Best Practices and Service Models
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
Wincere’s Strategic Partnership Model
6. We act on your behalf and represent you to help in achieving
the results.
5. "Eco...
BEST PRACTICES - CONTROLLED DELIVERY METHODS
3
Confidential-Unauthorized dissemination & distribution is strictly prohibit...
BEST PRACTICES – PROJECT MANAGEMENT - 1
4
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
–...
Software Migration, Porting and Internationalization
5
Confidential-Unauthorized dissemination & distribution is strictly ...
WEEKLY PROJECT CONFERENCE
PHONE CALLS
PROJECT METRICS
DASHBOARD
EMAILS
ACTION TRACKER ANNOUNCEMENTS
ISSUE TRACKER RISK TRA...
Wincere as an Offshore Partner
7
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
Exceed
Cus...
Offshore Infrastructure
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
– Security
– Blende...
Software Technical Support Outsourcing
9
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
Of...
Software
Engineering
Bug Fixes &
Release Patches
Sustaining Software Engineering
10
Confidential-Unauthorized disseminatio...
Team Structure for Dedicated Development Center
11
Confidential-Unauthorized dissemination & distribution is strictly proh...
Transition Plan
12
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
PLANNING TRANSITION
INTE...
Partial List of Clients
Confidential-Unauthorized dissemination & distribution is strictly prohibited.
Upcoming SlideShare
Loading in...5
×

Wincere Best Practices

186

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
186
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wincere Best Practices

  1. 1. Best Practices and Service Models Confidential-Unauthorized dissemination & distribution is strictly prohibited.
  2. 2. Wincere’s Strategic Partnership Model 6. We act on your behalf and represent you to help in achieving the results. 5. "Economy of Scale" allow us to be cost effective and pass along those savings to you. 4. As our preferred client, you receive the highest level of support and commitment from us. 3. Our leadership team has been in your shoes and has an appreciation for the challenges you face. 2. Our benefit/gain of the tied to the client are meeting its objectives. • are needed by the client • we have proven and mature expertise in the areas of need. 1. The foundation of the partnership model is based on validation by the client that our services and products - 7. We are proactively augmenting the efforts of the client in identifying the opportunities to realize improved results. Confidential-Unauthorized dissemination & distribution is strictly prohibited. 2
  3. 3. BEST PRACTICES - CONTROLLED DELIVERY METHODS 3 Confidential-Unauthorized dissemination & distribution is strictly prohibited. A 3-tiered setup consisting of the following environments is being recommended • Development Environment – Development team builds the solution in dedicated servers maintaining the sanity of source code and client facing environments • Staging Environment – The client performs ‘user acceptance testing’ and formally approves the solution as conforms to the specifications • Production Environment – Post successful acceptance of the solution delivered on staging, solution is updated on production environment for end users Production Staging Development Review Upload INDIA
  4. 4. BEST PRACTICES – PROJECT MANAGEMENT - 1 4 Confidential-Unauthorized dissemination & distribution is strictly prohibited. – Project Management Tool – Advanced Visualization, Interaction and Artificial Intelligence (AVIA). – Agile and Scrum development methodology. – Configuration Management for product/solutions versioning and source control. – PMI’s Principals of project management. • Scope, Schedule, Cost, Quality, Risks and Quality management. – PCI Compliance – Quality Compliance and Audits At Wincere, we use industry proven best project management practices to ensure conformance to the requirements for our clients.
  5. 5. Software Migration, Porting and Internationalization 5 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Building The Unicode Support In Products Correcting Byte-order Dependencies Converting ASCII/EBCDIC
  6. 6. WEEKLY PROJECT CONFERENCE PHONE CALLS PROJECT METRICS DASHBOARD EMAILS ACTION TRACKER ANNOUNCEMENTS ISSUE TRACKER RISK TRACKER Global & Integrated Team 6 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Onsite Team Offsite Team • PMO Business Analyst Core Group • Technical Leads System Analyst Functional Head • Development User Interface Data Base Quality Assurance • PMO Business Analyst Core Group • Technical Leads System Analyst Functional Head • Development User Interface Data Base Quality Assurance
  7. 7. Wincere as an Offshore Partner 7 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Exceed Customer Expectation BEST PRACTICES & MATURE PROCESSES HUMAN RESOURCES & SKILL RETENTION – Relationship Management – Knowledge Management – Quality process – Adapting to client-specific QMS – SLA Compliance – ISV Expertise – Training & Multi-skilling – Ethics & Multi-cultural milieu – Retention Strategies PHILOSPHY – Flexible And Reliable Strategic Partner INFRASTRUCTURE – Recruitment Infrastructure – Global Connectivity – Business Continuity – Information Security
  8. 8. Offshore Infrastructure Confidential-Unauthorized dissemination & distribution is strictly prohibited. – Security – Blended Telephony Architecture – Fully Redundant Data Infrastructure – Power – Data Center – User End – Dedicated Lab – Servers, Desktops – Data Storage Located in prime areas in the cities of Hyderabad and Noida, our offices occupy a convenient position with quick access to the Airport, Government Offices, Hitec City, etc. 8
  9. 9. Software Technical Support Outsourcing 9 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Offer a complete package, including email support, voice support and online technical support to clients Knowledge Bank Support Tool QA & Testing Tools for Request Tracking Support Helpdesk Status Reposting Online Personal (If required) Client Side Personalized Account Manager Escalation Medium
  10. 10. Software Engineering Bug Fixes & Release Patches Sustaining Software Engineering 10 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Sustaining Software engineering Services includes Maintenance Of The Code Base Continuous Integration Custom Enhancement End-of –Life Product Support Acting As Feedback Mechanism Retrofitting Security Patches
  11. 11. Team Structure for Dedicated Development Center 11 Confidential-Unauthorized dissemination & distribution is strictly prohibited. Onsite Projects – Analysis and Planning – High level Design – User Interface Design – Project Co-ordination – Onsite Testing – Implementation Post Implementation Support – Rapid Reaction Support Offsite Projects – Management – Detailed Design – Coding – Testing – Documentation Post Implementation Support – Bug Fixes – Warranty Support – Maintenance 20-30% Effort 70-80% Effort – Intelligent Project Breakdown – Leverage Extended Workday – Leverage Cost Efficiencies
  12. 12. Transition Plan 12 Confidential-Unauthorized dissemination & distribution is strictly prohibited. PLANNING TRANSITION INTEGRATED SOLUTION DELIVERY PROCESS CONTROLS O N S I T E Identify Skills Setup Team Onsite Assessment & Planning Knowledge Transfer Development Blended Support Project Management Configuration Management Incident Management O F F S H O R E Requirements Deliverables Knowledge Acquisition Infrastructure Set-up Ongoing Offshore Operations
  13. 13. Partial List of Clients Confidential-Unauthorized dissemination & distribution is strictly prohibited.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×