Tuesday, December 6, 2016

Disaster Recovery Help for SAMs - 2 of 5


What can you do to recover after the hurricane, tornado, cyclone, tsunami, fire, or other disaster  has left your business decimated. This Knowledge Briefing delivers strategies for preventing yet another series of costly disasters—disasters of man-made origin!

Reduce Costs & Risks by Setting Effective Acquisition & Utilization Criteria for Technology Assets

Starting Over or Starting Out - When you begin planning your new technology, or your post-disaster technology environment, take a very serious look at your genuine needs. What level of hardware did you actually use prior to the disaster? What types of software? What were your problems, complaints, or cost concerns with previous products? The answers to these questions  should become the foundation for your purchasing criteria—requirements & expectations applied to every prospective purchase.

Real WorldAlthough incredibly unfortunate, a disaster gives you a chance very few businesses in the world will ever get—You get to correct previous technology and operational mistakes and plan a substantially more effective future infrastructure.

WIIFM – What's in it (in this briefing) for me? There are two simple ideas in this Knowledge Briefing that you can use to reduce technology costs and risks by as much as 30%. These strategies are applicable to businesses recovering from a disaster as well as new businesses building their first systems management (SAM or ITAM) infrastructure.

Take a look back. Prior to the event, how did you actually use your technology? How did your employees use it? Which of your tech products were genuinely doing the job? Which weren't? What functionalities did you value the most? The least? How much were you spending: On hardware, software, support, and services? How often did you change over to new hardware or new software? Were those changes because you needed the new products, or were they based on the vendor forcing you into the evolution? Did you really need a “genuine Intel” processor computer, or would an AMD or an Apple product be just as effective? Which of your prior software products regularly exposed you as a hackers or piracy audit target? Are there alternative products that you could use to reduce that exposure? Again, are your requirements criteria well thought out and based upon measurable need?

Once you have taken a serious look at the way your business technologies functioned before the disaster, it is time to set the criteria that will guide the technologies you will acquire for the new systems environment.

Here is a big cost reduction. How difficult would it be to rebuild your technologies using open source software? Many quality open source products are now available at no cost or for drastically lower costs than the more popular comparable proprietary products. The differences between open source and proprietary products in terms of functionality and support for the average small business are not as significant as you would expect.

For instance – Could your company use a minimally priced open source product as its desktop productivity suite—say for less than $100 per license? Or would you rather pay in excess of $400+ per computer for a comparable proprietary product? Could you use locally built computers, thus contributing to local growth, or would that multi-national brand name be more economical? Does your local tech community provide enough expertise to support your tech products, or will you pay that multinational company for telephone or email support?

Real WorldPrior to the disaster event, did you find yourself constantly patching and fixing defective systems and software? How much would you save, in labor alone, by moving to products that are not commonly targeted by hackers, malicious code, and counterfeiters?

Unfortunately, the vast majority of small- to medium-sized enterprises/businesses (SMEs/SMBs) acquire and use technologies based upon reactive purchasing instead of the more effective strategic purchase.

Do you want a guaranteed way to save money and reduce risk? Try this easy and cost effective process: Create a simple acquisition criteria template for all future tech purchases. If your personnel cannot clearly define and defend specific criteria for product functionality, do not purchase the product. Acquisition criteria must be directly tied to the bottom line or to improved productivity; and don't forget to ensure that those requirements criteria have not been provided by the product vendor (as is very frequently the case). 

Real World: We used to be able to acquire a perpetual license for most of our software-related products. This license meant that we purchase the product one time and continue to use it until we simply didn't need it any more—the one-time-fee license continued onward at no additional cost. Such perpetual licenses are few and far between in today's business technology environment. To increase their revenue streams, many software publishers have switched to the subscription based licensing scheme (SAAS) that requires you to pay an ongoing yearly fee to continue using the product. Your previous “one-time” cost just became a significant, and constantly escalating, repetitive expense. What's more, in many cases, if you refuse to pay the yearly fee, the licensor can legally shut the product down and deny use until you pay up or remove the product—very costly.

Setting and following acquisition criteria need not be difficult. As you may have gathered by the previous content, there are certain immediate steps you can take to produce instant savings. Remember the KISS principle? Consider the following...   

Real World – Over 80% of companies acquire technology assets (operating systems, software, hardware, & etc) based on ad hoc criteria. Altogether too frequently, ad hoc can be translated into pet product acquisitions. If you do nothing more than take away the free money and establish credible control over the entire acquisition process, you can reduce IT losses by as much as 30%.


Here's how you get caught...

Terrific Tales of Tremendous Terror – Over 60% of major businesses have refused to acquire the latest operating system for their PCs. With their extensive buying power, these large enterprises can afford to delay acquiring newly released products until the software publisher finishes their live beta testing (using customers to work the bugs out of products). Unfortunately, SMEs/SMBs do not have this leverage and must purchase whatever operating system the hardware provider supplies. Result? The business technology consumers least capable of absorbing financial losses due to technology
defects are the very companies that must carry the load.

Fortunately, and pretty much without precedent, an enormous number of PC systems builders have finally made a stand and refused to load the “latest” operating system on customers' PCs. Of course, the product was on the market for nearly six months before the systems providers took action. Take a moment and estimate how much defective software products cost you in down time, consulting fees for patch management, or simply inconvenience. You may want to seriously consider using these losses to gain more mutual benefit during your next hardware acquisition or software license negotiation.

Lots to consider. For now, your assignment is to establish the purchase criteria that most accurately fit your actual needs—measurable needs, not vendor hype. Work on criteria for hardware, operating system, software, and support. Don't forget your printers, copiers, fax systems, email, voice mail, even your cell phone needs. Could you reduce ongoing costs by standardizing on a specific product or service? Could the same standards reduce your exposure to risk issues such as hacking, compliance audits, built in obsolescence or constant unnecessary product feature bloat? I'll be back with more.

Got questions? Comments? Recommendations? Do you have horror stories of post-disaster experiences? Let us know and we'll follow up. I'm Alan Plastow & I firmly
believe that the more you know about managing technology assets, the less money you
will lose to sharp technology industry practices. Or, on the down side, you could always become one of those asset managers who are not permitted to do anything more than count computers and software titles...

No comments: