Skip to main content

Request For Proposal (RFP) Request For Information (RFI) documents

During my few years with technology telecommunication industry, I was involved and responsible for the technology trends evaluation. Through this process, Telecommunication operators can  follow technology refresh and trends for many domains.

It was really challenging for me and my team to follow the trends for many domains: Cloud computing, infrastructure across different fields including computing, storage, networks, SDn openstack, big Data, etc..

We didn’t have enough time to write a fair document that allows us evaluating vendors against their solutions and bids. Commercial and technical evaluation need to be done each time we lunch a new RFP(Request of proposal).

We spent days and nights writing, defining and setting the right requirements per domains as agnostic as possible against each vendors approach.

At the same time we were very stressed by time and we should delivery as fast as possible to give the vendors the time to look for our requirements and involve the right technical people to response back.
I used to look on the internet to find someone that helps me defining all of these requirements .It was too difficult to find the right person with the dedicated skills. And what we were looking for was the list of requirements, or at least a set of basic requirements that could be our starting point.

I decided to share with you what we have defined as model for different domain after several years of experience in the RFP ( request of proposal ) process dedicated for Cloud computing, Infrastructure , NFV , SDN and transformation services for cloud computing.

Next posts will be dedicated to help you defining all of these requirements from an agnostic angle.
Hence, developing and RFP or RFI is not only the matter. How could I start evaluating my bids after I receive all of these responses. It will be a very complicated and time consuming task when your initial template was not well defined.

Follow us in twitter and social web sites for the next blogs.

Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...