Most organizations follow an acquisition model similar to:
- Identify Business Need
- Gather Requirements
- Evaluate Products
- Select Product
- Purchase Product
- Implement Product
This model has generally proven to be costly and unreliable. Significant resources are spent identifying needs and requirements. Working with users to determine requirements is generally unreliable and often results in recursive need/requirement loops. Product evaluation and selection is time consuming and expensive, often requiring RFP’s, live demos and test installations. The end product rarely meets the users needs or requirements, simply because the unreliability of the user results in documented needs and requirements that do not represent actual user requirements.
The above process may be significantly streamlined by simply eliminating the unnecessary steps and reordering the remaining. The new model looks like this:
- Purchase Product
- Implement Product
- Gather Requirements
- Identify Business Need
This minor modification of the standard model has the following benefits.
- Formal product evaluation by highly paid technical staff is eliminated. Products are instead evaluated by VP’s and executives at vendor provided lunches, social gatherings, sporting events, etc. Product selection is likewise eliminated, as it derives directly from product purchase.
- Product requirements can be extracted from vendor documentation and product brochures more efficiently than developing requirements from scratch. Likewise, when an RFP or similar formal purchasing process is required, the process can be significantly streamlined by extracting requirements from vendor product brochures. Care must be taken to avoid the ‘ransom note look’ when copying and pasting vendor materials. Pasting as plain text into a preformatted document is preferred.
- Business needs are easily derived from post implementation product walk through and demonstrations. Business users will realize their needs as they explore the product user interface and features during product training. An entire layer of analysis is thereby eliminated.
- Entire teams of business analysts and architects are redundant in this model. The vendor’s analysts and architects have already provided much of the functionality that these roles normally perform. Substantial cost savings will result from the elimination of these roles.
- Project risk is minimized. When needs and requirements are derived from the documentation of an already purchased product, there are no unmet needs or requirement gaps except in cases where the vendor product documentation is inaccurate. Change orders can be executed to correct the mismatch. Project success is virtually assured.
In the particular case of highly technical products where customers are unlikely to realize that they have an unmet need (security products, for example) this method assures that customer needs are met even when customer awareness of needs is insufficient to result in customer initiated product evaluation and purchase.
A parallel model may be used for software development. In the software development derivative of this model, developers perform requirements gathering as they write the software. As in the product purchase model, business needs are derived from the functionality of the completed software. Individual developers assume the roles of business analyst and architect. Their familiarity with the functionality of the software assures that the software functions as requirements dictate, as all requirements are derived from existing software functionality.
The matching of functionality to requirements is simplified by careful construction of module and function names. This will allow use of regular expression matching and word substitution to automatically build requirements from source code. For example, for a source file containing the following pseudo code
[1]:
function store_customer_records
{
code....
}
This simple command:
cat <source file> </ source file>| sed -n \
'/^function/s/\(function\)\(.*\)/The product will \2\./p' | tr '_' ' '
Will extract the following requirement:
The product will store customer records.
The post-processing of requirements can easily be managed as a part of normal software deployment. As new versions of the software are deployed, the updated requirements can be automatically extracted and e-mailed to project managers by simple post-processing scripts attached to commonly available automated deployment systems.
A significant fraction of all product purchase and software development already follows derivatives of this model. Additional refinement and wider implementation of this model should result in improvements in efficiency, productivity and user satisfaction.
UPDATE 04/09/2009 After testing the new model on a recent large software purchase, it’s clear that I’ve obviously left out a critical step in the proposed model. An additional step should be added to the tail end of the process:
- Analyze and Document Security Requirements
The complete model should be:
- Purchase Product
- Implement Product
- Gather Requirements
- Identify Business Need
- Analyze and Document Security Requirements
Adding security requirements to the end of the document does not significantly alter the procurement process. The requirements are derived from existing functionality, making the process largely pro forma.
[1]Note: Regex matches on object oriented code should extract public methods only. The publishing of private methods is a security violation.