Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Capturing the Hidden ROI in Applications

When ROI (return on investment) is used in an IT context, it invariably boils down to how quickly a company can realize a return on hardware, software licensing and the day-to-day expenses of running a data center. Enterprises’ results in this area have been impressive, with many companies realizing cost-savings benefits in the tens of millions of dollars.

But this isn’t the only ROI.

The return on investment for applications continues to be an underexploited area for organizations—and as long as it remains underexploited, firms stand to lose millions in squandered employee productivity, lost revenue and service opportunities, and best-of-class operational workflows. “We see this all of the time in our applications, and especially with our CRM systems,” said one financial services sales and marketing vice president. “Over one year ago, we purchased a CRM (customer relationship management) package to help us better understand our customers and their needs. Now after one year of use, if we’re using 1% of its capability, we’re lucky.”

Other companies tell similar war stories. So what causes under-exploitation of application software?

We’ve all heard about the 80/20 rule. It also applies to applications. “The biggest concern we have with the users of our application, quite frankly, is that they are only using a portion of what the software can do for them,” said one supply chain software vendor. This means that the remaining 80% of application functionality is sitting on the shelf.

One contributing factor to application under-exploitation is the project implementation process itself. Within IT’s end-to-end “to do” list, an application project may be only one line item. This makes it easy for IT (and even end business users) to be satisfied that they got a new application or software package installed—and that they have implemented it with at least a baseline of functionality that everyone is trained on. After this point, there is a tendency for IT to retreat to a “maintain” mode, and for end users to take some time to further adapt the software to the everyday operation. Meanwhile, no one is evaluating other features included in the software and assembling a continuous implementation plan that will progressively incorporate even more functionality from the applications into the business. Consequently, the company risks losing out on a majority of what it has paid for in the application.

In many cases, software application vendors don’t help the situation, either. Documentation and training for applications traditionally are under-invested in by these vendors—and it’s often not an easy job for someone in IT or an end-user department to figure out what else they might plug into the business from the software, and how it will work.

After the baseline application is installed and running, there initially are a large number of calls that come into the IT help desk. Here again, the dots may not be connected to improve user use of the application for the long haul. One contributing factor is the customary “disconnect” between the help desk and the applications group. Generally, application development works with the help desk when the help desk is unable to answer or solve an end user problem—but there isn’t a flow of most frequently asked questions or software issues from the help desk back to applications that allows the applications group to research these issues and then to proactively determine how to better design applications in the future to assure maximum application utilization in the business.

As was mentioned earlier, IT and end users both tend to be satisfied when a new application or software package is at last installed and up and running. This sense of relief can be so overwhelming that little thought is given to followup on how fully the application is being used. Metrics tend to focus on meeting application implementation deadlines—and not on measuring how completely an application is being used, or quantifying the value that the application is bringing to the end business.

Page:  1 | 2  | Next Page »

Related Reading

More Insights

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

End To End APM Reports

Research and Reports

Network Computing: April 2013

TechWeb Careers