banner



What Different Choices Packages Does At&t Have For Home Phone Services

Practise

Seven Principles For Selecting Software Packages


shopping cart in store aisle

Illustration by James Gary

Effectually the mid-1950s, in the early years of commercial utilize of computers, all software systems were adult in-firm. At that place was no software industry in existence at that time.15 As the software manufacture formed over the side by side few decades, many organizations outsourced their software evolution to specialized software suppliers. Most software products were, nonetheless, even so developed as unique systems for each organization; that is, there was little standardization. The next step occurred when that software producers developed their ain proprietary software in club to capture economies of calibration in developing the software in one case and then selling it to multiple customers.2 This standardization procedure also benefitted software buyers by lowering transaction costs and risks, equally it was now possible to choose amid a proven gear up of applications. Moreover, standardization gave both producers and buyers of software a way to capture and blackness-box all-time practices by embedding it into the standardized components of the systems.16 Adjacent in the standardization process was a pace away from proprietary standard systems that essentially locked customers to a single software producer to open up software standards.37 In principle, software built on open standards allowed customers to source from any supplier that could supply software in accordance with open standards (for case, Java- and XML-based systems).

Open standards meant that prices dropped and functionality was enhanced, which resulted in a mass market for many software application types. In addition, software producers had enough resources to brand their software even more full general-purpose oriented with larger feature sets that were organized into a product.viii Software became even more than standardized, and in the procedure, many local markets were annexed into global markets. For case, give-and-take processing software was no longer produced specifically for a particular profession or industry or nation;26 instead, an almost universal office suite emerged, such as, Microsoft Function. The generalized software products could be configured in diverse ways (for example, program parameters, macro functionality, linguistic communication support, so on) to accommodate special needs among customers. These highly configurable full general purpose software products came to be known as software packages.23

Until recently in the IS academic community, there has been a tendency to focus on traditional studies of software development and implementation of large custom-made systems.20,24 This has been despite the leading tendency that organizations employ "shrink wrapped" systems31 where the core functionalities of the software are identical across all implementations in dozens, thousands or even millions of different organizations.fifteen When information technology comes to managing the process of identifying and evaluating packages, the IS academic customs has been almost silent.

The aim of this article is to provide practitioners with a grounded set of principles to guide the pick of software packages. Past principles, we hateful a fix of fundamental ideas that summarize important insights in software package acquisition that are not (nevertheless) embedded into the do of ownership software. The principles are interdependent and together they grade a whole that is larger than the sum of the parts. Like to Klein and Myers' statement,19 the use of all principles is not mandatory, but in each case it must exist judged whether, how, and which principles apply to a specific situation.

Dorsum to Summit

Packaged Software

Packaged software is a category of information systems for which all implementations are essentially identical; that is, the main functionalities are common to all adopters. While the core components of a parcel are identical across all user organizations, the implementation into an private organizational data infrastructure is usually configured in some manner to fit the requirements of the organization.1,17,22 For the purpose of this article, we define a standard software package as: a collection of software components which when combined perform a gear up of generalized tasks that are applicable to a range of users. As a parcel is adopted by many, information technology forms a standard because the core components are identical across all of its installations. The software package may be configured or customized to make it fit with specific requirements unique to the concrete implementation. This is achieved by setting program parameters, installing improver modules, or edifice interfaces with other software systems. Within an arrangement, the growing importance of organisation interconnections ways the choice of software bundle has wide ripple effects for other parts of the arrangement whose software packages, implementations, and interests may not originally have been identified or considered in the conclusion process regarding a new software acquisition.

Packages are often referred to every bit "commercial off-the-shelf" software,31 but open source systems (for example, Open Role) or other types of nominally free software, for example, Firefox21 or Cyberspace residing systems (for example, Google Apps) are other examples of packaged software. Some standard software packages require footling adjustment on the part of the user before they can perform (for example, Internet Explorer), while other software packages are mere tools or platforms on top of which specific functionalities required by the user tin can be implemented (for case, ERP systems).8 Some setups of parameters may be mutual among several customers, in which case the producer tin offering standard solutions on top of which only site-specific configurations demand to exist made.35 For example, the ERP producer SAP provides more than than 25 industry solution portfolios for big enterprises that embed best do (for instance, SAP for oil and gas).

Back to Top

Seven Guiding Principles for Selecting Software Packages

Here, nosotros nowadays the guiding principles for making a meliorate informed choice when selecting software packages. The first principle we label the founding principle because it is key to the other six. For each principle we provide examples that illustrate its importance.

The 7 principles were derived empirically from a field study and from our understanding of software acquisition. The field study approach provided us with in-depth noesis of a number of standards decisions made by bodily organizations. The focal company had more than than fifty,000 employees, and we followed its software acquisition processes and standard choices over three years. The field report was conducted using semistructured interviews. The persons interviewed were five senior directors with knowledge ofand some power to influencesoftware acquisition. To broaden our knowledge base, we also carried out 34 interviews in xiii other organizations. The interviewees were CIOs, CFOs, and general managers, and were deliberately chosen because of their high experience with software package pick processes. All interviews were recorded and transcribed and thematically coded. The longitudinal approach meant that a theme identified in one interview could be further investigated and validated in subsequent interviews.

A 2nd source of inspiration was information virtually item software standards and packages, vendors, historic information about system compatibility, market shares, and mergers and acquisitions. However another source of inspiration came from participating in an manufacture network in the belatedly 1990s where representatives from sixty companies met bimonthly to share their knowledge and experience with corporate intranets. During the three years the nature of intranets changed from beingness habitation grown, to a situation where a few local software companies vigorously fought over market share, to a situation where intranets were built upon international standards and readily available from multiple software houses. The seven principles accept now been presented and critically reviewed at numerous IT managers' conferences, and we are indebted to the participants for many of the examples that illustrate the principles.

Back to Peak

The Fundamental Kickoff Principle: When you buy packaged software you join its network.

Prior to the emergence of packaged software, any arrangement that was using software in consequence committed itself not only to a software product but likewise to a item software producer's connected power to deliver new functionalities, as organizational requirements evolved and new engineering science became available. In the present day, most of these commitments and dependencies have evolved from local software producers to global standard software packages that can be sourced from, and configured by, many independent software vendors with the necessary competences and technical skills.

The users and producers of a software package constitute a network of parties that share a mutual interest in its destiny.34 The network is virtual, in the sense that the members probably do non know each other but withal share a common interest in protecting their investments and ensuring the continued evolution of the package. The network indirectly also has other interests in mutual; for example, the grooming and education of personnel.34 An organization's purchase and implementation of a particular software package thus ways that the system has joined the network associated with the software packet, and the level of commitment is equal to the size of the investment (buying and configuring the software and the grooming of personnel, and then on). To a large extent, the investment represents sunk costs,10 which make run a risk mitigation activities even more central.

The network around the package has implications for the purchasing conclusion and has to be considered as role of the investment decision. Beyond the immediate network of users and producers, the extended network includes vendors, standard setting institutions, government regime and other compatible software products. It is imperative to choose to participate in the network that is perceived to provide the all-time long-term benefits as the organization, the network and parcel co-evolve. In the network the distribution of power and influence depends importantly on who controls the package and thereby its evolution. In the case of about software packages, the producer wields the greatest ability over the proprietary software network, as they own the rights to the packet outright and thus control its further evolution. The producer'south power tin can be challenged if users unite to influence the producer or even challenge the producer's ownership; for example, past opposite-engineering the package's functionality. Equally an example of influence, the pressure from powerful users has repeatedly postponed the dusk date of Windows XP.


The users and producers of a software package constitute a network of parties that share a mutual interest in its destiny.


Open up source packages, on the opposite, are non owned by a single entity; instead, the software is designed specifically to promote shared ownership.25,29 Open source software can appear unattractive and risky to some because at that place is no central point of control from which advice nearly the software package and its hereafter development can be sought. Others view these properties every bit strengths since they protect the standard parcel from the opportunistic actions of profit maximizing software producers. We shall not conclude the heated debate over open up source here, but just emphasise that organizations adopting a software package demand to be alerted to the intimate connection between a software package and its associated network.

Dorsum to Top

Principle Two: Take a long-term perspective: Look alee just reason back.

Many choices made in the early stages of an organization'south use of computers have turned out to have surprisingly long-lasting consequences, as both software and data standards have been shown to be very persistent.xx Many awarding types have historically developed in an evolutionary manner, where the first simple implementations were custom built by innovators, and then spread to a small number of early on adopters. As the application type benefited its adopters, competing systems became available on the market, and finally the application type became a commodity, possibly to be arranged with other software application types into larger software packages. A similar evolution trajectory will likely depict the development of future awarding types that first appear every bit isolated systems. As a outcome, organizations must take a long-term perspective and envision a more complex and continued future, or else they risk implementing tomorrow's legacy systems.

We emphasize this long-term perspective of software packages. As the step of change in the estimator industry reduces the effective lifespan of about hardware and software to a few years, the organizational data and the standards that define them are more than durable.5 An organization's standard package choice therefore involves participation in networks that may final a decade or ofttimes longer. Shapiro and Varian34 debate that when ownership standard technology we should expect ahead but reason back, noticing the network and the evolution process that produced it. We applaud and echo this communication that is valid also when selecting packaged software. This principle is useful to include when comparing a proprietary software package from a local vendor with that of a software package built upon an open global standard.

Back to Top

Principle Iii: When choosing packaged software, there is safe in numbers.

One route to mitigating the perceived risk in purchasing packaged software is to cull a package based on its historical and current success, as measured by the financial success of the software package's producer and the size of the associated network. Flocking behavior is a low take a chance strategy that is worth pursuing for software support of non-core functionality and for companies that consider themselves followers. Below, we describe ii scenarios representing opposite outcomes of a contest between software packages; namely, blind alleys and one-way streets. 12

The bullheaded aisle scenario refers to the situation where an system has adopted a package that is losing its market share to competing packages. David12 uses the term "angry orphan" to describe the state of affairs of the losing package. He points out that such products often testify a sudden rapid development when they are losing the battle. For instance, the greatest speed of innovation in canvas ships happened as the steam engine challenged the sail as the leading propelling technology on sea voyages. Despite the sudden and remarkable development, sail boats never actually challenged the inevitable change to steam engine boats. In a similar manner, the losing software package might undergo rapid developments, but shrinking network effects make the downward screw inevitable. In a special instance of the blind alley scenario, the losing package manages to capture a niche market network where information technology may sustain itself for yearsor even perpetually, giving organizations the choice of staying with the incumbent producer or giving them fourth dimension to look for migration paths toward a standard package with more perceived vitality.17

The one-way street scenario describes the situation where the organization is left with little selection when it comes to buying upgrades or expansions to the package. This is the case when the purchase of a particular packet in upshot obliges the arrangement to place time to come purchases with the aforementioned software family because the product has low compatibility with other families of software or packages. In this situation, the system may detect itself chained to the producer considering the costs involved in switching to some other parcel are prohibitively high, and the organization is in event locked-in.11 This is quite mutual for ERP systems where once the initial choice between (for case, Oracle Financial Systems and SAP), has been made, it becomes prohibitively expensive to switch. Sometimes, a package may be then successful in the market that there are fewif anyviable alternative products bachelor to the organisation, an example of which is the current selection of operating systems for PCs existence express to Microsoft Windows, creating a near monopoly. However monopolies are constantly challenged and they are ofttimes short lived in the software business, as reported past Chapmanvii who narrates the story of how WordPerfect lost its near monopoly and how other software packages such equally Netscape and dBase lost their lucrative position in the marketplace.

Back to Summit

Principle Four: Focus on compatibility and beware of false gold.a

Because of the long life expectancy of organizational data stored in some (frequently proprietary) format (see Principle Two), backward compatibility betwixt software systems becomes a major factor when organizations consider new software investments. Sometimes software adheres to i common standard, enabling user organizations to choose among competing packages based on features such as price, performance, usability, etc. Near often, however, compatibility is non a articulate binary issue. As standards and packages evolve and producers compete against each other, packages may converge or diverge on some features, such every bit, reaching or breaking compatibility.33 Of form, this development tin be acquired by legitimate technical pattern and implementation decisions, only it may besides be caused past the producer'southward perceived advantage in irresolute the caste of compatibility or interoperability with competing packages.

A producer may differentiate its package from the competition by adding proprietary features and unwarranted proprietary extensions to an open up standard. There are some calls for the execution of this predatory business concern technique of "comprehend, extend, and extinguish," and often Microsoft is associated with an well-nigh flawless execution of the technique. Only the law suits that doubtlessly follow spoil the perfection. One historical example is the fight between Lord's day and Microsoft over Coffee and extensions to Java.32 The do of calculation proprietary extensions to an (open) standard is successful when some adopters find the proprietary features attractive and implement them. Nevertheless, it is important to be enlightened that proprietary features that might exist useful for the singular adopter are in fact fake gold for the network at big. Every time a proprietary characteristic is implemented it adds to the switching costs, meaning that it will be harder to pull away from the software packet that embeds the proprietary extensions.34 For the network, it means that proprietary features become entrenched as de facto standards, and for the community in full general, it becomes an insurmountable barrier to alter, thus diminishing the value of a standard.

The break-down of open standards happens in many cases where in that location is no central governance of a standard by a central institution or authority, and fifty-fifty if such governance does exist, standards often interruption downward anyhow as competitors extend the limits of the standard.9 One example that we claim to be false gold comes from the visitor Linksys (owned past Cisco) which has extended its wireless network equipment with proprietary protocols, thus doubling the throughput of the non-proprietary protocol IEEE 802.11b. While the products are yet astern compatible with the open standard backed by the IEEE, Linksys gives users a stiff incentive to use Linksys hardware exclusively. Another large manufacturer, D-Link, does exactly the same thing; withal, the proprietary extensions of D-Link and Linksys are not compatible. For the community, the danger of proprietary extensions is that it may not be compatible with the next generation of the open standards (in this case IEEE 802.11n), and if the proprietary extensions take become entrenched, none is willing to adopt the adjacent open standard version. Thus, the network has moved from a situation where organizations could choose to purchase open standard uniform equipment from a number of independent suppliers to a situation where standard evolution has stopped and in that location is only one supplier of a proprietary de facto standard. In fairness, it should exist noted that neither D-Link nor Linksys has been successful in their effort to manifest their proprietary extensions as de facto standards; nonetheless, the risk remains.

Organizations should continue their options open by buying packaged software that is close to compatible standards; and if they are already using proprietary standard packages, they should keep their optics open for gateway standards as a fashion to break an existing lock-in to a proprietary extension.13 At the very to the lowest degree, organizations should be witting of the adoption of proprietary extensions, certificate their apply in the organisation, and consider which steps will be necessary to discontinue their use in the futurity; that is, a feasible exit strategy.

Generic software packages exercise non meet all the requirements of an organization;viii,28 there are therefore enough of options offered as part of the package to configure it equally needed.16,thirty Ofttimes local practices or cultural problems add to the desire to customize or localize the package.5,22 Customization is different from configuration in that customization is more radical and adds functionality that was non an intended generic feature in the original package. Customization is more lucrative for local software vendors compared to selling the packet itself. For the adopting organization, the pick to customize may appear shiny, but for several reasons, could turn out to be false gold.20,23,35 Get-go of all, the customization is often expensive and represents sunk costs that, in practice, limit the choices when the bundle or service contract is up for renewal.5,20 2d, when upgrading the software to the side by side version, ordinarily all customizations accept to be re-implemented. In add-on, the new features of the side by side version are plainly not role of the customization that was implemented from the previous version.8 Beatty and Williamsfive recommend "un-customizing customizations" before whatsoever upgrade is attempted because they are found to form major technical obstacles and are the main threat to achieving a Render on Investment. Instead, Beatty and Williams5 propose that an upgrade is an opportunity to review critically existing customizations in order to determine whether they are really needed, and if and then, to decide if they are supported in the new version and eligible for elimination. In line with this, we advocate fugitive any comprehensive customization of packaged software, unless admittedly necessary.

Dorsum to Height

Principle Five: Choose a software package with accessible knowledge.

When an system chooses to utilise custom-built software, it must conduct the entire burden of training and retaining personnel to develop the necessary skills to utilize the software. The use of packages, however, promises access to knowledge of the package's application and implementation. Ideally, the network of organizations using a package is matched by a network of individuals competent in configuring and using it, but often the supply and demand of certain skills is not aligned, as is pointed out by Calorie-free.23 If there is an unmet need for cognition and skills, both user and producer organizations suffer. One historical example of misaligned networks is that of ERP systems, where the number of people with knowledge and skills of the configuration of SAP systems is far less than the need from user organizations. The consequence is disproportionately loftier costs for the people component of SAP implementations and delayed projects with reduced or poor functionality.

Producers employ various strategies for ensuring a puddle of knowledgeable users for their software.11 One strategy is to produce complimentary or depression price versions and then that interested people volition be more probable to sample it. Another variation is to make "academic versions" of the software package available every bit gratis downloads, or to packet the package with textbooks used in educational institutions. The process of institutionalizing skills is more complex for packages based on open source (sendmail, emacs, Linux, amid others), where there may be no single trusted certifying institution corresponding to the owner or vendor of a package. Instead, other forms of legitimization are used, such as a person's rank in recommender-systems such every bit discussion Web sites. Such online networks besides get in possible to determine the contributions of a detail member, enabling potential employers to retrieve an account of a person's skills in regard to a particular software package.

The co-evolution of the ii networks (that of the producers and that of the users) has loftier path dependence to the indicate of existence quasi irreversible.xi For a new competing software packet that starts with essentially no network; the existing network forms a formidable entry barrier that is hard to break.6 If the new package is proprietary and the owners are willing to invest, one way for the new standard package to attain a disquisitional mass of users is for the owner to bear some or all of the costs for the organizations willing to switch.33 An culling approach is to invest in building gateway features into the new standard parcel, thus easing the transition from an incumbent bundle.13 When Microsoft Word was winning over the majority of the word processing market from WordPerfect in the first half of the 1990s, Microsoft sought to circumvent the knowledge barriers by providing WordPerfect users an piece of cake passage. Microsoft Word featured two gateways: an culling user interface where Microsoft Word could be made to emulate the keyboard shortcuts of WordPerfect, and "Help for WordPerfect users" where the apply of Microsoft Word was explained in terms that WordPerfect users were accustomed to. We propose using this principle to assess the available knowledge base for the software package.

Back to Top

Principle Six: Choose packaged software with the right blazon of standardization.

Standardization can be achieved at various levels and in many forms in packaged software. Here, we provide an overview of the almost common types of standardization considering information technology is important to cull the blazon that is right for the item arrangement, co-ordinate to its available resources and constraints.

Standardization of user interface is a mutual strategy employed to limit the need for user training. After some experimental implementations of information systems of a particular type, a ascendant design typically emerges, resulting in hitting similarities of user interfaces amongst unlike software systems. Referring to Spider web site design guru, Nielsen,27 users spend virtually of their time on other sites, and therefore adopt new Web sites to be designed similar to the sites with which they are familiar. Dominant designs sometimes get static and stop up equally anachronisms when the surroundings change. For example, the diskette icon featured in most software applications invokes the "save" role, even though no files are e'er saved to diskettes and personal computers no longer have disk drives.

In standardization of output, the software package's only compatibility restraint is that it must produce an output that can be used by recipient users or software. One example is that of Web page product, where different departments in an organization may use very different production techniques equally long as their Web pages satisfy agreed-upon requirements. This standardization strategy has the strength of allowing users greater liberty to optimize and personalize their production methods. The strategy also has serious drawbacks if the users ever need to share intermediate data; we would thus not recommend this strategy for most organizational standardization issues.

An system might choose standardization of data structure for one of two reasons: seeking backward compatibility with data stored in legacy systems, or seeking to ensure access to the information from other information systems in the time to come; that is, forrard compatibility. Past choosing an open standard, an organization tin can usually choose between numerous uniform software packages, thus bringing the simple advantage of choice. The disadvantage is that the user organisation must abstain from using any proprietary features or extensions of the packages chosen (the false gold mentioned in Principle Iv) in lodge to maintain strict data standardization. Examples of data standards with wide vendor support are the all-purpose data formatting languages XML and the database query linguistic communication SQL, although both are also subject to standard deviations amidst the implementations from diverse producers.


By choosing an open up standard, an arrangement can ordinarily choose between numerous compatible software packages, thus bringing the simple advantage of selection.


More advanced modes of standardization of information interfaces include interconnectivity and interoperability. iv Interoperable information systems are able to communicate during the execution of a detail chore. An everyday example is that the functionality of an electronic spreadsheet program tin can be employed by a word processing program to perform a calculation inside a text document. More avant-garde implementations let interoperability between software running on divide computers - even in different locations or organizations such as well-nigh Web services organized in serviced oriented architectures (SOA).fourteen Features such every bit these will accept far-reaching implications for the implementation of standard software packages and inter-organizational information systems in the coming years.

Organizations may choose standardization of skills by employing just people with a particular education or skill set, or if necessary, to behave the cost of preparation new employees to some formalized level of grooming (see Principle Five). Organizations can choose to standardize two types of skills: generic or specific skills. Generic skills are skills that are acquired through education, such as critical thinking, programming, business noesis, and so on specific skills cover a user's qualifications with a particular software package, and these may be certified by the product'south producer or a trusted third party (see Principle Five). Every major vendor in the packaged software market place has such certification programs, and many are even updated on a continual ground, forcing certificate holders to take new exams in order to preserve their status.

I might argue that if all are using the aforementioned standard software bundle, where does competitive advantage come from? As a rule of thumb, nosotros recommend organizations to follow and standardize in all non-core areas to bring down costs, and in order to differentiate themselves, organizations must exist prepared to lead (be an early on adopter) and tolerate a higher degree of standard dubiousness in core areas. We will render to the consequence of competitive advantage in the conclusion.

Back to Top

Principle Seven: All journeys start with a commencement step.

In a market place of fast update cycles and many options, some buyers may presume a wait-and-see position, while they let the rest of the market test out competing products, determine the necessary feature sets, and and then on.3,twenty Of course, this strategy will mitigate the risks of investing fourth dimension and coin in a software parcel which afterwards loses in the market, but we suggest organizations not to fall into the wait-and-run across trap for the following two reasons. First, a winner will only emerge when organizations really buy software, so an organization stands a greater hazard of finding software that fits its needs if information technology plays an agile role in the choice procedure (invest in the bundle).


We promote a view of buying software as a continuous procedure of constantly trying to match available packages with a base of operations of already installed information systems, while anticipating hereafter organizational needs and advantages in engineering science.


Second, the further evolution of packages is inevitable, and thus it is very probable that while an arrangement is waiting for a parcel to announced in the market place for a perfect fit, its requirements may have changed. In fact, it may never be possible to find a perfect lucifer.36 After a prolonged sampling process and the organization finally selecting a software package, activities such as conversion of legacy data may turn into considerable tasks, as there may be no personnel with expertise in both the legacy system and the new software package.20 Therefore, the best strategy to ensure that a better packet is at that place tomorrow is to adopt its predecessor today by joining its network. Being office of the network will also ensure that special needs are noted and incorporated into the next version of the package.

Dorsum to Top

Conclusion

Software packages are replacing custom built software at a fast pace. All the same, there is petty bachelor advice on how to evaluate and choose amongst the offered packages. This commodity highlights 7 principles that are related to selecting and assessing software packages. The principles extend beyond the two obvious merely narrow factors of price and immediate features, to include a wider networked and multilateral view of software packages. We promote a view of ownership software as a continuous process of constantly trying to match bachelor packages with a base of operations of already installed data systems, while anticipating future organizational needs and advantages in technology. Companies should seek to select the parcel that fits their situation. Nevertheless, this is not a unilateral decision, equally other companies' actions too contribute to the destiny of the package. Software packages are networked and built effectually standards that permit (and disallow) connection to other software systems and these considerations must be added to the equation, too. Information technology is therefore necessary to adopt a multilateral approach that asserts the benefits of participation from as many parties as possible in the selection process.

The proposed principles are useful in several means. First, they form a reference point for Information technology managers when engaging in software acquisition. Second, without the principles, IT managers would have to spend much time condensing these foundations from available theoretical and empirical sources. Third, the principles help It managers ensure that vital aspects of the software package acquisition process have non been left out or neglected. Finally, the ready of principles is an invitation to formulate a disagreement and offset a give-and-take on what constitutes sound software conquering practices.

Here is a checklist that IT managers tin consider in addition to the usual technical features and cost, when evaluating a software package purchase:

  • What companies are involved in producing the package?
  • How many companies are already using the package?
  • How many software companies can configure the package?
  • What is the history of the package?
  • Is the package congenital upon open standards?
  • How is the fit with other packages?
  • What kind of standardization does the parcel represent?
  • Is customization of the package necessary?
  • Is there an accessible knowledge base for the implementation and exploitation of the package?
  • What are the costs of switching to an alternative package?
  • What are the implications of postponing a decision to adopt?

In what direction is the package evolving? And is our company headed the same way?

The principles can be used prior to making an investment and be used to monitor the vitality of existing packages. To illustrate, when a university built a new campus building information technology came with a free proprietary facility direction system with the new building already encoded. Still, using the vii principles, the academy management decided that even though the parcel itself was complimentary of charge, the supporting network around the bundle was also local and too modest for the academy to invest in encoding the residue of its buildings into the package.

Some other example of the application of the principles was the company in the field study mentioned before. The company used the principles to annually monitor the determination to stay with a package that had been ascendant just was losing market share. The question was straightforward: Was the network of users around the software bundle sufficiently large to provide the package owner with revenue that allowed it to invest in developing the package? For a number of years the reply was positive, merely when the network was accounted inadequate, it was decided to switch to the dominant bundle.17 An illustration of Principle Five and Six is every bit follows: I large manufacturer had already implemented one ERP system when a vendor offered a competing ERP system at a very competitive price. The manufacturer attempted to switch but after more than a year of attempting to implement the new ERP organization the manufacturer had to revert to its one-time ERP system. The skill set and noesis base built around the former ERP organization in practice inhibited a switch.

Returning to the competitive advantage word initiated earlier and playing the devil's advocate, 1 might fence that if everybody were using the same software packages, where would competitive advantage in the form of differentiation come from? Succinctly put as a paradox, "In the world of software packages, advantage comes from having the aforementioned packages as everybody else before they do." Thus, competitive advantage is gained from existence able to spot and adopt the packages of the time to come before they have get the de facto standard packages, and to identify and stage out the packages of the past before they get legacy systems.

Back to Top

References

1. Adam, A. and Lite, B. Selling packaged software: An ethical assay. In Proceedings of the 12th European Conference on Data Systems. (Turku, Finland, 2004).

2. Attewell, P. Engineering improvidence and organizational learning: The case of business computing. Organization Scientific discipline three, 1 (1992), 119.

iii. Au, Y.A. and Kauffman, R.J. Should we await? Network externalities and electronic billing adoption. Hawaii International Briefing on Organisation Sciences. (Hawaii, 2001).

4. Bailey, J., McKnight, Fifty., and Bosco, P. The economics of avant-garde services in an open up communications infrastructure: Transaction costs, product costs, and network externalities. Information Infrastructure and Policy 4 (1995), 255277.

five. Beatty, R.C. and Williams, C.D. ERP II: Best practices for successfully implementing an ERP upgrade. Commun. ACM 49 (Mar. 2006), 105109.

6. Besen, S.1000. and Farrell, J. Choosing how to compete: Strategies and tactics in standardization. Journal of Economic Perspectives 8, 2 (1994), 117131.

7. Chapman, M.R. In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters. Apress, Berkeley, CA, 2003.

8. Chiasson, M.W. and Light-green, L.W. Questioning the IT artefact: User practices that can, could, and cannot be supported in packaged-software designs. European Journal of Data Systems 16, 5 (2007), 542554.

9. Damsgaard, J. and Lyytinen, Yard. The office of intermediating institutions in diffusion of electronic data interchange: How industry associations in the grocery sector intervened in Hong Kong, Finland, and Denmark. The Information Society 17, three (2001), 195210.

ten. David, J.South., Schuff, D., and Louis, R.S. Managing your full Information technology cost of buying. Commun. ACM 45, i (2002), 101106.

eleven. David, P.A. Clio and the economics of Qwerty. The American Economic Review 75, 2 (1985), 332337.

12. David, P.A. Narrow Windows, Blind Giants, and Angry Orphans: The Dynamics of Systems Rivalries and Dilemmas of Technology Policy. Technological Innovation Project (No. 10), Stanford University, CA, 1986.

13. David, P.A., and Bunn, J.A. The economics of Gateway technologies and network Evolution: Lessons from electricity supply history. Information Economics and Policy 3 (1988), 165202.

14. Erl, T. Service-Oriented Compages: Concepts, Technology, and Design. Prentice Hall, Upper Saddle River, NJ, 2005.

15. George, J.F. (ed.) The Origins of Software: Acquiring Systems at the End of the Century. Framing the Domains of IT Management: Projecting the Future through the Past. Pinnaflex Educational Resources, Inc., Cincinnati, OH, 2000.

16. Howcroft, D. and Lite, B. Reflections on problems of power in packaged software selection. Information Systems Periodical sixteen, three (2006), 215235.

17. Karlsbjerg, J. Staying outside the mainstream: An empirical study of standards choices. Hawaii International Briefing on Arrangement Sciences, Hawaii, 2002.

18. Karlsbjerg, J., Damsgaard, J., and Scheepers, R. A taxonomy of Intranet Implementation strategies: To make or to purchase? Journal of Global Information Management xi, 3 (2003), 151165.

19. Klein, H.K. and Myers, Thou.D. Evaluating interpretive field studies. MISQ 23, 1, 6794

20. Khoo, H.M. and Robey, D. Deciding to upgrade packaged software: A comparative case study of motives, contingencies and dependencies. European Journal of Information Systems 16, five (2007), 555567.

21. Klein, B. 1998. Microsoft's use of zero price bundling to fight the browser wars. The Progress & Liberty Foundation. Kluwer Bookish Publishers, Washington, DC, 1998.

22. Kutar, M. and Light, B. Exploring cultural issues in the packaged software industry: A usability perspective. In Proceedings of the 13th European Conference on Information Systems (Regensberg, Frg, 2005).

23. Light, B. Potential pitfalls in packaged software adoption. Commun. ACM 48, 5 (May 2005), 119121.

24. Calorie-free, B. and Sawyer, S. Locating packaged software in information systems research. European Periodical of Information Systems 16, v (2007), 527530.

25. Ljungberg, J. Open source movements every bit a model for organizing. European Journal of Information Systems. (Dec. 2000).

26. Moore, G.C. End user computing and office automation: A diffusion of innovations perspective. Infor 25 (1987), 214222.

27. Nielsen, J. User interface directions for the Spider web. Commun. ACM 42, one (Jan. 1999), 6572.

28. Pollock, N., Williams, R., and Procter, R. Plumbing fixtures standard software packages to non-standard organizations: The 'biography' of an enterprise-wide system. Technology Analysis and Strategic Management 15, three (2003), 317332.

29. Raymond, East.S. The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary. O'Reilly, 1997.

30. Sawyer, S. Furnishings of conflict on packaged software development team operation. Data Systems Journal xi, 2 (2001), 155178.

31. Sawyer, S. Information systems development: A market-oriented perspective. Commun. ACM 44, 11 (Nov. 2001), 97102.

32. Shankland, S., Kanellos, M. and Wong, Due west. Dominicus and Microsoft settle Java adjust. News.com, 2001.

33. Shapiro, C. and Varian, H.R. The art of standards wars. California Management Review 41, 2 (1999), 832.

34. Shapiro, C. and Varian, H.R. Data Rules: A Strategic Guide to the Network Economic system. Harvard Business School Printing, Boston, MA, 1999.

35. Sia, S.Chiliad. and Soh, C. An assessment of package-organization misalignment: Institutional and ontological structures. European Periodical of Information Systems 16, 5 (2007), 568583.

36. Truex, D.P., Baskerville, R., and Klein, H. Growing systems in emergent organizations. Commun. ACM 42, 8 (Aug. 1999), 117123.

37. West, J. The economic realities of open standards: Blackness, white and many shades of grey. Standards and Public Policy. S. Greenstein and V. Stango (eds.). Cambridge Academy Press, Cambridge, MA, 2007.

Back to Top

Authors

Jan Damsgaard (jd.caict@cbs.dk) is director and a professor at the Center for Applied ICT, Copenhagen Business Schoolhouse, Kingdom of denmark School of Information Systems, Curtin Academy of Engineering, Commonwealth of australia.

Jan Karlsbjerg (january@jankarlsbjerg.com) is an associate product director at Active Customs Solutions, Vancouver, Canada.

Back to Top

Footnotes

a. Past false gold or fool'southward gilded nosotros mean something that appears attractive simply in reality is not valuable at all.

This research was in function supported by the Danish Enquiry Foundation, grant number 331958.

DOI: http://doi.acm.org/x.1145/1787234.1787252


©2010 ACM  0001-0782/10/0800  $10.00

Permission to brand digital or hard copies of all or function of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies behave this detect and the full citation on the start page. To re-create otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.

The Digital Library is published by the Association for Computing Mechanism. Copyright © 2010 ACM, Inc.

What Different Choices Packages Does At&t Have For Home Phone Services,

Source: https://cacm.acm.org/magazines/2010/8/96615-seven-principles-for-selecting-software-packages/fulltext

Posted by: paylorsarlizies70.blogspot.com

0 Response to "What Different Choices Packages Does At&t Have For Home Phone Services"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel