Celent Says

Quantifying the Promise of End User Maintenance

Mike Fitzgerald
Insurance Experts' Forum, September 13, 2010

One of the frequently referenced benefits of transitioning to a modern automation platform is the ability to have some amount of system maintenance moved out of programming areas. In some organizations, this means having business analysts make changes to systems; in others, end users in business units perform selected modifications. Lower cost and shorter cycle times are claimed as the advantages of this approach.

However, it has always been difficult to quantify this opportunity. During a recent consulting project, we discovered a technique that helped clarify such a benefit.

The client was a large insurer with multiple divisions. The unit in which we were working used a 40-year-old legacy administration system. In a sister operation, a modern, rules-based system performed a similar function. We asked a business analyst who worked with the modern system to review the current outstanding work list of the legacy system and make a determination about which items would be handled without programming assistance in the more modern system. After reviewing 70 items, he determined that 28% of them could be accomplished without involving programming resources.

While this is not a controlled experiment, nor a statistically relevant sample, it did allow the client to more effectively gauge the opportunity.  It allowed us to have a much more meaningful discussion of a future state since we could reference actual work items and outline how they might be accomplished differently.

If your team is looking for a way to quantify the promise of end user maintenance, search across your organization to see if an existing experience with modern solutions in other parts of the company can contribute a focused and meaningful perspective.

This blog has been reprinted with permission from Celent.

Mike Fitzgerald is a senior analyst in Celent's insurance practice, and can be reached at mfitzgerald@celent.com.

Readers are encouraged to respond to Mike using the “Add Your Comments” box below.

The opinions posted in this blog do not necessarily reflect those of Insurance Networking News or SourceMedia.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

The Good, The Bad and The Ugly Of Enterprise BI

When IT can't deliver, business users build their own applications focusing on agility, flexibility and reaction times.

The IT-Savvy 10%

IBM survey reveals best practices of IT leaders.

The Software-Defined Health Insurer: Radical But Realistic?

Can a tech startup digitally assemble the pieces of a comprehensive, employer-provided health plan?

Data Governance in Insurance Carriers

As the insurance industry moves into a more data-centric world, data governance becomes more critical for ensuring the data is consistent, reliable and usable for analysis.

Fear This

Just days before this Issue, which contains our security cover story, went to press, we got some interesting news: 1.2 billion unique usernames and passwords and 542 million email addresses were reportedly stolen from 420,000 websites, according to The New York Times. The websites ranged from Fortune 500 companies down to small online retailers.

Should You Back Up Enterprise Data to the Cloud?

Six questions that need to be asked before signing on with an outside service.