SlideShare a Scribd company logo
Assessment / Business Case
Assessment / Business Case




According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering
market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years.

Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to
innovate faster than its competition and deliver their products to market first, supplement their
development teams and re-balance their development priorities in order to accelerate revenue
generation. Management and investors want to lower total cost of ownership and increase shareholder
value. Due to the standardization of software engineering processes, pricing pressure and margin
compression, evolving enterprise customer expectations, software companies are forced with the task of
delivering more complex product development with limited and decreasingly time frames.

Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven
by fundamental changes in customers' purchasing behavior.

To overcome all or some of the above problems more and more software companies turn to Product
Outsourcing i.e. hiring external vendors to develop a product for the company.




The life cycle of an outsourcing engagement for software company usually consists of six distinct phases.
The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1):

Exhibit 2.1




With industry analyst firm Gartner Inc. stating that more than 50% of outsourcing fails, the approach and
execution of your outsourcing decisions are critical. Software vendors are challenged with how be able to
effectively make decisions on what applications should be outsourced offshore, what should be kept in-
house, upgraded or retired. To forge a successful outsourcing strategy, independent software vendors
and application service providers should conduct an offshore outsourcing “readiness” assessment. The
assessment should be equally applied to software vendors considering outsourcing for the first time, or to
clients who wish to improve an existing outsource supply as it helps align the strategic corporate and
R&D goals and tactical objectives of an outsourcing engagement.


                                                                                 © Altoros Systems     2
Assessment / Business Case



The results of the assessment will provide a software organization with much of the information required
to make key decisions and to focus management effort.

The assessment can help examine the ability of a software development organization to outsource,
looking at procedures and processes maturity, experience, management tools and ROI objectives. The
assessment may cover four segments of organizational readiness, each providing a discrete evaluation of
part of the organization and its processes and expectations:

1. Business Objectives Readiness
2. Software    Development     Processes            Maturity Readiness
3. Cultural Readiness
4. Financial Expectations (Desired vs. feasible ROI)

The assessment may apply maturity models based on SEI CMM and ITIL principles.

Data for assessment may be gathered from:

1. Questionnaires
2. Interviews
3. Discussion with product managers and application owners
4. Study of product roadmaps, maintenance plans and application/code base inventory

Deliverables may include:

1. Outsourcing Readiness Report
2. ROI analysis
3. Application/Project Sequencing Plan
4. Engagement Roadmap

When reviewing product roadmaps, maintenance plans and application/code base inventory, the following
criteria are recommended to assess readiness of specific applications/processes:

1. Skill alignment with current/future technology direction
2. Current cost of operation
3. Application maturity
4. Alignment to business (core, context, utility)
5. Business value
6. Business satisfaction
7. Functional completeness
8. Technical completeness
9. Rate of change
10. Technology platform
11. Associated cluster
12. Perceived risk profile

With industry analyst firm Gartner Inc. stating that more than 50% of outsourcing fails, the approach and
execution of your outsourcing decisions are critical. Software vendors are challenged with how be able to
effectively make decisions on what applications should be outsourced offshore, what should be kept in-
house, upgraded or retired.




                                                                               © Altoros Systems     3
Assessment / Business Case



Table 2.1




 Short term project-based view                                  Long term strategic ROI view

 Focus on head-count based cost                                 Focus on Innovation, TTM, Cost
 reduction

 Significant overhead may outweigh                              Benefits far outweigh costs
 cost savings

 Not sustainable in the long run                                Sustainable time and cost efficiencies

However, regardless of business model, sustainable time and cost efficiencies of outsourcing and
whether it can be successful or not depends on how it is designed, implemented and managed. Software
companies often hire contractors for particular types of work and have formed long-term relationships with
firms whose capabilities complement or supplement their own. That is why sometimes strategic
outsourcing is mistaken with tactical subcontracting. The difference between subcontracting and
outsourcing is that the latter involves the most efficient reconstructing of particular business activities by
utilizing external partnerships. Software vendors should carefully evaluate available business models
before making a selection.




Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and
large software companies for many different reasons. Cost reduction is typically the basis for offshore
outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by
constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as
operational difficulties associated with global outsourcing are gradually removed.

Having the right strategic offshore roadmap and governance model is critical.

Outsourcing strategy checklist

BACKGROUND INFORMATION
Why outsourcing is needed?
How can outsourcing by used as a strategic tool?
What are the expectations from outsourcing?
DECISION MAKING
Who will decide what to outsource?
Who will select the outsourcer?
Who will approve variations to the outsourcing agreement?
Who will approve budgets, timelines and deliverables?
COMMUNICATION
With whom should the company communicate?
What will the outsourcer want to know and when?
What is the best way to conduct communications?
ENSURING A SUCCESSFUL OUTSOURCING PROCESS

                                                                                  © Altoros Systems      4
Assessment / Business Case



What are the critical success factors?
What are the risks?
How does one overcome risks or problems?
What are the assumptions to be made before proceeding?
RESPONSIBILITIES
What are the company's responsibilities?
What are the outsourcers?
What knowledge - skills are required?
ASSETS - STAFF AND LICENSES
What assets, staff or licenses need to be acquired?
What assets, staff or licenses need to be transferred?
What assets, staff or licenses need to be redeployed?
What assets, staff or licenses need to be disposed of?
OBLIGATIONS - LEGAL MATTERS
Are there copies of all arrangements and agreements?
Is there any consent to be obtained from third parties?
Are there any obligations after the outsourcing process begins?



Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com




                                                                      © Altoros Systems   5

More Related Content

What's hot

entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0
Geert Janssen
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
RedZone Technologies
 
It Strategy Session Cio Roundtable May 27 2010
It Strategy Session   Cio Roundtable May 27 2010It Strategy Session   Cio Roundtable May 27 2010
It Strategy Session Cio Roundtable May 27 2010
Crocus Hill Associates
 
101314655 org-study
101314655 org-study101314655 org-study
101314655 org-study
homeworkping7
 
IT due diligence for private equity firm
IT due diligence for private equity firmIT due diligence for private equity firm
IT due diligence for private equity firm
WGroup
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case study
WGroup
 
8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software
Corporater
 
Senior IT Audit Lead
Senior IT Audit LeadSenior IT Audit Lead
Senior IT Audit Lead
Claudia Sztandera
 
Introduction_Kishore Sundararaman
Introduction_Kishore SundararamanIntroduction_Kishore Sundararaman
Introduction_Kishore Sundararaman
Kishore Sundararaman
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
AstalapulosListestos
 
Trends in Software Outsourcing: Best Practices
Trends in Software Outsourcing: Best PracticesTrends in Software Outsourcing: Best Practices
Trends in Software Outsourcing: Best Practices
Softheme
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
AstalapulosListestos
 
Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?
Ellie Ahmadi
 

What's hot (13)

entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0entrust-it - Seminar ULG 290416 v1.0
entrust-it - Seminar ULG 290416 v1.0
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
It Strategy Session Cio Roundtable May 27 2010
It Strategy Session   Cio Roundtable May 27 2010It Strategy Session   Cio Roundtable May 27 2010
It Strategy Session Cio Roundtable May 27 2010
 
101314655 org-study
101314655 org-study101314655 org-study
101314655 org-study
 
IT due diligence for private equity firm
IT due diligence for private equity firmIT due diligence for private equity firm
IT due diligence for private equity firm
 
A prescription for saving money case study
A prescription for saving money   case studyA prescription for saving money   case study
A prescription for saving money case study
 
8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software
 
Senior IT Audit Lead
Senior IT Audit LeadSenior IT Audit Lead
Senior IT Audit Lead
 
Introduction_Kishore Sundararaman
Introduction_Kishore SundararamanIntroduction_Kishore Sundararaman
Introduction_Kishore Sundararaman
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
Trends in Software Outsourcing: Best Practices
Trends in Software Outsourcing: Best PracticesTrends in Software Outsourcing: Best Practices
Trends in Software Outsourcing: Best Practices
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
 
Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?Protiviti's Tips - Will you be ready for an IPO when the market is?
Protiviti's Tips - Will you be ready for an IPO when the market is?
 

Viewers also liked

Kanban - Birlasoft : Master Service Provider
Kanban - Birlasoft : Master Service ProviderKanban - Birlasoft : Master Service Provider
Kanban - Birlasoft : Master Service Provider
Kanban Infosystem Pvt. Ltd.
 
Avoiding Groundhog Day
Avoiding Groundhog DayAvoiding Groundhog Day
Avoiding Groundhog Day
Kelly Services
 
Just In Time - Operations Management
Just In Time - Operations ManagementJust In Time - Operations Management
Just In Time - Operations Management
Gargi Kapadia
 
GLOBAL SOURCING
GLOBAL SOURCINGGLOBAL SOURCING
GLOBAL SOURCING
Zamri Yahya
 
Strategic Sourcing
Strategic Sourcing Strategic Sourcing
Strategic Sourcing
mubarak2009
 
7 step strategic sourcing
7 step strategic sourcing7 step strategic sourcing
7 step strategic sourcing
Nimisis
 

Viewers also liked (6)

Kanban - Birlasoft : Master Service Provider
Kanban - Birlasoft : Master Service ProviderKanban - Birlasoft : Master Service Provider
Kanban - Birlasoft : Master Service Provider
 
Avoiding Groundhog Day
Avoiding Groundhog DayAvoiding Groundhog Day
Avoiding Groundhog Day
 
Just In Time - Operations Management
Just In Time - Operations ManagementJust In Time - Operations Management
Just In Time - Operations Management
 
GLOBAL SOURCING
GLOBAL SOURCINGGLOBAL SOURCING
GLOBAL SOURCING
 
Strategic Sourcing
Strategic Sourcing Strategic Sourcing
Strategic Sourcing
 
7 step strategic sourcing
7 step strategic sourcing7 step strategic sourcing
7 step strategic sourcing
 

Similar to Outsourcing Life Cycle: Assessment / Business Case

Outsourcing product development introduction
Outsourcing product development introductionOutsourcing product development introduction
Outsourcing product development introduction
suryauk
 
Beating the ERP Implementation Odds
Beating the ERP Implementation OddsBeating the ERP Implementation Odds
Beating the ERP Implementation Odds
Pradeep Shakespeare, MBA, CGMA, ACMA
 
Executives Guide to Outsourcing
Executives Guide to OutsourcingExecutives Guide to Outsourcing
Executives Guide to Outsourcing
E.S.G. JR. Consulting, Inc.
 
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionKey drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Mindfire LLC
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
kamlakargadegaonkar2
 
Top 10 Pitfalls Of Am
Top 10 Pitfalls Of AmTop 10 Pitfalls Of Am
Top 10 Pitfalls Of Am
Application Management
 
Key drivers that influence a CEO’s Software Outsourcing.pdf
Key drivers that influence a CEO’s Software Outsourcing.pdfKey drivers that influence a CEO’s Software Outsourcing.pdf
Key drivers that influence a CEO’s Software Outsourcing.pdf
Mindfire LLC
 
Mortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for SustainabilityMortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for Sustainability
Cognizant
 
Challenges of IT Outsourcing for CEOs of Small.pdf
Challenges of IT Outsourcing for CEOs of Small.pdfChallenges of IT Outsourcing for CEOs of Small.pdf
Challenges of IT Outsourcing for CEOs of Small.pdf
Mindfire LLC
 
Software Management
Software ManagementSoftware Management
Software Management
Ismail Muhammad
 
Product Engineering Outsourcing: Looking beyond Cost Savings
Product Engineering Outsourcing: Looking beyond Cost SavingsProduct Engineering Outsourcing: Looking beyond Cost Savings
Product Engineering Outsourcing: Looking beyond Cost Savings
Xoriant Corporation
 
Zd article delivering-erp_success_041812
Zd article delivering-erp_success_041812Zd article delivering-erp_success_041812
Zd article delivering-erp_success_041812
Mitch Rushing
 
In Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. BuyIn Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. Buy
Melissa Luongo
 
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Covance
 
gen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdfgen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdf
GilbertoStrafacci2
 
Software Outsourcing: Why, When, What
Software Outsourcing: Why, When, WhatSoftware Outsourcing: Why, When, What
Software Outsourcing: Why, When, What
Softheme
 
Synergetics-IIF-Tech-Ind
Synergetics-IIF-Tech-IndSynergetics-IIF-Tech-Ind
Synergetics-IIF-Tech-Ind
Nathan Louque
 
Why Erp Implementations Fail
Why Erp Implementations FailWhy Erp Implementations Fail
Why Erp Implementations Fail
PhilKeet
 
What to prepare before engaging with an offshore team (footnotes included)
What to prepare before engaging with an offshore team (footnotes included)What to prepare before engaging with an offshore team (footnotes included)
What to prepare before engaging with an offshore team (footnotes included)
Chris Hote
 
DEFINITION.docx
DEFINITION.docxDEFINITION.docx
DEFINITION.docx
AbdetaImi
 

Similar to Outsourcing Life Cycle: Assessment / Business Case (20)

Outsourcing product development introduction
Outsourcing product development introductionOutsourcing product development introduction
Outsourcing product development introduction
 
Beating the ERP Implementation Odds
Beating the ERP Implementation OddsBeating the ERP Implementation Odds
Beating the ERP Implementation Odds
 
Executives Guide to Outsourcing
Executives Guide to OutsourcingExecutives Guide to Outsourcing
Executives Guide to Outsourcing
 
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing DecisionKey drivers that influence a Tech Startup’s Software Outsourcing Decision
Key drivers that influence a Tech Startup’s Software Outsourcing Decision
 
Service Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptxService Operations management _Lecture 7.pptx
Service Operations management _Lecture 7.pptx
 
Top 10 Pitfalls Of Am
Top 10 Pitfalls Of AmTop 10 Pitfalls Of Am
Top 10 Pitfalls Of Am
 
Key drivers that influence a CEO’s Software Outsourcing.pdf
Key drivers that influence a CEO’s Software Outsourcing.pdfKey drivers that influence a CEO’s Software Outsourcing.pdf
Key drivers that influence a CEO’s Software Outsourcing.pdf
 
Mortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for SustainabilityMortgage LOS Implementation: A Roadmap for Sustainability
Mortgage LOS Implementation: A Roadmap for Sustainability
 
Challenges of IT Outsourcing for CEOs of Small.pdf
Challenges of IT Outsourcing for CEOs of Small.pdfChallenges of IT Outsourcing for CEOs of Small.pdf
Challenges of IT Outsourcing for CEOs of Small.pdf
 
Software Management
Software ManagementSoftware Management
Software Management
 
Product Engineering Outsourcing: Looking beyond Cost Savings
Product Engineering Outsourcing: Looking beyond Cost SavingsProduct Engineering Outsourcing: Looking beyond Cost Savings
Product Engineering Outsourcing: Looking beyond Cost Savings
 
Zd article delivering-erp_success_041812
Zd article delivering-erp_success_041812Zd article delivering-erp_success_041812
Zd article delivering-erp_success_041812
 
In Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. BuyIn Automated Controls It’s No Longer the Traditional Build vs. Buy
In Automated Controls It’s No Longer the Traditional Build vs. Buy
 
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
 
gen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdfgen-ai-planning-workbook.pdf
gen-ai-planning-workbook.pdf
 
Software Outsourcing: Why, When, What
Software Outsourcing: Why, When, WhatSoftware Outsourcing: Why, When, What
Software Outsourcing: Why, When, What
 
Synergetics-IIF-Tech-Ind
Synergetics-IIF-Tech-IndSynergetics-IIF-Tech-Ind
Synergetics-IIF-Tech-Ind
 
Why Erp Implementations Fail
Why Erp Implementations FailWhy Erp Implementations Fail
Why Erp Implementations Fail
 
What to prepare before engaging with an offshore team (footnotes included)
What to prepare before engaging with an offshore team (footnotes included)What to prepare before engaging with an offshore team (footnotes included)
What to prepare before engaging with an offshore team (footnotes included)
 
DEFINITION.docx
DEFINITION.docxDEFINITION.docx
DEFINITION.docx
 

More from Altoros

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with Kubernetes
Altoros
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
Altoros
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
Altoros
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
Altoros
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Altoros
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
Altoros
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
Altoros
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
Altoros
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
Altoros
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
Altoros
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
Altoros
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
Altoros
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
Altoros
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
Altoros
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
Altoros
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Altoros
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Altoros
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Altoros
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
Altoros
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
Altoros
 

More from Altoros (20)

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with Kubernetes
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Outsourcing Life Cycle: Assessment / Business Case

  • 2. Assessment / Business Case According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. The life cycle of an outsourcing engagement for software company usually consists of six distinct phases. The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1): Exhibit 2.1 With industry analyst firm Gartner Inc. stating that more than 50% of outsourcing fails, the approach and execution of your outsourcing decisions are critical. Software vendors are challenged with how be able to effectively make decisions on what applications should be outsourced offshore, what should be kept in- house, upgraded or retired. To forge a successful outsourcing strategy, independent software vendors and application service providers should conduct an offshore outsourcing “readiness” assessment. The assessment should be equally applied to software vendors considering outsourcing for the first time, or to clients who wish to improve an existing outsource supply as it helps align the strategic corporate and R&D goals and tactical objectives of an outsourcing engagement. © Altoros Systems 2
  • 3. Assessment / Business Case The results of the assessment will provide a software organization with much of the information required to make key decisions and to focus management effort. The assessment can help examine the ability of a software development organization to outsource, looking at procedures and processes maturity, experience, management tools and ROI objectives. The assessment may cover four segments of organizational readiness, each providing a discrete evaluation of part of the organization and its processes and expectations: 1. Business Objectives Readiness 2. Software Development Processes Maturity Readiness 3. Cultural Readiness 4. Financial Expectations (Desired vs. feasible ROI) The assessment may apply maturity models based on SEI CMM and ITIL principles. Data for assessment may be gathered from: 1. Questionnaires 2. Interviews 3. Discussion with product managers and application owners 4. Study of product roadmaps, maintenance plans and application/code base inventory Deliverables may include: 1. Outsourcing Readiness Report 2. ROI analysis 3. Application/Project Sequencing Plan 4. Engagement Roadmap When reviewing product roadmaps, maintenance plans and application/code base inventory, the following criteria are recommended to assess readiness of specific applications/processes: 1. Skill alignment with current/future technology direction 2. Current cost of operation 3. Application maturity 4. Alignment to business (core, context, utility) 5. Business value 6. Business satisfaction 7. Functional completeness 8. Technical completeness 9. Rate of change 10. Technology platform 11. Associated cluster 12. Perceived risk profile With industry analyst firm Gartner Inc. stating that more than 50% of outsourcing fails, the approach and execution of your outsourcing decisions are critical. Software vendors are challenged with how be able to effectively make decisions on what applications should be outsourced offshore, what should be kept in- house, upgraded or retired. © Altoros Systems 3
  • 4. Assessment / Business Case Table 2.1 Short term project-based view Long term strategic ROI view Focus on head-count based cost Focus on Innovation, TTM, Cost reduction Significant overhead may outweigh Benefits far outweigh costs cost savings Not sustainable in the long run Sustainable time and cost efficiencies However, regardless of business model, sustainable time and cost efficiencies of outsourcing and whether it can be successful or not depends on how it is designed, implemented and managed. Software companies often hire contractors for particular types of work and have formed long-term relationships with firms whose capabilities complement or supplement their own. That is why sometimes strategic outsourcing is mistaken with tactical subcontracting. The difference between subcontracting and outsourcing is that the latter involves the most efficient reconstructing of particular business activities by utilizing external partnerships. Software vendors should carefully evaluate available business models before making a selection. Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. Outsourcing strategy checklist BACKGROUND INFORMATION Why outsourcing is needed? How can outsourcing by used as a strategic tool? What are the expectations from outsourcing? DECISION MAKING Who will decide what to outsource? Who will select the outsourcer? Who will approve variations to the outsourcing agreement? Who will approve budgets, timelines and deliverables? COMMUNICATION With whom should the company communicate? What will the outsourcer want to know and when? What is the best way to conduct communications? ENSURING A SUCCESSFUL OUTSOURCING PROCESS © Altoros Systems 4
  • 5. Assessment / Business Case What are the critical success factors? What are the risks? How does one overcome risks or problems? What are the assumptions to be made before proceeding? RESPONSIBILITIES What are the company's responsibilities? What are the outsourcers? What knowledge - skills are required? ASSETS - STAFF AND LICENSES What assets, staff or licenses need to be acquired? What assets, staff or licenses need to be transferred? What assets, staff or licenses need to be redeployed? What assets, staff or licenses need to be disposed of? OBLIGATIONS - LEGAL MATTERS Are there copies of all arrangements and agreements? Is there any consent to be obtained from third parties? Are there any obligations after the outsourcing process begins? Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 5