Unformatted text preview:

Lecture 13AnnouncementsOld Business ModelBusiness Model with InternetNew Service ModelsFig 7.1 Purchase vs subscribe cashflowNew Service Models ctd.Web Services ModelGrid/On Demand/Utility ComputingFig 7.2(a) On Demand Computing EnvironmentFig 7.2(b) On-Demand ComputingRisk ManagementFig 7.3 Outsourcing DecisionsIncremental Outsourcing: HostingTable 7.1 Levels of Service from Hosting ProvidersRelationship ManagementExerciseTable 7.2 Comparing Hosting ProvidersTable 7.3 Visit Report on Hosting ProvidersQuestions, Break, PresentationService Level Agreements (SLAs)Table 7.4 Sample SLALegacy ManagementTable 7.5 Managing LegaciesManaging infrastructure AssetsMIT Study on InfrastructureFindingsFindings: Clusters of IT-infrastructure servicesFindings: Matching Capabilities to Strategic DirectionClassifying InitiativesCritical CapabilitiesInvesting in IT for strategic agilityLecture 13Chapter 7Managing Diverse IT Infrastructures2Announcements•Business Plan Individual project due Thursday May 24 (next week)3Old Business Model•Each company develops own infrastructure for communication with customers and partners–Duplication–Lack of interoperability –Required separate software simply to convert between incompatible systems–Proprietary systems locked in relationships over a long term, removing bargaining power4Business Model with Internet•Open standards of communication•Leverage work done by others•Shared infrastructure with partners•Bridging software simple, cheap•Less locking of partnerships•Services can come from separate providers instead of IT departments•Incremental services instead of large commitments•Virtual integration of partners•Service Level Agreements5New Service Models•Client-server computing–Locally stored documents, software•High capacity networks allow software, servers, storage to be distant from users•Not every company needs every specialization of IT capability•Develop new capabilities quickly, reducing time to market•Shift to 24-7 operations•Better cash-flow (see fig)6Fig 7.1 Purchase vs subscribe cashflow7New Service Models ctd.•Cost reduction–Centralization of updates–Eliminated need for specialized support–Less vulnerable points of security breach–Economies of scale•Global accessibility–Physical location–Device8Web Services Model•Online, automated negotiation for service•Currency conversion example9Grid/On Demand/Utility Computing•Reconfiguration online of resources•Web-enabled contracts•Sharing of resources•Requires–Short term, simple contracts–Restructuring of existing applications–Advanced infrastructure•Middleware to manage–Provisioning–Resource virtualization–Change Management–Performance Monitoring•See fig 7.210Fig 7.2(a) On Demand Computing Environment11Fig 7.2(b) On-Demand Computing12Risk Management•Which services should we outsource?–Generic processes that others can do better–Commodities–Not core capability or competitive advantages•Incremental service outsourcing is smaller scale and more reversible than production outsourcing13Fig 7.3 Outsourcing Decisions14Incremental Outsourcing: Hosting•House computers for net services•Service levels–Collocation hosting–Shared hosting–Dedicated hosting•Different level of services available–See table 7.115Table 7.1 Levels of Service from Hosting Providers16Relationship Management•Trust is extremely important•Often put out a RFP (Request for Proposal)•Look for–Descriptive Information–Financial Information–Proposed plan for meeting requirements–Mitigation of critical risks–Service guarantees–Pricing17Exercise•Look at tables 7.2, 7.3 and make a recommendation of selection for one service provider out of the three offered18Table 7.2 Comparing Hosting Providers19Table 7.3 Visit Report on Hosting Providers20Questions, Break, Presentation21Service Level Agreements (SLAs)•Align incentives in relationships•Careful definitions•Penalties – large or small – for failure to provide•Trusting with data–Clear who owns it•See table 7.422Table 7.4 Sample SLA23Legacy Management•Illustration of IT and accounting team (p348)•Typical challenges–Technology–Residual Process complexity–Local Adaptation–Nonstandard data definitions•Adding interfaces called enterprise application integration (EAI)•Work-around solutions tend to grow in complexity•See table 7.524Table 7.5 Managing Legacies25Managing infrastructure Assets•Difficulty to recognize who is using what machine etc.•Need to know if assets are used efficiently, if they are being used across business lines, etc.•Total Cost Ownership (TCO)–IT services measured in terms of measured costs and benefits–Per use or time dedicated–Theoretically efficient, but can be cumbersome and lead to wrong valuation and incentives26MIT Study on Infrastructure•180 business initiatives•118 businesses in 89 enterprises•4.2% of revenue spent on IT•50% of capital budget•55% of IT budget goes toward fusion of technology, processes and human assets27Findings•Leading companies used incremental modular steps rather than a few large investments•Service level agreements become more stable in better companies•Variety of classes of service that make up infrastructure28Findings: Clusters of IT-infrastructure services•Channel-management•Security and Risk-management•Communication•Data-management•Application-infrastructure•IT-facilities-management•IT-management•IT-architecture-and-standards•IT-education•IT R&D29Findings: Matching Capabilities to Strategic Direction•Found significant correlation between strategic agility and IT-infrastructure capability•Three major categories of initiatives:–Internally focused (51%)–Demand side: Links to Customers (55%)–Supply side: links to suppliers (76%)•56% of initiatives covered at least two, and 26% covered all three30Classifying Initiatives•Position on value net (suppliers/buyers/internal)–Technology enables communication and drops transaction costs•Type of exchange (B2B or B2C)–B2B involves small, focused customer set with large transaction volume per customer–B2C large no. of individual customers with less transactions per customer–Both require significant data•Type of innovation: products or markets?31Critical Capabilities•Supply-side–Business-unit level decisions required different systems•Internally-focused–Broadly enforced standards,


View Full Document

UCSC ISM 158 - Managing Diverse IT Infrastructures

Documents in this Course
NOTES

NOTES

2 pages

NOTES

NOTES

22 pages

Load more
Download Managing Diverse IT Infrastructures
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Managing Diverse IT Infrastructures and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Managing Diverse IT Infrastructures 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?