©2011 sap ag. all rights reserved.1confidential wrap up presentation - rules how to use the...

16
© 2011 SAP AG. All rights reserved. 1 Confidential Wrap up Presentation - Rules HOW TO USE THE TEMPLATE This wrap up presentation template is valid for a scoping workshop for DCM It is of utmost importance to point out the top issues, issues/risks (more detailed) and preliminary findings our powerful Solution Manager tool including the Issue tracking functionality and Collaboration Scenario the importance of an E2E approach and the benefits it brings For further details regarding “how to” presentations, refer to training material USMR09 For guidelines regarding Management presentations, refer to the documentation provided in the Learning Map Onsite Service Delivery.

Upload: kerrie-gardner

Post on 22-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

© 2011 SAP AG. All rights reserved. 1Confidential

Wrap up Presentation - Rules

HOW TO USE THE TEMPLATE

This wrap up presentation template is valid for a scoping workshop for DCM

It is of utmost importance to point out the top issues, issues/risks (more detailed) and preliminary findings our powerful Solution Manager tool including the Issue tracking functionality and Collaboration

Scenario the importance of an E2E approach and the benefits it brings

For further details regarding “how to” presentations, refer to training material USMR09

For guidelines regarding Management presentations, refer to the documentation provided in the Learning Map Onsite Service Delivery.

Scoping Workshop DCMSpeaker’s Name/Department (delete if not needed)Month 00, 2011

NOTE: Delete this element.

Use the white area to place your partner or customer logo. Resize the box to fit the logo.

Customer

© 2011 SAP AG. All rights reserved. 3Confidential

Agenda

■ Core Business Processes Overview

■ Involved Interfaces Overview

■ Overview Risks for DCM identified

■ Next Steps

© 2011 SAP AG. All rights reserved. 4Confidential

Agenda

■ Core Business Processes Overview

■ Involved Interfaces Overview

■ Overview Risks for DCM identified

■ Next Steps

© 2011 SAP AG. All rights reserved. 5Confidential

Reviewed Business Areas and Processes - Overview

Local Sales Order ProcessingLocal Sales Order Processing

Export Sales Order ProcessingExport Sales Order Processing

Indirect/Wholesales Inquiry [SIS update]Indirect/Wholesales Inquiry [SIS update]

Lost Orders ProcessingLost Orders Processing

Demand PlanningDemand Planning FI/CO-PAFI/CO-PA

G

Y

R

Adapt to your needs

© 2011 SAP AG. All rights reserved. 6Confidential

Core Business Process <XYZ>

SAP CRM [SERVER] - PC6

Upload assignment Letter with confirmation information

Create confirmation with reference to service order

Create / update iBase

Create confirmation items (service / spare part items)

Save (validation / change status)

Create debit memo request

Update statistics

Host - MOBILE

Update assignment

Colaboradores - CLICK

Update assignment (status time)

SAP R/3

Goods issue posted for spare parts

Transfer working times via CATS (HR)

Post costs / revenue to CO

Create debit memo request

Invoicing and posting to FI

Update CO object

Update statistics

1

2

Replace with Customer‘s Processes - 1

Slide per Business Process

Highlight Integration Issues, e.g. w

here are consistency reports

missing

Custom coding that needs to be analyzed etc

© 2011 SAP AG. All rights reserved. 7Confidential

Agenda

■ Core Business Processes Overview

■ Involved Interfaces Overview

■ Overview Risks for DCM identified

■ Next Steps

© 2011 SAP AG. All rights reserved. 8Confidential

<Project> Interfaces Architecture

WIP/ShipFileserver

WIP/ShipFileserver

MI1R/3

POPAPO DB, LC

PBFForecasting

Data Mapper

WIP/ShipFileserver

SUBCOOracle DB

MESLegacy Systems

Oracle DB

qRFC (CIF)

IDoc

FTP

...FTP

sql

AMB

EDI ServerService Provider

tp

Native SQL

Sql

FTP

BWPBW

ALEPOPAPO Optimizer

RFC

Schedulertp

Subcontractor

2

3

Replace with

Customer‘s

Interfa

ces

Provide fo

r each in

terface th

e technolgy and th

e objects

exchanges

Highlight th

e ones where m

onitorin

g should be setup or TC

might be endangered

© 2011 SAP AG. All rights reserved. 9Confidential

Agenda

■ Core Business Processes Overview

■ Involved Interfaces Overview

■ Overview Risks for DCM identified

■ Next Steps

© 2011 SAP AG. All rights reserved. 10Confidential

Priority Setting Criteria

Priority Criteria for classification of identified issues

Very highHas or will have a critical impact on the going live of the business processes and their operations

HighHas or will have an impact on business operations (severe impact)

MediumHas or will have an impact on business operations (functional impact)

R

Y

© 2011 SAP AG. All rights reserved. 11Confidential

Very High Issues/Risks IdentifiedR

Short Issue / Risk description

■ Findings / Current situation■ xxx

■ Risks / Impacts ■ xxx

■ Expectations Optional (e.g. ‘a specific time window must be met’)■ xxx

■ Recommendations Optional when BackOffice approval/further analysis is required■ xxx

■ Results Optional (when recommendation is implemented and improvements are obvious)■ xxx

■ Status Optional (relevant when the issue is being worked on during the onsite delivery)■ Open / In process by <customer> team / Close■ Effort implementation: High Optional

© 2011 SAP AG. All rights reserved. 12Confidential

High Issues/Risks Identified Y

Short Issue / Risk description

■ Findings / Current situation■ xxx

■ Risks / Impacts ■ xxx

■ Expectations Optional (e.g. ‘a specific time window must be met’)■ xxx

■ Recommendations Optional when BackOffice approval/further analysis is required■ xxx

■ Results Optional (when recommendation is implemented and improvements are obvious)■ xxx

■ Status Optional (relevant when the issue is being worked on during the onsite delivery)■ Open / In process by <customer> team / Close■ Effort implementation: High Optional

© 2011 SAP AG. All rights reserved. 13Confidential

Medium Issues/Risks Identified

Short Issue / Risk description

■ Findings / Current situation■ xxx

■ Risks / Impacts ■ xxx

■ Expectations Optional (e.g. ‘a specific time window must be met’)■ xxx

■ Recommendations Optional when BackOffice approval/further analysis is required■ xxx

■ Results Optional (when recommendation is implemented and improvements are obvious)■ xxx

■ Status Optional (relevant when the issue is being worked on during the onsite delivery)■ Open / In process by <customer> team / Close■ Effort implementation: High Optional

© 2011 SAP AG. All rights reserved. 14Confidential

Agenda

■ Core Business Processes Overview

■ Involved Interfaces Overview

■ Overview Risks for DCM identified

■ Next Steps

© 2011 SAP AG. All rights reserved. 15Confidential

BPO Project Timeline

Scoping

Remote

Interfaces

RemoteanalysisRemoteanalysis

Scoping Workshop Results

Scoping Workshop Results

Remote

Business Process AnalysisBusiness Process Analysis

Onsite

High Level Project Plan High Level Project Plan

Follow-upFollow-up

RealizationRealization

Detailed RequirementsDetailed Requirements

Core business process analysis

Check reports

Onsite/Remote

Tests & GoLiveTests & GoLive

Thank You!

< Team Lead Name >< Contact Data >SAP Active Global Support