Growth hungry small businesses today in the UK and indeed throughout the world face the challenge of balancing two competing objectives. Firstly, businesses must maintain and standardise current business processes in order to give your business the chance to get really good at what it does through experience curve effects. Greater business efficiency normally translates into a better customer experience and higher profits. Secondly, businesses must transform business operations in order to survive and compete in the future. How well we are able to achieve the right balance for our business will ultimately determine if we survive and go on to thrive or go the way of so many small businesses into market irrelevancy and insolvency.You may well be thinking right now what has this got to do with project management? To understand that we first need to understand the fundamental differences between projects and day to day business operations. Whilst many of the skills required to manage your “business as usual” activities are the same as those needed to manage projects, there are some crucial differences. Amongst the most significant differences are that project work tends to be at least cross functional and often cross organisational and every project will be unique in some way rather than following the predictable pattern of business as usual. These characteristics of projects introduce opportunities and risks over and above those encountered in business as usual. In short, projects are riskier than day to day business, and therefore need a different management approach.Projects are the means by which we introduce change in organisations. All businesses that are making any attempt to adapt to face future challenges have projects. Common examples of projects in small businesses may include setting up a company website, establishing the office in a new location, or implementing a new product but it can be any temporary activity or set of activities that have a specific output associated with it. Businesses increase their productive capacity one project at a time. Indeed, for ambitious small companies looking to grow and expand, the need to initiate the right projects and achieve the desired results is even more vital l than it is for huge national and multi-national businessesDespite the obvious need for a project management (PM) approach, most small businesses don’t bother. This constitutes a huge missed opportunity as effective project management impacts the bottom line. For example, research by the CBP shows that project management improvement initiatives improve project performance by up to 50% for the first project and can continue for each new project if the business offers ongoing project management tools and support. We could emphasise this point further by citing the Standish Group, who in their CHAOS Report conservatively estimates that 20% of money spent on projects is wasted because companies don’t have a consistent approach to project management.Let’s take a look at six reasons I often hear from small business owners that choose not to bother with project management and then critically address the misconceptions behind these reasons.1. Project management practices take more timeHaving a process to follow may add time to the duration of an activity. Doing something properly will almost always take a little bit more time than adopting a slapdash approach. However, if you where building a house, would you rather have a quality end result that took a little longer, or would you prefer to have it done quickly but with lots of problems? Given that poorly executed projects can be completely de-rail a small business if they go badly, doing it well is essential, and PM processes help ensure things are done well.2. Project management eats into the cash that I need to grow my businessA common misconception is that it is hugely expensive to implement PM process. The reality is that there are many free or low-cost sources of advice, techniques, tools, templates and project management services readily available and accessible through the Internet. If done correctly, any small business can implement PM processes, techniques and tools with very little cost. The likelihood is that small business owners are already using software and other tools that can be used for project management. For example, certain email software, spreadsheets, and other common software applications offer good templates for project management, especially if used in collaboration with some of the low cost project management services available for small businesses3. Project management requires skills that I don’t have and cannot afford to hireAlthough it does require specialised skills and experience to be an accomplished project manager, these are skills that can be learned over time. To move further up the learning curve faster, it is possible to take a PM course in as little as four or five days. Most small business owners tend to possess the knowledge needed for project management, and courses such as the Prince 2 Practitioner course would build on these skills while introducing the specific theories, tools, and processes essential for project management. Whilst business owners might not emerge from a course as a project expert, they would certainly learn valuable skills to apply to their small business.4. I don’t need the hassle or paperwork of project management.Every entrepreneur that starts their own business will, at some point, need to do a risk assessment, a marketing campaign or apply for finance. Being knowledgeable in project management and applying associated tools such as stakeholder analysis, communication planning and risk management will not only assist in many of these tasks, but will provide your small business with a competitive edge over competitors who do not approach.5. Project management will slow me down and I need to stay agile.Modern PM methodologies all acknowledge the importance of a tailored approach to project management. If your project requires speed, the right methodology can enable you to move quickly. Just as important, however, it will provide you with techniques to understand whether some proposed projects are worth pursuing at all. Rushing into situations without thoroughly understanding your environment is hazardous to the health of any project and potentially to the health of the business as a whole6. I am an expert in my industry, I don’t need project management.Most small businesses are started by a person who already has some expertise in their industry. This is unquestionably an advantage; however, project management should still be used to convert plans into reality. The main reasons for project failure tends to be poor planning, lack of capital, and lack of management. Project management, while not a cast-iron guarantee of success, will assist the small business in mitigating some of the common risks that so often cause project failure amongst small businesses.Even a brief look at the reasons often posited by small business owners for failing to approach projects in a systematic and different way that recognises their inherent riskiness and addresses some of the more challenging aspects of project work shows them to be of dubious merit. Without question, the quality of project outputs would be greatly enhanced and the cost of and time taken in delivering project benefits using a project methodology appropriate to the scale of the project.
Category Archives: Uncategorized
Acquiring and Implementing a New Treasury System
What is a treasury system?It may appear rather obvious, but many treasurers have questions about treasury systems, their scope and functionality, and how exactly they fit in with the others systems already in use. A treasury system typically covers the treasury front, mid and back office process, meaning that it processes transactions from and including the doing of the deal, up to and including settlement and generation of accounting entries. In addition, it provides all the analyses, risk management and reporting in respect of the transactions and positions within the system. There are some important aspects of this worth emphasising. Firstly, in relation to starting point, the treasury dealer should be simultaneously inputting the deal while on the phone. There is no ‘deal docket’ being completed; it’s an on-line activity, with no interim steps or recording. In some situations, there can be a requirement for a ‘pre-deal’ phase. The key point is that the TMS should support the business process from the earliest point possible, minimising or eliminating the manual or paper-based elements. Typically, the lifecycle of a treasury transaction is completed when settlement takes place and the transaction is posted within the accounting system.The TMS should generate the settlement instructions for the treasury transactions, delivering those in electronic form to a payment system e.g. Swift or a bank payment system, or in hardcopy if that is the business process. There is less uniformity when it comes to what the various TMS will do when it comes to accounting. Preferably, the TMS will generate all the account postings, including the revaluations, for all treasury transactions, passing those seamlessly to the accounting system. Given the ever-shortening month-end processes, this level of automation is quite important.Transaction processing is just one dimension of a TMS; another is risk management. Sometimes treasurers ask to see the risk management module of the TMS, implying that somehow ‘risk management’ is separable from the rest of treasury. In reality, ‘risk management’ is – or should be – all pervasive and embedded throughout the system, especially if seen as broadly-defined and including operational risks. For this reason, a ‘Risk Module’ is something of a misnomer, confusingly implying that ‘risk’ can be confined to a specific module. The key point is that the system should process the transaction from the point of deal entry, in accordance with an embedded ‘best practice’ control framework, that provides segregation, counterparty checks, limit checks etc.In summary, the TMS would typically interface with the accounting system to deliver the account postings, and with one or more payment/banking system to give settlement instructions and/or upload account balances. In addition, it would link with a market information system to upload interest rates, exchange rates and other market prices as frequently as required. Other interfacing may be required, for example with an on-line FX dealing system, or with secondary market bond trading systems, depending on the specific environment. Managing the Project Treasury should take responsibility for the project to select and implement the new TMS. In some organisations, the IT function takes the responsibility. This can be counterproductive, with technical IT issues becoming the focus and the actual treasury requirements being less than fully understood and somewhat muddled. Clearly, all systems and IT, including those in treasury, should be consistent with the overall corporate IT policy, however, treasury should determine its functional requirements, review these with the vendors, and lead the selection process. In practice, a small team, with enough seniority to take the necessary decisions, comprising treasury, IT and led by a project manager, is the ideal way to proceed. The role of the project manager should include ensuring ongoing coordination and problem solving with the project manager on the vendor side. An agreed project plan with clear milestones should be the constant reference point for managing the project. In terms of timetable, each situation is different but realistically it requires a minimum of three months for a very straightforward application and a maximum of twelve, depending on interfacing and customisation, with six months being a good average. A very important determinant of time required is the degree to which the key users engage with the implementation effort. The ‘business owner’ of the TMS, and the project manager, need to ensure that this engagement is maintained over the life of the project.Defining the RequirementsThe critical part of any project is at the very beginning, getting the basic concept right. The treasurer is the key player and must ensure that the basic concept is appropriate to the organization and the requirements. False assumptions at the beginning can have big costs later on. Treasury systems projects can often get stuck at this point of documenting the requirements because no one involved has been through the process before. It is not an easy task and requires a different mindset than that of day-to-day treasury. For this reason it is good to involve a business analyst to guide and drive the process. Basically, what’s needed is a concise description of the treasury business requirements and the environment in terms of other systems, users and locations. The essential components to specify are: transaction types (i.e. the money market, capital market and fx transactions, current and expected), the business process/scope (e.g. cashflow forecasting, cash management, bank accounts), and analytical/reporting outputs. This need not be a very detailed document, but it should be balanced e.g. not just about ‘front office’, and comprehensive. Rather than seeing this as a single-step exercise, it can be taken as a process, starting at a high-level and detailing this as the picture becomes clearer from interaction with vendors. Most treasurers will get system presentations and seek indicative quotes as part of the initial market scanning phase, and this will allow the specification to be more fully detailed. However, the treasurer must guard against ‘design creep’ i.e. an accumulation of a lot of small additions, each perfectly justifiable on their own but when taken together, results in a moving target of ever expanding size. Importantly, the treasurer needs to watch that s/he is buying, and not getting sold, functionality.Many treasurers are faced with a choice between taking the treasury module of an existing ERP system or acquiring a specialist TMS. This can be a difficult decision for treasury. To some extent the easier option is to favor the ERP Module, however, it is just another option to be evaluated against the criteria set for all the alternatives. An important point to recognise is that systems vendors are well used to reviewing and understanding standard treasury requirements. What is important then is to highlight the unusual or any company specific aspects.That said, it is necessary to guard against the tendency to think that ‘we are very different’ and the standard solution will require a lot of customisation to meet our requirements. It is very important to approach any new systems implementation with the readiness to change the existing business process to match the system, rather than requiring the new system to change to match the existing business process. The latter approach can be very expensive in terms of the customisation itself and, subsequently, the ongoing support and maintenance of such a bespoke solution. A new TMS is an opportunity to review and change the business process and this should form part of the project plan.Reviewing the RFP ResponsesTreasury should aim to get at least three, preferably five, strong RFP responses. While a review and shortlisting of the RFP responses is a necessary step, a system procurement should not be a paper exercise. It is not feasible to document requirements, send them to various vendors, evaluate the responses and select. At best, this can be sufficient for initial screening but beyond that, it is essential to get an in-depth understanding of what each system can actually provide – by focusing on the actual system itself. Frequently, a list of requirements will be issued to a number of vendors, asking for Yes/No responses in terms of fulfillment. However, a ‘Yes’ response to a requirement such as ‘does your systems generate the accounting entries’ is too little information. Each ‘yes’ means something different – maybe something very different – and those differences need to be properly understood. The only way to do this is by going through the system with the vendor in detail. This is more than a ‘system presentation’ – usually a high-level overview by the vendor – but a detailed walk through the system, allowing a full day for this exercise. This is not overkill; once the TMS is selected, treasury will have to live with it for a number of years with little or no room for second thoughts, so the due diligence is worth it.In reviewing the RFP responses, clearly the functionality and price are important but so too is the actual implementation process and ongoing support and maintenance. Critical for a successful implementation process is the team the vendor will assign to the project and commitments on this should be made explicit as part of the due diligence.Build, buy or rent?Very few treasurers today would dwell on the ‘build versus buy’ decision. The systems available on the market mean that an internal systems development simply does not make sense. The costs and the risks are too high. The costs include the resources/time requirement for treasury to provide the functionality specifications; the risks include the chance that the project will fail to deliver the requirements. And then there is the longer term issue on maintaining and developing the system into the future.However, the ‘buy versus rent’ option is something to consider. Basically ‘to buy’ means buying an initial licence (meaning the right to use the software) and paying an annual licence fee (to access ongoing support and maintenance and get system upgrades), with the software being installed on your in-house IT infrastructure. The alternative ‘application service provider’ (ASP) or Software-as-a-Service (SaaS) model means that you pay a periodic user fee and the software is installed/accessed at some external facility, rather than sitting on your in-house servers. From a user perspective, the functionality is the same. Pricing – or perhaps more correctly, cashflow – and contractual and IT policy issues are the differentiating points. The ASP/SaaS approach spreads the payments over time, avoiding the up-front expenditure.BudgetTreasury systems vary significantly in price. In a shortlist of five, it would not be unusual to find that the highest priced was almost double the lowest price. Given this wide range of in pricing, it can be difficult to set a budget at the outset. In practice, treasury should be talking with a number of vendors so as to get an indication of the price and scope/functionality of the various offerings. To avoid overruns on budget or indeed on contract, treasury should look for a fixed price contract, with clarity on what’s included and excluded, and the pricing for the optional extras.The main reasons why costs can get out of control are second-thoughts on requirements and too much customisation. As already explained, treasury should carefully consider the necessity for customisation and limit this as much as possible. Too much customisation means that the benefits of an ‘off-theshelf’ solution can be eroded and the risks on cost overrun and completion increased.As a rule of thumb, the implementation cost can be equal to the software cost. To manage this cost, treasury should spend time developing or agreeing a good project plan, one that includes all the tasks and correctly maps out the critical path. Importantly, treasury needs to recognise that a systems implementation is an additional and demanding task, and a concentrated effort is required to bring it on stream. The vendor cannot do it without that treasury commitment.Conclusion Good treasury systems are essential for effective treasury management. Risk management, control, analyses and reporting can be streamlined and the hidden costs of poor systems removed. The process of acquiring and implementing such a system is a big step but a proper approach means that it need not be a daunting task, and the outcome can be assured.Written by Eddie Fogarty and published in the ACT (Association of Corporate Treasurers UK) Yearbook 2012.
Network Configuration Management Overview
This guide gives a brief overview of Network Configuration Management, otherwise known as Network Change and Configuration Management, or NCCM.Why does it matter?In a large corporate network it is not uncommon to have hundreds or thousands of network devices. If you add up all your switches, routers, firewalls and other network appliances, and then you consider how many lines of configuration settings apply to each one, you can see there is a significant investment in your networks’ configuration which needs to be protected.Contemporary network devices will not only switch and route data, but will vlan, prioritize and shape multi-media traffic in converged networks. The settings and parameters that determine how traffic is handled all forms part of the configuration of the device, and of course, it is vital that all interoperating devices are configured consistently in order to deliver a healthy and reliable network infrastructure.Of course, the security of your network is dependent on the way your devices are configured. Corporate Governance policies all include Data Security considerations, such as Sarbanes Oxley (SOX), GLBA, NERC, PCI DSS, HIPAA, MiFID, SAS 70, ISO 27000, CoCo/GCSx Code of Connection and Basel II. These security standards have all been introduced to ensure certain minimum levels of security and integrity are maintained for company financial information and any stored personal details of customers. Your network is inherently vulnerable while default settings are used and it is vital that all known vulnerabilities are eliminated throughTherefore configuration settings for your network need to be backed up, verified for compliance with any corporate governance policy or security standard, and consistency of configs maintained across the estate.Unapproved changes are the biggest threat to IT Service Delivery and the single most likely cause of failures in IT infrastructures. Any changes that occur outside of established tracking and approval processes are classed as Unapproved Changes and, by definition, are undocumented. No audit trail of a change being made means there is no foothold to start from when troubleshooting a problem. In fact EMA primary research has indicated that greater than 60% of all environment failures would be eliminated if unapproved changes were identified before affecting IT performance.Unapproved changes are introduced from a variety of sources including security violations, inappropriate user activity, and administrator errors. Even a seemingly benign alteration can have far-reaching unintended consequences to IT security, performance and reliability. Over time, system configurations deviate further and further away from established standards. This is referred to as “configuration drift”, and the greater the drift, the greater the risk posed to the reliability of an IT support stack.The Network Change and Configuration Management SolutionA practical solution to address these requirements is to automate config backups and change tracking, which has given rise to the Network Change and Configuration Management, or NCCM, market.Change and Configuration Management (CCM) is the process for minimizing configuration drift by ensuring all environment settings are approved and consistent with established standards. CCM is composed of three distinct practices: configuration management which is the creation, documentation and updating of standard settings for all supported IT components; change management which is the process for identifying and approving new configuration settings and updates; and change detection which is an ongoing process of monitoring for inappropriate changes. Achieving compliance objectives for ensuring IT infrastructure reliability requires automated solutions that address all three CCM disciplines.How does it work?To date, the development of network device hardware has taken place at a much faster rate than the equivalent development of network management or network configuration management software. In some respects it is understandable – Network Devices didn’t need managing or configuring originally as they were black boxes that either passed data or not. It was only with the advent of shared network infrastructures such as Ethernet that the configuration of addresses and protocols became necessary and some consideration made of the network topology to cater for traffic flows and volumes.Simple Network Management Protocol (SNMP) came to the fore as a technology to address the need for performance, security and accounting statistics from the network, and at the same time, provide a means of changing the configuration of a network too.As a standard however, anyone who has used SNMP will know that it is anything but consistent in all but the most basic statistics. It is common to find that the manufacturers’ ‘Management Information Database’ or MIB will purport to support certain performance metrics, only to find that different devices from the same manufacturer do not consistently report information via the MIB.It is a similar story when using SNMP to gather or update configuration data – your version of Cisco Works may work well at backing up your 2950 switch configs but when you next upgrade to 3750 switches, you may quickly find out that Cisco Works suddenly needs an upgrade (at your expense, of course – ‘What do you mean, you pay annual maintenance? That is only to maintain your software, not to actually make it keep pace with product range developments!’)Fortunately there are other, more ‘open’ ways to gather configuration settings from network devices – using TFTP in conjunction with scripted Telnet or SSH Telnet interactions is a consistent and more easily maintained approach that can be applied to all manufacturers and all devices.All the above change and configuration management tasks can be automated using network change and configuration management (NCCM) software solutions, the best of which will cover desktop PCs together with change and configuration management of your servers and all network devices such as firewalls, switches and routers.