Demand & Supply Management in a Multi-Sourcing Environment


Published on

Presentation given by Jean-Pierre Beelen at Apeldoorn IT on 21 January 2008

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Demand & Supply Management in a Multi-Sourcing Environment

    1. 1. Demand & Supply Management in a Multi-Sourcing Environment Jean-Pierre Beelen Managing / Principal Consultant ICT as strategic enabler for high performance
    2. 2. Introduction <ul><li>Jean-Pierre Beelen </li></ul><ul><ul><li>Managing / Principal Consultant Getronics </li></ul></ul><ul><ul><li>Lecturer </li></ul></ul><ul><ul><li>Background </li></ul></ul><ul><ul><ul><li>Business Informatics </li></ul></ul></ul><ul><ul><ul><li>> 20 years in ICT Management </li></ul></ul></ul><ul><ul><ul><li>> 15 years in (Sales)Consultancy </li></ul></ul></ul><ul><ul><ul><li>> 5 years in Solution / Services Marketing </li></ul></ul></ul><ul><ul><li>Specialism </li></ul></ul><ul><ul><ul><li>Business Development and Innovation </li></ul></ul></ul><ul><ul><ul><li>Marketing and Portfolio analysis </li></ul></ul></ul><ul><ul><ul><li>Aligning Business & IT Management </li></ul></ul></ul>
    3. 4. Wat is de helft? <ul><li>8 </li></ul>
    4. 6. Agenda 29 May 2009 Getronics Confidential Page Maturity
    5. 7. <ul><li>Virtualization </li></ul><ul><li>ILM </li></ul><ul><li>Remote management </li></ul><ul><li>Infoscape </li></ul><ul><li>Smarts </li></ul><ul><li>SOA’s </li></ul>Using others data Guaranteed Availability Working with cost effective data Reducing active data Assuring business continuity Integration across the datacenter Automating Business Processes Integration across Business applications Infrastructure Maturity Level Source: EMC Data Availability Networked Storage Tiered Storage Archiving BURA Datacenter Automation Model Based Management Information Supply Chains Enabling data mobility & Central management <ul><li>SAN / NAS solutions </li></ul>Replication & restore solutions <ul><li>Replication tools </li></ul><ul><li>Synchroon / Asynchroon </li></ul><ul><li>Mirroring, etc </li></ul>Add value to consolidation: define multi tier storage <ul><li>Data classification </li></ul><ul><li>Multi tier storage </li></ul><ul><li>Define archive tier </li></ul>Active archive creation <ul><li>CAS </li></ul><ul><li>Migrations </li></ul><ul><li>Policies </li></ul>Next generation Backup <ul><li>BU to disk </li></ul><ul><li>Incremental BU </li></ul>
    6. 8. <ul><li>Business Object integration </li></ul><ul><li>Process Optimization </li></ul>Growing Infrastructure Requirements Working together Having a Secure repository Consistent organization Guaranteeing relevancy Collaborative working Integration across the enterprise Integration across enterprise applications Automating Business Processes Content Maturity Level Source: EMC Document Management Collaboration Workflow management Archiving Enterprise Content Enabling document sharing <ul><li>e-rooms </li></ul><ul><li>Roles and privileges </li></ul>Metadata Repository <ul><li>Status </li></ul><ul><li>Approvals </li></ul><ul><li>Version management </li></ul>Add value to document processing and approving <ul><li>Automated processes </li></ul><ul><li>E-forms </li></ul><ul><li>Policy management </li></ul><ul><li>Information rights mgt </li></ul><ul><li>Authentication </li></ul>Retention policies <ul><li>Record management </li></ul><ul><li>Automated archiving </li></ul>Application Integration Information Orchestration Compliance <ul><li>Process/Information Analysis </li></ul><ul><li>Business Process Modeling </li></ul>
    7. 9. Growing Infrastructure Requirements Secure communication Access Management Infrastructure robustness Digital Rights Mgt Automated policies <ul><li>Information rights mgt </li></ul><ul><li>Business Policy mgt </li></ul><ul><li>Embedded Data Protection </li></ul><ul><li>Security Lifecycle Mgt </li></ul>Data safety Intruder Protection Business process robustness Security Maturity Level Source: EMC VPN/SSL Anti virus Firewalls Identity Mgt Operation security Access/use control Anti virus solutions <ul><li>Virus detection </li></ul><ul><li>Virus elimination </li></ul>Authentication Secure Remote Access <ul><li>Network Access Control </li></ul><ul><li>2 way authentication </li></ul><ul><li>Transmission security </li></ul>Gateway Traffic Control Defining Security Protocols <ul><li>Permit/deny/proxy Mgt </li></ul><ul><li>Trust zone management </li></ul>Identity Lifecycle Management <ul><li>User credential management </li></ul><ul><li>Role based identity mgt </li></ul>Enterprise Data Protection <ul><li>Authentication (role based) </li></ul><ul><li>Password Mgt </li></ul><ul><li>Process/activity logging </li></ul>Key Mgt Digital Rights Mgt
    8. 10. Gartner I&O Maturity Model Roles Bus. Processes Governance Automate (Selfhelp) ICT Process (ITIL) ICT Catalogue Role based Standards Virtualisation Shared Services SLA -> KPI’s Balanced Score Card Business Metrics
    9. 11. Business Maturity Model Source: Deloitte
    10. 12. Business IT Integration (BITI) Maturity Model Business Perception of need for IT IT Service Organization Source: Getronics PinkRoccade
    11. 13. Demand & Supply Maturity Model Source: KPMG
    12. 14. Maturity Model <ul><li>Price per seat fixed, but what is in it? </li></ul><ul><li>Processes embedded </li></ul><ul><li>Repetition of activities </li></ul><ul><li>Business directs </li></ul><ul><li>Business is owner </li></ul><ul><li>Business decides </li></ul><ul><li>Business chooses </li></ul><ul><li>Business follows </li></ul><ul><li>ICT is driven by pains, projects over time and over budget </li></ul><ul><li>Ad hoc service delivery </li></ul><ul><li>Processes recognized, but not embedded </li></ul><ul><li>Price per seat variabel on basis of actual demand </li></ul><ul><li>Internal processes tuned and integrated </li></ul><ul><li>Dynamics in processes on basis of demand shifts </li></ul><ul><li>Functionality charged for services actually used </li></ul><ul><li>ICT services formulated in terms of business functions </li></ul><ul><li>Business & ICT Aligned </li></ul><ul><li>ICT accountable contribution to margin </li></ul>Source: KPMG 2 Processes / Controlled 5 Business Oriented 1 Ad Hoc/ Technology 4 Customer Oriented 3 Service Oriented
    13. 15. Agenda 29 May 2009 Getronics Confidential Page Multi-sourcing
    14. 16. What’s the most import invention of the industrial revolution?
    15. 17. The industrial revolution provides important insights - Standardization of screw thread was one of the key inventions of the industrial revolution - Henry Maudslay 1771-1831
    16. 18. Standardization leads to interchangeability, specialization, economies of scale and mass production
    17. 19. Ultimately, standards have led to contemporary enterprise architectures
    18. 20. E2E Multi-sourcing model Service Oriented Infrastructure COE Build Connectivity Enterpise Appl. Print facilities Business Appl. SPoC Business Incidents Business Alignment Storage Messaging Service Delivery CIO Office E2E Management Identity & Access Management
    19. 21. Manage Multi-sourcing Source: Gartner
    20. 22. 4 Worlds of sourcing Source: Gartner
    21. 23. Sourcing related to competence and value Source: Gartner
    22. 24. Is there ONE model for Demand & Supply Management?
    23. 25. Current management models Delivering change Delivering change Business Corporate ICT Third parties BiSL IS Lite ASL/ITIL Source: Atos Consulting 1 3 5 2 4
    24. 26. Agenda 29 May 2009 Getronics Confidential Page Supply Management
    25. 27. Business Model - Roles CIO Office Service Oriented Infrastructure COE Build Connectivity Enterpise Appl. Print facilities Business Appl. Identity & Acces Management E2E Management SPoC Business Incidents Demand Management Storage Messaging Getronics Customer <ul><li>Business Alignment </li></ul><ul><li>Relationship integration </li></ul><ul><li>Service Integration </li></ul><ul><li>Performance Measurement </li></ul><ul><li>Account Management </li></ul><ul><li>Vendor Management </li></ul><ul><li>Reporting </li></ul><ul><li>Charging </li></ul><ul><li>Customer Satisfaction </li></ul><ul><li>Service Portal </li></ul><ul><li>SL Management </li></ul><ul><li>Service Management </li></ul><ul><li>Systems Management </li></ul><ul><li>Continuous Improvement </li></ul><ul><li>Architecture Development </li></ul><ul><li>Procurement </li></ul><ul><li>Asset Management </li></ul>
    26. 28. Multi-Domain Monitoring Availability Monitoring Performance Monitoring Security Monitoring Correlation & Consolidation Engine Generic Collector Cisco Works LMS QMS CWSLE Microsoft MOM Net IQ Checkpoint P1 Cisco VMS Cisco CS-Mars Concord Red Siren Collector Consolidation / Cross-Domain Correlation Engine Vigilance Security Correlation Engine Customer dashboards Capacity reports Trend reports Vulnerability reports Incidents Identity LAN Datacenter WAN System Application Firewall IDS Content security Wireless objects
    27. 29. Security Monitoring
    28. 30. Agenda 29 May 2009 Getronics Confidential Page Demand Management
    29. 31. ICT roadmap drivers ICT- infrastructure changing needs Business drivers new bidders and posibilties Technology and Service developments Continuous improvement Servicemanagement drivers
    30. 32. Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2007 2008 2009 Q1 Q2 Q3 Q4 2010 Business Drivers Technology and Service Drivers ICT Infrastructure Sustainability Acquisition Mobility International Presence Web EAI Ubiquitous Access Bandwidth ILM Virtualization Smart Objects and Ambient Intelligence Semantic Connectivity OS innovation Application Rationalization E2E Management Managed IPT Performance Management Wireless workplace Service Management Drivers Centralization Standardization Tooling OS innovation Automate Aurora 2006 Output Management Identity & Access Management Value Add Hermes Apollo Innovation
    31. 33. Business Oriented Scenario’s Source: Microsoft Application Platform Optimization Model Business Intelligence Enterprise Content Management Collaboration Unified Communications Enterprise Search Business Productivity Infrastructure Optimization Model Development SOA and Business Process Business Intelligence User Experience Data Management Data Protection and Recovery Desktop, Device, and Server Mgmt Identity and Access Management Security and Networking Core Infrastructure Optimization Model IT and Security Process BASIC STANDARDIZED RATIONALIZED DYNAMIC BASIC STANDARDIZED RATIONALIZED DYNAMIC BASIC STANDARDIZED ADVANCED DYNAMIC Build Customer Connections Enable Your Mobile Workforce Drive Business Performance Drive Real-World Business Processes Improve Compliance Optimize Your Finance Operations Optimize Your Sales Force Productivity Optimize Your Customer Service Payments Other Industry Priority Solutions.. Business Infrastructure Requirements Optimize your business infrastructure
    32. 34. Agenda 29 May 2009 Getronics Confidential Page The next barrier
    33. 35. Person-Centered Computing: Content, Context and Services <ul><li>PCC Drivers </li></ul><ul><li>IT part of the fabric of normal (non-work) life </li></ul><ul><li>Multiple devices </li></ul><ul><li>User frustration over non-integration </li></ul><ul><ul><li>Vista upgrade will create next big wave of user upgrade and migration pain </li></ul></ul><ul><li>High-bandwidth connectivity </li></ul><ul><li>Automatic updates of Internet applications </li></ul><ul><li>Advertising and other revenue sources </li></ul>Source: Gartner Personal Professional Community Family Comms Services Content School Schedule Tax Info News Sports Standings E-Gov Shopping School E-Mail RSS Memories Music Hobbies Financial Info Banking Banking Broadband Cell Wi-Fi TV Calendar Memories Medical Financial Home Security IM E-Mail Personal Records Corp. Archives Training Production Data Meeting Records Work at Home Corp Apps Benefits Conferencing VOIP LAN Wi-Fi Cell Devices
    34. 36. 29 May 2009 Getronics Confidential Page Questions – Thank you
    35. 37. Business IT Alignment model Source: Gartner