Management of Computer System Performance Chapter 11

advertisement
Management of
Computer System
Performance
Chapter 11
Value For Money, and Health Checks
Value For Money, and Health Checks

Agenda:


Chapter 11
Outsourcing IT services
Objective:

Students should be able: to identify the value
for money and health checks.
2
Value for Money and Health
Checks



Value for Money and Health Check valuations are
used to validate the efficiency in which the IT
department is being managed.
They seek to measure the efficiency of the
management of the department and the
investments within the IT department.
These types of analysis lead to the
identification of issues that can serve as a
basis for change or in extreme cases, as a
basis for IT outsourcing.
3
Value for Money

VFM studies take an analytical look at the
different services offered by the IT department.
The object is to determine if:




the department is providing a value at a level consistent
with the funding,
the requirements being placed on the department are
reasonable,
there are areas where efficiencies and savings are possible
and
What the department does well and by extension, what
areas can be improved.
4
Value for Money


A typical IT department provides numerous services.
Customized questionnaires are usually created for
each department to obtain the optimum results from
a survey.


Consider that your firm will expend time and money collect
the data, an optimal data gathering approach should be
exercised.
The components of those services, that should be
examined, (assuming that they exist) for a VFM
study are as follows:
5
Value for Money



Staffing: Issues should include identifying what are their
current skills, what technology trends exist and if they
will be positioned to support new technologies as they
roll out. Other elements include staffing turnover and
levels of management.
Service Levels: Is the department successful in meeting
or exceeding their service level agreement.. This
crosses multiple areas from servers to helpdesk call
response and problem solving.
Security: This seeks to identify all aspects of the firms
security positions and what they do to enforce security
throughout the organization. This covers the gamut from
user logins to firewalls to Intrusion Detection Systems.
6
Value for Money



Technical Support: This addresses the applications of
patches and upgrades. Most patches are, by far,
security related so there will be a partial overlap in
these activities.
User Support: This predominately refers to users of
the technology and how the IT department assists them
in solving their problems.
Costs and Charges: This area of study refers to how
the consumers of IT servers are billed back for those
services. Examples include Desktops, Helpdesk calls,
Software licenses, etc.
7
Value for Money


Application Systems Development: What Software
Development Life Cycle methodologies are used and
how are the methodologies followed. This is a project
management type of question and it involve the
meeting of client expectations and the delivery of
projects on time, to specification and to budget.
Networks: Is the system reliable and delivering
adequate performance now and for the immediate
future. This covers both Networking issues as well as
Network Security. Again there is an overlap with the
security element. They are intertwined and cannot be
considered separate areas of work.
8
Value for Money


IT Department Organizational Integration: This
element is design to examine how the different support
groups within the IT department interface and provide
support to the rest of the organization. IT addresses
internal and external reorganizations and how they are
handled, how the IT staff interface with their users and
the communications provided by the different elements
with all external organizations.
Information Systems Plan: This is the long term IT
plan as part of the their execution of the firms strategic
goals.
9
Value for Money

IT managers may legitimately be concerned about
this type of study being performed on their
departments if they are not co-sponsors of the
activity.




A lack of IT knowledge on the part of the investigators can
impact the results of the study.
 A biased study could be career limiting to the IT
departments staff.
The knowledge of how the data gathered by the study will
be used may result in less than honest responses by the
participants.
Select the right staff for the job.
GET BUY IN OF IT STAFF / MANAGEMENT.
10
Value for Money

Components of the study should include:








Hardware and software refresh and maintenance.
 Includes servers, desktops, network equipment and all
related OS and applications.
Staffing turnover and the underlying reasons.
System and support SLA’s.
Project Performance
Security
Budgetary performance and compliance.
IT support of BPR initiatives.
Integration into the corporations strategic planning.
11
Value for Money

In this case, each of these elements will involve a
significant methodology to identify and document
what is being done in that particular area.




This is a very involved and meticulous process.
The larger the organization, the more involved this
becomes.
This type of study invariably leads to the
discovery of inefficiencies.
Root cause analysis of those inefficiencies is
the next step.
12
Value for Money Study Results

Action item points as a result of a VFM Study.
Such a study usually finds several areas for
remediation. These may include:




Security changes
Hardware/Software refresh
Integrated systems implementations
(ERP/CRM/SCM)
Staff increases or decreases.
13
Value for Money Study Results

The Root cause analysis will identify many causes,
depending on the problem but in the end, it
becomes a matter of determining if those problems
can be fixed internally or if it would be more cost
effective to resolve them externally (outsourcing).



Hardware purchases at retail levels can be beat by getting
someone else that buys larger quantities to buy it for you.
Skilled staff that is not needed full time may be acquired
through a larger organization.
Costs associated with 7x24x365 support can be off loaded
to a third party.
14
Value for Money Study Results


IT Strategic integration, Contributions to the
Organization and Delivery of services are all
aspects that would be evaluated.



Product support for home grown applications may need to
stay local.
Each has a cost element to it that should be quantified as
far as possible with a limited error range as possible.
Internal examinations will get you to the point of
knowing your cost.
The next element is to determine what you can get
those services for from an outside vendor.
15
Value for Money Study Results


This becomes the basis for a “keep in
house” or “outsource” decision.
Outsourcing will remain a key tool in the IT
Staff’s arsenal in controlling costs.


There are many aspects of this that must be
examined in great detail before firm undertakes
this type of challenge and risk.
This is clear case of knowing what you’re getting
into before you move forward.
16
IT/E-Commerce Outsourcing
Outsourcing (Specifically, IT Outsourcing)
 Definition - Contracting Key Information
Technology (IT) Services to another company
or companies.
 Key IT Services are defined as those
services needed for the profitable operation
of the company.
Potentially, if the services fail, the company could fail.
17
IT/E-Commerce Outsourcing

Compelling reasons for Outsourcing



The IT Dept. is not a core product or service sold
by the company.
IT is considered an administrative service.
IT operating costs have a negative impact on
financials



No volume discounts in purchasing
High indirect salaries
Staff skills may be difficult to keep current.
18
IT/E-Commerce Outsourcing

The base argument then becomes:

why divert the companies administrative
resources, energies and funds to something that
is not a core product if there are other firms that
can do it better for less money.


Outsourcing allows the business to focus
on its fundamentals by letting someone
else focus on the services.
19
IT/E-Commerce Outsourcing

The problem is that your IT Services are
critical to the successful and efficient
operation of the firm.


Contractor selection is critical.
Consider the following in contractor
selection criteria:

Are they Experienced?

Have they done this before?

IBM, EDS and CSC remain the main players in this
market.
20
IT/E-Commerce Outsourcing

Can they staff the job?




What will they do with the existing IT staff?
Do they have the financial means to manage
the cash flow requirements in terms of the
payment schedule.
Do they really understand your business?
Is their culture sufficient to meld seamlessly into
your operation?

This can actually be a critical issue in the selection of
the contractor.
21
IT/E-Commerce Outsourcing

What Customers Require From Outsourcing
Vendors:





Capability to shift risk from customer to vendor
Commitment to customer success
Flexible terms and conditions (e.g., minimizing extra
charges)
Understandable product (scope, service-level agreements
and simple, but flexible, pricing)
Demonstrable vendor capabilities (particularly project
management skills and quality benchmarking strength)
22
IT/E-Commerce Outsourcing

Some of the key issues now being seen are
as follows (CY 2002/2003):

Contractors are not accepting risk as the once
were.


Competition does tend to force this but there is now
push back where once there was none.
There is doubt as to the overall value of these
agreements but if structure correctly for the right
company, there are benefits.

Mainframe operations are an example of this.
23
IT/E-Commerce Outsourcing

Outsourcing Keys to Success





Define the rules of the engagement.
Let excellent people manage the relationship.
Realize that it often takes a year to put the deal
into operation.
Control demand, rather than constraining supply
to manage costs.
Understand that it might not be a true
partnership, but it is a marriage.
24
IT/E-Commerce Outsourcing

Outsourcing Keys to Success (Continued)




Let the deal be profitable for the vendor.
Understand that a good contract does not
guarantee a good relationship, but a bad
contract guarantees a bad relationship.
Maintain a healthy competitive tension among
vendors.
Ensure that contractual provisions are capable of
being executed.
25
IT/E-Commerce Outsourcing

Outsourcing Keys to Success (Continued)



Agree on governance structure upfront.
Focus on risk mitigation — outsourcing is all
about shifting risk.
Avoid ambiguity, inconsistency and lack of
concern for supplier’s costs.
26
IT/E-Commerce Outsourcing
E-Commerce Outsourcing Applications

Potential elements;



WEB Hosting
WEB Site Development
Middleware and BackOffice Services (Internet
Managed Asset Provider, IMAP)
27
IT/E-Commerce Outsourcing:
Specific Examples

WEB Hosting Requirements

Minimum of 99.5% uptime (Gartner Group).



Quality Hardware: Dual 1GHz homegrown vs.
Compaq Dual Alphas.
UPS vs. Backup generators. View rural Eastern
Shore vs. Baltimore
Guaranteed high-speed connections outbound to
the Internet. T1, Cable or T3 with redundancy if
warranted. Satellite up-links in case the local
phone system goes down? How important is your
Site?
28
IT/E-Commerce Outsourcing:
Specific Examples

Service is not cheap.


Time to do a make/buy analysis. Could you do it
yourself cheaper?
WEB Site Development Requirements


Do they know HTML and some flavor of JAVA?
Do they show graphics savvy. (Flash may be
great eye candy but it doesn’t do a lot for
content in all cases.)

Will they turn over to you copies of all that they
produce in some media format.
29
IT/E-Commerce Outsourcing:
Specific Examples



Will they Document their work?
Will they respond quickly to changes? The initial
rollout is fine. What about all of the changes that
will be needed on a weekly basis?
Middleware and BackOffice Services
Requirements

(Internet Managed Asset Provider, IMAP,
Application Service Provider, ASP) See
Subcontractor Considerations. The same begins to
apply.
30
Health Check Review

Upon completion of a VFM and the
subsequent analysis of collected data, a
Health Check Review can be conducted.


This type of study usually overlays on top of the VFM
study data in that it addresses the:
 overall integration of the IT department into the
corporation and
 attempts to determine how it is used.
It can review the data both from a predictive and
historical perspective (ex-ante and ex-post)
31
Health Check Review


HCR studies were initially developed by
PWC according to the text.
They identify three general areas of
subsequent review. These are:




IT Policy
IT Contribution
IT Delivery
Each of these elements includes the
following:
32
Health Check Review



IT Policy – Consists of Corporate IT
Strategy, planning and management;
Investment and budgeting.
IT Contribution – Consists of Customer
Relations, supply of IT services and
Evaluation of existing Services.
IT Delivery – Consists of Technology
Strategy, Development Planning,
Operations Planning, HR Strategies as
applied to IT and TQM type initiatives.
33
Health Check Reviews

The policy aspect of the rating of MIS’s
contributions is associated with:

overall corporate strategy. Examples would
include:


the implementation of an ERP system will increase
earnings x% or further growth is dependent on the
CRM deployment.
The effectiveness of IT Planning,
Management, Investment and Budgeting.

Almost 50% of all IT projects overrun by about
189%
34
Health Check Reviews

The Contribution to Operations from a functional
perspective refers to the ability of the MIS
department to deliver solutions that enhance
operations.


This would run the range from deployment of solutions
to meet specific department needs to complete,
integrated solutions.
The key for this criteria is that the solutions designed or
selected by the MIS department must meet the needs
of the department being supported.
35
Health Check Reviews

The delivery of services is probably the
most visible of the three, though not
necessarily the most important.





These elements would include desktop
refresh.
SLA compliance.
System availability.
Helpdesk service call response time.
System service maintenance (avoiding
downtime).
36
Health Check Reviews



As is the case with Value for Money
reviews, the results can be extensive and
result in the redirection of MIS activities.
Participation AND buy in by the MIS
department is critical for success of the
assessments.
Planning is a key component in the
initiation of this activity.
37
Assessments

VFM analysis is an internal review of IT
operations.


They attempt to gather quantitative metrics on specifics
of IT operations and determines if the services being
delivered are being delivered at a fair price.
Health checks are an external review of the value
of the IT organization to the rest of the
corporation.

They attempt to identify value of the services being
delivered to other organizations.
38
Comparative Valuations

As is the case of both of these processes, the
data derived is only available from one
perspective.


You cannot compare it to itself.
Additional data sources can be obtained from
consultants and research organizations.




Make sure that external comparisons are valid.
Use firm size in terms of employees and IT services as
a base line, not market position or revenues.
Normalize comparison points.
The more valid reference points, the more accurate the
comparison.
39
VFM and HCR Review


Value for Money (VFM) Studies focus on the
effectiveness of the IT department and focuses
on Micro-valuation of the services rendered.
Health Check Review (HCR) is categorized by
the text is periodic monitoring of various aspects
of the IT departments integration into the rest of
the organization and leans towards Macrostudies.

It addresses how the individual elements from the VFM
study tie together.
40
VFM and HCR Review

VFM studies take an analytical look at the
different services offered by the IT department.
The object is to determine if:




the department is providing a value at a level consistent
with the funding,
the requirements being placed on the department are
reasonable,
there are areas where efficiencies and savings are possible
and
What the department does well and by extension, what
areas can be improved.
41
VFM and HCR Review

Once VFM data gathering and analysis is
complete, a Health Check Review can be
conducted.



addresses the overall integration of the IT department
into the corporation and
attempts to determine how it is used.
They identify three general areas of subsequent
review. These are:



IT Policy
IT Contribution
IT Delivery
42
VFM and HCR Review



These components are measured, more
from an impartial perspective, such as by a
consultant. Methodologies are again
developed and assessed against an
industry and/or a competitive basis.
The results of this analysis are often used
to address the use of the IT department
from an organizational perspective.
Intangible Data collection remains
problematic.
43
Summary




VFM looks at all internal aspects of IT
department operations.
HCR looks at all external aspects of an IT
departments impact on the corporation,
Both require IT management buy in and
commitment to the process.
The results of these types of analysis will identify
numerous items that can be “optimized”

Range from staffing changes to outsourcing.
44
Homework
45
Download