Skip to main content

Out-of-the-Box - Avoding Custom Side-effects

In my experience.. Most large software infrastructure product deployments run into the path of becoming non-standard implementations.

IT decision makers are faced with a barrage of requests for customisation even after initial deployment of the product. The pressure of these requests drive even the very seasoned managers in to a trap of massive customisation. These changes end up in the installation without objective evaluation of real and percieved business value and their impact.

This is worse..if the changes are executed during the roll-out or right after....

The resulting deployment is vulnerable and may result in:

1. Lack of Stability
2. Complication in Upgrade path
3. Less security

The Support issues around such implementation cause undue stress on the staff.

The other side of the coin is an arguement about the importance of functionality for improving efficiency and user experience.

A Tight control on the finalization of requirements during pilot phase, A Disciplined approach towards function testing and User Acceptance testing, Feature Benchmarking of Similar sized Application Deployments are key to maintain a healthy balance.

In my opinion, When deploying new products...It is better to err on the side of caution and work work towards implementing a standard out-of-the-box product with minimum customization to ensure a simple, secure and scalable installation.

This Approach can be coupled with stacking up the incoming feature requests and enhance ments requested after the initial roll-out into a planned next revision of the deployment.

In this way.. The change requests can be carefully evaluated by the vendor and the implementation team. They can proiritised based on their impact on simplicity, security and scalability of the deployment.

Comments

Popular posts from this blog

Living a dream...five years of moving from services to lasting products.

RCV innovations has transformed from a training and consulting outfit to product based services organization.  The last five years had a see-saw effect on our existence as a viable business. We cannot forget the contributions of our mentors, early patrons and partners- Niranjan, Brad, Rakesh,Dorothy, Avik, Supriya, Sridhar, Bhaskar, Jaipal, Kishan, Joseph, Goutam, Mishra and many others. I am deeply moved by the faith some of our new customers have placed on us by adopting VAMANiT appliances for their business needs. Our team is grateful for the opportunity to serve you to the best of our ability. I am humbled by the commitment and excitement the team has shown in executing our new Nested Data center strategy. The pace at which we have trained ourselves in cutting-edge VMware vSAN and NSX technologies is noteworthy.  We are applying our VMware knowledge to Strategic and Mission critical applications by integrating energy efficient purpose built VAMANiT Nested Data ...

RAINing Appliances in the Clouds

Appliances always had a soft-corner in Data center and cloud strategy. My Brush with appliances started in early 2000. We were looking at soultions for traffic management and billing for small ISP. the solutions with software and hardware were quite complicated. We came across small company out of Israel called Allot Networks (www.allot.com). they did a good job in a simple way. Later at NVIDIA, I was exposed Netapp for NAS storage which quickly pivoted into block storage with iscsi. they literally gave away the iscsi protocol license for free with the box for a long time. On the network side, my Exposure was with F5 networks while managing nvidia.com. We were facing scalability issues during product launhces and driver release announcements. We tried newer players such as Array Networks and Netscaler while they were in Beta. We ended up assisting and supporting Netscaler with our feedback to evolve the product to have in-memory caching. In VMworld 2013, I have seen a emergence ...

Information Infrastructure for Human Advancement - Vedic thought

Human Advancement is a far-cry when we are living in a world where human existence is threatened by man-made vulnerabilities. Human existence is threatened by Global warming - Natural disasters Health Crisis - Drinking water, Biodiversity/Genetically Modified Food, Virus Outbreaks Materials Crisis - Availability of Petroleum/Rare-earth for EV's (Lithium/Dyspersium) Security Crisis - Cyber Security/Data Breaches Global Political/Economic environment – Sanctions/Tariffs Purpose and Motivation Purpose of this conversation is to discuss the application of emerging technologies in information infrastructure for improving resilience of the human race and aspire for human advancement. This requires understanding key concepts of AI/Deep learning/Machine Learning, Nueromorphic computing and Pervasive computing in the context of  human interactions. There is need for a Multi-disciplinary approach involving Non-STEM and STEM(Science, Technology, Engineering and Math)...