mothballing your y2k effort so soon! mothballing your y2k effort so soon !
TRANSCRIPT
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Mothballing Your Y2K Effort
So Soon!
Mothballing Your Y2K Effort
So Soon !
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
John S. Farhat
• President of The Technology Group.
• Happy to see everybody out of the bunkers at our tribal meeting. Don’t forget the kerosene and clean water exchange at the end of the meeting.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Disasters
• Naval Research Academy Reports the year as 20100. Lasted a day!
• Our web site did the same. Lasted yet another day.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Other Y2K Disasters
• Having spent all that money and we have no real disaster stories to tell - Not even one good movie.
• (Thank God for hackers who will keep us busy with Yahoo and e-Bay stories for a while)
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Success Stories
• Having spent all that money, and all the valuable information it has created.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Main Premise
• This whole presentation is built on the premise that an organization is:– A System.
• It takes inputs.
• Generates outputs (and profit).
– Like any system is has subsystems.– Like any system, it can be optimized to function
better.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Example: Organization As A System
Raw Materials
Manufacturing
Customer Orders
Order Management
Purchasing
Production Planning
A/R
Supplier
Customer
A/P
Marketing
Marketing Materials
Payroll
Cash Management
Accounting
Other Functions
Profit to Share Holders
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Order Received
•Verify in stock ATS To Whse •Pick list Inventory Relief •Transport Rqst •Bill of Lading •Initial Invoicing
•Customer Verification •Credit Validation •Order Acknowledgement •Deals, Discounts, Pricing •Billing, Accounts Rec.•Production Scheduling
•Raw Materials on Hand / Re-supply•Labor Scheduling and Availability•Planning and Forecasting
Example: Sub-Systems
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Secondary Premise
• Nobody or No Group of People in an organization of a reasonably small size and above knows how all the pieces fit together, and which points are good process enhancement points.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Remember?
• Do you remember all the work and all the advice for Y2K preparations you received.
• Let’s see if the next set of slides look familiar. I have pulled them directly out of a Y2K preparation seminar The Technology Group organized in the middle of 1999.
• Quick run……..
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice (1)
• Identifying and prioritizing your risks
• Test Strategies for Business Systems
• Develop work arounds.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice (2)
The steps required to make a system or product Y2K compliant are:
1. Awareness from Proper Planning
2. Assessmenta Impact Analysis
b. Inspection (Internal & External Systems)
c. System monitoring
d. Evaluation
3. Testing/Validation
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: External Dependencies
• External Dependencies are risks presented by factors outside the enterprise; these include risk present in the possible failures of business partners, suppliers, public utilities, transportation, telecommunications, governments, and other businesses.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Examine your business and its processes
Be sure to know and understand these points.
•What are the basic components of your business? •What are the internal processes? What are the external processes? •Which processes are mandated by law to be compliant; which processes are critical to your companies survival ? •Which processes are most vulnerable to Y2K issues?
Y2K Advice: Processes
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Question 1 --Why should I plan for a situation which may never occur?
•Even if a Y2K catastrophe does not occur, planning will prepare you for other types of emergencies. • During planning, you will learn more about your business strengths and weaknesses. •Planning is an opportunity for you to encourage teamwork in your organization.
Y2K Advice: Planning
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Examine your business and its processes
Include computerized and non-computerized processes
Include historic information processes which are date dependent, such as sales history, market trends and, inventory aging, A/R aging and forecast history.Also include communication processes within your business and to the outside.
Y2K Advice: Planning
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Examine your business and its processes
Write down your findings in a concise and detailed manner.
Create a diagram showing transactional business flows of your company. Include in this all critical forms, such as orders, invoices, inventory tickets, vouchers, and checks. Include all contacts between departments within the company. Include all contacts between the company and external sources.
Y2K Advice: Planning
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: PlanningPublish your business flow and critical path findings to the company
Be sure to encourage suggestions and comments, but give a closing date for changes.• Concentrate on areas that will need workarounds. • Look not only for direct Y2K implications, but for secondary impacts to your business. For instance, how do you take an order if the computer is down due to power outages?• Listen to what those within your company; they do the work, and know their areas well. You need to incorporate this expertise into the overall plan.• Check with your outside contacts to see what they are doing to prepare for the century change.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: PlanningReview analysis and input and from these develop a list of critical touch points.
Be specific -- point out potential problem areas within your organization.
• For every potential problem, develop a manual workaround.• Work with each area to make sure that the workaround is do-able.• Publish the workarounds quick, and move on to the next stage --- PREPARATION
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: Contingency Planning
• Why do you need Contingency Planning ?
• No matter how early you started everything that impacts you can not be guaranteed to be compliant
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: Contingency Planning
• How to prepare– Identify risks– Prioritize based on risk– Develop alternate actions– Assign responsible parties– Test the plan
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: Contingency Planning
CleanManagement
Plan Contingency,2nd Priority
to Fix in 2000
Must FixBefore
Year 2000
CleanManagement
Plan Contingency,3rd Priority
to Fix in 2000
1st Priorityto Fix in 2000,
DiminishedOperating Plan
CleanManagement Defer Defer
Very Critical -High Business Impact
Can survive six months -Medium Business Impact
Non-Critical -Low Business Impact
No Date Impact,Workarounds Not
Needed
Date ImpactWorkarounds
Available
Date ImpactNo Workarounds
Available
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: Testing
• Test manual workarounds in the live environment.– Uncovers problems with workarounds.– Allows time to correct problems.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Y2K Advice: Testing
• Hold post evaluation meeting.– Discuss good points and concerns.
• Make any additional changes.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Lot’s of memories…
• Let’s see how the solutions were implemented.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Organizations’ Solution
• Remediate Computer Based Systems
• ERP or such solutions
• Piece meal solutions
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Problem
• A lot of the main issues with the business were never solved.
• Reason: The looming DATE, and the BUDGET.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Two Examples
• Example of ERP Implementation
• Example of Custom Piece Meal Solution
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Example: ERP
• Disruption to organization is very large.
• Changing ineffective processes at the same time as the implementation was deemed too risky.
• SOLUTION: Implement New System to Support Old Processes.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Example: ERP Consequences
• A lot of knowledge about the two laying on people’s desks waiting to be trashed or worse yet, filed
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Example: Custom Piece Meal Solution
• Started with a situation that had many problems, systemic as well as process based.
• Initial solution: Duplicate existing system to create a compliant version.
• Rejected!
• Mindful of the opportunity accorded to us to alleviate the process issues, we set to work.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Example: Custom Solution Consequences
• More dramatic result to customer.
• New Processes New Systems.
• Criticism: Using ERP or such solution would have produced the same dramatic results.
• Answer: Most likely scenario is New System / Old Processes.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
GEM
• After January 1:– Utilize knowledge gained to make business
process improvements.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
If You Did Remediation
• Pure Remediation simply allowed the existing programs to be fixed to properly handle the date.
• No solutions around the systems and areas around it.
• If your organization performed pure remediation: You are an excellent candidate for Y2K enhancements.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
If you Implemented ERP
• Two situations:– New System / Old Processes– New System / New Processes
• If you fit into NS/OP: You are an excellent candidate for Y2K enhancements.
• If you fit into NS/NP: Congratulations… Go to Disney World.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
If You Implemented Custom Systems
• It is likely that you implemented special enhancements to the process.
• It is also likely that integration opportunities and additional process enhancements can be achieved.
Copyright 1999 © The Technology Group Inc
AB
CM
AB
CM
Sem
inar S
eries S
emin
ar Series
Copyright 1999 © The Technology Group Inc
Take Away
• The Technology Group urges you to wait before committing Y2K analysis results to the filing cabinet or trash.
• Money has already been spent.
• Take one more look at the results.
• Fix a problem.
• Achieve a dramatic result.