sponsored by HCL Technologies Ltd.
Posted:  10 Jul 2008
Published:  16 May 2008
Format:  PDF
Length:  14  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
Upgrades help business to maintain its competitive edge in the market-space with well-tuned, up-to-date business applications and supporting infrastructure.

Yet, upgrades pose their own set of challenges. If best practices are not adopted in execution of important processes and functions of upgrade lifecycle, it can lead to budget slippages, missed timelines, unprepared end-users and other set backs.

This white paper lists down all the best practices that should be followed in each and every important processes and functions of an upgrade lifecycle. It also examines how the risks associated with an upgrade project could be minimized with the adoption of best practices. At the end it summarizes how maximum reliability could be achieved in upgrade projects




Authors

Vijay Deep
HCL Technologies
Vijay Deep is responsible for management of SAP Upgrade Competency Center at HCL. He is a certified SAP Logistics consultant with over 10 years of experience in consulting and project management of SAP implementation, upgrade and maintenance projects in various industry verticals. He has been responsible for development and dissemination of world class project accelerators and best practices for the benefit of upgrade projects and is a speaker in leading events such as Sapphire.

B. S. Bhalla
HCL Technologies



BROWSE RELATED RESOURCES
Best Practices | Change Management | Documentation | Downtime | Hardware | Project Management | Technical Support Staff | Testing | Training

View All Resources sponsored by HCL Technologies Ltd.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement