What are the different types of approaches to implement a new system?
When a company is implementing a new system, and it is considered a large-scale conversion, there are four main approaches the company could use:
1) Direct conversion: A direct conversion is when a company stops using the old system and start using the new system at a specific point in time. This can be risky because even with sufficient testing, it is impossible to make sure there are no issues with the new system.
2) Parallel conversion: Parallel conversion is when the process is run on the old and new system for a period of time. This process is less risky than the direct approach because the company still has the old system to rely on. One downside is that this approach duplicates the work since it’s the work is being performed in two environments.
3) Phase-in conversion: This is when the company slowly implements a system in pieces. This can be useful to make sure that the whole process is not interrupted, which makes it less risky than the direct approach.
4) Pilot conversion: Pilot is when the company uses the system in a test environment for a period of time to work out all of the bugs. This is less risky than the direct approach since it allows the company to understand the issues that may become applicable with a new system.
You might also be interested in...
Is a computer-based system for transaction processing more efficient than a manual system?
Computer-based systems will be more efficient in producing financial statements. This would be more efficient for a number of reasons, including reducing the number of resources needed, as well as the timing necessary for producing these reports.
What are logical controls?
Logical controls are preventative controls that apply information technology software’s and systems to prohibit unwanted access to information within a computer system. Nonphysical access controls are also referred to as logical controls. These will prevent information assets from being accessed electronically. Logical controls that can prevent access to an organizations informational asset include:Authentication of unauthorized […]
What is a CRM?
Customer relationship management, often referred to as CRM is a business strategy that the focus on meeting the needs of your customer. It does this to utilize advanced technologies to organize, automate, and integrate the marketing, sales and customer service components of an organization. Customer relationship management applies data analytics to better understand a customer’s […]