Skip to main content
Workforce LibreTexts

10.4: Implementation Methodologies

  • Page ID
    9811
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)

    Implementation Methodologies

    Once a new system is developed (or purchased), the organization must determine the best method for implementing it. Convincing a group of people to learn and use a new system can be a challenging process. Using the new software and the business processes it gives rise to can have far-reaching effects within the organization.

    There are several different methodologies an organization can adopt to implement a new system. Four of the most popular are listed below.

    • Direct cutover. In the direct-cutover implementation methodology, the organization selects a particular date that the old system will not be used anymore. On that date, the users begin using the new system, and the old system is unavailable. The advantages of using this methodology are that it is speedy and the least expensive. However, this method is the riskiest as well. If the new system has an operational problem or is not properly prepared, it could prove disastrous for the organization.
    • Pilot implementation. In this methodology, a subset of the organization (called a pilot group) starts using the new system before the rest of the organization. This has a smaller impact on the company and allows the support team to focus on a smaller group of individuals.
    • Parallel operation. With the parallel operation, the old and new systems are used simultaneously for a limited period of time. This method is the least risky because the old system is still being used while the new system is essentially being tested. However, this is the most expensive methodology since work is duplicated and support is needed for both systems in full.
    • Phased implementation. In a phased implementation, different functions of the new application are used as functions from the old system are turned off. This approach allows an organization to move from one system to another slowly.

    These implementation methodologies depend on the complexity and importance of the old and new systems.

    Change Management

    As new systems are brought online, and old systems are phased out, it becomes important to manage how change is implemented. Change should never be introduced in a vacuum. The organization should be sure to communicate proposed changes before they happen and plan to minimize the impact of the change that will occur after implementation. Training and incorporating users’ feedback are critical to increasing user’s acceptance of the new system. Without gaining the user’s acceptance, the risk of failure is very high. Change management is a critical component of IT oversight.

    Maintenance

    Once a new system has been introduced, it enters the maintenance phase. In this phase, the system is in production and is being used by the organization. While the system is no longer actively being developed, changes need to be made when bugs are found, or new features are requested. During the maintenance phase, IT management must ensure that the system continues to stay aligned with business priorities, has a clear process to accept requests, problem reports, deploy updates to ensure user’s satisfaction with continuous improvements in the product's quality.

    With the rise of privacy concerns, many companies now add policies about maintaining their customers’ data or data collected during the project. Policies such as when to dispose of, how to dispose of, where to store are just a few examples.


    10.4: Implementation Methodologies is shared under a CC BY-NC-SA 3.0 license and was authored, remixed, and/or curated by Ly-Huong T. Pham, Tejal Desai-Naik, Laurie Hammond, & Wael Abdeljabbar.