Information Tech & Heavy Industry

494 views

Published on

Assistance in bridging gap between in-place infrastructure (mainframe based) and the desired future environment (client/server based)

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
494
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Information Tech & Heavy Industry

  1. 1. Information Technology Management Orlando Moreno [email_address] 408.656.2498
  2. 2. Operations Budget Elements <ul><li>Hardware </li></ul><ul><li>Software </li></ul><ul><li>IT, Communication and equipment </li></ul><ul><li>Data center AND personnel </li></ul><ul><li>Disaster recovery planning </li></ul><ul><li>Security </li></ul><ul><li>Invention AND Collaboration </li></ul>[email_address] 408.656.2498
  3. 3. Operations Problems Solutions <ul><li>Technology </li></ul><ul><li>Continuously fight fires and rearrange priorities - getting people to solve the problem at hand </li></ul><ul><li>Continuously document and measure what is done so as to find the real solutions, not just the apparent ones </li></ul>[email_address] 408.656.2498
  4. 4. Applications Characteristics <ul><li>Functional quality of the applications, measured by how they meet user needs </li></ul><ul><li>Technical quality of the applications, measured by how easy they are to maintain and how efficiently they run </li></ul><ul><li>Application age and life expectancy </li></ul><ul><li>Portfolio coverage , measured by how much work that can be automated is automated </li></ul>[email_address] 408.656.2498
  5. 5. 5-step Automation Process <ul><li>1.- Define areas of human intervention and divide them into: </li></ul><ul><ul><li>Procedures that are easy to eliminate </li></ul></ul><ul><ul><li>Procedures that are hard to eliminate </li></ul></ul><ul><li>2.-Define instructions that could be added to application software to eliminate procedures identified in previous step </li></ul>[email_address] 408.656.2498
  6. 6. 5-step Automation Process <ul><li>3.- Agree on a method to incorporate the new instructions into new applications and into all changes made to existing applications </li></ul><ul><li>4.- Isolate the easy-to-implement instructions into projects and execute them </li></ul><ul><li>5.- When unattended operation appears easy to achieve, organize a project to do it. </li></ul>[email_address] 408.656.2498
  7. 7. Drivers of Outsourcing <ul><li>Focus on core business </li></ul><ul><li>Value based on their discounted cash flow (shareholder value) </li></ul>[email_address] 408.656.2498
  8. 8. Customer-vendor Relationships <ul><li>Buying their professional value (planning or consulting, building or maintaining applications, building or maintaining networks, and training) </li></ul><ul><li>Buying their products (may or may not include training) </li></ul><ul><li>Buying their transactions (checks, or credit reports) </li></ul>[email_address] 408.656.2498
  9. 9. Customer-vendor Relationships <ul><li>Using a systems integrator , to generally handle some turnkey solutions and projects </li></ul><ul><li>Outsourcing , where the outsource provider contracts to handle all or certain information systems </li></ul><ul><li>Systems integration is project based; outsourcing is time-based </li></ul>[email_address] 408.656.2498
  10. 10. Outsourcing Changes <ul><li>Strategic view of outsourcing </li></ul><ul><li>Selective outsourcing </li></ul><ul><li>Transformational outsourcing </li></ul><ul><li>Outsourcing application development </li></ul><ul><li>“ One stop shopping” approach to outsourcing </li></ul>[email_address] 408.656.2498
  11. 11. Outsourcing Changes <ul><li>Strategic view of outsourcing - </li></ul><ul><ul><li>Outsourcing now an accepted practice </li></ul></ul><ul><ul><li>Now a way to improve competitive position often resulting in major restructuring </li></ul></ul><ul><ul><li>This restructuring results in mega-deals and full-service outsourcing </li></ul></ul>[email_address] 408.656.2498
  12. 12. Outsourcing Changes <ul><li>Selective outsourcing </li></ul><ul><ul><li>Only specific areas of the IS department outsourced </li></ul></ul><ul><ul><li>Deals are short termed (2-5 years) as opposed to strategic deals (5-10 years) </li></ul></ul><ul><ul><li>Driving forces are lack of skills and desire to offload non-core competency areas to providers </li></ul></ul>[email_address] 408.656.2498
  13. 13. Outsourcing Changes <ul><li>Transformational outsourcing </li></ul><ul><ul><li>Assistance in bridging gap between in-place infrastructure (mainframe based) and the desired future environment (client/server based) </li></ul></ul><ul><ul><li>Companies’ willingness to admit failure (success is based on the client’s expectations) </li></ul></ul><ul><ul><li>Some restructuring of a large number of deals seems to be in the offing </li></ul></ul>[email_address] 408.656.2498
  14. 14. Outsourcing Changes <ul><li>Outsourcing applications development </li></ul><ul><ul><li>Idea that applications were competitive edge is dying </li></ul></ul><ul><ul><li>Now better to get applications built faster because competitive edge comes from begin first </li></ul></ul><ul><ul><li>Sometimes speedy development can only come from outsource providers </li></ul></ul>[email_address] 408.656.2498
  15. 15. Outsourcing Changes <ul><li>‘ One-stop Shopping’ approach </li></ul><ul><ul><li>Firms use it when they outsource infrastructure functions (LAN operation, desktop, mainframes) along with a “best of breed” approach when outsourcing applications </li></ul></ul><ul><ul><li>Client and prime contractor seek a partnering relationship than a customer/supplier relationship </li></ul></ul>[email_address] 408.656.2498
  16. 16. Key Questions <ul><li>Which IS activities are strategic? </li></ul><ul><li>Will outsourcing save at least 15%? </li></ul><ul><li>Does our firm have access to the needed technology and expertise? </li></ul><ul><li>Does outsourcing increase our firm’s flexibility? </li></ul>[email_address] 408.656.2498
  17. 17. Key Questions <ul><li>Is the vendor likely to exist in five year's time?. If not, you and your subscribers may find yourself stranded with an obsolete, unsupported billing system. </li></ul><ul><li>Is the system fully integrated or does it rely on patching components from several different vendors, which increases implementation and support costs and complexity? </li></ul>[email_address] 408.656.2498
  18. 18. Key Questions <ul><li>Can the system translate easily to the languages of your country, without additional expensive and time-consuming coding? </li></ul><ul><li>Does the system deliver true customer care enabling, for example, at least 60 per cent of queries to Customer Service Representatives to be answered from the first screen seen by the contact centre agent? </li></ul>[email_address] 408.656.2498
  19. 19. Network Management <ul><li>Fault handing </li></ul><ul><li>Performance monitoring </li></ul><ul><li>change management </li></ul><ul><li>Tactical planning </li></ul><ul><li>Cost control </li></ul>[email_address] 408.656.2498
  20. 20. Net Management Trends <ul><li>Integrated net management is a major goal </li></ul><ul><li>Management of distributed applications on horizon </li></ul><ul><li>Automation of network operations on increase </li></ul><ul><li>Outsourcing of network management on increase </li></ul>[email_address] 408.656.2498
  21. 21. Internet Security <ul><li>Use layered approached </li></ul><ul><ul><li>Begins at the internet connection device (router) </li></ul></ul><ul><ul><li>Screening router can be used to verify the source as well as the destination of every packet sent to the corporate network by packet filtering </li></ul></ul>[email_address] 408.656.2498
  22. 22. Internet Security <ul><li>Protect against 5 kinds of attacks </li></ul><ul><ul><li>Eavesdropping </li></ul></ul><ul><ul><li>Password sniffing </li></ul></ul><ul><ul><li>Data Modification </li></ul></ul><ul><ul><li>Spoofing </li></ul></ul><ul><ul><li>Repudiation </li></ul></ul>[email_address] 408.656.2498
  23. 23. Internet Security <ul><li>Firewalls provide access protection but do not ensure end-to-end transaction security </li></ul><ul><li>Cryptographic protocols used to provide security on the Net </li></ul><ul><li>Another method is to secure the data in individual transactions and not worry about securing the Net </li></ul>[email_address] 408.656.2498
  24. 24. Disaster Recovery <ul><li>Create an effective disaster plan </li></ul><ul><li>Learn the strengths of different data backup systems </li></ul><ul><li>Make use of vaulted backups </li></ul><ul><li>Recover e-mail services </li></ul><ul><li>Defend systems from attack </li></ul><ul><li>Lead and manage effectively during times of crises </li></ul>[email_address] 408.656.2498
  25. 25. Internal Disaster Recovery <ul><li>Multiple data centers </li></ul><ul><li>Backup telecommunications facilities </li></ul><ul><ul><li>Build duplicate communication facilities </li></ul></ul><ul><ul><li>Use alternate technologies that re-deploy in case of an emergency </li></ul></ul><ul><li>Local area networks (servers backup servers) </li></ul>[email_address] 408.656.2498
  26. 26. External Disaster Recovery <ul><li>Integrated disaster recovery services </li></ul><ul><li>Specialized disaster recovery services </li></ul><ul><li>On-line and off-line data storage facilities </li></ul><ul><li>Service bureaus, consortia and informal cooperative arrangements </li></ul>[email_address] 408.656.2498
  27. 27. Questions Orlando Moreno [email_address] 772-679-3997 [email_address] 408.656.2498                                                                      

×