>From a company viewpoint, I have always been a proponent of the custom
build.  ITSM, or any pre-built app, must by its nature be an attempt at
all things to all companies.  And since all companies are not alike, you
invariably end up with a square peg and a round hole.  You spend as much
time customizing and compromising as it would have taken to develop from
the ground up.  And you've paid twice (once for ARS, once for the app),
and continue to pay twice in the form of support.  That's especially
true with Remedy.  Because Remedy is so customizable, (and is marketed
and sold as such) companies expect customization. 

 

Now, from a developer or administrator viewpoint, is all that extra work
really a bad thing?  After all, it keeps them their jobs.  I'll leave
that for another discussion.

 

To your points:

1 - I don't believe the vendor controls an organization's processes, but
the ITIL standards themselves control an organization's processes (and a
vendor's).  And because the ITIL standards derive (at least in part)
from the organizations, it's really just a peer-pressure situation among
companies instead of high-schoolers.

For those companies that don't embrace ITIL - don't upgrade.  Instead,
go custom.

 

2 - Of course it makes it difficult to reverse engineer, but not really
to customize.  One doesn't need an understanding of the entire product
to customize it, only an understanding of the workflow surrounding the
item to be customized.  And through logging and the search DB, that's
relatively easy to figure out.

 

3 - Yes, customization is unavoidable.

 

4 - You handle configuration control with a change control process.  The
basics are: 1) no changes without a change control record. 2) The change
control record tracks what was changed, and why.  3) EVERY changed
object references a change control record.  When it comes time to
evaluate an upgrade, you then have a list of changed items to compare to
the list of "What's New".  It's not easy, but it's straight-forward.
Also, when you customize, try to do it in a way that will play well with
future upgrades.  Such as: never delete, just hide.  And don't change
workflow, just disable and replace.  (By the way, you'd never have that
problem if you built custom.)

 

-Aaron

* Email: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> 

________________________________

From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of Kaiser Norm E CIV USAF 96
CG/SCWOE
Sent: Friday, January 26, 2007 11:06 AM
To: [email protected]
Subject: OT: ITSM Total Cost of Implementation Discussion

 

Hi list:

 

I apologize for not being a more active participant of the ARS list
community recently...work has had me tied up more in red tape than in
real development lately.

 

Anyway, I put this in as off topic, but I think it's only a bit off
topic.  I would like to get any and all viewpoints on the subject of
implementing ITSM vs. another product or a custom product.
Specifically, how do you feel about the following points (some are from
a devil's advocate perspective):

 

-          ITSM 7.0 was overhauled from the previous version to be "ITIL
compliant".  An organization that does not want to embrace the ITIL
model, however, is stuck because BMC only supports so many versions
back.  Eventually support is dropped on the non-ITIL compliant versions.
Thus, doesn't the vendor effectively control your organization's process
and not the other way around? What are your thoughts on that?

-          ITSM 7.0 has some 26,000 code objects (forms, ALs, filters,
and escalations).  Doesn't that make the tool nearly impossible to
reverse engineer? And a bear to customize?

-          Isn't customization unavoidable...especially in large
enterprises with longstanding, proven business practices?

-          If customization is unavoidable, how do you handle
configuration control? That is, how do you know the next version won't
wipe out all the work you did on your customizations?

 

All thoughts and opinions are much appreciated.

 

Norm

__20060125_______________________This posting was submitted with HTML in
it___


SunCom is the wireless company that's committed to doing things differently. 

Things we want you to know.

This e-mail and any files transmitted with it are confidential and are intended 
solely for the use of the individual or entity to whom they are addressed. This 
communication may contain material protected by the attorney-client privilege. 
If you are not the intended recipient or the person responsible for delivering 
the e-mail to the intended recipient, be advised that you have received this 
e-mail in error and that any use, dissemination, forwarding, printing or 
copying of this e-mail is strictly prohibited.


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to