Managing Networked Infrastructure and Operations

Download Report

Transcript Managing Networked Infrastructure and Operations

Module 2 [Part 2]

Managing IT Service Delivery [Chapter 7]
◦
◦
◦
◦

New service models
Managing risk through incremental outsourcing
Managing relationships with service providers
Managing large-scale outsourcing
Managing IT Project Delivery [Chapter 8]
◦ Managing sources of implementation risk
◦ Managing project execution
◦ Process consistency and agility in project management
Chapter 7




Discuss new models for IT service delivery?
Discuss the issues involved in managing
relationships with service providers.
Why are outsourcing contracts difficult to
undertake?
What advice can you give to business executives
who are considering IT outsourcing options?


Internet provides opportunities for incremental
outsourcing
Benefits include:
◦
◦
◦
◦
◦
◦

Managing shortage of specialized IT workers
Reducing time to market
24-7 operations
Favorable cash flow
Cost reduction in IT service chains
Globally accessible applications
Emerging new service models
◦ ASP, On demand, SaaS, Utility computing, Grid computing

More attractive choice
◦ Unique versus generic IT services
◦ Incremental versus traditional outsourcing

External versus internal delivery
◦ Which services provide competitive advantage
◦ Reliability and cost of external delivery

Hosting models and benefits
◦
◦
◦
◦
Key decisions
Colocation hosting
Shared hosting
Dedicated hosting

Selecting service provider partners
◦ RFP
◦ Contents of an RFP include:





Descriptive and financial info
Plan for meeting service requirements
Risk mitigation
Service guarantees and pricing
Relationship management
◦ Processes and procedures
◦ Aligned incentives
◦ SLA [Table 7.4]

Why outsourcing?
◦
◦
◦
◦
◦
◦

Cost savings
Dissatisfaction with existing services
Desire to focus on core competencies
Forcing major organizational change
Access to skills and talent
Other factors [many]
Designing alliances
◦
◦
◦
◦
Contract flexibility
Standards and controls
Scope of outsourcing
Expected savings and access to latest IT

Managing alliances
◦ CIO responsibilities
◦ Performance tracking
◦ Relationship interfaces

Managing legacies
◦ Technology problems [incompatibility]
◦ Residual process complexity [addressing problems that no longer
exist]
◦ Local adaptation [old systems addressed narrow problems]
◦ Nonstandard data definitions [different part numbers]

Managing IT infrastructure assets
◦ Increasing complexities with mix of assets
◦ Questions to address [deployment, utilization, efficiency, value
creation]
◦ TCO [cost benefit analysis of utilization and services provided]
Chapter 8




Why do so many IT projects fail?
Describe the characteristics common to good IT
project managers?
Discuss the difficulties involved in assessing the
risk of an IT project? How is managing a low risk
project different from managing a high risk
project?
How would you manage a project that has a very
high risk?

Project size
◦ Risk increases with size

Experience with technology
◦ Risk increases with lack of experience

Requirements volatility
◦ Risk increases with moving requirements


Managing the “dip” during implementation
◦ Expectations versus reality
◦ Performance drops for some period after cutover
◦ Importance of communications
Portfolio risk
◦ High/low risk portfolios versus balanced risk
◦ Risk and return distribution for a portfolio of projects [Fig.
8.3, pp. 316]

Traditional methodologies
◦ Don’t necessarily work well
◦ Phases include: analysis and design, construction,
implementation, operation and maintenance

Adaptive methodologies
◦
◦
◦
◦
◦

Iterative approach
Fast cycle time
Early delivery to limited end-user functionality
Skilled staff for midcourse adjustments
Focus on “buying of information” about outcomes rather than ROI
Adaptive methods and change management
◦ Acceptable design emerges gradually
◦ Involve users for change
◦ Collaboration is key

Flow
◦ Relationship between activities of end-users
◦ Understanding of “process”
◦ Process details are not always required

Completeness
◦ What, when, by whom checklists work best

Visibility
◦
◦
◦
◦
Process reviews during execution
Status reporting helps
Wall charts in one location
Others tools may be needed to audit