MODULE 9 : Managing Diverse IT Infrastructure Matakuliah : J0422 / Manajemen E-Corporation

advertisement
Matakuliah
Tahun
Versi
: J0422 / Manajemen E-Corporation
: 2005
:1/2
MODULE 9 :
Managing Diverse IT Infrastructure
1
Learning Outcomes
 In this chapter, we will study:
 The benefits of increments of outsourcing.
 Choose hosting models for IT infrastructure
 How to select Service Provider Partners
 Cost and benefit analysis for IT assets and platforms
provides a basis for evaluating a company’s current IT
services against new service alternatives.
 Case Study : Ford Company : Supply Chain Strategy.
2
Outline Topic
 New Services Models.
 Managing Risk through Incremental Outsourcing.
 Managing Relationships with Service Providers.
 Managing Legacies.
 Managing IT Infrastructure Assets.
 Case Study : Ford Motor Company (Supply Chain
Strategy).
3
Content
 Before emergence of the commercial Internet in 1990s,
companies accomplished much now achieved through public
Internetworks by using proprietary technologies installed and
managed inside each firm. This approach was expensive and
unsatisfactory.
To reach business partners and customers, every company had to
develop its own communication infrastructure, a process that led
to massive duplication in infrastructure investment. Often the
multiplicity of technologies confused and confounded the
partners and customers businesses wanted to reach.
 The technologies did not interoperate well. Many companies
maintained complex software programs that had no purpose
except to serve as a bridge between other incompatible systems.
 Reliance on proprietary technologies meant that companies were
locked in to specific vendor technologies. Once locked in, firms
had little bargaining power and were at the mercy of the marginmaximizing inclinations of their technology providers.

4
Managing Diverse IT Infrastructure
 The new approaches compare favorably and in many cases
enhance previous approaches in numerous ways. Today, for
example:



Companies can share a communication infrastructure common to
all business partners and customers. Customers and business
partners can interact via common interfaces This seamless
interaction dramatically reduces complexity and confusion.
Because of the open Transmission Control Protocol/Internet
Protocol (TCP/IP) standard, communication technologies
interoperate very well. Software that bridges systems is simple,
standardized, and inexpensive. In some cases, acquired for free.
Companies are much less locked in to specific vendor
technologies, a fact that creates more competition among
vendors. More competition leads to lower prices and betterperforming technology.
 At last, companies can combine technologies from numerous
vendors and expect them to interconnect seamlessly
5
New Service Models
 Since the emergence of PC and client-server computing, end-user
software has been designed to execute on PCs or on servers that
are housed locally.
 Saved work--documents and other data--usually remains on a PCs
hard drive or on storage devices connected to a nearby server or
mainframe. In this scenario, when the software malfunctions, the
user contacts his or her IT department, which owns and operates
most, if not all of the IT infrastructure.
 With advent of reliable, high-capacity networks, however, local
software execution no longer is the only alternative, nor is it
necessarily the best alternative.
 Increasingly, software is designed to operate in geographically
distant facilities that belong to specialized service providers, each of
which deliver software services across the Internet to many different
customers.
6
New Service Models
 Even if actual software applications are not acquired
externally, other increments of outsourcing may make
sense.
 The benefits of increments of outsourcing include the
following:
• Managing the shortage of skilled IT workers
•
•
•
•
•
Reduced time to market
The shift to 24 x 7 operations
Favorable cash flow profiles
Cost reduction in IT service chains
Making applications globally accessible
7
Managing Risk through Incremental Outsourcing
 Increments of outsourcing offers new and attractive choices to
managers seeking to improve IT infrastructure. In the past,
managers often felt they faced two equally unpleasant
choices:


Do nothing and risk slipping behind competitors
Wholesale replacement of major components of computing
infrastructure, which risks huge cost overruns and
potential business disruptions as consequences of an
implementation failure.
 Decisions to replace wholesale legacy networks with TCP/IPbased networks have run this second risk as have decisions
about whether to implement enterprise systems.
 With the TCP/IP networks installed today, however,
managers have intermediate options that lie between all-ornothing choices.
8
Managing Risk through Incremental Outsourcing
 An Incremental Outsourcing Example: Hosting
 Outsource hosting of a company’s systems involves
deciding where they should be located physically.
 The Hosting Service Provider Industry
 Proponents of service provider-based infrastructures
describe a world in which companies routinely obtain a
majority of the IT functionality needed for day-to-day
business from over-the-Net service chains.
9
Managing Risk through Incremental Outsourcing
 Incremental Service Levels in Hosting
 Hosting models can be categorized along service level
lines as:
•
•
•
•
•
•
Co-location hosting
Shared hosting
Dedicated hosting
Simple dedicated hosting
Complex dedicated hosting
Custom dedicated hosting
10
Managing Risk through Incremental Outsourcing
 Managing Relationships with Service Providers
 When they acquire IT services externally, companies inevitably
find themselves engaged in relationships with a growing
number of service provides.
 Services are only as good as the weakest link in the service
provider chain. Choosing reliable services providers and
managing strong vendor relationships therefore are critical
skills for an IT manager.
 Selecting Service Provider Partners
 The most critical step in assembling an IT service chain is the
selection of providers.
 The most common process for selecting service providers
involves writing a “request for proposal” (RFP) and submitting
it to a set of apparently qualified vendors.
11
Managing Risk through Incremental Outsourcing
 Selecting Service Provider Partners
 Typically RFPs request information in the following categories:
• Descriptive information
–
•
•
How it describes its business reveals much about a service
provider’s priorities and future direction.
Financial information
– A service provider’s financial strength is a critical factor in
evaluating the continuity of service and service quality a
vendor is likely to provide.
Proposed plan for meeting service requirements
– How the provider offers to meet the requirements laid out in the
RFP indicates whether it truly understand the requirements.
12
Managing Risk through Incremental Outsourcing
 Selecting Service Provider Partners
 Typically RFPs request information in the following categories:
• Mitigation of critical risks
– A good RFP asks specific questions about potential service
risks. Availability and security are two areas for customers to
be sure they understand a service provider’s approach.
•
Service guarantees.
– A service provider’s guarantees (levels of performance it is
willing to back with penalty clauses in a contract) are important
signals of the real level of confidence vendor managers have in
their services.
•
Pricing
– Pricing usually includes one-time and variable components and
may be structured in other ways as well.
13
Managing Risk through Incremental Outsourcing
 Relationships with service provider partners require
ongoing attention.
 The most formidable obstacles are sometimes not
technical but “political.”
 A service-level agreement (SLA) is the prevalent
contractual tool used to align incentives in relationships
with service providers.
14
Managing Legacies
 The difficulties that arise from legacy systems can be
categorized as
• Technology problems
Sometimes constraints embedded in legacy systems result
from inherent incompatibilities in older technologies.
• Residual process complexity
Some difficulties with legacy systems arise because the
systems address problems that no longer exist.
15
Managing Legacies
 The difficulties that arise from legacy systems (Cont’d)
• Local Adaptation
Many legacy systems were developed for very focused
business purposes within functional hierarchies.
• Non standard data definitions
Throughout most companies, business units and divisions
have used different conventions for important data elements.
16
Managing IT Infrastructure Assets
 In the mainframe era, keeping track of the assets that
made up a company’s IT infrastructure was relatively
easy. The majority consisted of a small number of large
mainframe machines in the corporate date center.
 After emergency of PCs, clients and servers, the Web,
portable devices, and distributed network infrastructure,
a company’s investments in IT became much more
diffuse.
 Computing assets were scattered in a large number of
small machines located in different buildings. Some
moved around with their users and left the company’s
premises on a regular basis.
17
Managing IT Infrastructure Assets
 The variety of asset configurations in modern IT
infrastructures makes certain business questions hard to
answer:





How are IT investments deployed across business lines/units?
How are IT assets being used?
Are they being used efficiently?
Are they deployed to maximum business advantage?
How can we adjust their deployment to create more value?
 One approach to this problem is called total cost of
ownership (TCO) analysis.
 IT services are analyzed in terms of costs and benefits
associated with service delivery to each client device.
18
Managing IT Infrastructure Assets
 For example, the total cost of delivering office
productivity services to a PC desktop within an
enterprise might be expressed as “$250 per client per
month.”
 Cost and benefit analysis for IT assets and platforms
provides a basis for evaluating a company’s current IT
services against new service alternatives. Outsourcing
vendors often are asked to bid on a per platform basis.
These prices can be compared to study results to
evaluate a company’s options and identify incremental
opportunities for service deliver improvement.
19
Ford Motor Company: Supply Chain Strategy
 Case Study :
 Form Motor Company : Supply Chain Strategy
20
Ford Motor Company: Supply Chain Strategy
 What are the roadblocks that make the direct model
difficult to implement at Ford
 What historical “legacies” affect Ford’s ability to move to a
BTO model
• Ford is 100 yrs old Founded 1903, Dell on the other hand
was founded 15 years ago
• Product variety
– Necessitates the management of large number of individual
component inventories
– Production capacity for individual components get set long in
advance and cannot be changed quickly
21
Ford Motor Company: Supply Chain Strategy
 What historical “legacies” affect Ford’s ability to move to
a BTO model
 Process Complexity
•
•
•
•
A large number of suppliers
3 tiers of suppliers
Business was usually over the phone and fax
Ford a $150billion company enjoy a tremendous leverage
over its suppliers
– Annual component price decrease and open book
22
Ford Motor Company: Supply Chain Strategy
 What historical “legacies” affect Ford’s ability to move to
a BTO model
 Powerful independent dealer network
 Unionized labor force
 Incompatible systems
• Ford credit – DEC
• Parts and service – IBM
• Suppliers and dealers – Variety of systems
23
Ford Motor Company: Supply Chain Strategy
 What practical challenges must Ford address as it tries
to establish Internet linkages with its supply base
 Difficulties in establishing B2B linkages
 Lack of technology and technological sophistication that
prevail in the supply chain, especially at lower tiers.
24
Ford Motor Company: Supply Chain Strategy
 How should Ford use Internet technologies to interact
with suppliers
 To address this problem Ford must think about its relationships
not only with suppliers but also with dealers and customers.
 As supply chain systems staff members study the Dell model in
particular, they come to appreciate that “virtual integration” must
include design not only of the supply chain but also of fulfillment,
forecasting, purchasing, and a variety of other functions that had
long been considered separately within the Ford hierarchy.
 The question is in fact explosive in its implications, because it
inevitably leads to fundamental questions about the way Ford
has historically operated internally and how it has interacted with
important partner constituencies (including dealers)
25
Ford Motor Company: Supply Chain Strategy
 Recommendation on moving forward
 One group are enthusiastic about the technology and think
that the only appropriate way to answer the question is to
consider, evaluate and recommend radical changes to
Ford overall business model; this group considers Dell a
serious model for Ford’s business
 Another group is more cautious and believes that the
fundamental differences between Dell’s industry and
Ford’s industry necessitate significant differences in
business models.
26
Ford Motor Company: Supply Chain Strategy
 Recommendation on moving forward
 What is your own recommendation?
27
Chapter Summary
 The following questions should help a company assess
the opportunities and the risks:
 What services within our IT infrastructure are candidates
for incremental outsourcing?
 Where are there opportunities to convert large up-front IT
investments into spread-over-time subscription services?
 Are our service delivery partners technically and financially
capable enough to support our evolving IT service needs?
 Do we have well-defined processes for partner selection
to ensure that we will continue to have highly capable
partners?
28
Chapter Summary
 Do we have detailed service-level agreements in place
with our service providers?
 Have we made sure the SLAs in our service deliver chains
interlock and that incentives are aligned up and down the
chain?
 Do we have systems in place for virtually integrating with
service delivery partners?
 Have we specified contract terms with service providers
that preserve our options for incrementally improving our
infrastructure?
 What our short-term and long-term strategies for dealing
with legacy system issues?
 What systems should we replace, and when should we
replace them?
29
Download