Initiation Phase of a Large IT Program: Key Points to Keep in Mind

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Initiation Phase of a Large IT Program: Key Points to Keep in Mind-2 Next

Mandate

This is one of the key activities without which no other activity can begin. It provides the blueprint for the entire program and all key decisions thereafter are based on the mission and objectives of the program. You can compare this to a country’s constitution that outlines the fundamental principles of the program. The mandate should include business case, project justification, high-level requirements and success criteria.

Many global companies are using business transformation initiatives to meet changing market needs. Implementing large IT programs is a key component of these change initiatives. Given that the failures of such programs are now commonly discussed, a recent McKinsey/Oxford study highlights that the failure rate of such programs is indeed more often. According to the study, half of IT projects with budgets of over $15 million run 45 percent over budget, and 7 percent are behind schedule and deliver 56 percent less functionality than predicted. What should organizations do to mitigate failure of such programs, and successfully implement their program?

According to Virtusa, most IT programs struggle during the initiation phase since key program management activities are not completed to effectively start the program. This leads to longer startup times and missed budget targets, even before the program begins. The model outlined by Naushad Kapasi, associate director – client services at Virtusa Corporation, contains the key activities that need to be completed during program initiation.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.