Search Results for: gartner

G2Crowd’s Problem with Financial Disclosure

Executive Summary G2Crowd promised a new way to review software. However, G2Crowd has major disclosure issues that we cover. Introduction Recently, during an interaction on LinkedIn where the head of CrowdReviews brought up Gartner’s bias in being a pay-to-play system. During that interaction, the topic of G2Crowd came up, which is another applications ranking entity…

The Brightwork SAP Consulting Corruption & Deception Quadrant

Executive Summary Gartner issues a number of Magic Quadrants, which allow companies to buy their way into good ratings. As a response, we have created a Voodoo Quadrant for Corruption and Deception where we allowed consulting companies to buy positions in our quadrant. Introduction Gartner’s well-known Magic Quadrant places some competitive applications or companies along…

How to Understand the Enterprise Software Market

Executive Summary The enterprise software market is far less efficient than generally assumed. We cover the basics of market efficiency and how they do not apply to enterprise software. Introduction to the Software Market Any selection of enterprise software happens within the context of the enterprise software market. Most people who write about the enterprise…

References for Rethinking Enterprise Software Risk Book

References Aloini, Davide. Dulmin, Riccardo. Valeria, Mininno. Risk Assessment in ERP Projects, University of Pisa, 2009 Avdoshin, Sergey M. Pesotskaya, Elena Y. Software Risk Management. Institute of Electrical and Electronics Engineers. April 20 2012 Zhang, Zhe. Lee, Matthew K. O. Zhang, Liang. Huang, Xiaoyuan, Huang. A Framework of ERP Systems Implementation Success in China: An…

How to Manage Buying from Software from Large Vendors

Executive Summary It is often presented that risk is reduced by buying from the largest software vendors. This article explains why buying from large software vendors actually increases risk. Introduction After a detailed analysis of this topic, it is clear that the standard approaches to managing risk on enterprise software selection and implementations such as…

How to Understand the IT Project Failure Ratio

Executive Summary Projects normally do not have a risk percentage applied to them in the project planning stages. Companies tend to prefer to assume that all IT projects will be successful and ignore IT project failure. Introduction It should go without saying that implementation success and implementation timelines are probabilistic. Enterprise software is generally complex…

How to Use Outsourced Support to Gain Privacy from SAP

Executive Summary Indirect access is triggered by specific behaviors on the part of the customer. Sharing information with SAP is a double-edged sword in that it opens the customer to more liability. Video Introduction: How to Use Outsourced Support to Gain Privacy from SAP Text Introduction (Skip if You Watched the Video) Brightwork Research &…

Using Outsourced Support to Gain Privacy from SAP

Executive Summary The Issue with Indirect Access and What Triggers Indirect Access Sharing Information with SAP SAP Knowing What You Are Doing with their Software Introduction Brightwork Research & Analysis has covered indirect access extensively. It is one of our primary research areas. One of the things we have been researching lately is what tends…

How to Best Understand the Control of SAP on IT Media

Executive Summary SAP controls the IT media system with a combination of advertising and paid placements. IT media entities do not declare their income source from SAP. Introduction I recently wrote an article that is a critique of our IT media system in the article The IT Media and the Fake News Debate. Increasingly what…

The Real Story on IT Implementation Methodologies

Executive Summary There are a number of IT implementation methodologies, but they usually are not evaluated for their effectiveness. We cover SAP consulting company methodologies as well as SAP’s Rapid Deployment Methodology. Introduction to IT Methodologies IT methodologies are often presented as major differentiators for implementation companies. However, IT methodologies are not what they appear….