Sunday, December 14, 2008

Radio Show #15: Naomi Lee Bloom, Managing Partner, Bloom & Wallace

According to Naomi Lee Bloom to evaluate the HR solution one has to bring an investigator-reporter mind set to the process and add a bit of software archeology.

The most important aspects:
1. Functionality (what the product does),
2. Architecture - how it does it (the logic model and the architecture are very hard to discover, it tells you a lot about whether it is affordable, if it is easy to deal with and about the future of the product).

Always remember that if your vendor offers its own Best Practices, you sign up with those practices as well and should try to go along with that. Therefore, it is important to identify the areas where you have to be unique.

It is extremely important to look “under the covers” – this will give you a clear idea what you can configure and what not, it will reveal the nuances of the vendor’s approach to HR and whether it matches with yours.

It is also important to evaluate the vendor as a company:
People – leadership team, what talent it attracts.
Corporate culture – does it attract the best and the brightest?

Naomi gives a very valuable advice for strategic analysis – business strategy analysis or software requirements analysis. It should be:
Rich, Rigorous and Robust.

Sunday, December 7, 2008

HR Technology Profile: Workday / O.Blansett and N. Tyaglo

A complete suite of business management services:
•Human Capital Management
•Payroll
•Financial Management
•Procurement
•Resource management
•Business Intelligence

Delivery Model
– only over the internet
Intended users: employees, managers, back office.

Workday offers Employee/Manager Self-Service

Under the hood”: SAAS, multi-tenant architecture – can support all of its customers in a single instance of the database


Integration Model
Workday offers hosted, packaged integration built on natively generated web services and delivered using embedded enterprise service bus (ESB) technology. Object Management Server, the core of the solution, speaks only XML. UI servers convert XML into files according to client’s needs – PDF, Excel, etc.
Workday allows universal, standards-based connectivity for virtually all types of business applications, information and processes.
Security
Database security:
Encryption Strength: AES cipher, 256-bit key
Workday encrypts every single attribute value before it is written in the database. The database sees only encrypted values, so backup files and log files contain only encrypted values. This is not possible with the conventional database schema, but workdays’ database architecture makes this possible.
Security for Communications - TLS (SSL 3.0): strong key sizes, no weak cipher suites, secure session keys to prevent hijacking.
Web Services Security: WS-Security support, Communication uses TLS (SSL 3.0)
Internet Data Centers Security:
Redundant power, HVAC, Internet connectivity, Backup Power
Physically secure
Workday owns and operates all servers

OMS guarantees one consistent approach for secured access. Robust set of password rules, multiple levels of authentication control.
Authorization: users have traditional and derived roles. Derived roles - based on the information in the database (system of record for jobs, so Workday can determine who has access to what). For example, if the manger has moved to another department, s/he automatically gains/ loses access to the department’s information.

Configuration vs. Customization
•The application is highly flexible
•The system is built with the philosophy that shortcuts should be everywhere and that power users should be able to support business change without involving IT.

Reporting/Metrics/Dashboards
Built-in Business Intelligence: Workday provides more than 1200 operational reports that deliver the information executives, managers, HR specialists, employees, and auditors need. These reports are available in a browser, as PDFs or as Excel spreadsheets. Custom report writing is available as well.
Dashboard – Workday users have personalized “My Workday” pages that present the tasks that need to be accomplished. Tailored to fit 3 types of users: casual users, managers and power users.

Upgrade Model - Workday provides updates

Global Functionality:
Workday is designed to support multi: -language, -currency, -business entity, etc. in a single global instance, enabling users to track and manage business activity locally while providing a view of your organization as a single consistent entity.

Audit Reports
Non-destructive data updates – application data is never over-written; rather the new value is recorded and can see a history of value at any point in time. Audit reports can be by user or by object.

Data transfer covered by contract acceptable to EU (“Model Contract”). Workday achieved EU Safe Harbor certification in 2007.

Cost Model – subscription fee based model

Support Model - Saas is customer driven. Saas puts the customer in a driver’s seat. It eliminates really expensive IT items: servers, database software, operating systems, people who have to support it, etc. Saas can really shrink the overall costs of supporting a large customer base. This allows the company to focus on one product – one instance instead of wasting time on products installed at the customers’ premises. The company can throw all its resources to make that version superb.

Saturday, December 6, 2008

Six Steps to Company-Wide Adoption

The technology is constantly evolving. Many big companies consider adoption of the integrated solutions for the company-wide interactions. As Michael notes, company-wide deployment drastically differs. The author draws parallel with a presidential campaign - the goal is to win the vote of the nation, however, it breaks down to crafting your campaign for each state, each region…

His advice for the company-wide social software implementation is:
1. Encourage a broad range of use cases.
2. Recruit energetic champions across the organization.
3. Launch the tools with hands-on experiences for new users.
4. Route repeated activities through social software.
5. Integrate with existing systems of record (can significantly enhance CRM)
6. Leverage public communities.