SlideShare a Scribd company logo
1 of 26
Information
Systems
Management
• Making wise infrastructure investments
• Choosing and coordinating infrastructure
components
• Dealing with infrastructure change
• Management and governance
Management Challenges
Spending on Infrastructure
Total cost of
ownership
Starting out
small
Competitive
forces model
Competitive Forces Model
Question 1
Assume that you are an executive in a
multi-national Insurance company.
Discuss how you are going to develop
and manage a workable and powerful IT
infrastructure for your company using
this model.
1. Market demand for the firm’s
customers, supplier &
employees
➜ Different categories of customers &
employees
➜ Make an inventory of the services
provide for customers, employees
➜ Survey each group
➜ Find out services provide for them
are meeting with the needs of each
group
2. The firm’s business strategy
➜ Analyze the company for
particular time period - five
years business strategy
➜ Try to assess what are the
new services and capabilities
required to achieve company
goals
3. The firm’s IT strategy,
infrastructure and cost
➜ Examine the information
technology plans - next five years
➜ Asses its alignment with company’s
business plan
➜ Determine total IT Infrastructure
cost
➜ Total Cost ownership analysis can
be performed
4. Assessment of the firm’s
current Information
technology
➜ Check whether the firm is behind the
technology curve or at the bleeding
edge of IT
➜ Not advisable to spend resources on
advanced technologies that are still
experimental, expensive &
unreliable
➜ Spend on technologies which have
standards and IT vendors are
competing on cost, not design, and
where there are multiple suppliers
5. Services of Competitor firms
➜ What technology services are offered
by the customers to their competitors
& employees
➜ Quantitative & qualitative methods
to compare them with your company
➜ If the service level is law - the
company is in a competitive
disadvantage
➜ Looks on the possible ways to
improve the service level
6. Competitor firm IT
infrastructure investments
and returns on investments
➜ Gain a good idea of how much
you and your competitor firms
are spending on IT infrastructure
➜ What you are receiving in return
➜ How your competitive position
might be improved
Components of TCO
Hardware
acquisition
Software
acquisition
Training
Support
Space and
energy
Downtime
Infrastructure
Maintenance
Question 2
Discuss how you are going to
use this model to find out the
best option using a real life
example.
Question 3
Discuss how you would
approach this acquisition
process by using the above
model as your guide.
Five Major Steps in IS Acquisition
1.Project identification, justification and
planning
➜ Should align the business process with the
company objectives
➜ Should consider the overall strategy
➜ Specific process may need to be prioritized
➜ Process should be carefully analyzed
➜ Investment
2. IT architecture
➜ The purpose of the IT Architecture
➜ Identify what is compatible with the current
system
2. IT architecture
➜ How well the new IS resources we plan to
implement could integrate with the current
business processes
➜ Whether they are comply with the rules and
policies.
➜ We have to consider about feasibility in
technical, operational, cultural, legal,
economical, etc
➜ Build
➜ Buy
➜ Lease
Acquisition and Development.
Acquisition and Development.
➜ How does one know how to select the best
acquisition option???
➜ The advantages and disadvantages of each plan
➜ How well will the option fit with the organizations
business plan
➜ Organizations capabilities
➜ What impact will it have
➜ Cost/Benefit and risk analysis
Testing Installation and
Integration
➜ Testing
• Verify and validate acquired resources
➜ Installation & Integration
• Correctly introduced to the environment and
properly integrated with existing system
➜ Training
• The users need to be trained appropriately in
order to use the new acquisition effectively
Testing Installation and
Integration.
➜ Security
• Make sure appropriate controls are developed
and put in place
• Make sure proper recovery policies are in
place
• Make users aware of the controls and place
and how to adhere to them
Operations Maintenance and
Updating
➜ The phase in which the software is released to
operate in the production environment
➜ Change management
➜ The acquired resources need to be monitored,
sustained and supported as needed. (Benefit
realization)
Further
Discussion
Buy vs. Lease
Assume your company is planning on
implementing a new accounting
package. Discuss the buy and lease
options for the new system

More Related Content

What's hot

Strategic sourcing
Strategic sourcingStrategic sourcing
Strategic sourcingNathan
 
Insourcing vs outsourcing ppt by iccs bpo
Insourcing vs outsourcing ppt by iccs bpoInsourcing vs outsourcing ppt by iccs bpo
Insourcing vs outsourcing ppt by iccs bpoICCS BPO
 
Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Karthik Arumugham
 
Product Management Lifecycle
Product Management LifecycleProduct Management Lifecycle
Product Management LifecycleSameer Paradia
 
World Class Procurement
World Class ProcurementWorld Class Procurement
World Class Procurementmwekesser
 
Operation strategyppt
Operation strategyppt Operation strategyppt
Operation strategyppt Venkat Krish
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsBarcoding, Inc.
 
The W Group Vendor Management Practice
The W Group   Vendor Management PracticeThe W Group   Vendor Management Practice
The W Group Vendor Management Practicemohara7750
 
CSCM Chapter 8 outsourcing cscm
CSCM Chapter 8 outsourcing cscmCSCM Chapter 8 outsourcing cscm
CSCM Chapter 8 outsourcing cscmEst
 
How to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programHow to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programJeff Kubacki
 
Vendor Management Systems Best Practices
Vendor Management Systems Best PracticesVendor Management Systems Best Practices
Vendor Management Systems Best Practicesjeffmonaghan
 
IT Hardware Sourcing – Case Studies
IT Hardware Sourcing – Case StudiesIT Hardware Sourcing – Case Studies
IT Hardware Sourcing – Case StudiesMehul Vora
 
31185020 purchasing-and-vendor-management-lecture-6
31185020 purchasing-and-vendor-management-lecture-631185020 purchasing-and-vendor-management-lecture-6
31185020 purchasing-and-vendor-management-lecture-6sneha dwivedi
 
Chapter 10 Outsourcing
Chapter 10 OutsourcingChapter 10 Outsourcing
Chapter 10 OutsourcingTran Thang
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
CSCM Chapter 6 sourcing cscm revised
CSCM Chapter 6 sourcing cscm revisedCSCM Chapter 6 sourcing cscm revised
CSCM Chapter 6 sourcing cscm revisedEst
 

What's hot (20)

Strategic sourcing
Strategic sourcingStrategic sourcing
Strategic sourcing
 
Insourcing vs outsourcing ppt by iccs bpo
Insourcing vs outsourcing ppt by iccs bpoInsourcing vs outsourcing ppt by iccs bpo
Insourcing vs outsourcing ppt by iccs bpo
 
Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012Gartner using itfm_to_improve_biz_results_2012
Gartner using itfm_to_improve_biz_results_2012
 
Product Management Lifecycle
Product Management LifecycleProduct Management Lifecycle
Product Management Lifecycle
 
Mis 4
Mis 4Mis 4
Mis 4
 
World Class Procurement
World Class ProcurementWorld Class Procurement
World Class Procurement
 
Operation strategyppt
Operation strategyppt Operation strategyppt
Operation strategyppt
 
Erp
ErpErp
Erp
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
The W Group Vendor Management Practice
The W Group   Vendor Management PracticeThe W Group   Vendor Management Practice
The W Group Vendor Management Practice
 
Price value ppt
Price value pptPrice value ppt
Price value ppt
 
CSCM Chapter 8 outsourcing cscm
CSCM Chapter 8 outsourcing cscmCSCM Chapter 8 outsourcing cscm
CSCM Chapter 8 outsourcing cscm
 
How to implement a strategic IT vendor management program
How to implement a strategic IT vendor management programHow to implement a strategic IT vendor management program
How to implement a strategic IT vendor management program
 
Vendor Management Systems Best Practices
Vendor Management Systems Best PracticesVendor Management Systems Best Practices
Vendor Management Systems Best Practices
 
IT Hardware Sourcing – Case Studies
IT Hardware Sourcing – Case StudiesIT Hardware Sourcing – Case Studies
IT Hardware Sourcing – Case Studies
 
31185020 purchasing-and-vendor-management-lecture-6
31185020 purchasing-and-vendor-management-lecture-631185020 purchasing-and-vendor-management-lecture-6
31185020 purchasing-and-vendor-management-lecture-6
 
Vendor Management
Vendor ManagementVendor Management
Vendor Management
 
Chapter 10 Outsourcing
Chapter 10 OutsourcingChapter 10 Outsourcing
Chapter 10 Outsourcing
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
CSCM Chapter 6 sourcing cscm revised
CSCM Chapter 6 sourcing cscm revisedCSCM Chapter 6 sourcing cscm revised
CSCM Chapter 6 sourcing cscm revised
 

Viewers also liked

Manejo del estres
Manejo del estresManejo del estres
Manejo del estresEstef29
 
Taking Action on Behavioral Data
Taking Action on Behavioral DataTaking Action on Behavioral Data
Taking Action on Behavioral DataJornaya
 
07 violenciagenero arcas
07 violenciagenero arcas07 violenciagenero arcas
07 violenciagenero arcasmonica ARCAS
 
SKMBT_C55015090219061_0005
SKMBT_C55015090219061_0005SKMBT_C55015090219061_0005
SKMBT_C55015090219061_0005Maha Habli
 
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...srinivasanece7
 
Alteraciones en la imagen corporal
Alteraciones en la imagen corporalAlteraciones en la imagen corporal
Alteraciones en la imagen corporalmonica ARCAS
 
Inscripciones curso alimentación e hidratacion saludable
Inscripciones curso alimentación e hidratacion saludableInscripciones curso alimentación e hidratacion saludable
Inscripciones curso alimentación e hidratacion saludableCris Rodriguez
 
metrics driven design/ how to define just right kpi for mobile game
metrics driven design/ how to define just right kpi for mobile gamemetrics driven design/ how to define just right kpi for mobile game
metrics driven design/ how to define just right kpi for mobile gameLeo Cui
 
The effects of heat input and interpass temperature on the microstructure of ...
The effects of heat input and interpass temperature on the microstructure of ...The effects of heat input and interpass temperature on the microstructure of ...
The effects of heat input and interpass temperature on the microstructure of ...Mark Keeler
 

Viewers also liked (12)

Manejo del estres
Manejo del estresManejo del estres
Manejo del estres
 
Taking Action on Behavioral Data
Taking Action on Behavioral DataTaking Action on Behavioral Data
Taking Action on Behavioral Data
 
07 violenciagenero arcas
07 violenciagenero arcas07 violenciagenero arcas
07 violenciagenero arcas
 
UnyCloud
UnyCloudUnyCloud
UnyCloud
 
SKMBT_C55015090219061_0005
SKMBT_C55015090219061_0005SKMBT_C55015090219061_0005
SKMBT_C55015090219061_0005
 
Recuerdos
RecuerdosRecuerdos
Recuerdos
 
36
3636
36
 
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
 
Alteraciones en la imagen corporal
Alteraciones en la imagen corporalAlteraciones en la imagen corporal
Alteraciones en la imagen corporal
 
Inscripciones curso alimentación e hidratacion saludable
Inscripciones curso alimentación e hidratacion saludableInscripciones curso alimentación e hidratacion saludable
Inscripciones curso alimentación e hidratacion saludable
 
metrics driven design/ how to define just right kpi for mobile game
metrics driven design/ how to define just right kpi for mobile gamemetrics driven design/ how to define just right kpi for mobile game
metrics driven design/ how to define just right kpi for mobile game
 
The effects of heat input and interpass temperature on the microstructure of ...
The effects of heat input and interpass temperature on the microstructure of ...The effects of heat input and interpass temperature on the microstructure of ...
The effects of heat input and interpass temperature on the microstructure of ...
 

Similar to Is management

Chap4_Requirements_Elicitation and Collaboration.pptx
Chap4_Requirements_Elicitation and Collaboration.pptxChap4_Requirements_Elicitation and Collaboration.pptx
Chap4_Requirements_Elicitation and Collaboration.pptxJaymin Mistry
 
WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdfssuser590cc81
 
From Good MI to Leading BI v2
From Good MI to Leading BI v2From Good MI to Leading BI v2
From Good MI to Leading BI v2Craig Fletcher
 
Practical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemPractical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemKetan Parekh
 
ITM business barriers.pptx
ITM  business barriers.pptxITM  business barriers.pptx
ITM business barriers.pptxrajalakshmi5921
 
Assessing Strengths and Weaknesses
Assessing Strengths and WeaknessesAssessing Strengths and Weaknesses
Assessing Strengths and WeaknessesSalih Islam
 
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnWHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnRohitKumar639388
 
E-Tourism - Strategic Hospitality Technology Investment
E-Tourism - Strategic Hospitality Technology InvestmentE-Tourism - Strategic Hospitality Technology Investment
E-Tourism - Strategic Hospitality Technology InvestmentFaindra Jabbar
 
SQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationSQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationMatthew W. Bowers
 
benchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbenchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbehaylu3
 
benchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbenchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbehaylu3
 

Similar to Is management (20)

Chap4_Requirements_Elicitation and Collaboration.pptx
Chap4_Requirements_Elicitation and Collaboration.pptxChap4_Requirements_Elicitation and Collaboration.pptx
Chap4_Requirements_Elicitation and Collaboration.pptx
 
Benchmarking
BenchmarkingBenchmarking
Benchmarking
 
WEEK2-Analyzing the Business Case.pdf
WEEK2-Analyzing the    Business Case.pdfWEEK2-Analyzing the    Business Case.pdf
WEEK2-Analyzing the Business Case.pdf
 
From Good MI to Leading BI v2
From Good MI to Leading BI v2From Good MI to Leading BI v2
From Good MI to Leading BI v2
 
Internal analysis
Internal analysisInternal analysis
Internal analysis
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
Erp
ErpErp
Erp
 
Practical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management systemPractical tips for implementing corporate performance management system
Practical tips for implementing corporate performance management system
 
Chapter 12 developiong business&it solutions
Chapter 12  developiong business&it solutionsChapter 12  developiong business&it solutions
Chapter 12 developiong business&it solutions
 
ISBB_Chapter8.pptx
ISBB_Chapter8.pptxISBB_Chapter8.pptx
ISBB_Chapter8.pptx
 
ISBB_Chapter8.pptx
ISBB_Chapter8.pptxISBB_Chapter8.pptx
ISBB_Chapter8.pptx
 
ITM business barriers.pptx
ITM  business barriers.pptxITM  business barriers.pptx
ITM business barriers.pptx
 
Benchmarking
BenchmarkingBenchmarking
Benchmarking
 
Assessing Strengths and Weaknesses
Assessing Strengths and WeaknessesAssessing Strengths and Weaknesses
Assessing Strengths and Weaknesses
 
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjnWHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
WHAT IS BUSINESS ANALYTICS um hj mnjh nit 1 ppt only kjjn
 
ISC Brochure
ISC BrochureISC Brochure
ISC Brochure
 
E-Tourism - Strategic Hospitality Technology Investment
E-Tourism - Strategic Hospitality Technology InvestmentE-Tourism - Strategic Hospitality Technology Investment
E-Tourism - Strategic Hospitality Technology Investment
 
SQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationSQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 Presentation
 
benchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbenchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdf
 
benchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdfbenchmarking-12517018313111-phpapp01.pdf
benchmarking-12517018313111-phpapp01.pdf
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Is management

  • 2. • Making wise infrastructure investments • Choosing and coordinating infrastructure components • Dealing with infrastructure change • Management and governance Management Challenges
  • 3. Spending on Infrastructure Total cost of ownership Starting out small Competitive forces model
  • 5. Question 1 Assume that you are an executive in a multi-national Insurance company. Discuss how you are going to develop and manage a workable and powerful IT infrastructure for your company using this model.
  • 6. 1. Market demand for the firm’s customers, supplier & employees ➜ Different categories of customers & employees ➜ Make an inventory of the services provide for customers, employees ➜ Survey each group ➜ Find out services provide for them are meeting with the needs of each group
  • 7. 2. The firm’s business strategy ➜ Analyze the company for particular time period - five years business strategy ➜ Try to assess what are the new services and capabilities required to achieve company goals
  • 8. 3. The firm’s IT strategy, infrastructure and cost ➜ Examine the information technology plans - next five years ➜ Asses its alignment with company’s business plan ➜ Determine total IT Infrastructure cost ➜ Total Cost ownership analysis can be performed
  • 9. 4. Assessment of the firm’s current Information technology ➜ Check whether the firm is behind the technology curve or at the bleeding edge of IT ➜ Not advisable to spend resources on advanced technologies that are still experimental, expensive & unreliable ➜ Spend on technologies which have standards and IT vendors are competing on cost, not design, and where there are multiple suppliers
  • 10. 5. Services of Competitor firms ➜ What technology services are offered by the customers to their competitors & employees ➜ Quantitative & qualitative methods to compare them with your company ➜ If the service level is law - the company is in a competitive disadvantage ➜ Looks on the possible ways to improve the service level
  • 11. 6. Competitor firm IT infrastructure investments and returns on investments ➜ Gain a good idea of how much you and your competitor firms are spending on IT infrastructure ➜ What you are receiving in return ➜ How your competitive position might be improved
  • 13. Question 2 Discuss how you are going to use this model to find out the best option using a real life example.
  • 14.
  • 15. Question 3 Discuss how you would approach this acquisition process by using the above model as your guide.
  • 16. Five Major Steps in IS Acquisition
  • 17. 1.Project identification, justification and planning ➜ Should align the business process with the company objectives ➜ Should consider the overall strategy ➜ Specific process may need to be prioritized ➜ Process should be carefully analyzed ➜ Investment
  • 18. 2. IT architecture ➜ The purpose of the IT Architecture ➜ Identify what is compatible with the current system
  • 19. 2. IT architecture ➜ How well the new IS resources we plan to implement could integrate with the current business processes ➜ Whether they are comply with the rules and policies. ➜ We have to consider about feasibility in technical, operational, cultural, legal, economical, etc
  • 20. ➜ Build ➜ Buy ➜ Lease Acquisition and Development.
  • 21. Acquisition and Development. ➜ How does one know how to select the best acquisition option??? ➜ The advantages and disadvantages of each plan ➜ How well will the option fit with the organizations business plan ➜ Organizations capabilities ➜ What impact will it have ➜ Cost/Benefit and risk analysis
  • 22. Testing Installation and Integration ➜ Testing • Verify and validate acquired resources ➜ Installation & Integration • Correctly introduced to the environment and properly integrated with existing system ➜ Training • The users need to be trained appropriately in order to use the new acquisition effectively
  • 23. Testing Installation and Integration. ➜ Security • Make sure appropriate controls are developed and put in place • Make sure proper recovery policies are in place • Make users aware of the controls and place and how to adhere to them
  • 24. Operations Maintenance and Updating ➜ The phase in which the software is released to operate in the production environment ➜ Change management ➜ The acquired resources need to be monitored, sustained and supported as needed. (Benefit realization)
  • 26. Buy vs. Lease Assume your company is planning on implementing a new accounting package. Discuss the buy and lease options for the new system