IT ConsultOne           

Strategies for Implementation

Implementations of enterprise level business systems require specific methods for project success. Methods can include Go-Live Readiness. This process involves categorizing assessment tasks that need to be done before Go-Live. This includes Coding, Testing, Installation, Documentation, Training, Support, and Maintenance. There is also what is known as Vanilla Implementation. This means that the system is implemented “as is” and later improved and customized to meet business requirements. Either the business process is changed to fit the system or the system to fit the business process (Pearson Education, 2009). Once development and testing are complete the project team will initiate a business strategy for implementation through piloting. A single pilot site will be selected for implementation to make sure all requirements are satisfied. Other types of performed system conversions are Parallel, Direct, and Phased. Training will be provided to the staff and clients who visit any of the live office locations. Training courses will be conducted for the staff along with tutorials for clients. Reference guides will be created and provided to staff. The project will focus on self-paced training and tutorials to keep implementation costs low. Smith Consulting Corporation will be available to provide ongoing system support and maintenance. Types of maintenance include corrective, adaptive, perfective, and preventative (Valacich, J., & Schneider, C. (2012).

Outsourcing business applications and implementation to third parties must be done by careful analysis of both the cost and security factors (data security) related to the decision. Security requirements for outsourcing must be in a written contract developed by a legal team to safeguard the organization from security threats. An active chief information office and staff should manage the legal and professional relationship (Valacich, J., & Schneider, C. (2012). Property rights and expectations should be clearly detailed to make sure both parties are aware. In-sourcing security requirements included making sure proper hardware and software are in place to safeguard the infrastructure, have resources constantly available for support and maintenance, and secure locations for servers are created.

Pearson Education (2009). Enterprise Systems for Management (1st ed.). Chapter 7.
Valacich, J., & Schneider, C. (2012). Information systems today: Managing in the digital world (5th ed.). Chapter 9. Upper Saddle River, NJ: Pearson Education.
                

Home · Written Works · Projects · Contact ·

Copyright © 2012 ArutyunT.com All Rights Reserved.