Beruflich Dokumente
Kultur Dokumente
Bill Bierds
Jeremy Gibson
Sandor Hasznos David Backman
Carolyn Hungate Mike Ransom
Calvin Lawrence Reid Byers
Fernando Zuliani Charles P. Brown
ibm.com/redbooks
International Technical Support Organization
February 2004
SG24-6070-01
Note: Before using this information and the product it supports, read the information in
Notices on page ix.
This edition applies to the IBM Software Group Software Deployment Method.
Copyright International Business Machines Corporation 2003, 2004. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP
Schedule Contract with IBM Corp.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
The team that wrote this redbook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Contents v
Chapter 10. Software deployment tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
10.1 License management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
10.1.1 Taking control of software licenses . . . . . . . . . . . . . . . . . . . . . . . . . 81
10.1.2 IBM Tivoli License Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
10.2 Communication tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
10.2.1 Instant messaging, Web conferencing, and team workplaces . . . . 82
10.2.2 Easy Access Portals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
10.3 Self-help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
10.3.1 Problem management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
10.3.2 License acquisition and entitlement with Passport Advantage . . . . 84
10.3.3 Software maintenance via Passport Advantage . . . . . . . . . . . . . . . 84
10.4 Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
10.5 Deployment services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Contents vii
viii The Software Deployment Mystery - Solved!
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to IBM for the purposes of
developing, using, marketing, or distributing application programs conforming to IBM's application
programming interfaces.
ibm.com RS/6000
Approach IMS RUP
AIX LearningSpace S/390
APL2 Lotus SmartSuite
CICS/ESA MQSeries SP1
CICS MVS Tivoli
Database 2 OS/2 TME
DB2 Universal Database OS/390 VisualAge
DB2 Passport Advantage WebSphere
GDDM Rational Unified Process zSeries
ImagePlus Rational 1-2-3
Informix Redbooks (logo)
IBM Redbooks
Intel, Intel Inside (logos), MMX, and Pentium are trademarks of Intel Corporation in the United States, other
countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
SET, SET Secure Electronic Transaction, and the SET Logo are trademarks owned by SET Secure
Electronic Transaction LLC.
Other company, product, and service names may be trademarks or service marks of others.
To solve any mystery, detectives rely on their experience along with proven tools
and techniques to unravel the conundrum. This IBM Redbook addresses the
often illusive mystery known as software deployment success. The information,
practices, and methods presented in this book have enabled many IBM
customers to achieve their business and Information Technology (IT) goals more
quickly and efficiently. IBM has accumulated a wealth of knowledge and
experience in software deployment. The technologies we have developed, the
best practices we have authored, and the employees we have cultivated are our
greatest assets. Like a detective explaining how the mystery was solved, we use
this redbook to pass on to you our customers the experience, knowledge, and
wisdom we have accumulated after years of solving software deployment
mysteries.
The primary audience for this redbook is the person who has ultimate ownership
for software deployment performance. We refer to this person as the Enterprise
Business Sponsor (EBS). Secondary audiences include anyone who is engaged
in software deployment activities. Both audiences benefit from the practices and
procedures described.
This redbook refers to a core team known as the Software Deployment Team
(SDT). This team consists of representatives from both your company and the
software vendor. The mission of the SDT is to maintain ongoing and clear
communication between you and your vendor. Chapter 2, Roles and
responsibilities on page 13, describes in detail the SDT and the concept of
partnership.
Throughout this book, you see testimonials, quotes, and success stories
submitted by customers who have leveraged all or part of the deployment
practices described. One of our customers, a major U.S.-based retailer who we
refer to often throughout the book, not only follows the methods that are
described, but they also use them as a source for their own customized
deployment guidebook. For confidentiality reasons, we refer to this customer as
GMR Corporation or GMR.
During the life cycle of deployment, IBM will always be there to assist you, but it is
our goal that you become self-sufficient. This involves building a team of highly
skilled subject matter experts who can craft solutions that drive deployments that
achieve your business and IT goals. Software deployment is a two-way street
between you and your software vendor. We hope that the information presented
in this book helps you maximize deployment success and value realization.
Note: For the purposes of this redbook, we have used IBM as the vendor. The
tools, techniques, and methods presented herein are applicable to any vendor
with whom you deploy software.
Preface xiii
Kathleen OLeary
Program Manager
Mac Pogue
Certified Project Manager, Software Deployment Architect
Jennifer Ramirez
Software Deployment Architect
Lauren States
VP Technical Sales and Deployment
Beverly Vandahl
Program Manager - ELA Deployment
Kim Waddell
Director ELA Deployment
William Welch
Software Deployment Architect
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you'll develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Preface xv
xvi The Software Deployment Mystery - Solved!
1
The extensive experience of IBM in deploying software has revealed that many of
our customers do not recognize the level of commitment that is required from
them to achieve software deployment success. Also, some customers are not
taking steps that are necessary to achieve business value. Consider these
examples:
The lack of focus in these areas has resulted in less than optimal return from a
software purchase. It has also spawned situations where multiple projects are
run in parallel with inadequate infrastructure or mechanics to leverage common
components, tasks, resources, lessons, etc.
These experiences suggest that successful software deployment does not just
happen. It requires proactive focus and attention from both you and IBM in the
following areas:
Understanding and qualifying the initial demand (projects)
Identifying the core team, with individuals from IBM and your company, that
will coordinate the overall software deployment process
Developing a deployment strategy that will achieve the defined business goals
Continually defining new projects that will help you overcome new challenges
To address these needs, this redbook and the Software Deployment Method
described within were established.
The SDT should meet as required to develop software deployment strategies and
review software deployment progress. For further information about the roles and
responsibilities of the SDT, refer to Chapter 2, Roles and responsibilities on
page 13.
New Software
Software Requirement
Acquisition Defined
Step 5&6:
Step 11: Update
Purchase Refine & Finalize
Business &
Software Plan
Update High Level
Business Plan Deployment Plan
Step 10: Identify
New Business
Step 4: Establish Needs Step 1: Create SW
Deployment Software Deployment Team
Step 9: Execute
Partnership with Deployment Plan Deployment
Vendor Mill
Step 8: Execute Quick
Deployment Wins
Step 7: Kick-off
& Communication
Software
Deployed
ROI
Software
Deployed
Step 11: Purchase
Software & Update
Business Plan
Software
Deployed
Time
Figure 1-3 Software Deployment Method value timeline
You can find more information about these best practices in Chapter 3, Software
deployment best practices on page 21. For more information about value
realization, time-to-value, and ROI, see Chapter 4, Value realization on
page 31.
Finding good players is easy. Getting them to act as a team is another story.
Casey Stengel, famed manager of baseball's New York Yankees
One of the many reasons you may have decided to do business with IBM is
because we have many skilled professionals involved in the sales and
deployment of our software, hardware, and services. The challenge when many
people are involved is to ensure that the roles and responsibilities are clearly
communicated to you. It is equally important that any expectations you have of
IBM, and vice versa, are defined as early in the software deployment process as
possible.
One of the more common concerns found when analyzing deployments is that
roles and responsibilities are not clearly stated up front. Then, as the deployment
progresses, confusion arises over who is supposed to perform certain tasks or
when they will be done. The foundation, therefore, for deriving value from your
purchases begins with ensuring that your team and the IBM team know their own
roles and the roles of each other. Who is supposed to do what? And when should
they do it? This chapter describes that foundation.
Sponsors are those individuals who are funding the deployment work to provide
the solution to the stakeholders. The sponsor may also have selected or
approved the high-level architecture and products to be used in the solution.
Sometimes, the stakeholder and sponsor are the same individual or group.
Project leads are in charge of individual projects that contribute to the solution
paid for by the sponsor and to be delivered to the stakeholders. They manage the
day-to-day execution of the project vision and direct the efforts of the
development specialists.
To make the most of your software investment and exploit the value of that
investment, it is critical to have early and frequent communication with the
It is equally important to repeat the vision and ultimate goals for deployment
projects to the project managers and implementers. Without this cadence of
direction, projects can lose themselves in the day-to-day issues and lose site of
the business reasons for the implementation. It is the progress toward meeting
your business needs, more so than a particular technology or technique, that is
the goal of any deployment.
For more information about the GPLs role, refer to Chapter 9, Managing global
software deployment projects on page 71.
When leveraged, the IBM team can be a tremendous asset to you. Their wealth
of expertise is unmatched in the IT industry. Also their knowledge of your
business goes far beyond the scope of the software that is being deployed. The
IBM team members come from such organizations as IBM Global Services, the
System Group (Server/Storage), IBM Global Finance, Personal Computing
Division, Printers, Partner Channels (Global and Small to Medium), and the IBM
Software Group. Almost every software agreement requires participation from
these organizations. Leveraging such a diverse team can greatly enhance the
deployment process.
Managing Director
Client Executive
Client Representative
Sales Spec Sales Spec Sales Spec Sales Spec Sales Spec
Each SAM provides a single sales face to you across all of the IBM Software
brands.
Note: The primary IBM Software Group brands are Data Management, Lotus,
Rational, Tivoli, and WebSphere.
It is important that you and the IBM team discuss and agree to follow these best
practices, since they have proven to ensure the highest possibility of success.
Table 3-1 summarizes the best practices that are described in this chapter.
Identify an Enterprise Aligns business goals with Information Technology (IT) initiatives
Business Sponsor prescribed during software purchase decision
Establishes an owner for software value, rate of return (ROR), and ROI
Functions as a leader to track deployment progress and coordinate
resources to execute projects
Centralize software Ensures that each person that has the desire to deploy software has the
fulfillment means of getting it efficiently and effectively
Provides a control point from which software deployment progress can me
monitored
Implement a license Allows you to verify your compliance with the terms and conditions of your
management tool software contracts
Eases charge-backs between departments for requested software
Provides intelligence regarding software deployment
Allows better control of version management, patch delivery, upgrades,
and general maintenance
Gives you an opportunity to save money with accurate assessments of
your software usage
Hire deployment Ensures that an expert is engaged to help plan and execute the
services deployment
Allows you to navigate the normal pitfalls of solution development by
leveraging experienced consultants
Dramatically increases the chances for deployment success
Determine deployment Eliminates many of the unknowns associated with solution design and
readiness software deployment
Guides you through the activities needed to improve software planning
and deployment
Helps to ensure that the deployment goes as smoothly as possible with
the fewest challenges
Commit to Ensures that, over time, the reliance on IBM services and support is
self-sufficiency minimized
Reduces long term cost of ownership by building skilled teams, strong
processes, and robust environments
Define a time-to-value Provides common goals for the deployment teams to work toward
and ROI strategy Builds confidence with the achievement of quick wins
Defines a schedule for achieving long term goals
Provides a mechanism to gain community buy in
Ownership for your deployment success may be at several different levels. For
example, you may be the high-level Enterprise Business Sponsor and have
delegated additional sponsorship to your direct reports. Or an IT executive may
have delegated sub-sponsorship to separate lines of business. It is important that
there is one executive who is responsible for the successful implementation of
large or on-going transactions. If this person is you, seek out your local IBM
team. They are eager to meet you and build the partnership necessary for your
success.
If the Software Deployment Team (SDT) feels that they cannot control the
projects or implement any needed changes, it is possible they have not found or
are not working with the Enterprise Business Sponsor. It may be that the
individual given responsibility for deployment is not in the right position to drive
success. The sponsor needs to know that there is a team ready to work together
to achieve the business goals defined. It is with the Enterprise Business Sponsor
that quick deployment successes need to be set. Ongoing successes should be
expected and celebrated.
The members of the SDT should work with the Enterprise Business Sponsor to
identify any cultural, geographical, political, skills, or training challenges that
need to be overcome. Define a strategy or plan to overcome each. It should also
Over time, the individuals or groups who need to receive software will likely
change. It is important for you to initiate a centralized software fulfillment process
as early as possible in the deployment life cycle. The key element of this process
is having one party in your company be responsible for the receipt or
downloading of all software, logging its receipt, distributing it to those who need
it, and tracking what is delivered. If it is not feasible to initiate this process within
your company, consider contacting your IBM team to explore the option of using
an IBM Business Partner for assistance.
Many companies have tried to accomplish this task with paper, spreadsheets, or
e-mails. This tracking typically addresses only the first stage of license
management, what is supposed to be installed. An equally critical stage is that of
tracking what software licenses are actually installed and used, because
departments may be charged for the software distributed to their community,
whether or not it is used. Good record keeping and licence management
techniques regarding your software installation and use can ensure that software
is purchased at the required levels.
Refer to Chapter 10, Software deployment tools on page 79, for further
information about software deployment and license management tools.
Your IBM team has been involved with many services engagements and can help
you determine what is needed for your unique situation. If you decide not to use
an external services organization, then realize that your time-to-value may be
further out than desired. Your internal staff needs more education and time to
learn how to integrate the new technology into your existing environment.
The IBM Software Deployment Architect, IBM Software Architect, IBM Technical
Sales Specialist or all three will work with your team members to collect the
information needed to prepare a readiness plan. The plan may include some or
all of the following subplans:
Communications (including IBM support)
Education and skills
Architecture
Deployment (Implementation, testing, and migration)
Operations (Help desk support and systems management)
Risks and dependencies
We realize that doing this takes time. However, the time you invest here pays
excellent dividends as you proceed with the deployment. These plans and
thought processes help you to:
Ensure that you have the right set of expectations and directives to
successfully implement the proposed solution
Ensure that the IT solution lies within the art of the possible
Identify any issues and risks that may need to be escalated
You or the sponsoring executive should work with the Software Deployment
Team to define the return objectives and map a timeline with value milestones.
Revisit the milestones at least quarterly to help ensure that the deployment is
moving forward effectively and delivering the intended results.
Refer to Chapter 4, Value realization on page 31, for more information about
this topic.
A key event that helps launch a large deployment effort is to host a deployment
kickoff meeting. This meeting should take place soon after you close a software
agreement. This event should introduce all of your stakeholders to the products
purchased and how they fit into the vision. This is a good time to review these
software deployment best practices. In addition, review any expectations that
were set and the criteria that will be used to measure value. For more information
Like the steady beat of a drum, communications should continue throughout the
life of the deployment, marketing and surfacing deployment opportunities, and
areas for improvement. The Software Deployment Team should monitor
deployment progress and recommend adjustments in the communication plan. In
general, keep those who need to know informed about the progress or inhibiting
factors. An example of communications can be a newsletter or intranet Web page
that keeps management and end users informed about recent accomplishments,
milestones, and improvements. It is important to promote and validate the results
of deployment often and to as many audiences as possible to keep up the
momentum and excitement.
This chapter reviews various ways in which value can be defined. You are given
specific examples and supporting case studies to help you select a method that
best matches your business. It is possible that you may not find a method that
matches your needs. However, we hope that this chapter will foster discussions
and work groups to develop a value realization strategy that works for you.
To keep the value statement current, you must revisit it every time you purchase
new hardware or software.
The second step is to build a value timeline. The value timeline should also be
dynamic in nature and include an illustration of key projects and key milestones.
Figure 4-1 shows an example.
7/15/2003
Figure 4-1 Sample value timeline
According to most experts in this area, it is important to have both tangible and
intangible ways to measure success. In many cases, the value may not be clearly
defined in financial terms. Therefore, the only alternative is to look for
non-financial benefits. A common misconception is that hard measures are good
and soft measures are bad. It makes the most sense to determine what is best
for your business and then measure and celebrate your successes.
Hard and soft ROI can be developed at an individual product level. While this is
not discouraged, it is important not to become lost in the details. It is more
important to determine the overall benefits at the enterprise level and tie those
benefits to your business vision.
Professional studies that quantify hard ROI require significant time commitment,
six to nine months in some cases. These studies involve questionnaires and
interviews that may contain hundreds of questions. Since many departments in
your company are asked to participate, your time investment can be quite high.
When this process is completed, it may take several days or weeks for the
analysis and results to be made available.
For an additional word of advise, even hard ROI has a bit of subjectivity to it.
Keep these points in mind before you embark on the long process of defining
ROI in these manners. See Figure 4-2 on page 37 and Figure 4-3 on page 38 for
good examples of how to calculate hard ROI based on software utilization.
The challenge with soft ROI is that you need to determine how you will measure
and track progress and performance. Step 7 of the Software Deployment Method
You may have a business goal to expand your company and add three new
locations around the world to support customers more efficiently in their local
languages. To support this goal, you purchase hardware and software for each
location to support the business applications needed. The ROI for this project is
soft because it results primarily in increased customer satisfaction and the
attainment of a corporate goal.
A year later there are advances in the hardware and software arena. A decision
is made to consolidate the hardware onto fewer, but larger machines. This
solution reduces your fixed hardware support costs and provide hard ROI. The
original hardware may be returned (if leased) or redeployed to support other
business needs. The quantity of software needed for the new locations may now
be lower due to the lower number of machines or processors. This means that
you can redeploy the now available software to support additional business
needs and gain additional hard or soft ROI from the original, single purchase.
This cycle may repeat over time. However, since your focus was on solving
business problems and showing how each solution provided ROI, you can
maximize that ROI over several projects.
These steps offer an order and approach for identifying on-going measurements
for success and lifetime ROI.
Deployed /
Total # Licenses Licenses Software License Allocated Software
Product Purchased Deployed Allocated Gap Value Value Gap Value
Data Management
IBM DB2 UDB Enterprise Edition 50 40 5 5 $17,000.00 $765,000.00 $85,000.00
IBM Content Manager 15 5 0 10 $5,000.00 $25,000.00 $50,000.00
Lotus
IBM Lotus Notes Seats 29000 29000 0 0 $25.00 $725,000.00 $0.00
IBM Lotus Domino Server 10 10 0 0 $1,500.00 $15,000.00 $0.00
IBM Lotus Sametime 29000 5000 20000 4000 $25.00 $625,000.00 $100,000.00
IBM Lotus Quickplace 29000 750 1500 26750 $35.00 $78,750.00 $936,250.00
Rational
IBM Rational ClearCase 30 15 10 5 $200.00 $5,000.00 $1,000.00
Tivoli
IBM Tivoli License Manager 500 300 200 0 $100.00 $50,000.00 $0.00
IBM Tivoli Distributed Monitoring 350 100 100 150 $1,000.00 $200,000.00 $150,000.00
IBM Tivoli Enterprise Console 5 2 2 1 $12,000.00 $48,000.00 $12,000.00
WebSphere
IBM WebSphere Application Server 25 25 0 0 $9,500.00 $237,500.00 $0.00
IBM WebSphere Application Developer 250 250 0 0 $250.00 $62,500.00 $0.00
$2,836,750.00 $1,334,250.00
The will to win is nothing without the will to prepare to win. Vince Lombardi,
legendary football coach for the Green Bay Packers
The overall purpose of preparing for your software deployment is to build the
groundwork required for the successful deployment of your projects and
solutions. The steps you take early in the deployment process facilitate a better
understanding of your vision, enable successful kickoff meetings, and set the
tone for a positive partnership between you and IBM.
The following activities (shown in Figure 5-1) are discussed in this chapter:
Step 1: Create the Software Deployment Team (SDT)
Step 2: Review the deployment documentation
Step 3: Develop a high-level deployment plan
Step 4: Establish a deployment partnership with IBM
Step 1: Step 2:
Create Review
Software Documents
Deployment
Team
Step 3: Step 4:
Develop Establish
High-Level Deployment
Deployment Partnership
Plan
Prepare
Figure 5-1 Phase 1: Prepare for deployment
Table 5-1 Inputs, tasks, and outputs for SDM Step 1: Create the SDT
Inputs Tasks Outputs
5.1.3 Benefits
The benefit of creating and maintaining the SDT is that the team members
understand their roles and then accept the ownership for the deployment
success.
The SDT should thoroughly understand the content, terms, and conditions of any
software purchase contract. Typically, this contains standardized terminology.
However, because each agreement may be customized to meet specific needs, it
may include special terms or clauses that need to be understood. The SDT
should understand these customizations and how they affect the deployment
process. If there are things that they dont understand, they should ask the team
negotiating the contract.
The participants include the project managers, internal IT architects, IBM Client
Executive, IBM technical representatives and IBM service representatives. All
members of the SDT should participate in this step.
5.2.3 Benefits
The benefits that result from this documentation review are that the SDT:
Has a common understanding of the business vision and goals
Agrees that the conceptual solution is viable and concurs with the viability
assessment
Confirms and agrees to the roles and responsibilities for both your company
and IBM
Has an awareness that the preparation phase of deployment has begun
This plan should also include ownership of any core infrastructure projects that
are prerequisites for the implementation and management of the specific
business oriented projects. Some examples include License Management,
Problem Management, Configuration Management, Performance and Availability
Management, Security, and Storage Management.
Ideally, you buy software based on identified needs. However, you may
sometimes buy software based on projected needs or because of discount offers.
Also, you may purchase software without a set of known projects that will use the
software. Regardless of your reasons for buying the software, you should have a
set of business goals in mind that you can mold into potential projects.
These known or potential projects should drive the deployment planning and
activities of the SDT. The list of projects should be started before any final
contract negotiations conclude. The SDT should start by listing:
All of the known projects
All of the potential projects
The IBM Software brands and products (if known) that will be involved
The deployment locations
The project owners and their contact information
You may end up with a list of 60 projects and 60 separate project owners that will
deploy over one 100 IBM Software products over the course of three years. Or,
you may have three projects with one project owner and a broad identification of
IBM Software brands to be deployed in one year. The objective is to identify the
business goals, the projects that will support those goals, and the products
needed to implement the projects.
Table 5-3 Inputs, tasks, and outputs for SDM Step 3: Develop a high-level plan
Inputs Tasks Outputs
Viability assessment Validate and refine the goals Updated goals and
Architectural decision and milestones milestones
document Group deployment into High-level, phased
Solution architecture logical chunks based on deployment plan
Component model business initiatives; assign Detailed mapping of
Internal interface ownership to the initiatives products to projects to
descriptions Refine the list of projects and business initiatives
Goals and milestones assign ownership Services requirements
Software deployment best Create a high-level Environment and
practices deployment timeline or infrastructure requirements
High-level mapping of phased execution plan for and projects
business initiatives to building the entire solution Updated license utilization
projects Assess gaps where services report
Draft mapping of projects to will be required
products Assess the need for
Initial license utilization infrastructure management
report projects
Review an initial license
utilization report and identify
where existing software will
be used and how new
software will be tracked
Determine any gap between
products with defined
projects and products that
require further project
definition
5.3.3 Benefits
The main benefit of creating a high-level deployment plan is that the SDT comes
to agreement and understands the various aspects of the deployment. It should
You should also be ready to review any findings from the IBM teams readiness
plan or gaps from the software deployment best practices (see Chapter 3,
Software deployment best practices on page 21, for more information). Both the
readiness plan and best practices are designed to help you be successful with
your deployments.
Table 5-4 Inputs, tasks, and outputs for SDM Step 4: Establish the deployment partnership
Inputs Tasks Outputs
Updated goals and Confirm buying decision and Finalized goals and
milestones vision milestones
High-level phased Identify quick deployment Quick deployment win plan
deployment plan wins Validated high-level
Detailed mapping of products Define deployment deployment plan
to projects to business milestones and Validated mapping of
initiatives measurements products to projects to
Services requirements Review skills and projects business initiatives
Skills gap analysis gaps and define a strategy to Validated gap analysis
Environment and address Validated environment or
infrastructure projects Review and discuss any infrastructure projects
roadblocks that could impact Roadblock action plan
deployment Scheduled kickoff meeting
Validate project owners
Schedule date for first kickoff
meeting
5.4.3 Benefits
You should realize the following benefits from the establishment of a deployment
partnership:
The SDT has an understanding of the goals and milestones associated with
the software purchase.
The SDT agrees to the high-level deployment plan.
There is a strategy and timeline for the software deployment.
There is a strategy to address skills and project gaps.
The first deployment kickoff meeting is scheduled.
The following activities (see Figure 6-1) are discussed in this chapter:
Step 5: Refine the deployment plan
Step 6: Finalize the deployment plan
Step 7: Conduct the initial deployment kickoff meeting
Step 5: Step 6:
Refine Finalize
Deployment Deployment
Plan Plan
Step 7:
Conduct
Deployment
Kickoff
If you have been following this deployment method, you should already have a
list of known and potential projects with assigned owners. After you finalize the
software agreement, the SDT should finalize that list and check for any
last-minute additions or changes. Since it is unlikely that you will start every
project right away, it is important to meet with the project owners and explain the
deployment plan and timeline. This shows the project owners that their needs are
planned for and their projects will be addressed within an agreed to time frame.
Some projects may be defined in sufficient detail and occur early enough in the
timeline to perform project level deployment planning at this time. For these
projects, the SDT works with the project owners to perform any necessary
capacity and performance modeling. They should recommend a physical
architecture and define or refine hardware and software requirements. They
should also discuss environmental and infrastructure requirements for
deployment. The IBM members may initiate a Solution Assurance Review (SAR)
for the project at this time, if necessary.
With this step completed, the majority of the planning for a successful
deployment of the software is completed. Good planning leads to a smooth
deployment.
6.1.3 Benefits
The benefit of this step is that the SDT revisits and refines the deployment plan,
project details, deployment timeline, and supporting plans and documents based
on any changes to the software contracts. It should be well understood what was
purchased, why it was purchased, and how it will be deployed to meet the
business goals and maximize the investment.
This step in the deployment method is the time to present the finalized plans to
this approval authority and promote the upcoming activities. You should highlight
the work done in planning and preparation by the SDT and get buy-in from the
project managers.
Table 6-2 Inputs, tasks, and outputs for SDM Step 6: Finalize the deployment plan
Inputs Tasks Outputs
Refined physical architecture Review and finalize the Final physical architecture
Refined deployment plan, deployment plan Final deployment plan
deployment timeline, and Discuss any appropriate Final deployment timeline
systems management plan migration strategies Final operational model
Proposed project controls Discuss any appropriate Final systems management
Refined quick deployment conceptual data model for plan
win plan legacy data Final project controls
Software deployment best Finalize the recommended Final quick deployment win
practices physical architecture plan
Finalize the systems Final goals and milestones
management plan Software deployment best
Gain agreement on project practices understood and
controls agreed upon
Update the quick deployment
win plan, if needed
Finalize project ownership
Finalize software deployment
milestones and metrics
6.2.3 Benefits
The benefits of going through this step are:
Executives are aware of the work done by the SDT to plan and prepare for a
successful deployment.
Final approvals are obtained on the plans and schedules.
Goals and milestones are affirmed.
The meeting should be led by you, the Enterprise Business Sponsor, as the
leader within your company of the software deployment. Presentations may be
made by the members of the Software Deployment Team, IBM client team or
executive or other leaders that will be supporting the deployment effort. A
high-level agenda should include:
What software, hardware, and services were purchased
Why the purchase was made
The final deployment plan
The final deployment timeline
The overall vision and business goals should be explained to keep the
discussions in line with the desired results. The SDT should present the roles
and responsibilities described in Chapter 2, Roles and responsibilities on
page 13, and the software deployment best practices described in Chapter 3,
Software deployment best practices on page 21.
Dozens of people may attend this kickoff meeting. Your goal is to inform the
participants of what is to come and to create excitement and energy for the
deployment. This type of meeting should be conducted with as many people as
possible, perhaps at various locations. To maintain the enthusiasm, you should
also conduct regular update meetings or events to celebrate your successes and
highlight the activities to come.
Table 6-3 Inputs, tasks, and outputs for SDM Step 7: Conduct initial deployment kickoff meeting
Inputs Tasks Outputs
Final contracts Present the vision that drove Synergy and enthusiasm for
Architecture plans and the software purchase the upcoming deployment
descriptions Link the products purchased High-level understanding of
Final high-level deployment to the business initiatives and the contracts
plan and timeline vision Communicated vision and
Goals and milestones Discuss the high points, business value
IT vision terms and conditions, and Understanding of roles and
Software deployment best critical aspects of any responsibilities and the
practices contracts software deployment best
Roles and responsibilities Communicate the business practices
value and benefit
Show the business context
and high-level architecture
Present the high-level
deployment plan and timeline
Discuss the breadth of the
deployment (local, regional,
national, or global)
Discuss the roles and
responsibilities
Discuss any known
roadblocks and the plan to
overcome
Communicate the quick
deployment win plan
Discuss the software
deployment best practices
Present the key benefits of
the major driver products
Arrange for demonstrations
of key products if necessary
Up to this point, we discussed the planning and preparation for the software
deployment, the importance of measuring the value that you will realize, and
some of the preliminary steps necessary to market your vision and create an
environment ready for success. Now comes the time to take what was planned
and what is on paper and make it a reality through systematic execution of the
plan and the deployment of the software.
The purpose of this step is to execute the quick deployment win plans, ensure
early deployment success, and execute the deployment plans and projects that
follow the quick wins. Throughout this iterative process, you must also keep your
eyes open for changes in the business needs and be prepared to adjust the
plans as needed to ensure you can use your software investment to the fullest
potential. You should also search for ways to apply the successes enjoyed from
this deployment effort to future business plans.
The following activities (see Figure 7-1) are discussed in this chapter:
Step 8: Achieve quick deployment wins
Step 9: Execute the deployment plan
Deploy
Figure 7-1 Phase 3: Deploy software
The Software Deployment Team (SDT) should carefully monitor the early
projects to ensure you can being with the expected fast start. The team should
stay focused on the early business goals to reduce scope creep and to provide
the value realization expected.
Table 7-1 Inputs, tasks, and outputs for SDM Step 8: Achieve quick deployment wins
Inputs Tasks Outputs
List of projects and owners Assign project managers to Quick deployment win
Project plans for quick quick deployment win projects projects competed
deployment wins (internal, IBM, or third party) Initial business value realized
IBM readiness plan Verify and augment the Internal reference groups
Software deployment best capabilities of the quick
practices deployment teams assigned
to the projects
Execute the quick deployment
win plan
Manage the projects with
project controls
Conduct regular meetings
with the project owners
Monitor progress of quick
deployment win projects
against plans and make
adjustments as needed.
Implement recommendations
defined during readiness
discussions
Address and resolve technical
issues that may arise
Maintain close contact with
project owners, stakeholders,
and sponsors
Execute early phases of the
education plan
Monitor the satisfaction of the
solution users
Track software license usage
This is an ideal time to repeat the deployment kickoff meetings held earlier and
provide a status report on the quick successes and reset the expectations for the
rest of the deployment. These meetings can now include live demonstrations of
the early projects to reinforce the success and reiterate the vision.
During this step, the SDT should maintain and manage to two lists:
A list that identifies existing (underway) projects
A list that identifies potential projects
7.2.3 Benefit
The benefit of this step is the achievement of the defined business goals. This
primary benefit is supported by the success of you, the Enterprise Business
Sponsor, the rest of the SDT, and the successful partnership with IBM.
Table 7-3 Inputs, tasks, and outputs for SDM Step 10: Identify new business needs
Inputs Tasks Outputs
7.3.3 Benefits
The benefits of this step include:
Higher usage of purchased software
Increased value received from the original software purchase
Increased visibility of the business benefits provided
Satisfied stakeholders and end users who received new technology and
improved processes
7.4.3 Benefits
When the Software Deployment Method is incorporated into your standard
processes, the end result is a successful deployment. This takes focus on the
overall success and progress against the deployment plan. Other organizations
will notice your success and request the implementation of additional business
requirements. If you have a thorough method for deployment, then you can meet
that need.
You will also see an improved partnership with IBM by following the steps
detailed in the previous chapters. You gain the benefit of many professionals
working toward your success, and IBM has the satisfaction of knowing we
assisted you in meeting your goals.
A key point is that you must view the deployment holistically. To maximize
success, you must allocate all software licenses to projects as early in the
deployment life cycle as possible. The preferred time for this effort is in final
stages of the negotiation. This is because all informed parties are at the table at
this time. Too often one or two projects are defined and the momentum is lost. It
is imperative that a concerted effort be taken to find homes for all licenses in your
agreement.
This chapter provides information that will help you manage a successful
deployment project that maximizes the value you receive from your software
purchase. You see again the involvement of the Software Deployment Team
(SDT). Refer to Chapter 2, Roles and responsibilities on page 13, where we
introduce the IBM team with whom you will be working. We also define key
representatives from your team. You may not recognize or use the titles that we
selected, but hopefully you will recognize the responsibilities.
The SDTs hard work begins when the vision must be mapped into deployment
activities (projects).
As an example of getting started, a purchase agreement for $10 million U.S. may
specify $2.5 million in software to be used from four of the five IBM Software
Group brands. The SDT works with each brand's sales person and technical
sales person to determine an inventory for their $2.5 million. Then the SDT aligns
the software with the anticipated projects, identifies an owner for each project,
determines the start and end dates for each project, and sets a timeline for
deployment. The IBM Software Architect assigned to the account is responsible
for ensuring that all of the software in the agreement (across brands) integrates
smoothly, but in some cases, the projects may not need to integrate at all. For
example, there may be a totally independent Tivoli project that may not touch a
data management project. However, many times projects need to integrate.
Very quickly after a new software purchase occurs, I need to think about projects
that can burn software licenses. I begin my conceptualization by going back to
read and thoroughly understanding the contract. I then meet with the Software
Account Manager (SAM) and whoever else was involved with the purchase and
understand where and how the customer envisioned using the licenses. It is
important to write down the project list on paper. Memories are short, and by
documenting this, we and the customer stay on the same page.
After the project list is documented, I apply good project management principles.
For example, I create a work breakdown structure for each project. I make sure
we have a project lead allocated to individual projects. I may have to request
management to identify when the people would be allocated. It is crucial to
allocate one IBM focal point for each project as it becomes active. There should
be one IBM counterpoint to each customer focal point per project.
Every account is different, but you have to do all you can to help ensure the first
project is successful. If the SDT believes they cannot control the projects,
including which ones should be deployed first or who should be assigned to lead
them, it may be a sign that they are not working with the true EBS. The SDTs
challenge is to partner with the real owners, those who care most about the
success of the projects, and work with them to make things happen.
The SDT may advise project managers as they create their project plans, help
ensure that projects have clear charters, or review completed plans, because an
extra set of experienced eyes on these items can be quite helpful. The SDT can:
See that each project starts well
Check with the teams at critical points to help ensure things are on schedule
Help ensure that action items required to keep projects moving are acted
upon
It is wise for the SDT to prioritize projects, too. They should spend more of their
time on the hottest projects. Even then, they should manage them at the
milestone level. As one SDT member said, We need to know what needs to be
done to plan a project, but we dont need to be the ones doing it. Were not the
executors.
Scope creep
Scope creep refers to projects that gradually extend beyond their original
charters and add functions that require software that was not in the original
agreement. Scope creep can be harmful, because it can take a project off on a
tangent and cause schedules to be missed. It is imperative that the EBS stay
focused on the major deployment goals.
The word global is used liberally to describe the landscape of a business. In its
simplest form, global implies that you are doing business in more than one
location. This is an unfortunate minimization of a challenge that in itself can
absorb the time of several full-time project managers and executives. Doing
business globally implies geographical, cultural, and language barriers that must
be overcome before business can be effectively executed. Deploying software is
no different. Proper planning must be done if the breadth of software utilization is
to be maximized.
IBM was one of the first companies in the United States to tap into the worldwide
market. Its presence in the major and minor geographies of the world has
become an increasing source of business growth. As such, global software
deployment happens frequently. Global deployments pose challenges above and
beyond those faced in deploying software within a single location. As discussed
in Chapter 3, Software deployment best practices on page 21, self-sufficiency
IBM is one of few companies that actually has the capability to service global
customers effectively. That being said, doing business in over 100 countries or
regions with unique cultural, political, and business guidelines is complicated and
fraught with potential pitfalls. It is because of these pitfalls that this chapter is
included in this redbook. We are motivated to maximize global customer
success.
First, we recommend that you establish a global lead to be the project manager
and coordinator of all software deployment activities going on around the world.
This person should meet the following criteria:
Have excellent project management skills as well as experience on the global
stage working with a variety of people from differing cultural backgrounds.
Have experience managing complicated projects. This implies that they can
handle complicated products, and combinations of products, as well as
complicated geographical challenges.
Be a self starter, who is constantly looking for opportunities to increase the
deployment footprint.
Your IBM team will align their coverage in each city around the world based on
your requirements. Under normal circumstances, support is maintained at a level
that is commensurate with the deployment activities that occur in any given city.
This IBM team generally consists of representatives from all parts of IBM, such
as a Global Client Executive, a Global Software Account Manager, and perhaps
a Global Software Deployment Architect.
If you decide to assign a global project manager, identify this person as quickly
as possible. This global lead needs to identify the countries or regions (see
Table 9-1) and cities where deployment will occur, how much, and when. Ideally,
you will assign project leaders within each location that has significant
deployment activity.
Tokyo
GCC (primary)
Vevey, Switzerland GC EUR (secondary)
Frankfurt, Germany
GC AOA (secondary)
Sydney, Australia
GC AMS (secondary)
Phoenix, Arizona
Most organizations have a customized set of that tools they leverage to manage
projects and monitor deployment performance. It is not our goal to have only IBM
products in place to fulfill your tool requirements. It is more important that you
recognize any weaknesses in your tool strategy and take immediate action to
address them. To learn more about any of the tools described in this chapter,
contact your IBM Software Account Manager (SAM) or see the following Web
site:
http://www.ibm.com
ftp://ftp.software.ibm.com/software/tivoli/whitepapers/
wp-license-mgr.pdf
The larger your company is, the more complex the IT infrastructure must be to
support the business. This infrastructure requires time and money to be
managed, maintained, and extended. In a large organization scenario, a software
solution that helps you track assets from a financial, contractual, and physical
point of view is a critical business need.
By having an integrated view of the hardware and software assets you own, you
can plan for hardware and software maintenance and upgrade, and understand
exactly what resources are needed to support your business.
Typically, software assets are the key factor missing from asset management.
The main portion of the investment required to set up an IT infrastructure is
usually related to software, not to hardware. Taking care of the software products
that are installed and run on a large infrastructure, including thousands of servers
and desktops, is not a trivial task. However, there are several benefits in using an
enterprise solution to accomplish this task. Some of them are:
Legally enforce license agreements of procured products
Obtain information about the software that is actually needed
Strive for full utilization of procured products, paying support only on what is
used
Gather data for total cost of ownership analysis
Collecting information about the software products that are installed and used
within your IT infrastructure is the only way to achieve the benefits that were
previously described. To do this, the use of a system explicitly designed for asset
and license management and well-defined processes around that system are
required.
The real needs for asset management go far beyond a simple tool for software
tracking. You likely need to know whether any of your departments are
overbuying licenses because there is no way to tell if they are really needed, or
whether it is exposing your company to the risk of non-compliant usage of
software products.
Taking control of your software licenses is just as important as tracking the life
cycle of hardware assets. A solution that tells you if you are overspending or
taking the risk of high penalties gives you an instrument to achieve these goals:
Reduce overall cost of software license management and compliance
monitoring
Produce the licensing data necessary to plan for license upgrades and
migrations
Analyze the licensing data to determine if other options are more attractive
To attain these goals, license management comes into play. Your software
procurement information must be properly reconciled with the software usage
and inventory data. Only by doing this it is possible to tell whether you are paying
more license fees than necessary, or whether you should buy new licenses as
soon as possible to remove any compliance exposure.
The license procurement information is defined using the Web interface to the
administration server. Using only a Web browser, the administrator defines the
license procurement information that is needed to monitor the usage of a
software product and enforce a license agreement when requested.
In this scenario, each agent is responsible for detecting each new application,
validating the available information to identify the starting product, and requesting
an existing license from a run-time server, so that the product usage can be
authorized. Thus, license control can be done in real time, and the data collected
on the runtime servers is used both for real-time reporting and periodic
reconciliation with the administration server.
You can use several settings to configure the behavior of the system in a more
detailed manner. For instance, if you are not interested in applying license
enforcement to the usage of licensed products, you may turn off the function that
requires a license to be granted to the agent before a product can start.
An important first step is that you move away from the perspective that
communication is something used only to report problems and submit orders.
The power of communication is felt most when it is easy, convenient, and difficult
to avoid. A good example is the fuel gauge in a car. It is certainly critical that you
know when your car is running low on gas, but it is also convenient to know when
the tank is more than half full so you know you have nothing to worry about.
http://www-3.ibm.com/software/collaboration/
As part of your software relationship with IBM, your company may have access to
a private, customized Easy Access portal. We organized your private Web portal
to make it even easier to find what you are looking for. My Software Center,
accessible via your companys private portal, is a central source for information
about software product, support, and services. Whether you are interested in the
latest software products and solutions for your industry, local events, or support,
you can find it here.
Working with your IBM team, you can customize My Software Center to help you
understand the software products and services that you are entitled to use under
your software agreement with IBM. It provides the ability to request media,
submit questions to your IBM team, and to find information about the products
included in your software agreement. To determine whether your company has
an Easy Access Portal, contact your dedicated IBM representative.
http://www.ibm.com/support
http://www.lotus.com/services/passport.nsf/WebDocs/
Passport_Advantage_Home
Benefits
The benefits of obtaining maintenance via Passport Advantage are:
Includes a full 12 months of software maintenance with each license
Provides comprehensive and flexible upgrade coverage
Protects technology investments
Simplifies and improves software asset management
Reduces acquisition and administration costs
Streamlines budgeting for software upgrade and migration costs
Provides immediate support coverage on newly acquired products during
installation phase and for life cycle of product
Incorporates flexible, easy-to-access, responsive, cross-platform support
from IBM, worldwide
Provides access to IBM Software technical support for all of your designated
IT staff
Simplifies acquisition and renewal of cross-platform support
Enhances overall expected response time of two hours or less during normal
business hours
Provides 24x7 access to support resources for business-critical outages
Increases self help via the Internet
http://www.ibm.com/support
10.4 Education
To be self-sufficient, a team must be developed that has the right blend of skills
and experience to act independently of IBM support and services teams. This
education can be obtained via knowledge transfer from deployment services or it
can be a obtained via formal education made available by IBM.
http://www-3.ibm.com/services/learning/training_cat.html
IBM has its own e-business version of the pit crew the IBM Services teams. Our
teams offer skilled experts for Lotus, DB2, Tivoli, and WebSphere software.
Worldwide, our technical consultants turn opportunities into wins, challenges into
solutions, and skeptics into loyal customers. Just as the pit crew readies the car
and driver for the win, the IBM services teams have the expertise to make you a
winner with IBM Software.
The IBM services teams are available to help design and develop application
solutions that run on IBM middleware and provide services to support the proper
installation, configuration and operation of the products. The teams have strong
relationships with the IBM Business Partner community and IBM Global Services
to provide a broad range of services to suit your needs.
IBM services teams can support and mentor your implementation teams. Or they
can help you improve the skills of your development staff through training and
hands-on experience. All of our services are structured to ensure your success.
Various business context diagrams can be examined and discussed with you as
a way to clarify which business interactions are in scope and which are out of
scope of the system being developed.
Component model
The component model documents the following information for each component:
Responsibilities: Describes responsibilities from the view of a user of a
component. The description is later refined into specific operations that
constitute the application programming interface (API) for the component.
Customers organization
This work product description is simply an inventory (or chart) of organizational
elements (structures, behaviors and enablers) for in-scope organizational units
(for example, corporate organization, strategic business unit (SBU), functions,
teams, and individuals). The influencers and owners may be key to defining who
to call for a given solution. An organization chart may be color-coded, for
example, to indicate who is directly involved in the decision process.
Non-functional requirements
This work product details all of the key features and characteristics that are
required in the new system. It defines the constraints imposed upon it by other
factors. These requirements form a basis for preliminary system sizing and for
the first estimates of cost. The requirements, along with the component model,
are used to produce the operational model. These requirements are often the
most important single determining factor in the entire design.
Operational model
This work product specifies the hardware that the desired architecture requires.
Project descriptions
A project description document is written to communicate the project goals to all
who need to know. It is critical for the entire team to understand the projects
goals. Writing a project description helps to verify that everyone connected with
the project agrees on its objectives.
A statement of project goals gives the development team a context within which
to work. It provides a concrete starting point for development. Project goals can
raise issues of scope and function, which are best identified as early as possible.
The project description work product is a brief answer to the question: What are
we doing on this project and why? The content depends on the nature of the
project.
Use cases
This work product specifies requirements in the areas of performance, capacity
or volumes, scalability, availability, portability, maintainability, and usability. It also
specifies requirements in systems management, security, infrastructure
constraints, technology standards constraints, and geographic or configuration
constraints.
Viability assessment
This work product describes architectural risks, prioritizes (high, medium, and
low) the probability and impact of each, and identifies contingency plans for each
risk item.
Deployment plan
The deployment plan includes a full mapping of projects to products purchased.
It is not meant to duplicate planning around a single project being executed. The
content falls into two primary categories, Account Planning and Project Planning,
as explained in the following sections.
Account planning
The Account Planning subwork products in the deployment plan include:
High-level mapping of business initiatives to deployment projects:
Ideally, you have a set of goals in mind for the software that they are
purchasing. Those goals map to potential projects. When the agreement
closes, these projects drive deployment activity. This subwork product is a
mapping that links each project to the business goals or initiatives that drove
the original purchase.
Documented linkages of deployment projects to products: Like the
previous mapping of projects to business initiatives, this subwork product
documents the products included in each project. This provides a direct tie to
the products just purchased. This tie can help to rejustify the software
purchase to new management, identify gaps in projected deployment, and
align the deployment timeline with the business initiative timeline.
Deployment services requirements: This subwork product lists the services
that the SDT believes is needed during deployment because they are critical
to deployment success. The deployment team identifies these requirements
during the preparation phase of deployment, reviews them with the EBS.
Status of environment and infrastructure requirements: Any ancillary
prerequisites or corequisites must be completed before or along side the
actual software deployment for a successful project. These may include
hardware acquisition and setup, third-party software, or the creation of a new
organization to handle the customization and rollout of the solution. It is
important that these are recorded and monitored to prevent the project from
stalling.
Project Planning
The Project Planning subwork products in the Deployment Plan include:
Deployment quick-win plan: It is important that success be demonstrated
as early as possible in deployment, because it will generate momentum,
Readiness plan
This work product was created to ensure that the IBM team evaluates your
readiness for deployment. In regard to the following subplans, the SDT should
consider where extra planning may be necessary to minimize deployment risk.
The subplans are:
Communication plan: Considers who the stakeholders are and who the
sponsor or owner is for all internal and external communications. This plan
also contains a support plan.
Education and skills plan: Documents the skills assessment, roles, and any
justification needed for education expenditures.
Issue There is a large number of legacy systems, some of which are to be replaced. There is
a disposition to buy over build. There is a large number of interfaces, cost of
maintenance is large, and the system is rigid. Additionally, the corporation must provide
the potential to be acquired or to acquire.
Assumptions Systems will require maintenance modifications for the foreseeable future. Multiple
redundant interconnections are much more expensive to maintain than single
connections. Systems which have abstracted interfaces are easier to work with.
Motivation Economy, flexibility, reliability, time to market. Ability to add packages and make
changes in a timely way.
Alternatives Continue to support point-to-point connectivity going forward. System will become
increasingly hard to maintain as new packages are added. Addition of new packages
will itself become more difficult.
Architecture overview
The integration design is in three parts: the integration hub, the gateway, and the
portal. Figure A-1 shows these three parts.
The gateway provides Internet and network access for machines. It consists of
technologies such as electronic data interchange (EDI), messaging, and Web
services.
The portal provides Internet and intranet access for humans, and consists of the
Internet infrastructure and associated devices.
legacy
applications
gateway
external
external
networks workflow new
networks
server integration
packaged
hub
applications
portal
application
server
(new apps)
content
management
system
Citrix EIP
apps
To ensure that this process begins with an accurate understanding of the existing
flow of work and information throughout the system, we examined ShopCos
current business context and illustrated it as shown in Figure A-2. Many of these
systems will be replaced by packaged application over the next two years. The
new packages that are not yet selected will necessarily be treated as black
boxes for the sake of this architecture. The integration of the new systems with
the existing structures, as well as with the projected workflow and Internet
systems, raise architectural issues that can only be roughed out in general at this
time.
debit/credit, authorization
Customer
Customer Third
ThirdParty
Party
Direct
Multiple
Store
Store
purchase
Support
Support
coupon control
ordering
delivery info
personnel info
labor,
benefits
HR
HR
Financial Merchandizing
Merchandizing
Financials
Systems
(Lawson etc)
Price
PriceManagement
Management
Executive
Executive sales info
Reporting
Reporting Systems
Systems cash management
Database
Database
Routing/ Queue-
HTTP Business Message Message
Browser Servlet Transfor m Enabled
Service Object Queu e Queue
Hub Application
Packaged
W eb Adaptor
Service Application
Partner
HTTP HTTP Partner
Web
Service Service Systems
Service
Business Partner
API response
Current IT environments
Current IT environments are typically depicted by application lists followed by
diagrams. A sample list follows. Figure A-5 and Figure A-6 are sample diagrams
that illustrate the current architecture.
Host applications
Bidders 6.0.0
IBIS A/P 7.1
IBIS G/L
Inforem 1.1.7
Genesys Payroll 5.5
WACS 4.1
27 legacy systems
Desktop software
Windows 95 B
Windows 98 SE
Windows 2000 5.00.2195 SP1
Personal Communications
SmartSuite Millenium
Global Dialer 2.5
Netscape 4.7
Acrobat Reader 3.25
Norton AntiVirus 4.1
PC Outline
Other software
Novell NetWare 4.11
OS/2 Notes 4.6
Microsoft Windows 98 98B
Microsoft Windows NT 4
MAC-OS
PSI Standard Desktop Platform 1.0
Excel 97
The available UNIX hardware and expertise should be retained, because they
constitute the most likely platform for the deployment of the Internet, intranet,
workflow tool, and the integration hub.
It is likely that ShopCo will also find that, as new business packages are
implemented, the UNIX platform will become increasingly important both as the
Financial Merchandising
POS BA BT Catalog
Store Server POS (4690) HH FT BN GT
(RS 6000) Supermarket Returns
Store Pharmacy
Management Toys
HR, CGO, etc HR Advertising
System 390
Store
Warehouse &
Financial Notes Mail,
Logistics
- Priceline Promotion
Peterson
DRS Access
Marketz Purch xBase/App Dev, etc
RS 6000 Windows
Distribution
Center Internet structure Intranet Domino
Web
A browser, on the users desktop, is used to connect to the Web site. This
browser then uses a plug-in to launch a Citrix session running on a Citrix server
within the secure zone. Within this Citrix session, a second browser is launched.
This browser then connects to an Internet Information Server (IIS) using an
auxiliary storage pool (ASP). The IIS server runs a Visual Basic program which
connects to a second IIS server on an Enterprise Information Portal (EIP)
This somewhat unlikely and cumbersome configuration came about because the
Brio system, used to provide reports, was unacceptably slow when the client was
on the users desktop. However, it ran sufficiently well on the Citrix server, from
which its image can be shown, page by page, on the desktop browser.
Nfuse
Server App Server EIP Server DB2
Brio EIP
Plug-in BRIO SQL Server
report
data
Underwriting Claims CIO CFO COO Branch Ops Managed Care Bill Howard
Judy Wells
Michael Ho Thomas Jones James King Mark Ellerby Betty Plonk Jeremy Newl Allen Hobbes
Changes Reporting
Web Apps Workers' Comp
Datamart Comml Auto
GJS POKI
CoA Prime Peter Vicot Ann Riley Financial A/R Rita Spannel Louis Jacaro Peg Henry DBA
Notes/Web Premium Corp
Actuarial Reporting
Client Systems Forms Lotus Notes Mail & Copy Help Desk
Data Quality Appl. Architecture
Support Call Center Admin Printing Procurement
End User Appl/Systems Data Center
Financial/Claims Quick Code Networking & MAC
Support
Image Team Services Prod. Control Telecom
Two other efforts are to be combined with this move. The first of these, the
integration of a new workflow with the imaging system, should be considered in
To provide for these goals, the CIO has requested IBM to provide an integration
architecture. This architecture is to include imaging, workflow, application
integration, Web integration, and integration with business partner systems.
Current IT standard
While some extensive standards documents have been promulgated over the
years, the most effective standards at ShopCo are de facto. This can clearly be
seen by examining the current IT environment. The use of COBOL as an
application development standard has been maintained more as a default than
an active choice. Enterprise program development has with some exceptions
been restricted to COBOL under CICS and IMS.
Database standards are DB2 Universal Database (UDB), with SQL server as a
second option. But there is some Sybase and some Access, as well as FoxPro
and Approach.
At the same time, there is a decided and verbalized proclivity toward the use of
packaged software. Although many of these package standards remain to be set,
the decision to use packages where possible should itself be treated as a
standard.
Host platform
S/390 Version 2.10
COBOL
VSAM
IMS
Image Plus
CICS Version 1.2
DB2 Version 6.2
Client/server platform
PowerBuilder
Sybase
Visual Basic
Oracle
Excel
Access
Ethernet (token ring)
Windows 2000 Desktop (Windows NT)
Windows 2000 Server (Novell)
Brio
Server platform
AIX
Sybase
Powerbuilder
MDI Gateway
SNA Comm Server
PeopleSoft
Windows 2000 Server
Browser client
Citrix plugin
IP
IE 6.0
Business goal Strategic business goal Improve employee Reduce training costs
productivity
Function What does it do? Real time chat and Distance learning
e-messages
Business value Value to customer Less phone tab, less Reduced travel and
travel, faster response tuition expense
training
Non-functional requirements
The non-functional requirements are explained in the following sections.
General
Because the projected changes to the system involve a large number of
black-boxed applications (systems that are not yet selected), it is not possible to
obtain accurate non-functional requirements in some cases. Although gross
approximations can be used, the system must be sufficiently scalable to
accommodate substantial differences in the actual build-out.
Performance
Average response time for external Internet-based applications is to be less than
7 seconds. To make this reasonable, a specific use case transaction time is
assumed to be no more than 2 seconds. Exceptions to this are the ERV
application, which must be less than 5 seconds, and the CCamp application,
which must be less than 1 second.
Capacity/volumes
Store TLOG files run at an average of 15 MB per store per week over 102 stores.
This constitutes a capacity of approximately 2 GB per week, or about 100 GB per
year. This is required for the trickle system, ETL tool, and the data warehouse,
and possibly the integration hub.
Scalability
Because the identity of many of the future packaged systems cannot be known
with certainty, the integration scheme must be easily scalable within an order of
magnitude, that is, a factor of 10. The possibility of mergers and takeovers
requires this capability as well.
Usability
Applications must adhere to the ShopCo Common User Interface (SCUI) for all
browser-based applications.
Portability
Because of the projected consolidation and migration of production machines in
the third quarter, all applications developed for this system are required to be
portable across runtime platforms. Projected package purchases and uncertainty
as to merger possibilities also make it prudent to ensure that the new
applications can run wherever they are required.
Maintainability
No specific requirements are noted.
Security
End-to-end security should be specified before application package selection.
Single signon is a requirement, and application packages must be able confirm
to the corporate standard. Security functions should not be performed within
applications unless they are approved by the chief architect.
In general, the system should have few entry points, should use hardened
gateways, and should authenticate users at entry points, not within applications.
The system must have a security code distributed to only a few nodes, must
extend end-to-end, and must be based on modularity rather than an
interdependence between security and applications.
Infrastructure constraints
MQSeries is the required messaging mechanism. Oracle is used for all GFV
applications and DB2 is used for all others.
Operational model
Figure A-8 shows an example of an operational model diagram.
Implement TRN
Migrate to the TRN Market Point-of-Sale (POS) applications. Customize TRN
application to cover high priority GFN customizations. Integrate existing host item
maintenance and electronic payment systems with TRN.
The architectural implication is that the integration hub is used to couple TRN to
other systems.
Price optimization
Use a price optimization solution (DemandTec, or KhiMetrics) to facilitate more
effective margin management. Need ADM numbers to expand beyond classical,
rock, and early jazz categories.
Data warehouse
The data warehouse provides the foundation for cost accounting, category
management, and GYPSY replacement. The data warehouse provides a single
Business
Partner New
Systems Packages
New Legacy
Architecture Systems
Branch
Systems
Intranet
Datamarts
& Internet
Systems
Distribution Direct
Systems Delivery
End User
Computing
Reclamation
Direct
EDI Store Support
Seasonal Pharmacy
Applications
Human
Price Resource s
Check
8 Judge
3-4, 5, 6-7
System 9
12-13
Safe
Social Haven
Worker
10 Clerk
Police
11 Dispatcher
Social Work
Supervisor
A programming use case for this scenario looks similar to the example shown in
Figure A-12.
System returnslistlis t
System returns
SW
Social selects
worker case
selects case
System returns
System returnsform
form
SWworker
Social c ompletes form
completes form
System returnsauthorization
System returns authoriztion
Viability assessment
This example represents the initial assessment of viability for the current
architecture. It may include risks, assumptions, issues, and dependencies.
Table A-4 shows the risks section.
Note the following explanations for probability and impact in Table A-4:
Probability:
High: The risk identified is probably going to occur, or is already occurring.
Medium: The risk identified is about as likely to happen as not to happen.
Low: The risk identified is unlikely but still worth considering.
Impact:
High: Resolution is likely to require difficult decisions, probably above the
level of the project manager, which is likely to affect the schedule, budget,
or functional completeness of the project.
Medium: Special management attention is required, but it should be
possible to contain the risk within the project plan.
Low: Normal management attention should be sufficient to resolve the
issue.
Select the Additional materials and open the directory that corresponds with
the redbook form number, SG24-6070.
ADD See architectural decisions document. business goals Brief objectives of the company
that must be achieved to enable the fulfillment of the
architectural decisions document (ADD) Lists vision.
critical architecture decisions or choices made in the
design phase. It also describes the rationale for CITA See Client IT Architect.
making them.
Client Executive Builds a long-term business
architecture overview diagram Illustrates the relationship with the client. Identifies IBM
basic ideas of the proposed architecture. It is the opportunities and develops solution strategies that
equivalent of the architects sketch. Depending on meet the clients business needs. They maintain
the context, the diagram may range from basic to customer business relationships at the senior level
more detailed. Related work products are the with key decision makers and influencers. The Client
system context diagram, component model, and Executive is accountable for total client satisfaction,
operations model, where additional detail is IBM market share, revenue, and profit earned from
conveyed. Typically, the diagram evolves with a the client. They partner with the Software Account
greater level of detail as the architecture is better Manager (SAM) to drive software sales and partners
understood. The diagram serves as a means of with sales and technical specialists in hardware and
confirming architectural understanding between IBM services to drive respective sales.
and the customer.
Client IT Architect (CITA) A role similar to that of
backup and recovery plan Identifies the the Software Architect (SWA) and Software
necessity for backup and recovery and how backup Deployment Architect (SDA). The CITA has IT
and recovery impacts the customers internal responsibility for the entire IBM relationship with the
service-level agreements. Customers should customer, including hardware, software, and
identify who is responsible for backup and recovery services. The relationship among the CITA and the
and document the procedures in their support plan. software technical team is critical.
IT standards A work product that documents all operational model A work product that specifies
known IT standards that the architecture must the hardware that the desired architecture requires.
accommodate.
Glossary 141
project descriptions Communicates the project return on investment (ROI) The value that a
goals to everyone who needs to know. Provides customer receives on their investment in software,
answers to the question, What are we doing on this hardware, and services. Hard ROI can be quantified
project and why? The document provides brief with dollars or numbers and is associated with
descriptions of the business problems that the headcount savings, system count reduction, server
deployed projects will solve. consolidation, and department closures. Soft ROI is
more difficult to project and quantify, and involves
quick deployment wins Projects selected for their perceptions and satisfaction.
high-probability of success, their importance to the
customer, and their ability to complete in a relatively ROI See return on investment.
short period of time. The Software Deployment
Team (SDT) wants the customer to complete these rollout plan and schedule Includes all the
as early as possible in deployment because they individual plans listed in the readiness plan, with a
generate momentum, enthusiasm, support, and schedule and priority attached to each activity.
positive first impressions.
RUP See Rational Unified Process.
quick deployment wins plan Identifies projects
selected for their high-probability of success, their SAM See Software Account Manager.
importance to the customer, and their ability to
complete in a relatively short period of time. The SAR See Solution Assurance Review.
plan also contains the milestones and metrics
associated with the projects. scope creep Projects that gradually extend
beyond their original charters and add functions that
Rational Unified Process (RUP) A require software that was not in the original contract.
Web-enabled set of software engineering processes
that provide you with guidance to streamline your SDA See Software Deployment Architect.
teams development activities.
SDM See Software Deployment Method.
readiness plan Fosters proactive communications
SDT See Software Deployment Team.
between IBM and the customer and promotes
smooth deployment. It is a set of processes and
service level agreements A contract between the
work products designed to:
customer and their users for providing availability,
Level set customers expectations.
capacity, scalability, performance, and security of
Assign responsibilities and ownership.
the system.
Determine the customers implementation
readiness. services requirements document A work
Plan transition from pre-sales to post-sales product that lists the services that the Software
activities. Deployment Team believes the customer will need
Assure that customers use cases during deployment because they are critical to
(requirements) are met. deployment success. The deployment team
Identify risks for mitigation and escalation. identifies these requirements during the preparation
phase of deployment, reviews them with the
customer, and hopefully convinces the customer to
purchase them.
Glossary 143
Software Sales Specialist (SSS) Sells a systems management plan A comprehensive
particular set of IBM Software and works with SAMs, plan that documents the customers change and
Software Technical Sales Specialists, and Software configuration management plan, security
Architects in doing so. They have knowledge of IBM management plan, problem management plan, and
strategies and directions for the products they who is responsible for solution uptime during
represent. They are responsible for closing the sale deployment.
and positively impacting the customers satisfaction
with the engagement and offerings. use cases A work product that specifies customer
requirements in the areas of performance,
Software Technical Sales Specialist capacity/volumes, scalability, availability, portability,
(ITS) Advocates IBM products to technical decision maintainability, usability, systems management,
makers. The ITS can create new revenue security, infrastructure constraints, technology
opportunity, champion brand image, and position standards constraints, and geographic/configuration
IBM as the leader in providing software solutions constraints.
that meet the customers technical challenges. The
ITS also provides a bridge between the customers Value Realization Model (VRM) A software
technical challenges and potential product solutions. deployment work product that ensures that IBM and
the customer fully understand how the customer
Solution Assurance Review (SAR) Minimizes plans to measure deployment success.
deployment risk. Used to review solutions proposed
to the customer during the selling or deployment viability assessment This work product describes
phases of the EA. Ensures that the proposed architectural risks, prioritizes (high, medium, and
solution delivers the features expected and that the low) the probability and impact of each, and
solution is technically possible to implement. identifies contingency plans for each risk item.
SSS See Software Sales Specialist. vision statements The long-term objectives of the
company. They articulate the companys target
support plan Addresses how IBM will deliver marketplace, products and services, and the
support to the customer and how the customer will position the company wants their products and
support their users during deployment. services to have in the targeted marketplace, as well
as the financial position (revenue, profit, etc.).
SWA See Software Architect.
VRM See Value Realization Model.
SWG Team See Software Group Team.
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this redbook.
Online resources
These Web sites and URLs are also relevant as further information sources:
Instant messaging, Web conferencing, and team workplace tools
http://www-3.ibm.com/software/collaboration
Problem management self help and support
http://www.ibm.com/support
Passport Advantage
http://www.lotus.com/services/passport.nsf/WebDocs/
Passport_Advantage_Home
Education
http://www-3.ibm.com/services/learning/training_cat.html
IBM Tivoli License Manager Intelligent software license management to
help optimize business value
ftp://ftp.software.ibm.com/software/tivoli/whitepapers/
wp-license-mgr.pdf
Index 149
Achieve the quick deployment wins 58 Work products used by SDM 88
benefits 60
inputs, tasks, and outputs 59
owners and participants 59
Step 9
benefit 61
Execute the deployment plan 60
inputs, tasks, and outputs 60
owners and participants 60
substitution clauses 44
SWA (IBM Software Architect) 17
system context diagram 90
system count reduction 33
T
Team IBM 15
tertiary site 73
Tivoli License Management 141
tools 79
U
Update the business plan 62
use cases 91
V
value realization 31
Value Realization Model (VRM) 91
value statement 32
value timeline 32
viability assessment 91
vision statement 89
W
why have a Software Deployment Method 3
work product
architecture decisions document 88
component model 88
customers IT environment 89
customers organization 89
goals and issues 89
IT standards 90
operational model 90
project descriptions 90
system context diagram 90
use cases 91
viability assessment 91
Work product examples 94
Reveals best To solve any mystery, detectives rely on their experience along
practices and with proven tools and techniques to unravel the conundrum. This INTERNATIONAL
methods proven to IBM Redbook addresses the often illusive mystery known as TECHNICAL
drive deployment software deployment success. The information, practices, and SUPPORT
success methods presented in this book have enabled many IBM customers ORGANIZATION
to achieve their business and IT goals more quickly and efficiently.
IBM has accumulated a wealth of knowledge and experience in
Offers actual
software deployment. The technologies we have developed, the
customer experience best practices we have authored, and the employees we have BUILDING TECHNICAL
as a guide cultivated are our greatest assets. Like a detective explaining how INFORMATION BASED ON
PRACTICAL EXPERIENCE
the mystery was solved, we use this redbook to pass on to you
Helps make the most our customers the experience, knowledge, and wisdom we have
of your relationship accumulated after years of solving software deployment mysteries. IBM Redbooks are developed by
with IBM the IBM International Technical
The primary audience for this redbook is the person who has Support Organization. Experts
ultimate ownership for software deployment performance. We from IBM, Customers and
Partners from around the world
refer to this person as the Enterprise Business Sponsor (EBS). create timely technical
Secondary audiences include anyone who is engaged in software information based on realistic
deployment activities. Both audiences benefit from the practices scenarios. Specific
and procedures described. recommendations are provided
to help you implement IT
solutions more effectively in
your environment.