Negative Results have to be expected

After a business analysis phase for a solution, there is a decision making process for thinking about the viability of the solution.

The recognition that the development of a solution really cannot be profitable is very hard for the person who studied it.

Sometimes, the defense of this viability is done as a matter of life or death.


There are so many hours, effort and personal expectative when you are doing it and your ego does not let you to think in the failure of this initiative. On the other hand the creation of higher expectations can be bad. This should be avoided.

If business case is well prepared and the answer is “… no this solution is not viable for us!”. No problem, this is a valid answer and you are taking a good decision for your company.

This has to be explained during early phase of the analysis to avoid future frustrations.

Life Cycle Costing (LCC)

When you work on new solutions for your company, the adoption of a life-cycle costing approach is mandatory.

LCC requires decisions during R&D phase. Just at this moment is when you need to start the LCC analysis. A silly example, you are working on R&D and you have 2 designs for a solution; both requires the same cost for manufacturing but the maintenance is cheaper in one of the cases.

Of course real life is a little bit complex, but this process is necessary to avoid unexpected expenses at a point where you have not an alternative.
The scope of this LCC is all the cost to the organization for the creation of a product/solution: R&D, production, operation, support…

Then, what you have to do is the systematic evaluation of alternatives with the objective of chosing the best way to employ your resources.

You can detect a good/bad business analyst just seeing the way they take care about the future expenses of its analysis.

Organizing my Time

This week I have accumulated 26 hours of scheduled meetings. It beats the amount number of hours I can handle to deliver my work properly.

At this moment, I think 20 hours is a good number, less than 15 hours means I’m not attending the team or the clients and more than 20 means “you’re in trouble”.

I continue organizing my time from I changed my position, after 2 months I’m finding the right way to do everything in a good level of productivity.
You can think it’s too much time to organize it but it isn’t.

I’m not a secretary!!

Recently I have listened it from a PM regarding to the fact that we request him to do a meeting minutes.

This answer let me understand the ignorance of this person about his understanding of what a meeting minutes can mean with regards to its value in terms of ‘agreement’ during the execution of a project.

This meaning was explained and understood by the other part, so the issue was closed just at that moment.

I can understand the lack of knowledge or an inappropriate comment at a given moment, but what I don’t like was the arrogance showed and the way it was expressed, but anyway, it’s other issue.

Blackberry, access to a restricted Lotus WSDL


– Lotus Domino

You are working with the ACL granting whole access to the application. Everything works, but suddenly you retire the anonymous access to the application and all crash.

The access of the MDS Studio and the final mobile device is not possible due to these applications do not understand the HTML screen that shows the server.

These applications understand the call sent when your Lotus Domino Server is configured with Session Authentication = ‘disable’.

You need to configure the Server taking into account that the rest of the applications hosted there need to continue working as the same way that they are currently doing.

With it, the Lotus Notes Administrator allows you to configure the server using Virtual Web Servers and their rules. This kind of configuration allows you to:
  • Allow the current users to access to their Web applications with the existing configuration pattern.
  • Allow the mobile users to access to the WSDL elements using the Session Authentication = “Disable”.

With it, the access of the mobile users is done with the credentials entered when the user access to the application (an username/password screen is shown).