Your SlideShare is downloading. ×
0
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Information Tech & Heavy Industry
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Information Tech & Heavy Industry

1,241

Published on

Information Tech & Heavy Industry

Information Tech & Heavy Industry

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,241
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Information Technology Management Orlando Moreno omoreno@hotmail.com 408.656.2498
  • 2. Operations Budget Elements  Hardw are  Softw are  I T, Com m unication and equipm ent  Data center AND personnel  Disaster recovery planning  Security  I nvention AND Collaboration omoreno@hotmail.com 408.656.2498 2
  • 3. Operations Problems Solutions  Technology  Continuously fight fires and rearrange priorities - getting people to solve the problem at hand  Continuously docum ent and m easure w hat is done so as to find the real solutions, not just the apparent ones omoreno@hotmail.com 408.656.2498 3
  • 4. Applications Characteristics  Functional quality of the applications, measured by how they meet user needs  Technical quality of the applications, measured by how easy they are to maintain and how efficiently they run  Application age and life ex pectancy  P ortfolio coverage , measured by how much work that can be automated is automated omoreno@hotmail.com 408.656.2498 4
  • 5. 5-step Automation Process 1.- Define areas of hum an intervention and divide them into:  Procedures that are easy to eliminate  Procedures that are hard to eliminate 2.-Define instructions that could be added to application softw are to elim inate procedures identified in previous step omoreno@hotmail.com 408.656.2498 5
  • 6. 5-step Automation Process 3.- Agree on a m ethod to incorporate the new instructions into new applications and into all changes m ade to ex isting applications 4.- I solate the easy-to-im plem ent instructions into projects and ex ecute them 5.- W hen unattended operation appears easy to achieve, organize a project to do it. omoreno@hotmail.com 408.656.2498 6
  • 7. Drivers of Outsourcing  Focus on core business  Value based on their discounted cash flow (shareholder value) omoreno@hotmail.com 408.656.2498 7
  • 8. Customer-vendor Relationships  Buying their professional value (planning or consulting, building or maintaining applications, building or maintaining networks, and training)  Buying their products (may or may not include training)  Buying their transactions (checks, or credit reports) omoreno@hotmail.com 408.656.2498 8
  • 9. Customer-vendor Relationships  Using a system s integrator , to generally handle some turnkey solutions and projects  Outsourcing , where the outsource provider contracts to handle all or certain information systems  Systems integration is project based; outsourcing is time-based omoreno@hotmail.com 408.656.2498 9
  • 10. Outsourcing Changes  Strategic view of outsourcing  Selective outsourcing  Transform ational outsourcing  Outsourcing application developm ent  “One stop shopping” approach to outsourcing omoreno@hotmail.com 408.656.2498 10
  • 11. Outsourcing Changes  Strategic view of outsourcing -  Outsourcing now an accepted practice  Now a way to improve competitive position often resulting in major restructuring  This restructuring results in mega-deals and full- service outsourcing omoreno@hotmail.com 408.656.2498 11
  • 12. Outsourcing Changes  Selective outsourcing  Only specific areas of the IS department outsourced  Deals are short termed (2-5 years) as opposed to strategic deals (5-10 years)  Driving forces are lack of skills and desire to offload non-core competency areas to providers omoreno@hotmail.com 408.656.2498 12
  • 13. Outsourcing Changes  Transform ational outsourcing  Assistance in bridging gap between in-place infrastructure (mainframe based) and the desired future environment (client/server based)  Companies’ willingness to admit failure (success is based on the client’s expectations)  Some restructuring of a large number of deals seems to be in the offing omoreno@hotmail.com 408.656.2498 13
  • 14. Outsourcing Changes  Outsourcing applications developm ent  Idea that applications were competitive edge is dying  Now better to get applications built faster because competitive edge comes from begin first  Sometimes speedy development can only come from outsource providers omoreno@hotmail.com 408.656.2498 14
  • 15. Outsourcing Changes  ‘ One-stop Shopping’ approach  Firms use it when they outsource infrastructure functions (LAN operation, desktop, mainframes) along with a “best of breed” approach when outsourcing applications  Client and prime contractor seek a partnering relationship than a customer/supplier relationship omoreno@hotmail.com 408.656.2498 15
  • 16. Key Questions  W hich I S activities are strategic?  W ill outsourcing save at least 15% ?  Does our firm have access to the needed technology and ex pertise?  Does outsourcing increase our firm ’s flex ibility? omoreno@hotmail.com 408.656.2498 16
  • 17. Key Questions  Is the vendor likely to exist in five year's time?. If not, you and your subscribers may find yourself stranded with an obsolete, unsupported billing system.  Is the system fully integrated or does it rely on patching components from several different vendors, which increases implementation and support costs and complexity? omoreno@hotmail.com 408.656.2498 17
  • 18. Key Questions  Can the system translate easily to the languages of your country, without additional expensive and time- consuming coding?  Does the system deliver true customer care enabling, for example, at least 60 per cent of queries to Customer Service Representatives to be answered from the first screen seen by the contact centre agent? omoreno@hotmail.com 408.656.2498 18
  • 19. Network Management  Fault handing  P erform ance m onitoring  change m anagem ent  Tactical planning  Cost control omoreno@hotmail.com 408.656.2498 19
  • 20. Net Management Trends  I ntegrated net m anagem ent is a m ajor goal  M anagem ent of distributed applications on horizon  Autom ation of netw ork operations on increase  Outsourcing of netw ork m anagem ent on increase omoreno@hotmail.com 408.656.2498 20
  • 21. Internet Security  Use layered approached  Begins at the internet connection device (router)  Screening router can be used to verify the source as well as the destination of every packet sent to the corporate network by packet filtering omoreno@hotmail.com 408.656.2498 21
  • 22. Internet Security  P rotect against 5 kinds of attacks  Eavesdropping  Password sniffing  Data Modification  Spoofing  Repudiation omoreno@hotmail.com 408.656.2498 22
  • 23. Internet Security  Firew alls provide access protection but do not ensure end-to-end transaction security  Cryptographic protocols used to provide security on the Net  Another m ethod is to secure the data in individual transactions and not w orry about securing the Net omoreno@hotmail.com 408.656.2498 23
  • 24. Disaster Recovery  Create an effective disaster plan  Learn the strengths of different data backup system s  M ak e use of vaulted back ups  R ecover e-m ail services  Defend system s from attack  Lead and m anage effectively during tim es of crises omoreno@hotmail.com 408.656.2498 24
  • 25. Internal Disaster Recovery  M ultiple data centers  Backup telecom m unications facilities  Build duplicate communication facilities  Use alternate technologies that re-deploy in case of an emergency  Local area netw orks (servers backup servers) omoreno@hotmail.com 408.656.2498 25
  • 26. External Disaster Recovery  I ntegrated disaster recovery services  Specialized disaster recovery services  On-line and off-line data storage facilities  Service bureaus, consortia and inform al cooperative arrangem ents omoreno@hotmail.com 408.656.2498 26
  • 27. Questions Orlando Moreno omoreno@hotmail.com 772-679-3997 omoreno@hotmail.com 408.656.2498 27

×