SlideShare a Scribd company logo
Software Outsourcing:Pitfalls and Best Practices Igor Tsinman CTO, AMC Bridge
[object Object]
Typical projects
Key issues with outsourcing
Most common reasons projects fail
Best practices
Questions to ask your potential partnerAgenda
[object Object]
The observations and recommendations in this talk are based on our and our partners’ experiences in carrying out these projects.Background
[object Object]
With skills that may be hard to find locally, or that are not necessarily part of the long term “picture” for your company
Time to market
Project cost savings
Save money or extend existing budget
Cost savings can be 4:1
There are pros/cons
No free lunch: in many ways, successful projects require many of the same elements as building your own team (communication, organizational knowledge, processes)
Outsourcing is not a “silver” bullet – just another tool in getting things done, taking into account tasks, resources, time and money at hand.Why outsource?
Support of existing product ,[object Object],Augment existing team ,[object Object],“Try something new” ,[object Object],One-off (relatively short) project ,[object Object]
[Most of our experience, and thus the observations and recommendations in this PPT, are for projects in category 1-3.]Typical projects
Several ways that outsourced engineering teams can play a role Occasional one-off project (e.g., 1-2 engineers for 2 months) Extension of in-house engineering team (e.g., 5-10 engineers on a more-or-less ongoing basis) Fully outsourced development Wide range of scope

More Related Content

What's hot

The importance of requirement elicitation and analysis
The importance of requirement elicitation and analysisThe importance of requirement elicitation and analysis
The importance of requirement elicitation and analysis
Tunde Adeniran
 
Infographic - Pragmatic Technical Debt Management
Infographic - Pragmatic Technical Debt ManagementInfographic - Pragmatic Technical Debt Management
Infographic - Pragmatic Technical Debt Management
Tushar Sharma
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02Rizwan Khurram
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01Rizwan Khurram
 
Technical Debt
Technical DebtTechnical Debt
Technical Debt
Gary Short
 
Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...
Mekon Ltd.
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt
CAST
 
Information Technology Project Management - part 05
Information Technology Project Management - part 05Information Technology Project Management - part 05
Information Technology Project Management - part 05Rizwan Khurram
 
Understanding the risks in enterprise project management
Understanding the risks in enterprise project managementUnderstanding the risks in enterprise project management
Understanding the risks in enterprise project management
Orangescrum
 
Information Technology Project Management - part 04
Information Technology Project Management - part 04Information Technology Project Management - part 04
Information Technology Project Management - part 04Rizwan Khurram
 
Project Management for Freelancers
Project Management for FreelancersProject Management for Freelancers
Project Management for Freelancers
Crystal Williams
 
Information Technology Project Management - part 08
Information Technology Project Management - part  08Information Technology Project Management - part  08
Information Technology Project Management - part 08Rizwan Khurram
 
Information Technology Project Management - part 09
Information Technology Project Management - part 09Information Technology Project Management - part 09
Information Technology Project Management - part 09Rizwan Khurram
 
David.atwell
David.atwellDavid.atwell
David.atwellNASAPMC
 
Information Technology Project Management - part 10
Information Technology Project Management - part 10Information Technology Project Management - part 10
Information Technology Project Management - part 10Rizwan Khurram
 
Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
SUFYAN SATTAR
 
Information Technology Project Management - part 11
Information Technology Project Management - part 11Information Technology Project Management - part 11
Information Technology Project Management - part 11Rizwan Khurram
 
Managing international software projects interactively using scrum
Managing international software projects interactively using scrumManaging international software projects interactively using scrum
Managing international software projects interactively using scrum
Peter Horsten
 
Software developer
Software developerSoftware developer
Software developer
ashrafulislam293
 

What's hot (20)

The importance of requirement elicitation and analysis
The importance of requirement elicitation and analysisThe importance of requirement elicitation and analysis
The importance of requirement elicitation and analysis
 
Infographic - Pragmatic Technical Debt Management
Infographic - Pragmatic Technical Debt ManagementInfographic - Pragmatic Technical Debt Management
Infographic - Pragmatic Technical Debt Management
 
Information Technology Project Management - part 02
Information Technology Project Management - part 02Information Technology Project Management - part 02
Information Technology Project Management - part 02
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01
 
Technical Debt
Technical DebtTechnical Debt
Technical Debt
 
Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...Conference Room Prototype – a low cost, high value approach to selecting the ...
Conference Room Prototype – a low cost, high value approach to selecting the ...
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt
 
Information Technology Project Management - part 05
Information Technology Project Management - part 05Information Technology Project Management - part 05
Information Technology Project Management - part 05
 
Understanding the risks in enterprise project management
Understanding the risks in enterprise project managementUnderstanding the risks in enterprise project management
Understanding the risks in enterprise project management
 
Information Technology Project Management - part 04
Information Technology Project Management - part 04Information Technology Project Management - part 04
Information Technology Project Management - part 04
 
Project Management for Freelancers
Project Management for FreelancersProject Management for Freelancers
Project Management for Freelancers
 
Information Technology Project Management - part 08
Information Technology Project Management - part  08Information Technology Project Management - part  08
Information Technology Project Management - part 08
 
Information Technology Project Management - part 09
Information Technology Project Management - part 09Information Technology Project Management - part 09
Information Technology Project Management - part 09
 
David.atwell
David.atwellDavid.atwell
David.atwell
 
Information Technology Project Management - part 10
Information Technology Project Management - part 10Information Technology Project Management - part 10
Information Technology Project Management - part 10
 
Requirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/MethodsRequirement Elicitation Techniques/Methods
Requirement Elicitation Techniques/Methods
 
Information Technology Project Management - part 11
Information Technology Project Management - part 11Information Technology Project Management - part 11
Information Technology Project Management - part 11
 
Managing international software projects interactively using scrum
Managing international software projects interactively using scrumManaging international software projects interactively using scrum
Managing international software projects interactively using scrum
 
How To Up-Skill in IT
How To Up-Skill in ITHow To Up-Skill in IT
How To Up-Skill in IT
 
Software developer
Software developerSoftware developer
Software developer
 

Similar to Software Outsourcing: Pitfalls and Best Practices

Project Management Complete Concept
Project Management Complete Concept Project Management Complete Concept
Project Management Complete Concept
MuhammadTalha436
 
An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
Daroko blog(www.professionalbloggertricks.com)
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
abdulrafaychaudhry
 
Postmortemanalysis 120520033844-phpapp02
Postmortemanalysis 120520033844-phpapp02Postmortemanalysis 120520033844-phpapp02
Postmortemanalysis 120520033844-phpapp02
Loriebel Manabat
 
Lecture2 2
Lecture2 2Lecture2 2
Lecture2 2
soloeng
 
Aula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanAula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanRogerio P C do Nascimento
 
Project Management as an Art Form
Project Management as an Art FormProject Management as an Art Form
Project Management as an Art Form
Treehouse Agency
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21Dhairya Joshi
 
Project management chapter_04 for MSBTE
Project management chapter_04 for MSBTEProject management chapter_04 for MSBTE
Project management chapter_04 for MSBTE
Kalyan Ingole
 
Team Misfocus and Error in software projects
Team Misfocus and Error in software projectsTeam Misfocus and Error in software projects
Team Misfocus and Error in software projects
Adam Russell
 
Misfocus-caused error in software projects
Misfocus-caused error in software projectsMisfocus-caused error in software projects
Misfocus-caused error in software projects
Adam Russell
 
Agile and Scrum Workshop
Agile and Scrum WorkshopAgile and Scrum Workshop
Agile and Scrum Workshop
Rainer Stropek
 
Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
Holly Ross
 
Project post-mortem analysis
Project post-mortem analysisProject post-mortem analysis
Project post-mortem analysis
Jaiveer Singh
 
Poor Man's Kanban
Poor Man's KanbanPoor Man's Kanban
Poor Man's Kanban
Chicago ALT.NET
 
Project management concepts
Project management conceptsProject management concepts
Project management concepts
NayyabMirTahir
 
lecture16.ppt
lecture16.pptlecture16.ppt
lecture16.ppt
BetshaTizazu1
 
Cost estimation
Cost estimationCost estimation
Cost estimation
Nameirakpam Sundari
 

Similar to Software Outsourcing: Pitfalls and Best Practices (20)

Project Management Complete Concept
Project Management Complete Concept Project Management Complete Concept
Project Management Complete Concept
 
An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
 
importance of resources allocation in formal method of software engineering ...
 importance of resources allocation in formal method of software engineering ... importance of resources allocation in formal method of software engineering ...
importance of resources allocation in formal method of software engineering ...
 
Postmortemanalysis 120520033844-phpapp02
Postmortemanalysis 120520033844-phpapp02Postmortemanalysis 120520033844-phpapp02
Postmortemanalysis 120520033844-phpapp02
 
Lecture2 2
Lecture2 2Lecture2 2
Lecture2 2
 
Aula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger PressmanAula 1 - Project Management Concepts by Roger Pressman
Aula 1 - Project Management Concepts by Roger Pressman
 
Project Management as an Art Form
Project Management as an Art FormProject Management as an Art Form
Project Management as an Art Form
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21
 
Project management chapter_04 for MSBTE
Project management chapter_04 for MSBTEProject management chapter_04 for MSBTE
Project management chapter_04 for MSBTE
 
Team Misfocus and Error in software projects
Team Misfocus and Error in software projectsTeam Misfocus and Error in software projects
Team Misfocus and Error in software projects
 
Misfocus-caused error in software projects
Misfocus-caused error in software projectsMisfocus-caused error in software projects
Misfocus-caused error in software projects
 
Agile and Scrum Workshop
Agile and Scrum WorkshopAgile and Scrum Workshop
Agile and Scrum Workshop
 
Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
 
Project post-mortem analysis
Project post-mortem analysisProject post-mortem analysis
Project post-mortem analysis
 
Project Management
Project ManagementProject Management
Project Management
 
Poor Man's Kanban
Poor Man's KanbanPoor Man's Kanban
Poor Man's Kanban
 
Project management concepts
Project management conceptsProject management concepts
Project management concepts
 
First fare 2011 project-management
First fare 2011 project-managementFirst fare 2011 project-management
First fare 2011 project-management
 
lecture16.ppt
lecture16.pptlecture16.ppt
lecture16.ppt
 
Cost estimation
Cost estimationCost estimation
Cost estimation
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

Software Outsourcing: Pitfalls and Best Practices

  • 1. Software Outsourcing:Pitfalls and Best Practices Igor Tsinman CTO, AMC Bridge
  • 2.
  • 4. Key issues with outsourcing
  • 5. Most common reasons projects fail
  • 7. Questions to ask your potential partnerAgenda
  • 8.
  • 9. The observations and recommendations in this talk are based on our and our partners’ experiences in carrying out these projects.Background
  • 10.
  • 11. With skills that may be hard to find locally, or that are not necessarily part of the long term “picture” for your company
  • 14. Save money or extend existing budget
  • 17. No free lunch: in many ways, successful projects require many of the same elements as building your own team (communication, organizational knowledge, processes)
  • 18. Outsourcing is not a “silver” bullet – just another tool in getting things done, taking into account tasks, resources, time and money at hand.Why outsource?
  • 19.
  • 20. [Most of our experience, and thus the observations and recommendations in this PPT, are for projects in category 1-3.]Typical projects
  • 21. Several ways that outsourced engineering teams can play a role Occasional one-off project (e.g., 1-2 engineers for 2 months) Extension of in-house engineering team (e.g., 5-10 engineers on a more-or-less ongoing basis) Fully outsourced development Wide range of scope
  • 22. What’s delivered is not what’s expected Bug fixing can be long and cumbersome After project delivery, lots of time spent bringing it up to the acceptable standards Excess expenses eat up projected “savings” Common failure modes
  • 23.
  • 24. Lack of understanding on the part of development team of the purpose and goals of the developed application
  • 26. Lack of clarity and coordination on key architectural assumptions/design/approach of overall program
  • 28. Not integrating the outside team into overall program’s development process
  • 30.
  • 31. For example, if you need to design and build application for performance based compensation in brokerage industry you should understand some basic things about how this industry works, such as:
  • 32. The difference between gross commissions and net commissions.
  • 33. What is ticket charge, what is trailer etc.
  • 34. The gap could be mitigated by a well defined spec, but it may not be enough in all cases.
  • 35. People work more productively if they understand the “big” picture, and see their work in the context of the overall projectBusiness context mismatch
  • 36. Here we are not talking about “basic technologies” like C++ or Java or .Net… Rather, this is about the architectural assumptions of the project, approaches and ideas that technical leads put into project. It’s rare that that information is captured in up-to-date documentation – at best one finds “original design documents” which most of the time are very outdated. Frequently, developers are forced to “research” product architecture by looking into code. For “local” staff, this can be mitigated by ability to ask questions in the real time – for outsource team this is much more difficult. As a result code submitted by outsource group can often be “contradictory” to the approach taken by the “main group.” It may not follow design guidelines, may be considered “poor” and unusable. At the end of the day quality for the project declines –sometimes to a critical point. Technical context mismatch
  • 37.
  • 38. This is especially true for many small companies and start-ups.
  • 39. Need to think through: project management, communication, code submission process, bug tracking, time management, QA, documentation.Development process mismatch
  • 40.
  • 41. There are culture where “it is impossible” for the boss to we wrong – i.e. if you’ve been told to do this – you should do it, period. Regardless of the quality of the assignment or the fact that you may know how to do it better.
  • 42. Engineers are chronically afraid to ask a question of their customer’s project leader – fearing that someone (especially their customer – their “boss”) will think that “they’re stupid.” The result is that the boss always hears “OK, everything is good” - while the engineer on the other end searches endlessly for answers to simple questions.Cultural mismatch
  • 43. Areas to probe: Evaluate how familiar outsourcing partner is with business domain, architectural components References – similar projects Explore their operations – process, approach, tools, technologies, source control, bug management, etc. Key questions to ask
  • 44.
  • 45. If you have an important project, it should not be outsourced to “moon lighters”
  • 46. Rather, look for organization who has been in business for some time, and has invested in building a company
  • 47. They would police their workforce themselves since “IP leak” would spell death for their business;
  • 48. If company ownership is in the US, this would add additional “protection” – owners could be reached by US legal system, adding pressure on them to build team and process accordingly.Intellectual Property
  • 49. Think long-term, build teams, invest in bringing people on board Choose teams w/domain expertise (rather than focusing on programming language / technology) Communication – one-to-many; many-to-many Best practices
  • 50.
  • 51. This helps create the effect of “information accumulation” – once explained, a topic could be clarified later, avoiding the need to revisit it over and over again
  • 52. Select teams that have worked in the same business area. For example, if they have written applications for financial industry – they most likely know concepts and terms such as Account, Positions, Product, etc. mean.
  • 53. Select teams that have experience in outsourcing for companies similar in size to yours
  • 54. Select teams that have built applications similar architecturally to yours– e.g., Client Server, Social Networks, CAD etc.Choose/build the right team
  • 55. Spend time to bring engineers on board – both in terms of business as well as technical aspects of the project. For example: at the beginning of a project, or at an important stage of the project, key members of outsourcing team visit your company for extended period of time, to get “merged” into the thinking around requirements, specification and approaches. (Also helps reduce cultural mismatch!) On-boarding new members
  • 56.
  • 57. Structure outsourcing team in such a way that while everybody can talk to everybody, there is a point person on the other side for issue resolution as well as issue tracking;
  • 58. Pay close attention to the process – a well-defined process is essential to making sure that offshore team contributes successfully to a project.Communication
  • 59. Case Study:Interactive Supercomputing MIT spin-off in High Performance Computing recently acquired by Microsoft Founded 2005; Identified need for outsourcing in 2006 Deployment and installation tools, QA framework, Math libraries developments Conducted search for outsourcing partner, hired and trained internal manager for the program (~12 months) Selected outsourcing partner, hired 2 Engineers and invited them onsite for 4 weeks of intense training (early 2007) Implemented best practices: Built communication, project procedures etc. for 6 months before hiring more people into the group Regularly hosts new members for on-site training, sends program manager overseas for group meetings Expanded group to 10 engineers, testers and system administrators ( 30 -40% of the total development force) Conducted several research projects by temporarily expanding the team Acquired by Microsoft – 09/2009: 2out of 3 technologies highlighted by Microsoft tech assessment team were developed with active participation of outsourcing team
  • 60. Outsourcing can improve time-to-market and save money… …But there’s no free lunch. Must be vigilant about key failure modes, and be disciplined about best practices. Summary
  • 61. Questions? Igor Tsinman itsinman@amcbridge.com (617) 842-7470