| | 1.2 Demand 01. Mission Statement | | |
---|
| The ASP mission is to provide: | 1. all your applications as a subscription service | 2. including continual evolutionary improvements | 3a. using private and secure | 3b. flexible on-demand | 4. and continual data access | 5. for any number of your authorized users | 6a. using their local languages and currencies | 6b. in all your approved countries and locations | 7. using any kind of computer, tablet or smart phone | 8. without (installing) any special software. |
Customer Demand: | Customer demands have been summarized as the enclosed eight mission statements. Not all missions are applicable to all customers, but all are important to provide professional application services. |
Shared Values: | Recruiting is all about matching the values of a person with the values of the business so they can share the mission. People who can be proven to have similar values will be approached and invited to get involved to a degree that they are comfortable with. A major benefit is that people can start off with an arms length association and get closer as they feel more comfortable to do so - its not all or nothing. Recruiting the right people can take years and its all a matter of shared values with a common mission. |
1. Application Services: | All computer business requirements are provided as reusable application services for a simple monthly subscription fee. By avoiding capital investments, the job of operating the business can evolve without expensive legal negotiations. Risk is reduced with the right to change application service provider at any time. |
2. Continual Improvements: | Included in the fee are evolutionary improvements to ensure your application services always mirror your business requirements. By avoiding disruptive new releases and implementing a continual modest improvements approach, training costs can be minimized. |
3a. Security: | Security is provided to the very highest international standards. Periodic external penetration testing and audits are undertaken and the results shared in an open and transparent way. |
3b. On-Demand: | Elastic capacity to handle peak loads and to shrink back to handle less busy times. All capacity limits are eliminated with any number of users in any office in any country. The number of application services provided to each user may expand and contract as business demands. |
4. Business Continuity: | By design, business continuity is built into your application services with multiple remote data centers running encrypted replicated databases. The Disaster Recover Plan is for users to simply sign in to an alternative domain name in the eveent that the normal domain name data center is not available for any reason. The provision of hot alternative data centers is not cheap, but the benefit of never having a major disruption to the business is considerable. |
5. User Authentication: | User sign on is implemented with many layers of identification and security to keep authorized users safe and to blacklist any criminal actions. |
6b. Multi-Language: | Users may select their own language and may select business documents that use the customers preferred language. | Users may select their own currency and may select business documents that use the selected currency. |
6b. Multi-Office: | Support for a selected set of countries and office locations is implemented with data control security to issolate office data and to reject anything from unauthorized countries. |
7. Any Computer: | Any kind of Internet connected computer, tablet or smart phone using any version of any operating system can be supported with complete safety. | Bring Your Own Device (BYOD) is a popular method of working for corporations who are able to provide safe and secure application services without the need to install any software. |
8. No Software: | Once of the most important factors is that no software is involved, no software needs to be installed and all software maintenance issues are eliminated. |
|
|