Number Of Commitments Source : [R1] Different evaluation approaches are needed depending on when in a system life cycle a commitment is made  Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Formative evaluation Future commitments Current commitments Evaluation Formative Context Normative Context Fielded Time Number Of Commitments - Formative vs. normative evaluation Source : [R1] ,[object Object],[object Object],[object Object],[object Object]
Formative vs. normative evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Future… … Past Source : [R1]
Ensemble evaluation (e2) ,[object Object],[object Object],Source : [R1]
Real-life example ,[object Object]
Example : A call center solution `` Backoffice out in PBX VOX6110 Aspect/ CTI Banking system CRM-2 CRM-1 Fax Server Edge / VSI PSTN Voice logging RIS for Windows + DDE ODBC+files ActiveX Email Server t.b.d. Voicemail Server Aspect ACD Aspect Campaign Mngt SMTP c c IVR ? Softdialer Edge Agenda planner MS Exchange Locator MS Access Knowledge Digidoc/IIS MS SQL server Dialog scripting Edge C-tree HTML ActiveX uit files files TCP/IP sockets Aspect/ CTI Additional Email management functionality is required Internet Aspect Nicelog
E-mail (response) Management System Email  Or Webform Respons management Content analyses Content Tracking ERMS Outputs Auto Acknowledgements Fully automated response Autosuggest response CRS Customer Information Repository Source : Gartnergroup Email Server
The essence van “Customer Relationship Management”  The right message on the right moment !! Which value added has the customer for your company  ? Which experiences did the customer have had with your company ?  Who are your customers ? In which product purchasing is your customer ?  In which type of products is your customer interested ?  In which state of life is your customer ?  Know your customer Customer
Gartner Report  (some fragments) The Transformation of ERMS and E-Service 24 January 2000 Donna Fuss Through demand will increase for applications that assist with managing customer e-mails, the majority of standalone ERMS vendors will leave the market by 2003…… … .. … .We expect 98 percent of the stand alone ERMS vendors to be out of the standalone ERMS vendors to be out of business by 2002 (0.9 probability) because customers will no longer be interested in addressing e-mail and will be unwilling to do the integration. Bottom Line : ERMS continue as good tactical solutions, but remain mostly no strategic because the vast majority are not integrated into more-complete, front-office-servicing suites, which are required to provide a complete new view of the customer through multiple channels. Prospects looking into address today's pain point should invest in an ERMS, but must understand that this investment is outdated within two years and that they are responsible for integration ` Update < 2 years
71 Brightware Number of customers  N/A Cisco/Webline 200 eGain 50 eShare 85 General Interactive 50 Genesys Labs / Alcatel N/A Interactive Intelligence 200 Kana 50 Lucent Technologies 225 Mustang 9 Octain Software 75 Quintus/Acuity 81 RightNow Technologies  22 ServiceSoft 65 SRA International 3 6% Market share  17 % 4 % 7 % 4 % 17 % 4 % 19 % N/A 6 % 7 % 2 % 6 % Not statistical relevant Comments Cisco’s E-Mail Manager 3.0 available 11/99  eShare NetAgent Re-Sponse became available in 09/99, 10 to 20 customers in production Has a base of 300 customers; announced eFAQ product for e-mail response management in 11/99 Sold 75 in 4Q99 Released e-Mail Starter Pack  Claims 150 users of Webcenter product; 125 resulted  from Acuity acquisition; GartnerGroup estimates based on 23 percent of hosted-customers  Claims 350 customers on a hosted or nonhosted basis; email users estimated based on 23 percent of hosted customers using email As of 09/99  Consulting firm created an ERMS product Release 1.0 available 09/99; release 2.0 was due 12/99 Webtone Technologies Vendor ERMS Vendor and Market Share Example of an ASP solution
Customer-service-and-support (CSS) CRM products Siebel Clarify Vantive Silknet Octane Chordiant CorePoint Oracle Ability to execute Completeness of vision IMA ERP High Low Low High Source: Gartnergroup, March 2000 “ Magic quadrants’ compare products in terms of two high level criteria”
What’s under the covers   – Suit or interfaced bundle ? 1) An interfaced Best-of-breed solution Vendor  X Vendor  Y Vendor  V Vendor  Z Vendor  V Vendor  V 2) Interfaced Application Bundle 3) Best of Cluster
Overlappings Gaps Functionality GUI CONTROL ENTITY Functionality problems Can overlapping functionality be switched off ? How can the gaps be filled in ? Do Layering structures fit together ? Do the security en authorization models fit together ? Problems
Example : A call center solution An additional Email management COTS-solution can lead to additional redundancy in data and functionality  Multi-channel Front-office Outbound Inbound FAX Post IVR Web Assist Me Telephone Email GEA Office Visit Current Front-office applications
different interface Interface lacks Openness GUI CONTROL ENTITY Connectivity problems Problems DCE ? Corba ? JAVA RMI ? SOAP ? SQL ? XML ? DDE ? OLE automation ? DCOM ?
Example : A call center solution The Additional Email management functionality must be integrated with the current call center functionality Windows-server Edge software architecture Edge server Windows-client (1) Windows-client (2) Edge client proces (1) Edge client proces (2) SQL Database Edge server proces Edge Terminal Server Edge Terminal Server screen display protocol ODBC client events protocol Read, load or mutation of tables via database tools, API’s and/or ODBC TCP/IP-Socket ActiveX Client/server C-libraries Edge server proces Windows-server Dcom Server ActiveX CTI A prosible bridge to other communicatie protocols Application ActiveX HTML Browser HTML Server HTML Presentation Interface Function Interface Data Interface Type of interface DDE, ActiveX, HTTP/HTML,  TCI, TCP/IP-sockets, DCOM, MQ/XML ODBC/SQL Protocol Interfaces and protocol ? DDE
Continuous evaluation (e3) ,[object Object],[object Object],Source : [R1]
Evaluation in refined context Time Number Of Commitments Source : [R1] ,[object Object],[object Object],[object Object],[object Object],Formative outcome of initial evaluation Normative elements of successive evaluations  Eval Eval
Time P1 P2 P3 Eval Eval    Eval    Eval   Eval   Design Alternatives Final  Decision Needed here Re-evaluation in Constant context Re-evaluate new product Releases with constant criteria Source : [R1] ,[object Object],[object Object],[object Object]
Eval Eval Eval Eval Eval Evaluation and design strategy ,[object Object],[object Object],[object Object],Market Survey Design for COTS Product selection Eval c c c Eval Eval Eval Eval Eval Market Survey Eval c I) II) Time Time Source : [R1] Design for COTS c Product selection c
Product Assessment Factor (1) Current released version of the product fully meets our requirements Current released version of the product meets most of our requirements. Future version fully meets requirements. Current released version of the product must be modified (by either the vendor or us) to meet our requirements. Functionality Product fully meets performance requirements for system. Product nearly meets performance requirements and shortcomings are not critical, or will be met in future versions or with hosting on faster hardware. Product does not meet performance requirements in critical areas (e.g., transactions/second). Performance Product is available on target platform and hosted on other platforms that may be required in future. Product is hosted on single platform required by system —not hosted on other platforms Product is not currently hosted on target platform — may be in future. Platforms Product meets security requirements for project. Product meets most security requirements for project —others can be handled procedurally or using other means. Current version of product will not handle security requirements of the project. Security Product meets security requirements for project. Product meets most security requirements for project —others can be handled procedurally or using other means. Current version of product will not handle security requirements of the project. Security Product is stable and has proven itself over time with its customer base. Product can handle error situations gracefully and recover. Product has occasionally errors but none will result in data loss or other critical problems. Product has errors that result in data loss, work lost, system crashes, etc. Reliability Low Risk  Moderate Risk  High Risk  Example  Of Product Evaluation List Product Assessment Factor (1)
Product Assessment Factor (2)  Product has an easy to understand interface and requires modest training. Can handle a range of users —from novice to expert. Product requires some training to use properly Product has difficult user interface and requires training for users to become proficient. Usability Product can interface to other products and can be controlled by custom code. Product has some capabilities to interface to other products and custom code. Product is closed and does not work well with other products and custom code. Openness Vendor provides 1-2 optional point releases per year and requires a major release every two years to stay supported.  Vendor requires a major release at least every year to stay supported Upgrades User manuals and support documentation are of extremely high quality. User manuals and support documentation are of adequate quality User manuals and support documentation do not exist. Documentation Product cost has minimal impact on overall system (e.g. little or no reduction or modification of requirements)Product costs up to 50% less than similar products Product cost has moderate impact on overall system (e.g., low to moderate priority reqmts delayed)Product costs within 10% of market average for similar products. Product cost has major impact on overall system (e.g. cost magnitude forces critical reqmts delayed) Product costs up to 50% more than similar products. Cost Low Risk  Moderate Risk  High Risk  Example  Of Product Evaluation List Product is stable and has proven itself over time with its customer base. Product can handle error situations gracefully and recover. Product has occasionally errors but none will result in data loss or other critical problems. Product has errors that result in data loss, work lost, system crashes, etc. Reliability
Business evaluation (e4) ,[object Object],[object Object],Source : [R1]
Vendor is established company, with quality workforce and facilities. Can attract and retain necessary talent. Vendor organization still fluid, with changes to staffing, work program and facilities. May be in high growth situation. Company is start-up and situation is highly dynamic. Organization Background Low Risk  Moderate Risk  High Risk  Vendor Assessment Factor(1) Solid market position for vendor. Viewed as one of the leaders. Vendor is known in the market or is new entrant that is quickly becoming established. Vendor is not known in this market. Market Position Vendor is working in a market that is well established. Vendor is working in a market that experiencing moderate growth or change. Some vendors will be bought by others Vendor is working in a new market —a volatile situation where products and players are not yet established. Early leaders are often in fleeting positions of market dominance.  Market Volatility External reviews from objective sources consistently give high ratings to the vendor’s products. External reviews of the vendor’s products are mixed. The vendor received multiple external reviews that indicate problems with product quality, schedule, etc.  External Reviews Vendor has strategic partnerships with several other vendors with complementary products and services. This may provide other opportunities to use COTS. Vendor has a few partnerships, some may be too early to determine strategic utility. Vendor has limited or no partnerships. Partnerships Vendor has solid financial situation, including growing revenue stream, strong ratings. Vendor has a mixed financial picture. May have strong revenue stream but no profit margin. Vendor has financial problems, such as poor credit, low revenues, low profit margin or ROE, etc Financial Example  Of Vendor Evaluation List
Easy to gain insight into future business direction of vendor. Easy to access key personnel at vendor. Some insight into future direction of vendor. Can access key personnel some of the time. Future business direction of vendor is unknown and access to key personnel is difficult. Access and Visibility Low Risk  Moderate Risk  High Risk  Vendor Assessment Factor(2) Example  Of Vendor Evaluation List
Business/Technical Evaluation Number Of business Commitments Number Of technical Commitments Time Source : [R1] ,[object Object],[object Object],[object Object],Effective CIS design will maximize this overlap - and will allow one to inform the other (if not to permit tradeoff between them
Exploratory evaluation (e5) ,[object Object],[object Object],[object Object],Source : [R1]
Two approaches ,[object Object],[object Object],[object Object],[object Object],Source : [R1]
Time Eval Eval Eval Eval Eval Goal-directed exploration ,[object Object],Market survey Feature map Model problem Prototype Opportunity Impact Source : [R1] ? ? ? ?
Table of content ,[object Object],[object Object],[object Object],[object Object]
The certainty of Uncertainty ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Significant problems ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Solutions ???
Table of content ,[object Object],[object Object],[object Object],[object Object]
A popular and often miss-used Explanation  ,[object Object]
Conclusion ,[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]
Advice ,[object Object],[object Object]

More Related Content

What's hot

Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementIBM WebSphereIndia
 
Customer centric digital platform for utilities: Process to value
Customer centric digital platform for utilities: Process to valueCustomer centric digital platform for utilities: Process to value
Customer centric digital platform for utilities: Process to valueCapgemini
 
FoW Enablers - Virtual Collaboration
FoW Enablers - Virtual CollaborationFoW Enablers - Virtual Collaboration
FoW Enablers - Virtual CollaborationCognizant
 
Business process modelling and e tom telecom
Business process modelling and e tom telecomBusiness process modelling and e tom telecom
Business process modelling and e tom telecomKate Koltunova
 
Application Management designed for PLM
Application Management designed for PLMApplication Management designed for PLM
Application Management designed for PLMApplication Management
 
Newgen Insurance Spectrum
Newgen Insurance SpectrumNewgen Insurance Spectrum
Newgen Insurance SpectrumRahul Bhatia
 
Convergent Billing
Convergent BillingConvergent Billing
Convergent Billingdevalnaik
 
RPA helps leading US mortgage provider stay ahead by improving agent producti...
RPA helps leading US mortgage provider stay ahead by improving agent producti...RPA helps leading US mortgage provider stay ahead by improving agent producti...
RPA helps leading US mortgage provider stay ahead by improving agent producti...Firstsource Solutions Limited
 
Network Transformation: Opportunities and Challenges for NEPs
Network Transformation: Opportunities and Challenges for NEPsNetwork Transformation: Opportunities and Challenges for NEPs
Network Transformation: Opportunities and Challenges for NEPsCognizant
 
Transformation in large Telecommunications Providers
Transformation in large Telecommunications ProvidersTransformation in large Telecommunications Providers
Transformation in large Telecommunications Providersbasmeh
 
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...Cognizant
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementMichael Lemm
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESijwscjournal
 
Factors for winning interface format battles: A review and synthesis of the l...
Factors for winning interface format battles: A review and synthesis of the l...Factors for winning interface format battles: A review and synthesis of the l...
Factors for winning interface format battles: A review and synthesis of the l...Eric van Heck
 
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...Microsoft Unified Communications - Driving Customer Savings in Financial Serv...
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...Microsoft Private Cloud
 

What's hot (20)

Robinatech_eTOM-Training
Robinatech_eTOM-TrainingRobinatech_eTOM-Training
Robinatech_eTOM-Training
 
Etom
EtomEtom
Etom
 
Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision Management
 
Customer centric digital platform for utilities: Process to value
Customer centric digital platform for utilities: Process to valueCustomer centric digital platform for utilities: Process to value
Customer centric digital platform for utilities: Process to value
 
FoW Enablers - Virtual Collaboration
FoW Enablers - Virtual CollaborationFoW Enablers - Virtual Collaboration
FoW Enablers - Virtual Collaboration
 
Business process modelling and e tom telecom
Business process modelling and e tom telecomBusiness process modelling and e tom telecom
Business process modelling and e tom telecom
 
Application Management designed for PLM
Application Management designed for PLMApplication Management designed for PLM
Application Management designed for PLM
 
Newgen Insurance Spectrum
Newgen Insurance SpectrumNewgen Insurance Spectrum
Newgen Insurance Spectrum
 
Convergent Billing
Convergent BillingConvergent Billing
Convergent Billing
 
HCL Infosystems - Services Brochure
HCL Infosystems - Services BrochureHCL Infosystems - Services Brochure
HCL Infosystems - Services Brochure
 
NCCW
NCCWNCCW
NCCW
 
RPA helps leading US mortgage provider stay ahead by improving agent producti...
RPA helps leading US mortgage provider stay ahead by improving agent producti...RPA helps leading US mortgage provider stay ahead by improving agent producti...
RPA helps leading US mortgage provider stay ahead by improving agent producti...
 
Network Transformation: Opportunities and Challenges for NEPs
Network Transformation: Opportunities and Challenges for NEPsNetwork Transformation: Opportunities and Challenges for NEPs
Network Transformation: Opportunities and Challenges for NEPs
 
Transformation in large Telecommunications Providers
Transformation in large Telecommunications ProvidersTransformation in large Telecommunications Providers
Transformation in large Telecommunications Providers
 
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
 
Enterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle ManagementEnterprise Mobility - Lifecycle Management
Enterprise Mobility - Lifecycle Management
 
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESWEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHES
 
Factors for winning interface format battles: A review and synthesis of the l...
Factors for winning interface format battles: A review and synthesis of the l...Factors for winning interface format battles: A review and synthesis of the l...
Factors for winning interface format battles: A review and synthesis of the l...
 
H05525256
H05525256H05525256
H05525256
 
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...Microsoft Unified Communications - Driving Customer Savings in Financial Serv...
Microsoft Unified Communications - Driving Customer Savings in Financial Serv...
 

Similar to Commercial of the shelve software

MOND Semantics Integration
MOND Semantics IntegrationMOND Semantics Integration
MOND Semantics IntegrationSales Emea
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentAntonio Rolle
 
Column itsm7 improvements_savino
Column itsm7 improvements_savinoColumn itsm7 improvements_savino
Column itsm7 improvements_savinoColumn Technologies
 
Column itsm7 improvements_savino
Column itsm7 improvements_savinoColumn itsm7 improvements_savino
Column itsm7 improvements_savinoColumn Technologies
 
From Components To Services
From Components To ServicesFrom Components To Services
From Components To ServicesJames Phillips
 
System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )Jennifer Wright
 
Selecting cots vendor in cbse process
Selecting cots vendor in cbse processSelecting cots vendor in cbse process
Selecting cots vendor in cbse processSaransh Garg
 
Vermont Teddy Bear Essay
Vermont Teddy Bear EssayVermont Teddy Bear Essay
Vermont Teddy Bear EssayAmy Williams
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
Innovate2011 DevOps TSRM RTC
Innovate2011 DevOps TSRM RTCInnovate2011 DevOps TSRM RTC
Innovate2011 DevOps TSRM RTCSteve Speicher
 
Kustom Impact Analyser
Kustom Impact AnalyserKustom Impact Analyser
Kustom Impact Analyserstephaneberger
 
2LA Kustom Impact Analyser
2LA Kustom Impact Analyser2LA Kustom Impact Analyser
2LA Kustom Impact AnalyserFredericLagrange
 
Critical steps in Determining Your Value Stream Management Solution
Critical steps in Determining Your Value Stream Management SolutionCritical steps in Determining Your Value Stream Management Solution
Critical steps in Determining Your Value Stream Management SolutionDevOps.com
 
ISD LECT 2and3upd.pptx
ISD LECT 2and3upd.pptxISD LECT 2and3upd.pptx
ISD LECT 2and3upd.pptxGamingMonster6
 
IT Software Category
IT Software CategoryIT Software Category
IT Software CategoryMehul Vora
 
The Systems Development Life Cycle
The Systems Development Life CycleThe Systems Development Life Cycle
The Systems Development Life CycleCrystal Torres
 

Similar to Commercial of the shelve software (20)

MOND Semantics Integration
MOND Semantics IntegrationMOND Semantics Integration
MOND Semantics Integration
 
Feasible
FeasibleFeasible
Feasible
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
Unit 2
Unit 2Unit 2
Unit 2
 
Feasible
FeasibleFeasible
Feasible
 
Column itsm7 improvements_savino
Column itsm7 improvements_savinoColumn itsm7 improvements_savino
Column itsm7 improvements_savino
 
Column itsm7 improvements_savino
Column itsm7 improvements_savinoColumn itsm7 improvements_savino
Column itsm7 improvements_savino
 
From Components To Services
From Components To ServicesFrom Components To Services
From Components To Services
 
System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )System Development Life Cycle ( Sdlc )
System Development Life Cycle ( Sdlc )
 
Selecting cots vendor in cbse process
Selecting cots vendor in cbse processSelecting cots vendor in cbse process
Selecting cots vendor in cbse process
 
Vermont Teddy Bear Essay
Vermont Teddy Bear EssayVermont Teddy Bear Essay
Vermont Teddy Bear Essay
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Innovate2011 DevOps TSRM RTC
Innovate2011 DevOps TSRM RTCInnovate2011 DevOps TSRM RTC
Innovate2011 DevOps TSRM RTC
 
Kustom Impact Analyser
Kustom Impact AnalyserKustom Impact Analyser
Kustom Impact Analyser
 
KIA
KIAKIA
KIA
 
2LA Kustom Impact Analyser
2LA Kustom Impact Analyser2LA Kustom Impact Analyser
2LA Kustom Impact Analyser
 
Critical steps in Determining Your Value Stream Management Solution
Critical steps in Determining Your Value Stream Management SolutionCritical steps in Determining Your Value Stream Management Solution
Critical steps in Determining Your Value Stream Management Solution
 
ISD LECT 2and3upd.pptx
ISD LECT 2and3upd.pptxISD LECT 2and3upd.pptx
ISD LECT 2and3upd.pptx
 
IT Software Category
IT Software CategoryIT Software Category
IT Software Category
 
The Systems Development Life Cycle
The Systems Development Life CycleThe Systems Development Life Cycle
The Systems Development Life Cycle
 

More from Richard Claassens CIPPE

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefRichard Claassens CIPPE
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Richard Claassens CIPPE
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...Richard Claassens CIPPE
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Richard Claassens CIPPE
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Richard Claassens CIPPE
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Richard Claassens CIPPE
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Richard Claassens CIPPE
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefRichard Claassens CIPPE
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamRichard Claassens CIPPE
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieRichard Claassens CIPPE
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenRichard Claassens CIPPE
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things DienstenRichard Claassens CIPPE
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiekRichard Claassens CIPPE
 

More from Richard Claassens CIPPE (20)

Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
 
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
Is privacywetgeving een blokkade voor technologisch gedreven innovatie?
 
Data Masking | waar in het IT-systeemlandschap? ...
Data Masking | waar in het IT-systeemlandschap?                              ...Data Masking | waar in het IT-systeemlandschap?                              ...
Data Masking | waar in het IT-systeemlandschap? ...
 
Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming Taken van de functionaris voor gegevensbescherming
Taken van de functionaris voor gegevensbescherming
 
Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)Positie van de functionaris voor gegevensbescherming (FG)
Positie van de functionaris voor gegevensbescherming (FG)
 
Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016Pripare methodology-handbook-final-feb-24-2016
Pripare methodology-handbook-final-feb-24-2016
 
Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)Benoeming van een functionaris voor gegevensbescherming (FG)
Benoeming van een functionaris voor gegevensbescherming (FG)
 
Privacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitiefPrivacy het nieuwe groen KNVI definitief
Privacy het nieuwe groen KNVI definitief
 
Establishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 AmsterdamEstablishing SOA and SOA Governance 23032010 Amsterdam
Establishing SOA and SOA Governance 23032010 Amsterdam
 
Verkenning internet of things
Verkenning internet of thingsVerkenning internet of things
Verkenning internet of things
 
A taxonomy of personal data by origin
A taxonomy of personal data by origin A taxonomy of personal data by origin
A taxonomy of personal data by origin
 
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomieSemantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
Semantische interoperabiliteit met behulp van een bedrijfsbrede taxonomie
 
Heidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningenHeidag Architectuur | presentatie van verkenningen
Heidag Architectuur | presentatie van verkenningen
 
Verkenning geo services
Verkenning geo services Verkenning geo services
Verkenning geo services
 
Ontwerpmodel Internet Of Things Diensten
Ontwerpmodel  Internet Of Things  DienstenOntwerpmodel  Internet Of Things  Diensten
Ontwerpmodel Internet Of Things Diensten
 
Software packaged software principles publiek
Software packaged software principles publiekSoftware packaged software principles publiek
Software packaged software principles publiek
 
Kennismaking sfdc v1
Kennismaking sfdc v1Kennismaking sfdc v1
Kennismaking sfdc v1
 
Authenticatie
AuthenticatieAuthenticatie
Authenticatie
 
Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)Cloud computing lunchsessie (v2)
Cloud computing lunchsessie (v2)
 
Cloud computing overzicht
Cloud computing overzichtCloud computing overzicht
Cloud computing overzicht
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Commercial of the shelve software

  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Build, Buy and Blend Time-to- Market Flexibility High Slow Low High Develop from Scratch Packages Busines Process Components Application Templates Source : Gartnergroup
  • 7. Productivity through Component reuse = Bought/ Subscripted = Built = Wrapped Legacy Package TC TC BC BC BC BC BC BC Application B Application A Application C Application D TC = Technical component BC = Business component Source : Gartnergroup
  • 8.
  • 9.
  • 10. Simple life cycle for COTS-intensive systems P P P Cots market Qualify Adapt Assemble Examine which product ? Select which product ? Use which product features ? Insulate which products ? Which design gets the most from the products ? Which design best meets market ? Upgrade the product? Switch to compelling technology ? Switch to competing technology ? Source : [R1] Update
  • 11.
  • 12. Evaluation is ubiquitous across the COTS life cycle P P P Cots market Qualify Adapt Assemble Update Evolution does not only appear in the step, where products are qualified and selected… In each of these activities there is an element of choice, decision, and selection and hence of evaluation   Source : [R1]
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Example : A call center solution `` Backoffice out in PBX VOX6110 Aspect/ CTI Banking system CRM-2 CRM-1 Fax Server Edge / VSI PSTN Voice logging RIS for Windows + DDE ODBC+files ActiveX Email Server t.b.d. Voicemail Server Aspect ACD Aspect Campaign Mngt SMTP c c IVR ? Softdialer Edge Agenda planner MS Exchange Locator MS Access Knowledge Digidoc/IIS MS SQL server Dialog scripting Edge C-tree HTML ActiveX uit files files TCP/IP sockets Aspect/ CTI Additional Email management functionality is required Internet Aspect Nicelog
  • 24. E-mail (response) Management System Email Or Webform Respons management Content analyses Content Tracking ERMS Outputs Auto Acknowledgements Fully automated response Autosuggest response CRS Customer Information Repository Source : Gartnergroup Email Server
  • 25. The essence van “Customer Relationship Management” The right message on the right moment !! Which value added has the customer for your company ? Which experiences did the customer have had with your company ? Who are your customers ? In which product purchasing is your customer ? In which type of products is your customer interested ? In which state of life is your customer ? Know your customer Customer
  • 26. Gartner Report (some fragments) The Transformation of ERMS and E-Service 24 January 2000 Donna Fuss Through demand will increase for applications that assist with managing customer e-mails, the majority of standalone ERMS vendors will leave the market by 2003…… … .. … .We expect 98 percent of the stand alone ERMS vendors to be out of the standalone ERMS vendors to be out of business by 2002 (0.9 probability) because customers will no longer be interested in addressing e-mail and will be unwilling to do the integration. Bottom Line : ERMS continue as good tactical solutions, but remain mostly no strategic because the vast majority are not integrated into more-complete, front-office-servicing suites, which are required to provide a complete new view of the customer through multiple channels. Prospects looking into address today's pain point should invest in an ERMS, but must understand that this investment is outdated within two years and that they are responsible for integration ` Update < 2 years
  • 27. 71 Brightware Number of customers N/A Cisco/Webline 200 eGain 50 eShare 85 General Interactive 50 Genesys Labs / Alcatel N/A Interactive Intelligence 200 Kana 50 Lucent Technologies 225 Mustang 9 Octain Software 75 Quintus/Acuity 81 RightNow Technologies 22 ServiceSoft 65 SRA International 3 6% Market share 17 % 4 % 7 % 4 % 17 % 4 % 19 % N/A 6 % 7 % 2 % 6 % Not statistical relevant Comments Cisco’s E-Mail Manager 3.0 available 11/99 eShare NetAgent Re-Sponse became available in 09/99, 10 to 20 customers in production Has a base of 300 customers; announced eFAQ product for e-mail response management in 11/99 Sold 75 in 4Q99 Released e-Mail Starter Pack Claims 150 users of Webcenter product; 125 resulted from Acuity acquisition; GartnerGroup estimates based on 23 percent of hosted-customers Claims 350 customers on a hosted or nonhosted basis; email users estimated based on 23 percent of hosted customers using email As of 09/99 Consulting firm created an ERMS product Release 1.0 available 09/99; release 2.0 was due 12/99 Webtone Technologies Vendor ERMS Vendor and Market Share Example of an ASP solution
  • 28. Customer-service-and-support (CSS) CRM products Siebel Clarify Vantive Silknet Octane Chordiant CorePoint Oracle Ability to execute Completeness of vision IMA ERP High Low Low High Source: Gartnergroup, March 2000 “ Magic quadrants’ compare products in terms of two high level criteria”
  • 29. What’s under the covers – Suit or interfaced bundle ? 1) An interfaced Best-of-breed solution Vendor X Vendor Y Vendor V Vendor Z Vendor V Vendor V 2) Interfaced Application Bundle 3) Best of Cluster
  • 30. Overlappings Gaps Functionality GUI CONTROL ENTITY Functionality problems Can overlapping functionality be switched off ? How can the gaps be filled in ? Do Layering structures fit together ? Do the security en authorization models fit together ? Problems
  • 31. Example : A call center solution An additional Email management COTS-solution can lead to additional redundancy in data and functionality Multi-channel Front-office Outbound Inbound FAX Post IVR Web Assist Me Telephone Email GEA Office Visit Current Front-office applications
  • 32. different interface Interface lacks Openness GUI CONTROL ENTITY Connectivity problems Problems DCE ? Corba ? JAVA RMI ? SOAP ? SQL ? XML ? DDE ? OLE automation ? DCOM ?
  • 33. Example : A call center solution The Additional Email management functionality must be integrated with the current call center functionality Windows-server Edge software architecture Edge server Windows-client (1) Windows-client (2) Edge client proces (1) Edge client proces (2) SQL Database Edge server proces Edge Terminal Server Edge Terminal Server screen display protocol ODBC client events protocol Read, load or mutation of tables via database tools, API’s and/or ODBC TCP/IP-Socket ActiveX Client/server C-libraries Edge server proces Windows-server Dcom Server ActiveX CTI A prosible bridge to other communicatie protocols Application ActiveX HTML Browser HTML Server HTML Presentation Interface Function Interface Data Interface Type of interface DDE, ActiveX, HTTP/HTML, TCI, TCP/IP-sockets, DCOM, MQ/XML ODBC/SQL Protocol Interfaces and protocol ? DDE
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Product Assessment Factor (1) Current released version of the product fully meets our requirements Current released version of the product meets most of our requirements. Future version fully meets requirements. Current released version of the product must be modified (by either the vendor or us) to meet our requirements. Functionality Product fully meets performance requirements for system. Product nearly meets performance requirements and shortcomings are not critical, or will be met in future versions or with hosting on faster hardware. Product does not meet performance requirements in critical areas (e.g., transactions/second). Performance Product is available on target platform and hosted on other platforms that may be required in future. Product is hosted on single platform required by system —not hosted on other platforms Product is not currently hosted on target platform — may be in future. Platforms Product meets security requirements for project. Product meets most security requirements for project —others can be handled procedurally or using other means. Current version of product will not handle security requirements of the project. Security Product meets security requirements for project. Product meets most security requirements for project —others can be handled procedurally or using other means. Current version of product will not handle security requirements of the project. Security Product is stable and has proven itself over time with its customer base. Product can handle error situations gracefully and recover. Product has occasionally errors but none will result in data loss or other critical problems. Product has errors that result in data loss, work lost, system crashes, etc. Reliability Low Risk Moderate Risk High Risk Example Of Product Evaluation List Product Assessment Factor (1)
  • 39. Product Assessment Factor (2) Product has an easy to understand interface and requires modest training. Can handle a range of users —from novice to expert. Product requires some training to use properly Product has difficult user interface and requires training for users to become proficient. Usability Product can interface to other products and can be controlled by custom code. Product has some capabilities to interface to other products and custom code. Product is closed and does not work well with other products and custom code. Openness Vendor provides 1-2 optional point releases per year and requires a major release every two years to stay supported.  Vendor requires a major release at least every year to stay supported Upgrades User manuals and support documentation are of extremely high quality. User manuals and support documentation are of adequate quality User manuals and support documentation do not exist. Documentation Product cost has minimal impact on overall system (e.g. little or no reduction or modification of requirements)Product costs up to 50% less than similar products Product cost has moderate impact on overall system (e.g., low to moderate priority reqmts delayed)Product costs within 10% of market average for similar products. Product cost has major impact on overall system (e.g. cost magnitude forces critical reqmts delayed) Product costs up to 50% more than similar products. Cost Low Risk Moderate Risk High Risk Example Of Product Evaluation List Product is stable and has proven itself over time with its customer base. Product can handle error situations gracefully and recover. Product has occasionally errors but none will result in data loss or other critical problems. Product has errors that result in data loss, work lost, system crashes, etc. Reliability
  • 40.
  • 41. Vendor is established company, with quality workforce and facilities. Can attract and retain necessary talent. Vendor organization still fluid, with changes to staffing, work program and facilities. May be in high growth situation. Company is start-up and situation is highly dynamic. Organization Background Low Risk Moderate Risk High Risk Vendor Assessment Factor(1) Solid market position for vendor. Viewed as one of the leaders. Vendor is known in the market or is new entrant that is quickly becoming established. Vendor is not known in this market. Market Position Vendor is working in a market that is well established. Vendor is working in a market that experiencing moderate growth or change. Some vendors will be bought by others Vendor is working in a new market —a volatile situation where products and players are not yet established. Early leaders are often in fleeting positions of market dominance. Market Volatility External reviews from objective sources consistently give high ratings to the vendor’s products. External reviews of the vendor’s products are mixed. The vendor received multiple external reviews that indicate problems with product quality, schedule, etc. External Reviews Vendor has strategic partnerships with several other vendors with complementary products and services. This may provide other opportunities to use COTS. Vendor has a few partnerships, some may be too early to determine strategic utility. Vendor has limited or no partnerships. Partnerships Vendor has solid financial situation, including growing revenue stream, strong ratings. Vendor has a mixed financial picture. May have strong revenue stream but no profit margin. Vendor has financial problems, such as poor credit, low revenues, low profit margin or ROE, etc Financial Example Of Vendor Evaluation List
  • 42. Easy to gain insight into future business direction of vendor. Easy to access key personnel at vendor. Some insight into future direction of vendor. Can access key personnel some of the time. Future business direction of vendor is unknown and access to key personnel is difficult. Access and Visibility Low Risk Moderate Risk High Risk Vendor Assessment Factor(2) Example Of Vendor Evaluation List
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.