| 1.5 HRM 30. Application Service Provision | |
---|
1.5.30 What We Do: | We do three things better than everybody else; (1) we conduct Business Analysis using formal Information Engineering Methodology (IEM), (2) we provide Application Services using strict Information Technology Infrastructure Library (ITIL) standards and regulation and (3) we are able to raise the venture capital needed to eliminate all capital investments. Just like electricity, corporate business application services are reduced to a simple monthly operational fee. | On top of it all, Continual Improvements are relentlessly applied in daily, weekly and monthly cycles that evolve the application in line with emerging business requirements and opportunities. |
Information Engineering Methodology (IEM): | We listen to critical business requirements, to the problems that can be resolved with automation. IEM creates a set of interlocking analysis documents that define the scope of the business requirement with a very high level of precision. When agreement is confirmed with all parties in the value chain, then the application service is provisioned as a fully working on-line system. | Every long-term successful application will cost ten times more to maintain than it ever cost to deliver it in the first place. An application could be cast in concrete to make it very expensive to maintain with a short life or it can be designed to be very flexible and continually evolve - we choose only to deliver flexible application services that have a long life. IEM provides the detailed documentation needed for continual improvements to be a cost effective part of the package. By design, the architecture of our application services will survive for a very long time with continual improvements - other vendors may not be motivated to design an architecture that will survive for ten years. |
Information Technology Infrastructure Library (ITIL): | It is ten times harder to keep an application service secure and continually available than it is to build the application service. Business continuity does not happen by accident, it must be managed day after day using proven operational procedures. Security and compliance regulations gets harder each year with professional criminal attacks from every part of the world. Software licensing, patch management, capacity management, database administration and even energy conservation has become so expensive and so critical to the success of the whole venture. | ITIL regulation demands that 32 roles are involved in the provisioning of commercially-viable application services. One person may take on more than one role, but that does not distract from the diverse set of skills that are critical to operate many remote data centers. The majority of operational costs increase year-on-year and only with professional management can costs be held constant for long periods of time. |
Continual Improvements: | ITIL standard includes volume 5 that dictates the long term value of continual improvements to any operational application service. Cloud computing companies like IBM, Amazon, Microsoft, HP, Oracle, Salesforce, Dell and Google to not appear to promote this critical role of ITIL cloud computing. Any company that is only operating as an Application Service Provider without Business Analysis and Customization is just a platform provider. A software-as-a-service (SaaS) platform provider may be useful as a vendor who sells cars without wheels or aircraft without engines - the SaaS platform only has value after application services have been customized and provisioned. Without continual improvements, the application service life will be restricted and could become a liability - Continual Improvements are part of the ITIL standard because they are critical to the long term success of any application service. |
| Our mission is to provide: | 1. your application services with (FOC evolutionary) continual improvements | 2. using secure replicated data access | 3. for any number of your authorized users | 4. in any approved (or mobile) location | 5. using any kind of computer, tablet or smart phone | 6. without the need to (pay for and) install special software |
1. Your Application Services with Continual Improvements: | You have a unique company and deserve unique application services - one size does not fit all business requirements. Cloud computing services are similar to your electricity service with a modest monthly fee. | As your business evolves, your application service must continually improve to (remain fit for purpose and) provide you with a competitive advantage. As a new business opportunity is identified, your application service must improve to enable you to maximize each opportunity. |
2. Secure Replicated Data Access: | The security you used last year will not be good enough for next year - periodic external audits ensure your data is safe. Business Continuity is provided with your data is stored in encrypted databases in multiple secure UK Internet data centers. |
3. Authorized Users: | The highest quality sign-in security is provided with control of: hours-of-day, days-of-week, network, country, IP address, operating system and version of your browser. People are supported to work with all European languages and in all currencies. |
4. Approved Locations: | It is easy to control when and where people can sign in and access your business data. People may be enabled or disabled for working from home or using a specific computer. |
5. Any kind of Computer, Smart Phone or Tablet: | Any Internet connected device may be used with any operating system and any browser such as Firefox, Chrome, Safari or Internet Explorer. Your application services cannot be infected by your computers and your computers cannot be infected by your application services. Multiple sign in is supported so you may have your laptop, tablet and smart phone all accessing different business data at the same time. |
6. Service not Software: | Because no special software is involved, your costs of IT support and software product licenses are reduced. All capital costs are eliminated and all computers that could be stolen contain no business data. |
|
|