Information Tech & Heavy Industry


Published on

Information Tech & Heavy Industry

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Information Tech & Heavy Industry

  1. 1. Information Technology Management Orlando Moreno 408.656.2498
  2. 2. Operations Budget Elements  Hardw are  Softw are  I T, Com m unication and equipm ent  Data center AND personnel  Disaster recovery planning  Security  I nvention AND Collaboration 408.656.2498 2
  3. 3. Operations Problems Solutions  Technology  Continuously fight fires and rearrange priorities - getting people to solve the problem at hand  Continuously docum ent and m easure w hat is done so as to find the real solutions, not just the apparent ones 408.656.2498 3
  4. 4. Applications Characteristics  Functional quality of the applications, measured by how they meet user needs  Technical quality of the applications, measured by how easy they are to maintain and how efficiently they run  Application age and life ex pectancy  P ortfolio coverage , measured by how much work that can be automated is automated 408.656.2498 4
  5. 5. 5-step Automation Process 1.- Define areas of hum an intervention and divide them into:  Procedures that are easy to eliminate  Procedures that are hard to eliminate 2.-Define instructions that could be added to application softw are to elim inate procedures identified in previous step 408.656.2498 5
  6. 6. 5-step Automation Process 3.- Agree on a m ethod to incorporate the new instructions into new applications and into all changes m ade to ex isting applications 4.- I solate the easy-to-im plem ent instructions into projects and ex ecute them 5.- W hen unattended operation appears easy to achieve, organize a project to do it. 408.656.2498 6
  7. 7. Drivers of Outsourcing  Focus on core business  Value based on their discounted cash flow (shareholder value) 408.656.2498 7
  8. 8. Customer-vendor Relationships  Buying their professional value (planning or consulting, building or maintaining applications, building or maintaining networks, and training)  Buying their products (may or may not include training)  Buying their transactions (checks, or credit reports) 408.656.2498 8
  9. 9. Customer-vendor Relationships  Using a system s integrator , to generally handle some turnkey solutions and projects  Outsourcing , where the outsource provider contracts to handle all or certain information systems  Systems integration is project based; outsourcing is time-based 408.656.2498 9
  10. 10. Outsourcing Changes  Strategic view of outsourcing  Selective outsourcing  Transform ational outsourcing  Outsourcing application developm ent  “One stop shopping” approach to outsourcing 408.656.2498 10
  11. 11. Outsourcing Changes  Strategic view of outsourcing -  Outsourcing now an accepted practice  Now a way to improve competitive position often resulting in major restructuring  This restructuring results in mega-deals and full- service outsourcing 408.656.2498 11
  12. 12. Outsourcing Changes  Selective outsourcing  Only specific areas of the IS department outsourced  Deals are short termed (2-5 years) as opposed to strategic deals (5-10 years)  Driving forces are lack of skills and desire to offload non-core competency areas to providers 408.656.2498 12
  13. 13. Outsourcing Changes  Transform ational outsourcing  Assistance in bridging gap between in-place infrastructure (mainframe based) and the desired future environment (client/server based)  Companies’ willingness to admit failure (success is based on the client’s expectations)  Some restructuring of a large number of deals seems to be in the offing 408.656.2498 13
  14. 14. Outsourcing Changes  Outsourcing applications developm ent  Idea that applications were competitive edge is dying  Now better to get applications built faster because competitive edge comes from begin first  Sometimes speedy development can only come from outsource providers 408.656.2498 14
  15. 15. Outsourcing Changes  ‘ One-stop Shopping’ approach  Firms use it when they outsource infrastructure functions (LAN operation, desktop, mainframes) along with a “best of breed” approach when outsourcing applications  Client and prime contractor seek a partnering relationship than a customer/supplier relationship 408.656.2498 15
  16. 16. Key Questions  W hich I S activities are strategic?  W ill outsourcing save at least 15% ?  Does our firm have access to the needed technology and ex pertise?  Does outsourcing increase our firm ’s flex ibility? 408.656.2498 16
  17. 17. Key Questions  Is the vendor likely to exist in five year's time?. If not, you and your subscribers may find yourself stranded with an obsolete, unsupported billing system.  Is the system fully integrated or does it rely on patching components from several different vendors, which increases implementation and support costs and complexity? 408.656.2498 17
  18. 18. Key Questions  Can the system translate easily to the languages of your country, without additional expensive and time- consuming coding?  Does the system deliver true customer care enabling, for example, at least 60 per cent of queries to Customer Service Representatives to be answered from the first screen seen by the contact centre agent? 408.656.2498 18
  19. 19. Network Management  Fault handing  P erform ance m onitoring  change m anagem ent  Tactical planning  Cost control 408.656.2498 19
  20. 20. Net Management Trends  I ntegrated net m anagem ent is a m ajor goal  M anagem ent of distributed applications on horizon  Autom ation of netw ork operations on increase  Outsourcing of netw ork m anagem ent on increase 408.656.2498 20
  21. 21. Internet Security  Use layered approached  Begins at the internet connection device (router)  Screening router can be used to verify the source as well as the destination of every packet sent to the corporate network by packet filtering 408.656.2498 21
  22. 22. Internet Security  P rotect against 5 kinds of attacks  Eavesdropping  Password sniffing  Data Modification  Spoofing  Repudiation 408.656.2498 22
  23. 23. Internet Security  Firew alls provide access protection but do not ensure end-to-end transaction security  Cryptographic protocols used to provide security on the Net  Another m ethod is to secure the data in individual transactions and not w orry about securing the Net 408.656.2498 23
  24. 24. Disaster Recovery  Create an effective disaster plan  Learn the strengths of different data backup system s  M ak e use of vaulted back ups  R ecover e-m ail services  Defend system s from attack  Lead and m anage effectively during tim es of crises 408.656.2498 24
  25. 25. Internal Disaster Recovery  M ultiple data centers  Backup telecom m unications facilities  Build duplicate communication facilities  Use alternate technologies that re-deploy in case of an emergency  Local area netw orks (servers backup servers) 408.656.2498 25
  26. 26. External Disaster Recovery  I ntegrated disaster recovery services  Specialized disaster recovery services  On-line and off-line data storage facilities  Service bureaus, consortia and inform al cooperative arrangem ents 408.656.2498 26
  27. 27. Questions Orlando Moreno 772-679-3997 408.656.2498 27