tag:blogger.com,1999:blog-349165702024-03-06T00:30:35.737-05:00Linking Business, Technology and IntellectThe postings on this site are of their respective authors and don't necessarily represent the positions, strategies or opinions of their employers' or any other entity they are affiliated with.Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.comBlogger147125tag:blogger.com,1999:blog-34916570.post-22694089025705460852023-06-23T06:47:00.001-04:002023-06-23T06:47:16.010-04:00How I Build PMOs in Less than 6-Months<p>Establishing a PMO at an organization can be the difference between execution and hoping for the best. Here I share some key strategies I followed in the past at mid size organizations (200 - 5000) employees to bring up a well-oiled PMO in less than 6 months.</p><p>Secure Leadership Buy-In: It is extremely important to have one C-Suite executive on board with the CIO in this initiative. Having executive leadership sponsorship will empower the PMO leader in promoting ideas throughout the organization, gaining momentum and stakeholder engagement.</p><p>Engage Experienced Stakeholders : Create a network of experienced partners throughout the organization in different areas of operations, strategy, management, leadership, and customer facing roles. This network will be able t provide valuable insights on bottom-line value proposition and ensure the PMO is helping delivering the right KPIs and organizational objectives. A team of PMO advisors are not only your ears and eyes on the ground, they are your advocates and sounding board.</p><p>Clearly Define Objectives and Scope: Before initiating the PMO setup process, clearly define the objectives and scope of the PMO. Determine the specific goals, functions, and services the PMO will provide. This clarity helps in streamlining the establishment process by focusing efforts on the most critical aspects of the PMO.</p><p>Leverage Existing Resources and Templates: To expedite the PMO setup, leverage existing resources and templates that have been proven effective in other organizations. This includes project management methodologies, frameworks, templates, and guidelines. Utilizing these resources saves time in developing PMO processes and documentation from scratch, allowing for a quicker setup.</p><p>Adopt Agile Implementation Approach: Instead of pursuing a lengthy and comprehensive implementation approach, consider adopting an agile methodology for setting up the PMO. Break the PMO establishment process into smaller, manageable phases or iterations. This allows for early delivery of some PMO services, providing immediate value to the organization while continuing to build and improve the PMO incrementally.</p><p>Keep it Simple & Organized: Start off with spreadsheets to track projects, initiatives, requests, issues, risks, objectives and organizational goals. Then build your simple, but modular and flexible internal PMO database. I typically leverage Salesforce.com to build my clients PMO backbone. The ease of application development allows for data storage and relationship building, workflows, approvals and reporting. I also have used SharePoint sites or internal Google Sites to display impact and showcase reporting. Data can be pulled out using tools like PowerBI or other integration tools, Form Assembly can be utilized for demand management and issue tracking, or other input capture throughout the organization.</p><p>Foster Collaboration and Knowledge Sharing: Promote collaboration and knowledge sharing among project managers and teams within the organization. Encourage the exchange of best practices, lessons learned, and project management expertise. This helps in establishing a culture of project management excellence and creates a fertile environment for the PMO to flourish. Our educational brown bag lunches were great ways to build competence throughout the organization and promote strategies, collaboration, knowledge and skills. </p><p>Invest in PMO Team: A key component I have always found invaluable is investing in my project management team's training, conference attendance, internal brainstorming sessions, creating an environment of learning and innovation. It not only boosts team morale, but also keeps the team on the cutting edge of problem solving, strategic thinking, stakeholder engagement and goal achievement.</p><p>Drop me a line and let me know how it goes!</p>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-21387993537515186782023-06-23T06:16:00.003-04:002023-06-23T06:16:26.860-04:00CIOs Practices for Dealing with Economic Uncertainty<p> According to <a href="https://www.cio.com/article/416550/top-9-challenges-it-leaders-will-face-in-2023.html" target="_blank">an article on CIO.com</a>, economic uncertainty is one of the main concerns that keep a CIO (Chief Information Officer) up at night. Below I share some ways CIOs can mitigate the impact of changes to the economy.</p><p><b>Cost Optimization:</b> CIOs should closely analyze their IT budgets and identify areas where costs can be optimized without compromising critical operations. They can explore options such as cloud migration, outsourcing non-essential tasks, renegotiating vendor contracts, or consolidating systems to reduce expenses.</p><p><b>Risk Assessment:</b> Conduct a thorough risk assessment of the organization's IT infrastructure and operations. Identify potential vulnerabilities and develop contingency plans to mitigate risks. This may involve enhancing cybersecurity measures, implementing data backup and recovery solutions, and ensuring business continuity plans are in place.</p><p><b>Agile IT Operations:</b> Implement agile methodologies within the IT department to improve responsiveness and flexibility. Agile practices enable faster decision-making, rapid adjustments to changing circumstances, and efficient resource allocation. This approach allows organizations to adapt quickly to economic fluctuations.</p><p><b>Strategic Technology Investments:</b> Evaluate technology investments carefully, ensuring they align with the organization's long-term strategic goals. CIOs should prioritize initiatives that drive efficiency, innovation, and competitive advantage. They should also consider emerging technologies that can enable cost savings and improve productivity, such as automation, artificial intelligence, and data analytics.</p><p><b>Collaboration and Communication</b>: Foster collaboration and open communication channels with other executives and departments within the organization. Engage in regular discussions to understand business priorities, challenges, and opportunities. This collaborative approach helps align IT initiatives with the overall business strategy, ensuring technology investments are focused on areas that deliver the most value during uncertain times.</p><p><b>Scenario Planning</b>: Develop various scenarios based on different economic outlooks and assess the potential impact on IT operations and projects. By having contingency plans for different scenarios, CIOs can be better prepared to respond quickly and effectively to changing economic conditions.</p><p><b>Continuous Monitoring</b> and Analysis: Establish mechanisms for continuous monitoring of economic indicators and trends. Stay informed about market conditions, industry developments, and regulatory changes that may impact the organization. This ongoing analysis allows CIOs to make informed decisions and adjust strategies accordingly.</p><p><b>Talent Management</b>: Focus on talent retention and development within the IT department. Invest in upskilling and reskilling programs to ensure that the IT team possesses the skills needed to adapt to changing business needs. Retaining key IT personnel during uncertain times is crucial to maintaining stability and continuity.</p><p><b>Vendor Management</b>: Strengthen relationships with key technology vendors and partners. Collaborate closely with them to negotiate favorable terms, explore cost-saving opportunities, and leverage their expertise in navigating economic uncertainty. Effective vendor management can help optimize IT investments and minimize disruptions.</p><p><b>Transparent Reporting</b>: Establish clear reporting mechanisms to provide regular updates to stakeholders on IT initiatives, progress, and the value delivered. Transparent reporting builds trust and confidence among leadership, employees, and external stakeholders, especially during times of economic uncertainty.</p><p>By implementing these strategies, CIOs can proactively address economic uncertainty and help their organizations navigate through challenging times while maintaining operational efficiency and supporting business objectives.</p><p><br /></p>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-10006786652489611072022-08-26T11:01:00.002-04:002022-08-26T11:01:53.711-04:00Simply Ask "Why"<p> <span style="background-color: #1d2226; color: rgba(255, 255, 255, 0.9); font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; white-space: pre-wrap;">It's more common than we think. Lack of end user perspective will ruin a product.</span></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">Yes these images are real. Check out this old post from 2009 https://sys-eng.blogspot.com/2009/04/one-way-to-ruin-great-product-idea-when.html</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">Looking at these three images at three different projects, its clear that even if on paper the design seemed feasible, the implementation team must have noticed the a little more than average steep driveway, or a little too high ATM, they even went out of their way to accommodate an opening 😱 for the lamp post in the balcony's floor.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTXH3j_pzIxeVd1UaOImo3l1nGU8V3imf_SFtzEVrs3ItczMARdcJxXwOx5O-lvO1l7H56i-tuvXM6L4PfcO8rOn2E1bxOZfxIfaIq8n9nqffWLk5W75FBEAGg5jbjkDS69ynvnjeJiGfqvOPaVRG7r71sp_oXF-uNuu7Vztz6xpuhcum08w/s400/lamp.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="400" data-original-width="219" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTXH3j_pzIxeVd1UaOImo3l1nGU8V3imf_SFtzEVrs3ItczMARdcJxXwOx5O-lvO1l7H56i-tuvXM6L4PfcO8rOn2E1bxOZfxIfaIq8n9nqffWLk5W75FBEAGg5jbjkDS69ynvnjeJiGfqvOPaVRG7r71sp_oXF-uNuu7Vztz6xpuhcum08w/s320/lamp.jpg" width="175" /></a></div><br /><p></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">👀 Did the implementation teams just throw a blind eye to the issue?</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">🙊 Maybe they assumed it would go away?</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">🏋🏼 Thought it was an undiscovered innovation? </p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">These are just examples of everyday business issues that happen all the time. Sometimes minor like losing a customer, in others pretty devastating like losing an entire product line.</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">Allowing teams to speak freely their minds, and giving team members the authority to question decisions, and promoting respect and accountability are a few ways to mitigate errors in organizations.</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">The need becomes increasingly important with large portfolios, digital transformation initiatives and situations where projects are too fast or too slow.</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">Just go back to the simple question, WHY?</p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;"><br style="box-sizing: inherit;" /></p><p style="--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: #1d2226; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(255, 255, 255, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;">Agree?</p>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-32383912665952966992021-08-23T18:01:00.000-04:002022-08-26T11:03:07.413-04:00The Impact of Multi-Factor Authentication<p> </p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">According to Google, using Multi-factor Authentication can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during its investigation, as reported earlier this year in a </span></span><a href="https://www.businesswire.com/news/home/20210311005630/en/28.34-Billion-Multi-factor-Authentication-Market---Global-Growth-Trends-and-Forecasts-2021-2026---ResearchAndMarkets.com" style="color: #444444; font-family: "Helvetica Neue", Helvetica, Arial, "Lucida Grande", sans-serif; font-size: 14px;" target="_blank">BusinessWire release</a><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;"> which estimates the MFA market to reach $28 billion by 2026.</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">One of the most important factors in the success of an MFA deployment is user adoption. My experiences deploying MFA for thousands of end users is to engage early with the end users. Engagement typically follows a multi-stage process:</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">1. Leadership Education</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">It is important for the technology team to reach out to the leadership team on the business and end user side, to explain the benefit, impact to business risk reduction and improved data integrity. Discussions should also include a very high level of the technology and how it works (the concept of Who You Are, and What You Own).</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">2. Managers Engagement</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">Managers will be crucial when time comes for go-live to ensure all users have followed the instructions to activate MFA on their accounts. Managers will also provide lists of the users in their departments and their email addresses for the IT team to enable the feature on their accounts, which will allow end users to activate.</span></span></span></p><ul><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">Background on Cyber Security threats and risks</span></span></span></li><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">What is MFA?</span></span></span></li><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">Value Proposition and Benefits</span></span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">End User Impact</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">Deployment Schedule</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">User Guide</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">Technical Support</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">Learn More</span></span></li></ul><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">3. End Users</span></span></span></p><p><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">End users will benefit the most from easy to follow user guides that include screenshots, clear step by step process to follow and information to provide the assurance they are moving in the right direction. A short 2-minute video will come in handy, as well as instructions on how to contact technical support should there be access issues. A table of contents of a good user guide is shown below:</span></span></span></p><ul><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">What is MFA</span></span></span></li><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">Why MFA?</span></span></span></li><li><span style="background-color: #fefefe;"><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="font-size: 14px;">When Will the Change Take Place?</span></span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">What Will the Change Look Like?</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">Where Can I Find Information on Activating My Account?</span></span></li><li><span style="color: #444444; font-family: Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;"><span style="background-color: #fefefe; font-size: 14px;">What to Do if I Have Questions?</span></span></li></ul>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-53996846990361380032021-04-06T13:55:00.005-04:002022-08-26T11:03:38.074-04:00Building a Business Intelligence Shop<p>Not sure where to start in building your business intelligence capability. Check these four major steps.</p><p>A. Strategic Planning</p><p></p><ul style="text-align: left;"><li>Aligning capabilities to needs</li><li>Cross-functional approaches and prioritization</li><li>Understanding demands, dependencies, trends</li><li>Digital transformation</li><li>Define KPIs</li></ul><p></p><p>B. Build the organization</p><p></p><ul style="text-align: left;"><li>Build data-driven culture</li><li>Build transparency and accountability</li><li>Define data governance and data model</li><ul><li>Data architecture, modeling, design, storage and access, security, integration, interoperability, documents, content, master data, reference, data warehousing, metadata, data quality</li></ul><li>Leadership support</li><li>Decision-making process</li><li>Agility and funnel approach, change management and enablement</li></ul><div>C. Managing the Work</div><div><ul style="text-align: left;"><li>Portfolio management, demand management and alignment</li><li>ROI and value management</li></ul><div>D. Service Marketing</div></div><div><ul style="text-align: left;"><li>Portals</li><li>Dashboards</li><li>Websites</li><li>Reports</li><li>Communications</li><li>Customer Network and social interactions</li><li>Marketing to persuade change and efficiencies, cross collaboration</li><li>Monetization of data through updated strategic planning and capability building.</li></ul></div><p></p><p><br /></p>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-72585486589058692162021-04-01T12:04:00.005-04:002022-08-26T11:03:48.773-04:00Business Intelligence<p> Some key components for Business Intelligence are:</p><p></p><ul style="text-align: left;"><li>Context</li><li>Visual representation</li><li>Forecasting approaches</li><li>Machine learning</li><li>Storytelling</li><li>Analysis and meaning</li><li>Action items</li></ul><p></p><p><br /></p>Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-10753536397315281012020-07-16T13:19:00.000-04:002020-07-16T13:20:06.746-04:00Telehealth Promises Higher Quality of Life for Rural America<div dir="ltr" style="text-align: left;" trbidi="on">
It is not uncommon to find lesser access to healthcare capabilities in rural pockets of the world, and this holds true in the United States as well. A 2017 CDC report showed that death rates in rural America due to cancer are higher than urban communities. With recent changes to telehealth revenue models, and relaxed federal regulation, telehealth capabilities bring promise to areas that are hard to access service, as providers can extend their services into rural areas of states in which they are credentialed.<br />
<br />
In June, the Federal Communications Commission (FCC) announced that it would be opening opportunities for healthcare providers to receive funding for infrastructure build-outs and improved access for patients. Funding can be used to provide clinical monitoring devices for patients's use at home, or telehealth software and hardware by providers.<br />
<br />
Solo and small provider groups, along with large medical systems can extend their reach beyond their local zip codes. The playing field is not totally equal to all clinicians, but a specialist in Baltimore can certainly start providing telehealth services to residents in Western Maryland through the click of a mouse. The smaller practice can up with innovative billing models which still hold effective to the patient maybe even without using insurance, as they leverage lower overheads and direct personalized care. The larger provider groups benefit from the marketing economies of scale, more aggressive advertising, but are constrained by less flexible revenue models, large overhead, and the less than optimum agility to adopt solutions.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ru52GxP364UuVZl_5HQP142In4hOHugUMjY_KYFh4kkoh36sl24Nq7A-u-qujnzXCUPR10gigmGnuBdqtQfvuyI-M0-d6kCAR4WB9wQuQoOBD0JuD4KhUnnEHRkjD3L8gTm9/s1600/Carefinitive+Banner+%25283%2529.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="200" data-original-width="600" height="106" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9ru52GxP364UuVZl_5HQP142In4hOHugUMjY_KYFh4kkoh36sl24Nq7A-u-qujnzXCUPR10gigmGnuBdqtQfvuyI-M0-d6kCAR4WB9wQuQoOBD0JuD4KhUnnEHRkjD3L8gTm9/s320/Carefinitive+Banner+%25283%2529.png" width="320" /></a>Many successful implementations have shown promise such as in the case of an <a href="https://www.healthcareitnews.com/news/telehealth-can-improve-cancer-care-rural-areas" target="_blank">oncology program in California</a> which helped bring patients closer to caregivers especially during the brutal months of winter. The program reached accreditation by the commission on Cancer and has seen a growth of 8X over two years from 60 patients to 500 patients back in 2008.<br />
<br />
The vendor and solution provider landscape is offering more innovation than a few years ago, and opportunities for easier access, higher value proposition and more personalized care with smarter revenue models cutting out the middle insurance broker are becoming more of a reality, especially in preventative and monitoring care. Generally speaking, patients adherence to long term is not strong, with closer engagement with their care providers the likelihood of adhering to guidelines and recommendations is much higher, leading to <a href="https://www.sciencedirect.com/science/article/abs/pii/S0738399113001845?via%3Dihub" target="_blank">improved health outcomes</a>.<br />
<br />
Examples of telehealth solutions that are creating personalized experiences for patients through access to a stronger medical ecosystem are <a href="https://www.siemens-healthineers.com/en-us/digital-health-solutions/digital-solutions-overview/patient-engagement-solutions/e-health-solutions" target="_blank">Siemens Healthineers</a>, and <a href="https://www.vianovahealth.com/" target="_blank">Vianova</a>. Standards groups such as Institute of Electrical and Electronics Engineers (IEEE) are actively working on interoperability standards for devices and data across solution providers. The IEEE P2933 work group focuses developing a framework for the clinical IoT data and device Interoperability with TIPPSS (Trust, Identity, Privacy, Protection, Safety, Security) principles. This includes wearable and other clinical IoT enabled devices and their interoperability with healthcare systems including Electronic Health Records (EHR), other clinical IoT devices, hospital devices, and future devices and connected healthcare systems.<br />
<br />
#telehealth #patientmonitoring #P2933 #healthcare<br />
<br />
<i>Ayman Nassar is an industry expert in project and portfolio management with over 25 years experience in architecting business solutions through optimum alignment of technology and business to achieve meaningful results. He is also a member of IEEE P2933 helping bringing patients closer to improved quality of life through robust and seamless telehealth solutions. He can be reached at anassar@anassar.net or https://www.linkedin.com/in/aymannassar/</i></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-54385679151692723942020-07-14T13:57:00.002-04:002020-07-14T13:57:22.143-04:00What is Your Telehealth Roadmap Strategy?<div dir="ltr" style="text-align: left;" trbidi="on">
There is no doubt that COVID-19 has been a major catalyst in accelerating telehealth solutions. Many medical care institutions have had some flavor of telehealth prior to COVID-19. For some organizations the telehealth capability took the form of provider to provider consults. In other cases it could have been a simple portal where patients login and provide some basic information about their vitals and how they are feeling. COVID-19 however pushed the boundaries on every provider to find out ways to provide virtual encounters via video and audio remotely as both providers and patients have been quarantined and stay-home orders were in effect.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBV9CFQaUCVS2GK85iJM5cEgf4noN763tSWoBdd4aBmOjXuPdEi5Snmm1cxSLJFOlWsuV2oOHcteqYMPplWE1TfUyRAUZ7gIKZKAHH05mwK0ZJzF7ITTc4-dpTMFvM7YCgQrpo/s1600/Carefinitive+Banner+%25281%2529.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="200" data-original-width="600" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBV9CFQaUCVS2GK85iJM5cEgf4noN763tSWoBdd4aBmOjXuPdEi5Snmm1cxSLJFOlWsuV2oOHcteqYMPplWE1TfUyRAUZ7gIKZKAHH05mwK0ZJzF7ITTc4-dpTMFvM7YCgQrpo/s1600/Carefinitive+Banner+%25281%2529.png" /></a></div>
<br />
<br />
As healthcare organizations scrambled to deploy quick solutions which in some cases were not HIPAA compliant, and were far from fool-proof, leaders have to the realization of the need to operationalize the capability, as well as develop a vision for what it would look like over the short term, next 12-24 months. This need becomes of a higher need as regulations undergo some changes, compensation models innovation are occurring, and patients expect the service, not to mention potential subsequent COVID-19 waves as witnessed this morning in California as it re-enters into a State of Emergency.<br />
<br />
So what are some considerations for a sound telehealth roadmap?<br />
<br />
I like to break down the strategy into two distinct areas; the first is what I call the foundational phase, the second is the deployment and roll-out phase. Telehealth capabilities are more than technology. The successful realization of telehealth capabilities requires addressing culture, business rules, workflows, technology security, data analytics and operational key performance indicators (KPIs) in the clinical, revenue cycle and supporting operations areas.<br />
<br />
Setting the foundation is the main focus of the initial component of the roadmap, and involves these activities:<br />
<br />
<ol style="text-align: left;">
<li>Establishing a well-oiled enterprise portfolio management office. A group that can facilitate C-Suite discussions to define key business KPIs, and define approaches to track them on a daily basis, and view projects as investments translating delivered work into measurable value that can be translated into financial and operational metrics that the CFO and COO can appreciate and utilize. To maintain autonomy the group should have the empowerment to coach chiefs on thinking outside of their areas and think strategically. In some models the group would report to the CEO, or to all chiefs, but have autonomy to make decisions based on sound approaches and documented rules. Another common model is to have the group report to the CIO, as almost all solutions today are data-driven and technology enabled. Today's successful CIO's are those who speak in the language of the business and are empathetic with the needs of clinicians and their patients.</li>
<li>Fostering and nurturing an organizational culture of accountability, patient value proposition and organizational mission. Unfortunately, not too uncommon is many organizations in the industry suffering inefficiencies. Examples of these inefficiencies are clinician controlled organizations which tend to prioritize physician convenience over patient care reflected in scheduling rules, availability, triaging rules, decision making, patient volume accountability and documentation maintenance. Another common inefficiency is tactical leadership in the C-Suite that fails to think strategically across the organization, unable to define heat maps, or poorly identifying existing and needed business capabilities and lack of prioritization of initiatives, losing track of meaningful KPIs and creating silos. Focus should be on business rule simplification, process streamlining, capability and asset inventory, architecture documentation, and change management and enablement processes.</li>
<li>Investing in a strong supporting infrastructure represented in IT security, network and server technical capability, enterprise architecture, project management office, talent development, compliance and a legal support team. Unfortunately many healthcare organizations view their IT departments, legal team and HR recruiters as cost centers, rather than value development centers. Together these supporting teams can strategically build and support a strong value stream by weaving a strong strategy map in conjunction with the operational leaders of the organization, mainly in the clinical and revenue cycle sides. The formation of these guiding teams and the chiefs engagement directly with these teams is a key requirement for success. Chiefs shouldn't be immersed in fighting daily fires, leaving strategic growth initiatives to become second priority.</li>
</ol>
<br />
Next comes the deployment and roll-out phase which focuses on two main components<br />
<br />
<ol style="text-align: left;">
<li>Problem Definition and needs analysis coupled with a visioning exercise checking its alignment to the organization's mission has proven very powerful to validate the scope of the telehealth roadmap and it's capabilities.</li>
<li>Solutioning and a strong market research of offerings, comparing off-the-shelf products and their fit to the healthcare organization's environment and configuration at a feature and use case level is the next value-add activity. This can be achieved through vendor presentations, RFPs, in person demos of well-defined use cases reflective of the organization's workflows. This piece of work should include integration concerns across vendors, and how the integration will address the organization's specific business rules and the level of adaptation of the technology to the changes in business and clinical operations.</li>
<li>Building a strong partnership model internally and externally with key stakeholders and vendors to implement the solution and telehealth capabilities under the oversight of the guiding team, utilizing the enterprise portfolio team and project management office as the internal auditors of the roll-out, providing continuous feedback and opportunities for process improvement.</li>
<li>Once these high level stages can be put into place, the problem of defining which telehealth model to deploy (virtual health, peer to peer consultations, third-party contracted services) becomes a simple task, followed by a more detailed definition of telehealth capabilities and types of clinical encounters and a roll-out plan across the various specialties or a big-bang approach.</li>
</ol>
<br />
In summary, before worrying about COTS vs inhouse implementation, or Electronic Health Record (EHR) and Practice Management (PM) embedded vs integrated solutions, or the features a doctor can perform, the organization needs to think strategically at a macro-level to build a solid foundation in an agile manner to ensure a valid business and revenue model. This will ensure a scalable roadmap that can be incrementally implemented providing value realization to both the organization and the patient, focusing on what matters and what makes the organization unique and well-positioned for longer term growth.<br />
<br />
<i>For more information on telehealth advisory services visit carefinitive at </i><a href="https://www.linkedin.com/company/68234600/admin/"><i>https://www.linkedin.com/company/68234600/admin/</i></a>. <i>Ayman Nassar is an industry expert in project and portfolio management with over 25 years experience in architecting business solutions through optimum alignment of technology and business to achieve meaningful results. He can be reached at anassar@anassar.net or https://www.linkedin.com/in/aymannassar/</i></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-53635083532912469742018-06-21T10:39:00.001-04:002022-08-26T11:04:35.855-04:00Speak Up<div dir="ltr" style="text-align: left;" trbidi="on">
Ever been in a meeting when someone is presenting a topic, or making a statement and then the discussion goes on, towards the end the facilitator asks if there are any questions or comments, and its all silence. Ten minutes after the meeting is over the complaints starting roaming around on emails and phone calls. People whining and complaining about that idea that was thrown out there, or that comment that was made in the meeting. Sounds familiar? So how does a project manger handle office rumors, perceptions, she said, he dictated. It's simpler than it seems, just speak up.<br />
<br />
Speak up on calls, that is why we have them. to share your points and opinions and be heard. Otherwise keep your peace forever and do not complain off-line.</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-85656536697796933532018-04-05T10:47:00.000-04:002022-08-26T11:04:21.263-04:00A Framework for Enterprise Portfolio Management<div dir="ltr" style="text-align: left;" trbidi="on">
It's all about chosen the right set of initiatives and project to deliver the needed value at the right time and with the right investment. In Systems Architecture lingo its the optimum validated design, in stock manager lingo it a balanced nest. In the early 2000s I wrote extensively on value proposition and value management, the diagram below illustrate the position of value management across the grand scheme of things. Enjoy<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggFA5eChC4x9Ypvo8_7csa3P2tvfbTIKWqrWX_6ZIbu-U_Hlqwb7PTXh81fC5oQzbpj6ZCKYusyFSnskjUD7jwrT5uusORKKadyh6phjJzUDWN9Rk7gUtsFbp67luRhB-6E89t/s1600/Public+Portfolio+Mgmt.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="960" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggFA5eChC4x9Ypvo8_7csa3P2tvfbTIKWqrWX_6ZIbu-U_Hlqwb7PTXh81fC5oQzbpj6ZCKYusyFSnskjUD7jwrT5uusORKKadyh6phjJzUDWN9Rk7gUtsFbp67luRhB-6E89t/s640/Public+Portfolio+Mgmt.jpg" width="640" /></a></div>
<br /></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-74240057337977598892018-03-26T16:39:00.000-04:002022-08-26T11:04:54.496-04:00ETL Move to Production Considerations<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Extract, Transport and Load (ETL) work is a common
method to connect systems using manual or scheduled batch jobs. Blow are common items worth considering when
building an ETL and turning it over to your operations team. We holding knowledge transfer meetings the items below are usually of most importance.</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Functional
description</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Batch / Automated
Job Names</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Frequency / Timings
of Batch Jobs</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Potential Errors </div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Error Handling</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Exception Handling</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Escalation Path</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Diagrams</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Interface Names</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Server / System
Names</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
ETL Tool Version /
Vendor Support</div>
<br />
<div style="font-family: Calibri; font-size: 11pt; margin: 0in;">
Security Parameters</div>
</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-74720838021872771812018-02-07T09:36:00.001-05:002018-02-07T09:36:44.217-05:00Project Governance Transitioning<div dir="ltr" style="text-align: left;" trbidi="on">
Ocassionally project managers transition out from a project due to relocation to another business area, termination or incompatiable skill set. So what are some of the items that the new project manager needs to check and receive from the departing project manager? The list below is what I have found the most important artifacts to enable a smooth transition.<br />
<ul style="text-align: left;">
<li>Project charter</li>
<li>Latest status report</li>
<li>Open items punch list / issue list</li>
<li>Progress Map (where does the project fit on the lifecycle of a typical project)</li>
<li>Team / Stakeholder roster</li>
<li>Approvals Matrix (list of approvers and evidence of approvals</li>
</ul>
<div>
</div>
Both departing and onboarding project managers should schedule a meeting to review these pieces of information, and then a followup meeting with the stakeholder to ensure all expectations are clear.</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-65304393729059115192017-12-07T11:00:00.003-05:002017-12-08T17:30:26.884-05:00Software Transition Plan<div dir="ltr" style="text-align: left;" trbidi="on">
Building a system is one thing and turning it over to production for the end users to reap it's utility is a totally different beast. Transitioning products to production involves training, documentation, support knowledge transfer, operational procedures, production readiness and end of life disposal. It is a complex process and requires good governance and leadership. A well known systems hueristic emphasizes that systems are least stable when transitioning from one governance mode to another.<br />
<br />
<br />
Each of the areas above could require a detailed plan or set of checklists to ensure all needed actions have been considered. In this post we will focus on software products, and list below key items that should be included in a transition plan.<br />
<br />
<br />
Training should cover all required functions by the end user, and should include special cases. emphasis should be on how to process business rules, verify transactions, run reports and review output. common artifacts used are handouts, videos, training web pages, online webinars, in person train the trainer sessions.<br />
<br />
<br />
Documentation includes defect logs, knowledge base tip sheets, escalation procedures, notification requirements, schedules for batch jobs, lists of interfaces, details of interfaces, expected outcomes, lists of vendors, data sheets, user guides, admin guides, support levels and contacts. Requirements documents and functional specifications should also be shared with the operatonal support team for reference, manitenance and operational support puproses.<br />
<br />
<br />
Support knowledge transfer usually takes place in progrsssive iterations in the form of meetings between the project development team and the operational transition team, it is a series of engagements of experts to transfer knowledge, review details of the software and identify all the transition requirements including the development of a transition plan and its execution.<br />
<br />
<br />
Operational procedures are covered in the documentation above and also include run books, special processes for data archiving, licenses renewals, IT business functions and upport such as security audits, threat analysis and similar processes.<br />
<br />
<br />
Production readiness covers the setup and installation of the software, user configuration, secuity profiles, smoke testing, functional spot checking, final hardware configuration and monirtoring systems (reportsing / dashboards) setup.<br />
<br />
<br />
Finally end of life support should be considered at time of transition to ensure the user population understands how to dispose of the software at end of life, how to extract data and migrate into industry standard formats as needed.<br />
<br />
<br />
The links below provide some more details and templates<br />
<br />
<br />
<a href="https://www.projectmanagement.com/content/processes/10352.cfm">https://www.projectmanagement.com/content/processes/10352.cfm</a><br />
<br />
<br />
<a href="https://www.projectmanagement.com/content/processes/10350.cfm">https://www.projectmanagement.com/content/processes/10350.cfm</a> </div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-73423299905602584692017-10-23T09:35:00.000-04:002017-10-23T09:35:30.066-04:00Performance Challenges on the Cloud<div dir="ltr" style="text-align: left;" trbidi="on">
<div>
</div>
<div>
</div>
A typical cloud implementation could have hundreds of CPUs running in parallel. Some cloud solutions could be like an S-class Mercedes, however to leverage its muscles, it needs to be configured and fine tuned to reflect an efficient model. Examples of factors affecting a cloud implementation performance would be the number of Key Figures in an Integrated Business Planning (IBP) solution. The more Key Figures the higher the demand on the system and lower the performance.<br />
<div>
</div>
Examples of common cloud performance challenges I have seen on SAP and Salesforce implementations are:<br />
<ul style="text-align: left;">
<li>Slow login time which is usually driven by network latency, demand on the enterprise SSO or other security system, firewall settings, or network device configurations. </li>
<li>Dropped connections could be difficult to troubleshoot. On one implementation SAP users would receive a dropped connection error on an intermittent basis after about 30 minutes of being active on the system. Two weeks of troubleshooting uncovered the root cause of the issue was not due to the SAP cloud, but a misconfigured load balancer group of servers at one of the client's data centers.</li>
<li>Initial load of templates, views and report runs are common issues when customers process large amounts of data. On a healthcare SFDC implementation the customer had a Contacts view for all its members, a whopping 1.5 million records. Obviously loading the view would take a few minutes of its agents staring at their screen. Educating the client on customizing the views to show members in a particular region, or who match certain filter criteria allowed them to view smaller data sets which were also more meaningful to their work.</li>
<li>Refresh time is also a factor of the amount of data being retrieved, the browser </li>
<li>Simulations</li>
<li>Long running queries</li>
</ul>
<div>
</div>
Vendors constantly monitor their cloud operations checking memory utilization, background jobs status, CPU utilization, table sizes, system activities, and other performance KPIs to ensure optimum performance for their customers.<br />
<br /><br />
<div>
<br /></div>
<div>
SAP key figure calculations can reach 10 million rows per second for its IBP solution in some implementations. Some factors that can affect that metric are data aggregations, projection, joins and uinions. In general loading a Planning View is dependent on the slowest Key Figure atomic calculation speed and the volume of data it processes. Using filters can sometimes be effective if it reduces the number of stored Key Figures that are defined as inputs to a calculation chain. However if filters do not affect the number of key figures and only affects data size the impact on performance might be minimal.</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
</div>
</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-44442529309425725912017-10-04T13:50:00.002-04:002022-08-26T11:05:09.223-04:00Are You Asking Your Engineer to Do the Impossible?<div dir="ltr" style="text-align: left;" trbidi="on">
It is important for engineers building systems to understand how the organization will support the utility of their end product. I was asked to weigh in on a dispute between an IT vendor and a large multinational corporation. The vendor claims the IT security work has been delivered and they installed the systems and built the infrastructure needed. The IT sponsor at the corporation claims the implementation is not working.<br />
<br /><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsFSqfPMIe4d4r7f6LnylZKHSMBIWEs_di125blO-wcLhfnMzFv3mhutDCoAbgndUpOKuh7cdMU1m2gcMAy4gx338UZnyYo0vwojQN0cjdwECMe7tqUsLSQgvMvrCt7WMagIHY/s1600/techpolicy.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="960" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsFSqfPMIe4d4r7f6LnylZKHSMBIWEs_di125blO-wcLhfnMzFv3mhutDCoAbgndUpOKuh7cdMU1m2gcMAy4gx338UZnyYo0vwojQN0cjdwECMe7tqUsLSQgvMvrCt7WMagIHY/s400/techpolicy.jpg" width="400" /></a></div>
<br /><br />
<div>
</div>
Upon closer observation and after discussions with the technical team members I was able to identify the root cause of this confusion. Both entities were correct, the vendor indeed did deliver the work per technical spec, and indeed it was not serving the business objective the sponsor expected. <br />
<br />
<br />
In a nutshell, the technical implementation was done correctly. However the way it was used by end users was not what both parties had envisioned causing certain portions of the solution to go out of sync with other components in the system, causing configuration errors yielding diluted value of the implementation. What was missing was an organizational policy that guides end users to follow certain process changes. Once the end users would follow the new organizational policy, and back doors were no longer allowed, the system components would be in sync and operate correctly.<br />
<div>
</div>
The summary of this experience is that for a technology implementation to work properly the following need to occur in advance.<br />
<ul style="text-align: left;">
<li>Clearly articulate the updated operational process flow</li>
<li>Ensure governance and policies support the new process flow </li>
<li>Develop controls in the IT implementation to to enforce the policy</li>
</ul>
<div>
Without the three components the net realized value and user experience will be suboptimal. This is of course assuming all other standard best practices of system development have been followed from concept to deployment.</div>
</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-53881159520175692162017-09-13T15:25:00.000-04:002017-09-13T15:26:29.266-04:00Closing on Poorly Contracted Projects<div dir="ltr" style="text-align: left;" trbidi="on">
I was once asked to help with a large transformation program at a fortune 500 product development company. They had outsourced several IT security transformation projects to a vendor. The contract was very poorly written, more assumptions than deliverable were listed, the deliverables listed were not measurable and there was too much loose information. The projects which were supposed to take six months each ended up taking three years.<br />
<div>
</div>
I was faced with one of two options, spending dozens of hours sifting through project change requests, meeting minutes and status updates for three years' worth of work, or some up with an agile, fair, and meaningful approach to close on the three. Luckily, I was provided a punch list that a former project manager in the past had felt was all the work items missing. The punch list helped me make the decision to choose the latter option and follow an agile approach to close out on the project. I followed some simple steps;<br />
<div>
</div>
<ol style="text-align: left;">
<li>Setup weekly punch list calls</li>
<li>Defined my role and the objective of the effort</li>
<li>Went through the list each week</li>
<li>Compared to the original contract </li>
<li>Identified any gaps</li>
</ol>
<div>
</div>
These five steps might seem straight forward, which they are, except when you have two teams, one representing the client always asking for additional items which are mainly operational enhancements and not project deliverables; and another team which is the operational team on the vendor side fulfilling these requests, not realizing that they are also playing a role as the project vendor team. This is the crux of the complexity. It is not that the projects were not closed out, and not in production, they were indeed open projects, but the work delivered is well in production use for years, with new teams on board from both sides and now people are not considering the original baseline or expectations, they are comparing with the day before. It was a continuous bleeding scar for both companies.<br />
<div>
</div>
So the trick in closing these projects in addition to the agile process above was <span style="font-family: "times new roman" , "serif"; font-size: 12pt; line-height: 115%;">assertiveness</span>, clarity, separation of duties and the ability to act as a mediator and setting a clear measurable deliverable for each open item, with the confidence to act as a business analyst or contract manager specifying the measurable deliverable as needed on the go.</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-82341015852276070862017-09-13T15:22:00.001-04:002017-09-13T15:22:23.045-04:00When its Time to Close a Project, Close it<div dir="ltr" style="text-align: left;" trbidi="on">
It's in the best interest of the project, its sponsor, the team and the business to close a project when work is delivered and value is realized. I have come across several instances where the client feels the urge to keep the project open for one reason or another. Here are common cases where project teams keep the project open.<br />
<div>
</div>
<br />
<br />
<br />
<ul style="text-align: left;">
<li>Waiting for a new feature in a future COTS product release</li>
<li>Few minor defects not fuly resolved</li>
<li>Extra funds are available</li>
<li>It will be hard to get approvals for a new project</li>
<li>No guarantees that team members will be available in the future</li>
</ul>
<div>
</div>
None of these reasons are legitimate reasons to keep a project open. Open projects are like potholes, they only accumulate trouble until they get out of control and then need a complete removal and replacement with a new project. If the business value has been delivered, close it, move on and start a new one if needed when the time comes.<br />
<div>
</div>
</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-5359384603078780462017-09-13T15:17:00.003-04:002017-09-13T15:17:49.653-04:00What is an IOT Platform<div dir="ltr" style="text-align: left;" trbidi="on">
IOT Platforms come in different flavors and capabilities. IDC defines an IOT platform as follows:<br />
<br />
<br />
<div>
</div>
<ul style="text-align: left;">
<li>connects to and manages IOT endpoints</li>
<li>ingest and process IOT data</li>
<li>visualize and present IOT data </li>
<li>builds and hosts IOT applications</li>
<li>integrates IOT data into existing applications</li>
</ul>
<div>
</div>
Do you have a different definition?<br />
<br />
<br />
<br />
<br />
<br /></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-42294123900578052292017-08-13T13:22:00.000-04:002017-08-13T13:22:46.056-04:00I Received PMI Agile Certification This Week<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: left;">
This week I sat for the PMI-ACP exam and passed. It is a 3 hr 120 question examinations touching on several areas of the agile practice. As Certified Scrum Master, it required minimal preparation.</div>
<br />
<br /></div>
<div data-iframe-height="270" data-iframe-width="150" data-share-badge-id="12976715-aa42-46f3-9b16-b113f7a7f07e">
</div>
<script type="text/javascript">
(function() {
var s = document.createElement('script');
s.type = 'text/javascript';
s.async = true;
s.src = '//cdn.youracclaim.com/assets/utilities/embed.js';
var o = document.getElementsByTagName('script')[0];
o.parentNode.insertBefore(s, o);
})();
</script></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-26839638416920381082017-08-06T11:27:00.004-04:002017-08-13T13:26:39.018-04:00Do Not Shortcut the Instruments or Tools to Realize the End Product<div dir="ltr" style="text-align: left;" trbidi="on">
This weekend I invited a close friend of mine to visit a nonprofit leadership center I oversee to give us some advice. He is a seasoned executive at a large retailer and supervises dozens of stores around the region. As head of the institute, and the main instructor my attention is usually drawn to compliance, curriculum and the overall performance of the organization. As he walked in he joined the trailing part of a financial reporting meeting and offered a couple of suggestions for a new program, we then proceeded outdoors to take a holistic view of the organization from outside. What comes next was very interesting.<br />
<br />
He pointed out weeds on the sidewalk, and some stains on the building trim. Then he pointed out a few items that are not obvious to someone like myself who mostly focuses on the results and end deliverable. In other words he was able to make me realize that sometimes we get so entrenched in the mission or objective of the project; or we are operating on an agile framework delivering the next generation product while in the process the tools and artifacts used to get there are sub-quality.<br />
<br />
Quite often on complex technology projects the team is busy delivering product value and checking off the deliverable list, while in the process they neglect the tools and instruments used to achieve those deliverables. For example the engineering team might produce a set of technical documents, however the document might not be totally polished like one that is being presented to the end user; margins might be inconsistent, different fonts on the same page, figures not numbered.<br />
<br />
Agile project management should not mean producing internal PMO artifacts that have mismatched fonts or different font sizes, margins that look off, or a document that is lacking a table of contents. While it is true the client will never see these documents, and its only for the purposes of planning, but the fact that an instrument overall quality and aesthetics will eventually reflect the end product.<br />
<br />
The lesson I learned is that a good balance across all areas of a project or organization is required. It is not enough to have a quality product, even if it sells well. The process in achieving the product also needs to be totally shiny and attractive even though the client is not paying for it.</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-21982435792622530952017-08-03T11:38:00.001-04:002017-08-03T11:38:51.357-04:00Common Project Initiation Check Points<div dir="ltr" style="text-align: left;" trbidi="on">
Businesses initiate projects differently, some places have long cumbersome tasks that need to be completed prior to kick-off a project. Others might be simpler. I share some common tasks that usually are required for a new PM to get through before she can have that first team kick-off.<br />
<br />
<br />
<h3 style="text-align: left;">
Sponsor Funding Approval</h3>
This could also be referred to as appropriation request approval, budget allocation approval, capital investment approval or charter approval. Basically the sponsor signs off on a document that he has the available needs funds and specifies the total dollar amount of these funds. Some organization have set times when approvals are made and sent to the IT/PMO organization, in other cases it might be on an ad-hoc ongoing basis, where requests are queued up and processed by the IT/PMO organization at specific dates of the month or the quarter.<br />
<br />
<br />
<h3 style="text-align: left;">
Resource Allocation Approval</h3>
This approval usually is made by the organization which is delivering the work. If it is an IT project then the IT group that will actually design, build and test the product or system being developed as part of the project charter. The fact that funding is available by the sponsor does not guarantee that the delivering organization has the capacity to work on the project during the period wished by the sponsor.<br />
<br />
<br />
<h3 style="text-align: left;">
Technical Dependency Approval</h3>
This approval is usually obtained from the technical center of excellence, for example the enterprise architecture group, cloud center of excellence, security standards group or the group that is technically governing the organization's standards. A business might have the funds through a sponsoring organization to fund a project, and the delivering organization might have the resources (team, tools and supplies) to deliver, but there might be a major technical dependency preventing the feasibility of the project. For example in the case of an IoT enablement project, there might be a security identity management architectural pending problem, which the project requires resolution prior to going live. Another example in the transportation sector could be getting approval for use of certain material in paving roads to meet certain standards which has not been obtained yet.<br />
<br />
<br />
<h3 style="text-align: left;">
Vendor Statement of Work Approval</h3>
Many projects depend on a third-party vendor to deliver the project. In order to initiate the vendor SOW process, all the above approvals might need to be secured. Other items that are common as well, are charge numbers by the Finance organization, Project ID number by the PMO and even in some cases names of lead resources such as the Project Manager, the Technical Lead and the Quality Lead.<br />
<br />
<br />
<h3 style="text-align: left;">
Delivering Organization Statement of Work</h3>
The delivering organization usually would like to provide the sponsor with an internal SOW or charter that specifies the scope of work being delivered and any assumptions, dependencies and high level roles and responsibilities. This is different than the sponsoring organization <br />
statement of work or charter which is discussed above and is mostly a guarantee that money is available to execute. The delivering organization is the one responsible for ensuring the project is delivered per specs. In some case the delivering organization does the work, or might outsource it to a third-party-vendor as discussed above. The delivering organization charter is the agreement between that organization and the sponsor. Whereas the Vendor Statement of Work is the contract between the delivering organization (prime contractor) and the third party vendor or organization (subcontractor)<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCIewjGNuzr3VlpGwFQgUGKVNx60ClqCoawM1XtiPmXGpLLFfh7O1lQHKPKDVgCbEOdDcBKafFpSiI2xI3vnVmyN14ESg-doTTF98NB-CWJ0T44H_YEG4zncyLUHtCQzKipX-k/s1600/Generic+Project+Initiation+Approvals+Checklist.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="638" data-original-width="913" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCIewjGNuzr3VlpGwFQgUGKVNx60ClqCoawM1XtiPmXGpLLFfh7O1lQHKPKDVgCbEOdDcBKafFpSiI2xI3vnVmyN14ESg-doTTF98NB-CWJ0T44H_YEG4zncyLUHtCQzKipX-k/s1600/Generic+Project+Initiation+Approvals+Checklist.jpg" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
In summary there are many organizational check-points that a project manager should be aware of when kick-off a project at a client or even internally for the employer. In large businesses, these approval points and processes are not always, or usually not in sync, and some might need to be in parallel. <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-52394051150083816372017-07-24T10:36:00.001-04:002017-07-24T10:36:12.031-04:00The Most Important and Most Neglected - Business Rules<div dir="ltr" style="text-align: left;" trbidi="on">
Over the years the most important issue I have seen neglected on a transofrmation project is an honest thoughtful discussion on Business Rules. What should the process look like under the different conditions. Business rules come in all forms and levels of complexity. I share a few examples below for the purpose of clarity.<br />
<div>
</div>
A healthcare provider member who wishes to renew her policy for her 7 year old child and 19 year old college student. The business requirement can have different rules, here are some:<br />
<ul style="text-align: left;">
<li><em>Rule A: Income Level</em>: Family is low income and hence have an extra 10 day grace period</li>
<li><em>Rule B: Residence</em>: Family lives in rural counties of the state and hence is eligible for a 45 renewal window, versus same family living in the major cities of the state which has only a 30 day window for renewal.</li>
<li><em>Rule C:</em> Age: 19 year old child reached his 19th birthday less than 90 days prior to his policy expiration is treated differently than more than 90 days prior to expeiration date.</li>
</ul>
<div>
</div>
An example from the supply chain vertical related to demand forecasting and planning could be dependent on order cancellation business rules, for example:<br />
<ul style="text-align: left;">
<li><em>Rule A:</em> Orders returned due to defective items that are reordered on the same order, should not be removed from demand</li>
<li><em>Rule B</em>: Orders returned due to defective items and are reordered on a new order, should be removed from the demand of the month of order, and reapplied to the month of the new order.</li>
</ul>
<div>
</div>
Projects of all sizes usually neglect business rules when designing and delivering a system. Business rules are the most important part of the process, for indeed that is where decisions are made. Decisions are where the bug are found in the system. Poorly thought through business rules automatically equates to bugs, miscalculations, data quality issues, rework, frustration and utlimately redsign and worse sometime a compelte overhaul of the architecture<br />
<div>
</div>
<div>
</div>
<br />
</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-29694250276971194892017-07-21T15:06:00.000-04:002017-07-21T15:08:40.457-04:00The Cookie Cutter Project<div dir="ltr" style="text-align: left;" trbidi="on">
We all come across these straight forward projects, right? The project that was done half a dozen times before, that it almost feels like an operation to the project team. Deploying a new infrastructure at the fifth location of the company, or extending an automated software application service to a new region after three successful deployments elsewhere. Sounds familiar?<br />
<br />
Many project teams come across these cookie cutter projects each year, and also many of them end up having a hiccup. NASA shuttle program is one well publicized example. It was not the first few times a mission was launched when it blew up into flames. The program has been very successful for years with dozens of missions. Smaller projects experience the same. Several things project teams need to keep in mind with cookie cutter projects are:<br />
<br />
Projects are Projects<br />
A project is still a project, even if done before in a similar context. the fact that a scope of work has been identified by someone as a project means it inherently has some risk, and is deemed by the some in the organization to require closer baby-sitting than a typical operation. On a recent project I was leading for a high tech materials company supply chain, the team viewed the project as a cookie cutter and saw no need for tight toll gates, reviews and checks and balances. After all it was their fifth time to deploy this service for ordering the end product by their business customers. It took extensive coaching and education to explain to the team that if the project came to us, it means that the supply chain service line, as well as the IT PMO have determined it unique enough to be staffed as a project, rather than an operation. <br />
<br />
Identical is not Similar<br />
Studying geometry in eight grade was not a total waste for those who did not end up studying engineering. Similar and identical triangles are not the same. Unless a project is identical, to a previous project it should be considered unique and requires progressive analysis. Similar projects will have one-off requirements, or some special handling, or a change that occurred since the latest iteration of the similar project. This is exactly what happened with my project, during the time between the latest deployment at location A and the deployment at location B was five months. A couple of key processes changed across the the supply chain on the other side of the ocean. This change added risk and requirements that location A did not need to deal with. the project team for location B was not aware of this enterprise level change. Similar is not identical.<br />
<br />
Humility Pays Back<br />
We all are well aware of Titanic, the vessel that supposedly would survive a crisis in the middle of the water. Watching reconstruction videos of airplane mishaps occurring 40,000 feet high over a vast ocean, and how these failures were resolved has been not only intriguing for me as an engineer and project manager, but also an eye opener. No matter how advanced we human beings become, no matter how many sensors we have on an aircraft, or an Internet of Things (IoT), we will never beat the power of unknowns and unseen, nature and the Creator's will. Humility in dealing with projects' technical scope, technology, science, external factors, human behavior and automated electronic processes that usually run in the background undocumented properly is just good business sense at minimum.<br />
<br />
So a cookie cutter project is more than a cookie, its a cake with some custom toppings that could mess up the whole cake if not properly placed.<br />
<br />
Enjoy the cake !</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-76661241688477194542017-07-19T12:34:00.001-04:002017-07-19T12:34:25.689-04:00Risk Management and Normalization of Risk<div dir="ltr" style="text-align: left;" trbidi="on">
Once in a while we come across a failed project, poor decision or worse a catastrophe. The individual or team behind the decision might be very well experienced. When teams take on risks and plan well ahead for the impacts of these potential scenarios, they build competence and are well equipped to handle these risks. However is many situations the risks are mitigated and no negative impact is ever realized, causing teams to be more aggressive in risk taking, and hence the normalization.<br />
<br /><br />
In other words, successes and error-free delivery could lead us to gradually accepting higher levels of risks simply because the subsequent effect from a previous risk never occurred. When this normalization occurs we start to operate outside of acceptable parameters without realizing, potentially falling into trouble.</div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0tag:blogger.com,1999:blog-34916570.post-43604684199179658712017-07-18T12:32:00.003-04:002017-08-30T06:59:38.016-04:00SAP Planning Areas Considerations<div dir="ltr" style="text-align: left;" trbidi="on">
Without fine tuning your cloud implementation you might realize less than optimum performance without even noticing. This post shares some recommendations that could fine tune an SAP planning view performance.<br />
<br />
<br />
Sizing<br />
Verify sizing post implementation is accurate after data is loaded as part of go-live activities. Sizing includes data storage, processing memory, data density (number of relevant data output per time period), ex: 1 sale per month, will not be caught in the weekly runs), and safety factors. Processing data on a more frequent basis and keeping the results on the planning view affects the remaining free resources (memory and storage). Sizing should be done during the cloud service acquisition, at end of blueprint, as part of performance testing and after go-live.<br />
<br />
<br />
Configuration Complexity<br />
Master data types and overall attributes should be kept as minimally as required. Usually clients use 20%-40% of the attributes they have defined in their implementations impacting performance with no true business value realization. Using non-key figure attributes of master data types as root attribute in a planning level is another approach to improve performance. Minimizing the number of calculations that include input levels is another way to improve performance, however care should be taken to avoid the need to increase the number of key figure values needed to store data. On the fly transformations should also be avoided to avoid performance bottlenecks.<br />
<br />
<br />
Calculations<br />
The approach used to perform calculations can significantly impact performance. Examples are the selection of key figures for a calculation, the calculation chain, stored key figures inputs, key figures base planning levels, placement and configuration of filters among other factors.<br />
<br />
<br />
Planning Views<br />
Keeping planning views to a reasonable number of rows is a generally recommended practice. Usually setting the rows to 2000 - 5000 does not impact performance negatively. Utilizing VBA-based templates instead of formula-based templates is another approach to improve performance as recommended by SAP. Using filters in templates when saving and opening templates is highly recommended to ensure reasonable load times. In SAP 1708 users will receive a warning message if no filters are defined in a planning view.<br />
<br />
<br />
Running Operators as User-Defined Scenarios<br />
Algorithms such as multi-stage inventory optimization affect the whole supply chain network. This large run-time can cause time-outs when run in simulation mode. A recommendation is to run these simulations as user-defined scenarios for improved performance.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Ayman Nassarhttp://www.blogger.com/profile/09380153517319452000noreply@blogger.com0