IT technology replacement

Author Author:
Innokrea Team
Date of publication: 2023-02-08
Caterogies: Management Strategy

In the latest Gartner report (“Software Buying in 2023: 5 Trends Reshaping the Purchase Journey”), we can learn, among others, that many software buyers increasingly decide to replace, modify or adapt the currently used IT technology (e.g. software). When making such a strategic decision, it is worth answering at least the following three questions.


How to prepare for the replacement of the current solution with a new IT technology?

Each of the technologies, as we showed in the article [Trajectories of technological development], is at a certain stage of its development. When considering the transfer of a given IT technology to the enterprise, we should take into account its readiness and the company’s ability to absorb it, i.e. implement it. A company’s ability to absorb technology is its ability to adapt available IT technologies to increase the competitiveness and productivity of a given enterprise. We write more about it [here].

When planning a project consisting in the exchange of IT technologies, it is necessary to build a scope and plan for such an implementation project. The choice of a specific implementation scenario should be preceded by an analysis and assessment of the company’s technological needs. We wrote about strategic planning and general principles of IT technology selection in companies [here].

 

Where to look for new IT technologies?

We can look for IT technologies:

  • Inside your own organization. When a company has its own IT team, or cooperates in a group of companies, as a result of which new IT solutions are created, it may be tempted to implement its own project.
  • In the external market. In this scenario, the company uses IT technologies developed by other entities, becoming their owner through the purchase of licenses, ownership rights, or the acquisition of the company along with the technology. Industry portals containing catalogs of potential IT suppliers (e.g. clutch.co) can be helpful in this process.
  • Combination sources. In this model, the emerging IT solutions are the result of activities inside and outside the company, with mutual penetration and complementation of both sources.

You can read more about the advantages and disadvantages of individual technology sources in our article entitled [Sources of IT technologies].

 

What are the risks and opportunities associated with the exchange of IT technologies?

When replacing one IT technology with another, a number of different risks must be taken into account. These are the following risks (after M. Wirkus):

  • TECHNICAL – resulting from the use of new technical solutions.
  • MARKET – arising from the uncertainty of what future recipients of new solutions will be like, how big the market will be (how many buyers will be) and how willingly and under what conditions they will want to use the proposed offer (created on the basis of the mentioned IT technology).
  • FINANCIAL – involving unknowns as to certain costs and effects of implementation activities and methods of their financing.
  • RELATED TO TIME – meaning threats resulting from incorrect estimation of the time of implementation activities, as well as disruptions in their course.
  • RELATED TO PEOPLE – resulting, for example, from improper selection and efficiency of work and cooperation of team members (teams) of implementers.
  • MANAGEMENT – resulting from the risk of adopting inappropriate structures and methods of operation (e.g. post-implementation IT technology support processes or a new tool supporting project portfolio management that is too complicated and too involving many company resources).

Technology exchange is not only a risk but an opportunity for our enterprise. New technology may mean reduction of its maintenance costs and/or faster implementation of new changes adapting processes to the requirements of the market game.

Every risk and opportunity can be managed – we write about it in more detail in the article entitled [Main challenges and risks of IT projects].

 

As the INNOKREA team, we have participated many times in the project of taking over responsibility for the development of software originally made by a third party. Our client, FIXFM, faced the challenge of changing its technological partner. FIXFM was looking for a partner who would provide appropriate technical competence for further development and maintenance of the application. In cooperation with INNOKREA, a plan was developed to take over responsibility for the production and maintenance of the software so that it would be unscathed for the overall customer support. In a very short time, INNOKREA took over the comprehensive support and development of our client’s mobile and web application. Thanks to the implementation of this project, the client optimized the costs of application maintenance and development. At the same time, they guaranteed themselves a stable partner for technological cooperation.

See more on our blog:

User Identity and Access Management – What’s the Deal with IDP?

User Identity and Access Management – What’s the Deal with IDP?

What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.

Security

Design Patterns – part 2

Design Patterns – part 2

Hey, hey... Programmer, this is another article for you! The second part of the article on design patterns. Get to know Adapter and Memento.

Programming

Design Patterns – part 1

Design Patterns – part 1

Programmer, this article is for you! Grab a handful of useful information about design patterns.

Programming