- Management Reference Guide
- Table of Contents
- Introduction
- Strategic Management
- Establishing Goals, Objectives, and Strategies
- Aligning IT Goals with Corporate Business Goals
- Utilizing Effective Planning Techniques
- Developing Worthwhile Mission Statements
- Developing Worthwhile Vision Statements
- Instituting Practical Corporate Values
- Budgeting Considerations in an IT Environment
- Introduction to Conducting an Effective SWOT Analysis
- IT Governance and Disaster Recovery, Part One
- IT Governance and Disaster Recovery, Part Two
- Customer Management
- Identifying Key External Customers
- Identifying Key Internal Customers
- Negotiating with Customers and Suppliers—Part 1: An Introduction
- Negotiating With Customers and Suppliers—Part 2: Reaching Agreement
- Negotiating and Managing Realistic Customer Expectations
- Service Management
- Identifying Key Services for Business Users
- Service-Level Agreements That Really Work
- How IT Evolved into a Service Organization
- FAQs About Systems Management (SM)
- FAQs About Availability (AV)
- FAQs About Performance and Tuning (PT)
- FAQs About Service Desk (SD)
- FAQs About Change Management (CM)
- FAQs About Configuration Management (CF)
- FAQs About Capacity Planning (CP)
- FAQs About Network Management
- FAQs About Storage Management (SM)
- FAQs About Production Acceptance (PA)
- FAQs About Release Management (RM)
- FAQs About Disaster Recovery (DR)
- FAQs About Business Continuity (BC)
- FAQs About Security (SE)
- FAQs About Service Level Management (SL)
- FAQs About Financial Management (FN)
- FAQs About Problem Management (PM)
- FAQs About Facilities Management (FM)
- Process Management
- Developing Robust Processes
- Establishing Mutually Beneficial Process Metrics
- Change Management—Part 1
- Change Management—Part 2
- Change Management—Part 3
- Audit Reconnaissance: Releasing Resources Through the IT Audit
- Problem Management
- Problem Management–Part 2: Process Design
- Problem Management–Part 3: Process Implementation
- Business Continuity Emergency Communications Plan
- Capacity Planning – Part One: Why It is Seldom Done Well
- Capacity Planning – Part Two: Developing a Capacity Planning Process
- Capacity Planning — Part Three: Benefits and Helpful Tips
- Capacity Planning – Part Four: Hidden Upgrade Costs and
- Improving Business Process Management, Part 1
- Improving Business Process Management, Part 2
- 20 Major Elements of Facilities Management
- Major Physical Exposures Common to a Data Center
- Evaluating the Physical Environment
- Nightmare Incidents with Disaster Recovery Plans
- Developing a Robust Configuration Management Process
- Developing a Robust Configuration Management Process – Part Two
- Automating a Robust Infrastructure Process
- Improving High Availability — Part One: Definitions and Terms
- Improving High Availability — Part Two: Definitions and Terms
- Improving High Availability — Part Three: The Seven R's of High Availability
- Improving High Availability — Part Four: Assessing an Availability Process
- Methods for Brainstorming and Prioritizing Requirements
- Introduction to Disk Storage Management — Part One
- Storage Management—Part Two: Performance
- Storage Management—Part Three: Reliability
- Storage Management—Part Four: Recoverability
- Twelve Traits of World-Class Infrastructures — Part One
- Twelve Traits of World-Class Infrastructures — Part Two
- Meeting Today's Cooling Challenges of Data Centers
- Strategic Security, Part One: Assessment
- Strategic Security, Part Two: Development
- Strategic Security, Part Three: Implementation
- Strategic Security, Part Four: ITIL Implications
- Production Acceptance Part One – Definition and Benefits
- Production Acceptance Part Two – Initial Steps
- Production Acceptance Part Three – Middle Steps
- Production Acceptance Part Four – Ongoing Steps
- Case Study: Planning a Service Desk Part One – Objectives
- Case Study: Planning a Service Desk Part Two – SWOT
- Case Study: Implementing an ITIL Service Desk – Part One
- Case Study: Implementing a Service Desk Part Two – Tool Selection
- Ethics, Scandals and Legislation
- Outsourcing in Response to Legislation
- Supplier Management
- Identifying Key External Suppliers
- Identifying Key Internal Suppliers
- Integrating the Four Key Elements of Good Customer Service
- Enhancing the Customer/Supplier Matrix
- Voice Over IP, Part One — What VoIP Is, and Is Not
- Voice Over IP, Part Two — Benefits, Cost Savings and Features of VoIP
- Application Management
- Production Acceptance
- Distinguishing New Applications from New Versions of Existing Applications
- Assessing a Production Acceptance Process
- Effective Use of a Software Development Life Cycle
- The Role of Project Management in SDLC— Part 2
- Communication in Project Management – Part One: Barriers to Effective Communication
- Communication in Project Management – Part Two: Examples of Effective Communication
- Safeguarding Personal Information in the Workplace: A Case Study
- Combating the Year-end Budget Blitz—Part 1: Building a Manageable Schedule
- Combating the Year-end Budget Blitz—Part 2: Tracking and Reporting Availability
- References
- Developing an ITIL Feasibility Analysis
- Organization and Personnel Management
- Optimizing IT Organizational Structures
- Factors That Influence Restructuring Decisions
- Alternative Locations for the Help Desk
- Alternative Locations for Database Administration
- Alternative Locations for Network Operations
- Alternative Locations for Web Design
- Alternative Locations for Risk Management
- Alternative Locations for Systems Management
- Practical Tips To Retaining Key Personnel
- Benefits and Drawbacks of Using IT Consultants and Contractors
- Deciding Between the Use of Contractors versus Consultants
- Managing Employee Skill Sets and Skill Levels
- Assessing Skill Levels of Current Onboard Staff
- Recruiting Infrastructure Staff from the Outside
- Selecting the Most Qualified Candidate
- 7 Tips for Managing the Use of Mobile Devices
- Useful Websites for IT Managers
- References
- Automating Robust Processes
- Evaluating Process Documentation — Part One: Quality and Value
- Evaluating Process Documentation — Part Two: Benefits and Use of a Quality-Value Matrix
- When Should You Integrate or Segregate Service Desks?
- Five Instructive Ideas for Interviewing
- Eight Surefire Tips to Use When Being Interviewed
- 12 Helpful Hints To Make Meetings More Productive
- Eight Uncommon Tips To Improve Your Writing
- Ten Helpful Tips To Improve Fire Drills
- Sorting Out Today’s Various Training Options
- Business Ethics and Corporate Scandals – Part 1
- Business Ethics and Corporate Scandals – Part 2
- 12 Tips for More Effective Emails
- Management Communication: Back to the Basics, Part One
- Management Communication: Back to the Basics, Part Two
- Management Communication: Back to the Basics, Part Three
- Asset Management
- Managing Hardware Inventories
- Introduction to Hardware Inventories
- Processes To Manage Hardware Inventories
- Use of a Hardware Inventory Database
- References
- Managing Software Inventories
- Business Continuity Management
- Ten Lessons Learned from Real-Life Disasters
- Ten Lessons Learned From Real-Life Disasters, Part 2
- Differences Between Disaster Recovery and Business Continuity , Part 1
- Differences Between Disaster Recovery and Business Continuity , Part 2
- 15 Common Terms and Definitions of Business Continuity
- The Federal Government’s Role in Disaster Recovery
- The 12 Common Mistakes That Cause BIAs To Fail—Part 1
- The 12 Common Mistakes That Cause BIAs To Fail—Part 2
- The 12 Common Mistakes That Cause BIAs To Fail—Part 3
- The 12 Common Mistakes That Cause BIAs To Fail—Part 4
- Conducting an Effective Table Top Exercise (TTE) — Part 1
- Conducting an Effective Table Top Exercise (TTE) — Part 2
- Conducting an Effective Table Top Exercise (TTE) — Part 3
- Conducting an Effective Table Top Exercise (TTE) — Part 4
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part One
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Two
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Three
- The 13 Cardinal Steps for Implementing a Business Continuity Program — Part Four
- The Information Technology Infrastructure Library (ITIL)
- The Origins of ITIL
- The Foundation of ITIL: Service Management
- Five Reasons for Revising ITIL
- The Relationship of Service Delivery and Service Support to All of ITIL
- Ten Common Myths About Implementing ITIL, Part One
- Ten Common Myths About Implementing ITIL, Part Two
- Characteristics of ITIL Version 3
- Ten Benefits of itSMF and its IIL Pocket Guide
- Translating the Goals of the ITIL Service Delivery Processes
- Translating the Goals of the ITIL Service Support Processes
- Elements of ITIL Least Understood, Part One: Service Delivery Processes
- Case Study: Recovery Reactions to a Renegade Rodent
- Elements of ITIL Least Understood, Part Two: Service Support
- Case Studies
- Case Study — Preparing for Hurricane Charley
- Case Study — The Linux Decision
- Case Study — Production Acceptance at an Aerospace Firm
- Case Study — Production Acceptance at a Defense Contractor
- Case Study — Evaluating Mainframe Processes
- Case Study — Evaluating Recovery Sites, Part One: Quantitative Comparisons/Natural Disasters
- Case Study — Evaluating Recovery Sites, Part Two: Quantitative Comparisons/Man-made Disasters
- Case Study — Evaluating Recovery Sites, Part Three: Qualitative Comparisons
- Case Study — Evaluating Recovery Sites, Part Four: Take-Aways
- Disaster Recovery Test Case Study Part One: Planning
- Disaster Recovery Test Case Study Part Two: Planning and Walk-Through
- Disaster Recovery Test Case Study Part Three: Execution
- Disaster Recovery Test Case Study Part Four: Follow-Up
- Assessing the Robustness of a Vendor’s Data Center, Part One: Qualitative Measures
- Assessing the Robustness of a Vendor’s Data Center, Part Two: Quantitative Measures
- Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part One: What Did the Team Do Well
- (d) Case Study: Lessons Learned from a World-Wide Disaster Recovery Exercise, Part Two
This is the second of two sections on the art of negotiating. Part one offered a brief explanation of common barriers to reaching agreement on any negotiable issue, and continued with some methods for building rapport between two negotiating parties. In this section I explain three important aspects of negotiation: positional bargaining, determining best alternatives, and identifying zones of possible agreement.
As previously mentioned, some of the material in this section is from the Harvard Negotiation Project sponsored by the Harvard Business School. Harvard initiated the project as a result of the high number of expensive lawsuits that were being litigated across the country. Project participants found that enabling litigating parties to settle out of court through effective negotiation was far more beneficial, and economical, then conducting expensive, time-consuming, and often frivolous lawsuits. The concept of the project was that the more that people understood and practiced sound negotiating skills, the better off society would be in general.
Positional Bargaining
Positional bargaining involves the choices you make on a variety of issues prior to the negotiation, positions that can help or hinder the progress of the discussions. Some typical issues are: do you view the opposing party as a friend or an adversary; do you perceive the end goal to be an agreement or a victory; will you be offering concessions to cultivate the relationship, or demanding concessions as a condition of relationship; will you be making offers, or offering threats. The initial position you take often determines the pace of progress in a negotiation. When two opposing parties take a very hard line with their initial positions, stalemates frequently occur. For example, an end-user may insists that their online system cannot be down over a weekend even though an IT database specialist insists that if he does not perform mandatory maintenance databases will likely become corrupted. These two relatively hard lines will result in a deadlock until one or both parties adjust their positions.
An approach referred to as 'negotiating on merits' adjusts a person's position by trying to find a middle ground between the extremes of positioning bargaining. This technique attempts less at compromise and more at trying new approaches, e.g. instead of viewing the opposing party as either a friend or a foe, view him as a collaborative problem-solver; rather then agreement versus victory, try to arrive at a worthwhile outcome that is efficient and amicable. In the example of the end-user and database specialist, they may determine that only one database needs to up during the maintenance period, and that a temporary copy can be used and later imported back into the original set.
A real life IT example of negotiating on merits occurred with me a few years ago when I headed up the infrastructure group of a major company. We had run on company X's servers satisfactorily for several years, and were at a point where we needed to triple our capacity for much needed, and long over-due, enterprise applications. Factoring in anticipated growth over the next five years brought our estimated costs for new servers between $2-3 million. I approached company X with my requirements, fully expecting they would offer a competitive bid to remain the incumbent vendor. Their only serious competition came from company Y who began marketing their products and services very aggressively. We had never used company Y's products where I then worked.
My initial position was that I really did not want to bring in a second vendor. We were already locked in to company X with our legacy systems that would be around for several more years. Going with a new vendor would mean additional costs for training, or hiring experienced staff, or both. But along the way, two surprising things happened. One was that company Y was far more aggressive than I had anticipated, slashing their purchase and maintenance costs down to incredibly low figures, extending the give-back period from 3 months to 6 months, and putting in writing their claims of industry-setting performance and scalability. The other was the surprising lack of any significant marketing efforts by company X, the incumbent. They presumably felt that they had the deal wrapped up, and while their offering would have been competitive in a normal bidding situation, it was no match against what company Y was offering.
The upshot was that I eventually awarded the contract to company Y. Its claims about support, performance, reliability and scalability all proved to be true, and validated the decision. If I had not adjusted my original position from a very rigid hard-line of not being open to considering a non-incumbent vendor, the company would have lost a great opportunity. As it turned out, the company and the vendor both ended up winning on this deal.
Determining Best Alternatives
An important part of preparing for a negotiation is determining possible alternatives to the desired outcome. One should include in this the bottom line value, sometimes referred to as the best and final offer. The reason this best alternative is so important is because it needs to be the firm amount (or the final term or condition) from which you will walk away from the negotiation if it is not met. In the IT arena, this may be the point at which you escalate your negotiation to senior management.
An experience I had evaluating large-volume storage suppliers will serve to illustrate. The company I worked for was enjoying rapid growth and approved substantial funds in my in infrastructure budget for a huge disk storage contract. My technical support team itemized all of our requirements in a request for proposal (RFP), and sent it out to five well-known disk suppliers. One of our non-mandatory requirements suggested that the prospective bidder provide an onsite demonstration of their equipment. This would allow us to 'kick the tires' so to speak by verifying the unit's compatibility with our own equipment and validating its performance claims. Four of the five vendors agreed to conduct these onsite tests.
My first reaction to the vendor who declined was that this would not help their cause. Their explanation only made matters worse. They stated that since their inventory was low and demand for their product was high, they could not afford to free up valuable equipment for a proposal that was not yet a sure thing. The arrogance of the vendor continued with its total unwillingness to reduce its inflated costs for purchase and maintenance. The enterprise I worked at was a Fortune 50 company that would be a marquee account for any of the bidders, yet this particular vendor's marketing team was making little effort to secure what most considered a plumb of a contract.
During the course of the evaluations, we eliminated two other vendors who could not meet several of our mandatory requirements. We eliminated a third after confirming poor performance results with independent laboratories who conducted extensive tests for clients at their labs in northern California. Down to the last two, we conducted thorough customer interviews with 5 to 10 clients of each finalist. Surprisingly, the vendor who refused to test onsite received far and away the highest reviews from their customers. Even customers who acknowledged the vendor's high price and low marketing skills had to admit the product practically sold itself.
One of my initial negotiating alternatives was to go with the vendor who would be most cost competitive and still meet our performance goals. But my best and final alternative prior to evaluations centered on high availability. With all of our critical applications running on this new storage, we simply could not afford lengthy or frequent outages. In this category the vendor with the arrogant attitude was head and shoulders above all the others. Total redundancy of components, remote diagnostics, and impressive proactive maintenance all combined to make their product the most reliable on the market. These features supporting high availability eventually won them the contract. The performance and reliability of the product exceeded even our high expectations, so much so that we procured more of the same two years later. While the company did improve their marketing skills and cost competitiveness over time, the incident confirms the value of determining your best alternatives prior to the negotiation.
Identifying Zones of Agreement
Identifying zones of agreement is a negotiating technique in which the two parties try to explore common interests and mutual values that help move the negotiation forward. These areas of commonality may not be a direct part of the negotiation but significant enough to encourage meaningful dialogues when talks bog down.
President Jimmy Carter used this technique very successfully in attempting to further negotiations between Egyptian President Anwar Sadat and Israeli Prime Minister Menachem Begin. The common zone of agreement among all three parties was their deep belief in religion. Even though they practiced three very different faiths, they shared a mutual respect for each others' convictions. While there were numerous other factors involved, this common area of religious beliefs helped lead to the historic Camp David Accords in 1978 and the signing of a peace treaty with Israel in 1979. Though the signing eventually ended in tragedy when fundamentalist assassins gunned down President Sadat two years later, historians agree that the act of getting these two arch-rivals together to sit and negotiate is one of President Carter's greatest achievements.
A few years ago I began negotiating a contract with an IT disaster recovery service provider for a major client. Initially, the positions of the service provider and me seemed to have little in common. I preferred local testing on equipment identical to that of my client, with easy access for my technical staff. The vendor could not offer any of these. Their testing facility for this type of equipment was across the country; their models of computers would be upgraded levels from what we were running; and only limited personnel could be admitted.
In exploring these differences further, however, we realized that testing remotely would help us to simulate an actual disaster more realistically since some disasters would require a remote recovery. Running on upgraded equipment would likely enhance performance rather than degrade it. The vendor's technical support proved to be excellent and eliminated the need for several of my staff to travel to the remote recovery site. By searching for zones of agreement in our negotiations, we found we had more in common than not, leading to a worthwhile five-year contract. This technique of finding common areas and mutual interests can be a powerful tool to add to your negotiating arsenal.
This second of a two-part series on negotiating covered the three important aspects of positional bargaining, determining best alternatives, and identifying zones of possible agreement. The first part two explained two additional facets of barriers to agreements and how to build rapport. Whether used individually or in combination, these five elements of bargaining can help anyone negotiate more successfully.
References
Fisher, R., Getting To Yes: Negotiating Agreement Without Giving In, 2nd Edition, Houghton Mifflin Company, 1992 (Based on the Harvard Negotiation Project)
Ertel, D and Fisher, R., Getting To Negotiate: The Getting to Yes Workbook, Houghton Mifflin Company, 1995
Gallway, T., The Inner Game of Work, Random House, 1999