Topic 04. Acquisition Management

advertisement
1242.2219
Information System Economics
IT ACQUISITION
IT ACQUISITION
What is acquired?
 Hardware:
computers
communications
 Software:
applications
operating systems
communications
Personnel:
management
development
operating
IT ACQUISITION
How is it acquired?
 insourcing - DYI
 outsourcing
IT ACQUISITION
The growing importance of outsourcing
"ComNet 2000 Packed With Outsourcing Options"InfoWorld.com (01/25/00);
Jones, Jennifer; Moore, Cathleen
This week's ComNet 2000 show will feature a number of new products and
services aimed at capitalizing on the growing corporate demand
for network outsourcing. AT&T plans to announce outsourcing services for
large clients that do not want to manage their own network operations. ...
Nortel plans to establish a group that will design and manage networking
technology for large customers .... The rising interest in outsourcing stems
from a lack of trained technical workers and the need for IS departments
to devote time to mission-critical programs, experts say.
http://www.networkworld.com/news/2000/0125comnetout.html
IT ACQUISITION
The Process
 determine needs
 insource/outsource decision
 collect information
 evaluate
 select
 contract
IT ACQUISITION
Insourcing vs. Outsourcing:
Hardware
ACQUISITION RESOURCES
Insource
Internal resources for
analysis & capacity planning
planning requirements analysis,
selection etc.
Vendor performs
installation installation &
maintenance
Outsource
Vendor performs
capacity planning,
requirements analysis,
selection, etc.
Vendor performs
installation &
maintenance
Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.”
Communications of The ACM 39, 7 (July 1996):29-44.
IT ACQUISITION
Insourcing vs. Outsourcing:
Software
ACQUISITION RESOURCES
Insource
Outsource
ACQUISITION
SOURCE
Internal resources for Vendor performs
needs analysis,
custom needs analysis,
coding, etc.
coding, etc.
Internal resources for Vendor performs
package package selection,
package selection,
installation, etc.
installation, etc.
Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.”
Communications of The ACM 39, 7 (July 1996):29-44.
IT ACQUISITION
Insourcing vs. Outsourcing:
Operations
RESOURCES
LOCATION
Insource
Own hardware,
in-house software, and
personnel
Outsource
Own hardware, in- or
outsource software
& personnel
Vendor’s hardware &
at vendor’s Vendor’s hardware,
location own personnel, in- or personnel, in- or
outsource software
outsource software.
Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.”
Communications of The ACM 39, 7 (July 1996):29-44.
IT ACQUISITION
Evaluation
Evaluation purposes
 selection evaluation (system exists elsewhere)
 new hardware
 new software
 performance projection (system does not exist elsewhere)
 design new software
 design new hardware
 performance monitoring (system in operation)
 reconfigure hardware
 change software
IT ACQUISITION
Evaluation
Evaluation methods
 kernel programs
 analytic models
 benchmarks
 synthetic programs
 simulation
 performance monitoring
IT ACQUISITION
Evaluation
Evaluation methods – kernel programs
A kernel program is a typical program that has been partially or
completely coded and timed. The timings are based on the
manufacturer’s stated execution times for the instructions that
comprise the kernel program.
Uses: for evaluating machines which do not yet exist;
for time-critical procedures
Disadvantages:
require machine language code;
cannot adequately represent I/O and operating system
interactions
IT ACQUISITION
Evaluation
Evaluation methods – analytic models
An analytic model is a mathematical representation of a
computing system. These are frequently based on queueing
theory.
Uses: for evaluating machines which do not yet exist;
for specific machine components (e.g. a disk drive)
Disadvantages:
cannot capture all aspects of a computer’s functions;
are most effective for higher level analyses – e.g. CPUs or
complete systems
IT ACQUISITION
Evaluation
Evaluation methods - benchmarks
A benchmark is an existing program that is coded in a specific
language and executed on the machine being evaluated.
Uses: esp. for evaluating and comparing potential replacement
machines;
for comparing overall performance of different machines
and architectures
Disadvantages:
expensive;
interpretation problems
IT ACQUISITION
Evaluation
Evaluation methods – benchmark interpretation problems
 suboptimal machine setup
 “tailing”
Machine A
Job I
Job II
Job III
Machine B
Job I
Job II
Job III
time
IT ACQUISITION
Evaluation
Evaluation methods – synthetic programs
Synthetic programs are coded and executed, but differ from
benchmarks in that they do not necessarily exist beforehand.
Like kernel programs, they are not real applications, but they are
coded and they do include I/O considerations and interactions
with the OS environment. Thus, they combine some of the
attributes of benchmarks and of kernel programs.
IT ACQUISITION
Evaluation
Evaluation methods – synthetic programs
Uses: selection – can be designed to include any measurement
parameter of interest;
good for before and after tests before executing changes
Disadvantages:
expensive to prepare;
interpretation problems as with benchmarks;
difficult to develop for online, terminal-based systems
IT ACQUISITION
Evaluation
Evaluation methods - simulation
A simulation is a program which computes the results of
running a real system, based on the characteristics of that
system. It provides insight into the functioning of the system
simulated.
IT ACQUISITION
Evaluation
Evaluation methods - simulation
Uses: projecting outcomes of new designs;
selection – but cost frequently prohibitive
for comparing overall performance of different machines
and architectures
Disadvantages:
expensive;
validation problems – unless real results available for a
similar machine;
need to be adapted for each machine simulated
IT ACQUISITION
Evaluation
Evaluation methods – performance monitoring
Consists of collecting data on an existing machine in order to
locate bottlenecks or to improve system performance.
 hardware monitors
 software monitors
Uses: evaluating and analyzing performance of existing systems;
Disadvantages:
the measurement problem (Heisenberg’s Uncertainty
Principle);
quantities of data generated;
IT ACQUISITION
Evaluation methods – Summary
Purpose of evaluation
Selection
evaluation
Synthetic
Programs,
Benchmarks
primary use
pecondary use
Projected
Design
Simulation,
Analytic
Models
Evaluation Techniques
Performance
Evaluation
Monitors
IT ACQUISITION
Selection
Selection problems:
 multiple alternatives
 “apples vs. oranges”
 approximate measurements
 intangible economics
 human factors
 time
 subjectivity
IT ACQUISITION
Selection
Selection methods:
 ad hoc
 weights and scores
 cost-value
 efficient frontier
 sensitivity analysis
IT ACQUISITION
Selection Methods
weights and scores
1.
determine criteria (ci)
2.
assign a weight to each criterion (wi)
3.
assign score to each criterion (si)
4.
total score = S si wi
IT ACQUISITION
Selection Methods
Weights and scores – major problems
1.criteria set to predetermine solution
2. manipulation of scores
3. meaning of the final result
Partial solutions:
 separate setting criteria and weights from evaluation
 sensitivity analysis
IT ACQUISITION
Selection Methods
Weights and scores – an example
criterion
weight
score
Si Wi
H/W
.25
80
20.0
S/W
.40
75
30.0
Service
.10
85
8.5
Cost
.35
60
21.0
total
1.00
79.5
IT ACQUISITION
Selection Methods
Cost-value: cost is the sole basis for selection
1. determine and evaluate mandatory and
desirable criteria
2. build value templates for “rewarding” or
“fining” over and under performance
3. apply fines and bonuses
4. select lowest cost bid after corrections
IT ACQUISITION
Selection Methods
Cost-value: example of a value template
Criterion: laptop computer weighs 2.5 kg
Over/under weight
value
3.5 kg
+$250
3.0 kg
+$100
2.5 kg
0
2.0 kg
-$150
1.75 kg
-$300
IT ACQUISITION
Selection Methods
Efficient Frontier as a Winnowing Method
Criterion 1
A
B
C
D
G
F
E
Criterion 2
IT ACQUISITION
Selection Methods
Importance of Sensitivity Analysis
Download