Skip to main content

Out-of-the-Box - Avoding Custom Side-effects

In my experience.. Most large software infrastructure product deployments run into the path of becoming non-standard implementations.

IT decision makers are faced with a barrage of requests for customisation even after initial deployment of the product. The pressure of these requests drive even the very seasoned managers in to a trap of massive customisation. These changes end up in the installation without objective evaluation of real and percieved business value and their impact.

This is worse..if the changes are executed during the roll-out or right after....

The resulting deployment is vulnerable and may result in:

1. Lack of Stability
2. Complication in Upgrade path
3. Less security

The Support issues around such implementation cause undue stress on the staff.

The other side of the coin is an arguement about the importance of functionality for improving efficiency and user experience.

A Tight control on the finalization of requirements during pilot phase, A Disciplined approach towards function testing and User Acceptance testing, Feature Benchmarking of Similar sized Application Deployments are key to maintain a healthy balance.

In my opinion, When deploying new products...It is better to err on the side of caution and work work towards implementing a standard out-of-the-box product with minimum customization to ensure a simple, secure and scalable installation.

This Approach can be coupled with stacking up the incoming feature requests and enhance ments requested after the initial roll-out into a planned next revision of the deployment.

In this way.. The change requests can be carefully evaluated by the vendor and the implementation team. They can proiritised based on their impact on simplicity, security and scalability of the deployment.

Comments

Popular posts from this blog

ForeThought -- Global directory service for the Digital world

ForeThought Real world is full of people. We have phone books,yellow pages, maps and postal addresses to get to them. Real world is governed by laws, rules and norms. Digital world is full of devices and devices only(severs, desktops, appliances, gadgets etc..) In the digital world, We have DNS, IP Addresses/SMTP mail address, Routers/gateways. All of these methods are still rudimentery to lookup and locate attributes, features and functions of devices. Most devices serve a useful purpose. some of them are misused to inflict pain and damage in the digital world. Clear knowledge attributes, features and functions of devices can hel in reducing the risk and help us in responding to misuse of these devices. An idea of a Global Directory Service -- for locating Devices worldwide....These devices are attributed to People, Resources and Services.... This type of service can help in Asset tracking, Monitoring, Communications, Incident response, forensics and Da...

Blueprint for a new ITaaS Service Provider

Cloud computing is raising the expectation on the agility, availability and access to sophisticated computing and communication platforms for small and medium business. Today most critical IT components for running a successful business are available as SaaS, PaaS or IaaS platforms. There is little value in recreating all these services from the scratch by a new age service provider. It may be prudent to create a skeletal platform for essential services while taking a position of services broker to organize a rich portfolio by aggregating important services into tightly knit IT-as-a –Service offering. The initial target market for such a service provider is Small and Medium Business. We will review aspirations and capabilities needed to serve the ever increasing expectations of small and medium customers from a modern service provider. The Vision, Strategy and Execution plan to create a modern Information Technology as a Service (ITaaS) provider infrastructure is described on the...

RAINing Appliances in the Clouds

Appliances always had a soft-corner in Data center and cloud strategy. My Brush with appliances started in early 2000. We were looking at soultions for traffic management and billing for small ISP. the solutions with software and hardware were quite complicated. We came across small company out of Israel called Allot Networks (www.allot.com). they did a good job in a simple way. Later at NVIDIA, I was exposed Netapp for NAS storage which quickly pivoted into block storage with iscsi. they literally gave away the iscsi protocol license for free with the box for a long time. On the network side, my Exposure was with F5 networks while managing nvidia.com. We were facing scalability issues during product launhces and driver release announcements. We tried newer players such as Array Networks and Netscaler while they were in Beta. We ended up assisting and supporting Netscaler with our feedback to evolve the product to have in-memory caching. In VMworld 2013, I have seen a emergence ...