Home--> Assessing Customer Needs
[1] [2]
The first step in any engagement is understanding the client and their business.  The proper use of Information Technology starts with understanding our clients, their business, as well as their customers, suppliers, partners, and perhaps even competitors.  Everything should be considered from the perspective of business value.  The value gained must be significantly more than the investment made.  To effectively assess and assist our clients, we strive to understand their current use of Information Technology within their business activities and the objectives they wish to achieve.
We ask our clients the following to assess their goals:
Ideally, what would you like to accomplish?
Should your IT infrastructure be easy to use or functional?
What is the impact you seek or ROI / ROE/ ROS / ROA?
How critical is reliability and availability to you?
What is the impact if you can't access your system for an
     hour, day or a week?
What is the impact if your computer data is lost forever?
How sensitive is the privacy of information in your computers?
Do you want to allow access from remote locations
     (office, home, client, shareholder)?
Do you have frequent system outages?
Do your various systems run on their own individual hardware
     and operating systems?
Are your bandwidth, storage, server, and application needs
     escalating?
Do your employees have difficulty accessing information or
     applications when they need it?
Is your organization anticipating rapid growth through geographic
     expansion or merger/acquisition activities?
Do you have various teams network, Windows, UNIX, storage,
     or locations that do not coordinate activities, resulting in
     duplicative effort and non-shared infrastructure elements?
We can then offer to assist in these areas by:
Conducting a complete expert review of current technology,
     operations, policy and procedures in the current IT
     infrastructure.
Conduct Network, Server, licensing utilization evaluation.
Conducting Security Assessment and Documentation?
Asset inventories to better understand the working environment.
Assessing the risks and risk mitigation related to your use of
     Information Technologies.
Evaluation of potential for new application of Information
     Technologies, and Return On Investment
Creating a comprehensive and prioritized set of actions and
     initiatives.
Developing the implementation roadmap and estimate the
     investment requirement.
Professionally managing project(s) to improve and advance your
     use of Information Technologies.
Determining the appropriate capability acquisition model (buy,
     build, partner or outsource) and identify required vendor and
     outsourcing partners.
Assisting in the refining your IT organization structure and align
     skills with business needs.
[1] [2]