Sourcing Handbook. Tactics and Templates for Sourcing Strategy and Vendor Management. CEB CIO Leadership Council
|
|
- Brian Hudson
- 7 years ago
- Views:
Transcription
1 Sourcing Handbook Tactics and Templates for Sourcing Strategy and Vendor Management CEB CIO Leadership Council
2 A Framework for Member Conversations The mission of CEB Inc. and its affiliates is to unlock the potential of organizations and leaders by advancing the science and practice of management. When we bring leaders together, it is crucial that our discussions neither restrict competition nor improperly share inside information. All other conversations are welcomed and encouraged. Confidentiality and Intellectual Property These materials have been prepared by CEB Inc. for the exclusive and individual use of our member companies. These materials contain valuable confidential and proprietary information belonging to CEB, and they may not be shared with any third party (including independent contractors and consultants) without the prior approval of CEB. CEB retains any and all intellectual property rights in these materials and requires retention of the copyright mark on all pages reproduced. Legal Caveat CEB Inc. is not able to guarantee the accuracy of the information or analysis contained in these materials. Furthermore, CEB is not engaged in rendering legal, accounting, or any other professional services. CEB specifically disclaims liability for any damages, claims, or losses that may arise from a) any errors or omissions in these materials, whether caused by CEB or its sources, or b) reliance upon any recommendation made by CEB.
3 For most organizations, sourcing is a critical and unavoidable activity. SOURCING IS A CORE ACTIVITY FOR IT External Spend as a Percentage of Total IT Spend Sixty-six percent of the 149 organizations surveyed spend more than 10% of their IT budget on outsourcing and contractors. 58% 68% External Internal 42% 32% Source: CEB 2008 and 2012 Budget and Spending Database. Spending on d s and Contractors Organizations That Have d Less Than 10% 34% Organizations That Have d More Than 10% 66% Sourcing Defined IT sourcing is a set of processes for finding, evaluating, and managing suppliers of IT products and services; this includes software and hardware vendors and service providers such as integrators and outsourcers. n = 149. Source: CEB 2012 IT Budget and Spending Database. THE CHANGING FACE OF SOURCING SOURCING VALUE EROSION IT SOURCING LIFECYCLE HOW TO USE THE HANDBOOK 3
4 The maturation of cloud technologies, integrated business services, and greater business partner responsibility for technology decisions will alter the dynamics of sourcing and vendor management in the next few years. THE CHANGING FACE OF SOURCING Business and Technology Trends Impact Implication 1. Technology as a : Infrastructure and Applications are becoming available as virtualized, configurable, and scalable services in the cloud or will adopt licensing structures to mimic a service. 2. The Industrialized, Externalized Back Office: Industry standards will emerge for back-office business processes that are then delivered by external providers. The cloud provides an additional approach to external provision that will lead to externalized assets and activities that were not viable with other forms of outsourcing. IT will have fewer operational roles supporting back-office business processes. More Sourcing: Delivery will be increasingly externalized as vendors expand service provision and internal resources become brokers, not providers. 3. Selective Business-Owned Technology Sourcing: Business unit leaders and end users will play a greater role in obtaining and managing technology for themselves where differentiation has more value than standardization. Increasingly, technology-aware business leaders will be involved in key stages of technology procurement. Need for Stronger Sourcing Processes and Skills: IT will need to upgrade sourcing strategy and processes. Vendor management competencies, such as influencing, negotiation, market awareness, will become critical. Source: CEB analysis. For further analysis of future sourcing trends, see The Future of Corporate IT Vol. 3, Externalized Delivery. THE CHANGING FACE OF SOURCING SOURCING VALUE EROSION IT SOURCING LIFECYCLE HOW TO USE THE HANDBOOK 4
5 Analyze all business processes based on their role in providing competitive advantage and severity of operational risks to determine their outsourcing suitability. Cisco uses a framework to evaluate the readiness of all processes for outsourcing by applying strategic and operational risk filters to core and noncore activities. In this dynamic model, activities move between quadrants based on changing business needs and strategies. STRATEGIC AND OPERATIONAL RISK FILTERS Business Process Outsourcing Suitability Screen Mission Critical Any activity that, if performed poorly, would pose an immediate threat Core Any activity that contributes to competitive advantage In House Retain complete control Engage and control Cisco personnel Continue in house Our way, our standards Noncore Any activity that does not contribute to competitive advantage Out-Task and Transition Maintain outcome control Disengage and control Strategic partners Drive productivity Your way, our standards Sourcing Type Product Managed Cloud Source Sourcing Roles Business User Delivery Sourcing Non-Mission Critical Any activity that, if performed poorly, would not pose an immediate threat Out-Task and Review Maintain process control Engage and entrust Specialist partners Focused investment Our way, your standards More in the Core: Not all core activities are off limits for outsourcing; an initial risk screen can uncover suitable core activities given an appropriate level of control. Source: CEB analysis. INTRODUCTION: ALIGN WITH BUSINESS STRATEGY TEST SUITABILITY OF SOURCING MODELS Give up control Disengage and entrust Vendors Leverage and contract Your way, your standards ASSESS PROCESS READINESS ALIGN SOURCING STRATEGY WITH BUSINESS GOALS 5
6 Test strategic impact and reliance on relationships of specific IT activities to help determine potential outsourcing models. TEST OUTSOURCING SUITABILITY Global Sourcing Framework Applications Sourcing Framework Relationship-Neutral Relationship-Rich Strategic Lever Application development and integration Specification of application functionality Generation of high-level business requirements Sourcing Type Product Managed Cloud Source Sourcing Roles Business User Delivery Sourcing Global IS Strategic Lever Any activity that plays a role in helping Diageo achieve strategic ambitions Nonstrategic Any activity that has no strategic consequence to the business Relationship- Neutral Any activity that does not depend on strong relationships for success Managed /Priming/ Outsourcing (Potentially Offshore) Source: CEB 2006 Managing Infrastructure Outsourcing. INTRODUCTION: ALIGN WITH BUSINESS STRATEGY Partnering Through Smart Source (Near Source) Relationship-Rich Any activity that requires strong relationships or people insight for success IS Internal (Retain) TEST SUITABILITY OF SOURCING MODELS Rollout and application support Training Infrastructure Sourcing Framework Strategic Lever Relationship-Neutral Hardware requirements and high-level specification Sourcing, building, configuration License management Hand-holding support (internal coaching) Relationship-Rich Equipment allocation to employees (high level) Governance and Management Sourcing Framework Strategic Lever Nonstrategic Nonstrategic Nonstrategic Relationship-Neutral Asset management priority and methodology Replicable processes Asset management processes ASSESS PROCESS READINESS Line manager equipment requirements Relationship-Rich Change management principles methodology Global responsibilities and accounting Global problem resolution Local problem resolution Local change management rollout Local responsibility and accountability ALIGN SOURCING STRATEGY WITH BUSINESS GOALS 6
7 Make sourcing decisions based on IT role by creating a sourcing matrix to determine the degree to which each role can be outsourced. Without clear definitions of roles and competencies, appropriate sourcing decisions cannot be made. Strategic roles are too important to outsource. EVALUATE SOURCING FEASIBILITY BY IT ROLE Sourcing Matrix Excerpt Degree of Collaboration High Collaboration Medium Collaboration Low Collaboration Constant collaboration, face Frequent virtual collaboration, Frequent virtual collaboration, to face required with business; some face to face minimal face to face Strategic Importance colocation desired Defines Business Strategic Strategic Project Dependent Defines business and supporting IT strategy and architecture; should be internal Application Architect Data Architect Program Requirements Systems Engineer 1 Finance Systems Engineering Launch Sourcing Type Product Managed Cloud Source Influences Business Strategic Project Dependent Market-Sourced s Contributes to realizing IT strategy and may possess substantial institutional or proprietary knowledge; may be external Contract Business Analyst Requirements Lead Project DBA Development QC Lead QC Requirements Analyst Implements Business Solution Project Dependent Market-Sourced s Market-Sourced s Executes the defined solution; high potential to outsource Administrative Assistant Launch Project Controller Launch Support Production Support Tier 2 Application Administration Production Support Tier 2 Production Support QC Analyst Developer QC Tester Production Support Tier 1 Systems Administrator Sourcing Roles Business User Delivery Sourcing Strategic Cannot Project Dependent Some Outsourcing Possible Market-Sourced s Candidate for Outsourcing 1 Pseudonym. Source: CEB 2008 Reshaping Skills Portfolio. INTRODUCTION: ALIGN WITH BUSINESS STRATEGY TEST SUITABILITY OF SOURCING MODELS ASSESS PROCESS READINESS ALIGN SOURCING STRATEGY WITH BUSINESS GOALS 7
8 Gaps in internal processes must be identified and addressed before undertaking sourcing initiatives. VALIDATE SOURCING READINESS Potential Process Gaps Process Readiness Assessment Tool Excerpts GSK tests internal process readiness for outsourcing suitability by identifying gaps in process definition, control, and enablement. Section 1: Process Definition Gaps Assesses understanding of processes and complexity Represents critical exposures Criteria High Suitability = Low Risk Assessment of Process Readiness 1. Objectives Clearly defined objectives, as a result of the outsourced opportunity, are definable, measurable, and realistic. 2. Application Uniqueness 3. Size and Complexity Industry standard or configured solution with standard technology, supporting a common process Measure of the complexity of application or process and underlying technology, e.g., enhancement, integration, number of technologies; how long does it take new users to understand it? Objectives undefined 1 10 Obscure, highly proprietary, supporting exclusive process Complex, requiring years to thoroughly understand 1 10 Objectives defined and regularly reviewed Common knowledge, e.g., configured standard solution 1 10 Simple and can be understood in a few weeks Risk R/Y/G Sourcing Type Product Managed Cloud Source Sourcing Roles Business User Delivery Sourcing Section II: Process Control Gaps Outlines oversight or monitoring deficiencies Exposures must be fixed before proceeding or at outset of deal. Section III: Process Enabler Gaps Focuses on potential workflow and efficiency risks Exposures require ongoing monitoring. 9. Delivery Processes 14. License Provision Source: CEB 2007 Process Readiness Assessment. INTRODUCTION: ALIGN WITH BUSINESS STRATEGY 15. Communications 16. Impact on Existing Roles The processes to produce required outputs are clearly understood and defined. This should Inconsistent and include processes associated with management undocumented of delivery (e.g., change control). Where GSK processes processes are used, training requirements should be defined. 10. Metrics Metrics for monitoring project/service delivery performance and quality are (or can be) defined. 11. Cost Baselined The project/service cost baseline and its composition are understood. 12. Project/ Management There is an overall project/service management capability planned to be resourced within GSK. Is there a possibility GSK will be expected to provide licenses for software accessed via or installed on the offshore desktop? Note: Refer to guidance in License Sheet tab in this workbook. Nature of required communications is understood. Mechanisms to overcome remote working and time zone differences can be implemented. Yes Y N No Frequent ad hoc, face to face communication required 1 10 No metrics defined 1 10 Current costs unknown with no estimates Unclear management roles or responsibilities Are GSK or CW roles potentially impacted (at risk)? Yes Y N No TEST SUITABILITY OF SOURCING MODELS ASSESS PROCESS READINESS Documented and enforced processes Metrics defined, regularly reported, and reviewed Current costs fully understood with estimates for all components Strong management capability with defined responsibilities Predictable and structured communication can be implemented. ALIGN SOURCING STRATEGY WITH BUSINESS GOALS 8
9 Segment sourcing proposals based on impact on business objectives and ease of implementation. A COMPREHENSIVE VIEW OF STRATEGIC FIT Portfolio Segmentation Grid Illustrative Set of Sourcing Proposals for Business Unit A Business Impact High Complex Project 5 Project 3 Collaborative Project 2 Project 8 Project 1 Project 7 Project 6 Project 4 Business Adapts to Sourcing Strategy Procurement proposes to accelerate qualification of new emerging market supplier. Business impact is to improve COGS while meeting local content requirements. Business decides to reallocate resources to fund project. Low 0 0 Hard SWAT Ease of Implementation Easy Sourcing Type Product Managed Cloud Source Sourcing Roles Business User Delivery Sourcing Sourcing Strategy Adapts to Business Procurement proposes to migrate to new regional maintenance service providers. Project Portfolio Segmentation Types Complex: High impact, difficult implementation Resource distribution 50% Procurement, 50% BU (crossfunctional team) Collaborative: Moderate impact and easy implementation Resource distribution 70% Procurement, 30% BU (Procurement lead) Source: CEB 2012 A House United: Securing Business Partner Commitment to Sourcing Strategy. INTRODUCTION: ALIGN WITH BUSINESS STRATEGY TEST SUITABILITY OF SOURCING MODELS ASSESS PROCESS READINESS SWAT: Low to moderate impact, easy implementation Resource distribution 100% Procurement (BU defines objectives and hands off) ALIGN SOURCING STRATEGY WITH BUSINESS GOALS 9
10 Thank You for Your Interest in CEB Research! If you re a member, please log into your account to access the full study. If you would like access to this full study, please contact CEB to learn more. Member Login Contact CEB 2014 CEB. All rights reserved. CIO SYN
11 Contact CEB to Learn More cebglobal.com/it 10
An Unbalanced Scorecard
An Unbalanced Scorecard Twelve New IT Metrics for an Era of Change CEB CIO Leadership Council A Framework for Member Conversations The mission of CEB Inc. and its affiliates is to unlock the potential
More informationThe State of Hybrid Cloud
The State of Hybrid Cloud To learn more about this full research or to inquire about membership, contact us: +1-866-913-8101 IT.Support@ executiveboard.com www.cebglobal.com/it CEB Infrastructure Leadership
More informationRunning an Effective Office of the CIO
Running an Effective Office of the CIO Key Findings from the Chief of Staff Time Allocation and Responsibilities Survey CEB CIO Leadership Council A Framework for Member Conversations The mission of The
More informationOrganizational Restructuring Toolkit
Organizational Restructuring Toolkit Driving Effective Enterprise Change CEB Applications Leadership Council CEB Infrastructure Leadership Council A Framework for Member Conversations The mission of The
More informationEnhance visibility into and control over software projects IBM Rational change and release management software
Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software
More informationApplications Executive Council Drivers of Business Analyst Effectiveness
Applications Executive Council Drivers of Business Analyst Effectiveness IIBA Building Business Capabilities 2012 Moderator: Mark Tonsetic Senior Research Director A FRAMEWORK FOR MEMBER CONVERSATIONS
More informationRethink Your Risk Assessment Lifecycle
Information Security in a Box A Guide for Establishing Baseline Maturity Rethink Your Risk Assessment Lifecycle www.executiveboard.com INFORMATION SECURITY IN A BOX: A GUIDE FOR ESTABLISHING BASELINE MATURITY
More informationCEB Applications Leadership Council. Building an Effective Business Analyst Community
CEB Applications Leadership Council Building an Effective Business Analyst Community CEB Applications Leadership Council Content Publishing Solutions General Manager Warren Thune Executive Director Shvetank
More informationAudit Director Roundtable Asia Emerging Risks Report
Audit Director Roundtable Asia Emerging Risks Report Q3 2012 A FRAMEWORK FOR MEMBER CONVERSATIONS The mission of The Corporate Executive Board Company and its affiliates (CEB) is to unlock the potential
More informationRight-Sizing Electronic Discovery: The Case For Managed Services. A White Paper
Right-Sizing Electronic Discovery: The Case For Managed Services A White Paper 1 2 Table of Contents Introduction....4 An Overview of the Options...4 Insourcing: Bringing E-Discovery Processes In-House....4
More informationThe New Model for IT Service Delivery
CEB CIO Executive Board The New Model for IT Service Delivery Volume II: Skills, Deployment, and Integration All Rights Reserved. VOLuME II: SKILLS, DEPLOyMENT, AND INTEGRATION Study roadmap 4 Service
More informationRemote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
More informationLocation of the job: CFO Revenue Assurance
JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance
More informationServices Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
More informationERP. Key Initiative Overview
Jeff Woods Research Managing Vice President This overview provides a high-level description of the ERP Key Initiative. IT leaders can use this overview to better understand what they need to do to prepare
More informationBACKUP IN A VIRTUAL WORLD. Data-Protection Challenges in Virtual Server Environments
BACKUP IN A VIRTUAL WORLD Data-Protection Challenges in Virtual Server Environments Data protection for virtual environments became crucial when end users began virtualizing tier-one, mission-critical
More informationPortland. Reducing Software Costs While Increasing Cost Predictability and Control. Abstract. Mikko Marttinen
White paper Reducing Software Costs While Increasing Cost Predictability and Control Mikko Marttinen Abstract Effective software procurement addresses contractual and overall cost of ownership through
More informationAn ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
More informationEnabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
More informationApplication Overhaul. Key Initiative Overview
Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an
More informationAccenture Life and Annuity Software. Achieving high performance through faster time to market, increased agility and improved cost control
Accenture Life and Annuity Software Achieving high performance through faster time to market, increased agility and improved cost control Accenture Life and Annuity Software offers strategic solutions
More informationHigh level principles for risk management
16 February 2010 High level principles for risk management Background and introduction 1. In their declaration of 15 November 2008, the G-20 leaders stated that regulators should develop enhanced guidance
More informationORACLE SERVICES PROCUREMENT
ORACLE SERVICES PROCUREMENT KEY FEATURES Create contracts for services with complex payment terms Incorporate progress payment schedule into services contracts Track and report progress based on schedule
More informationTransform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group
SAP Services Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group A Journey Toward Optimum Results The Three Layers of HR Transformation
More informationITIL v3 Process Cheat Sheets
CEB Infrastructure Leadership Council ITIL v3 Process Cheat Sheets 2014 CEB. All rights reserved. IEC8051414SYN 1 ITIL v3 Process Cheat Sheets The ITIL v3 process cheat sheets include a definition, description
More informationMaximize potential with services Efficient managed reconciliation service
RECONCILIATION IntelliMatch Operational Control services Optimize. PRODUCT SHEET Maximize potential with services Efficient managed reconciliation service Overview At its best, technology provides financial
More informationAnalyze, Validate, and Optimize Business Application Performance
SAP Brief SAP Extensions SAP LoadRunner by HPE Objectives Analyze, Validate, and Optimize Business Application Performance Test performance throughout the application lifecycle Test performance throughout
More informationORACLE S PRIMAVERA FEATURES PORTFOLIO MANAGEMENT. Delivers value through a strategy-first approach to selecting the optimum set of investments
ORACLE S PRIMAVERA FEATURES Delivers value through a strategy-first approach to selecting the optimum set of investments Leverages consistent evaluation metrics, user-friendly forms, one click access to
More informationDriving Business Value. A closer look at ERP consolidations and upgrades
IT advisory SERVICES Driving Business Value A closer look at ERP consolidations and upgrades KPMG LLP Meaningful business decisions that help accomplish business goals and growth objectives may call for
More informationMODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE
MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE INTRODUCTION The machinery and plant engineering industry is under pressure to transform. Globalization, new competitors,
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationCould your utility improve efficiency and performance with third-party services?
White Paper Outsourced Smart Grid Services: A Smart Approach for AMI and Beyond Could your utility improve efficiency and performance with third-party services? Jim Blake Director of Customer Operations
More informationVendor Management Program Office Onshore or offshore?
Vendor Management Program Office Onshore or offshore? Deloitte s previous article 1 discusses the five most common challenges which have prohibited clients from optimizing their Vendor Management (VM)
More informationRole and Skill Descriptions. For An ITIL Implementation Project
Role and Skill Descriptions For An ITIL Implementation Project The following skill traits were identified as fairly typical of those needed to execute many of the key activities identified: Customer Relationship
More informationAssessing Your Information Technology Organization
Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing
More informationHuman Capital Advantage for Business What is the value of ADP ihcm for HR Directors?
Human Capital Advantage for Business What is the value of ADP ihcm for HR Directors? HR.Payroll.Benefits. ADP ihcm: Rethink Human Capital Management The need for HR to be a true business partner has never
More informationConcept of Operations for Line of Business Initiatives
Concept of Operations for Line of Business Initiatives Version 1.0 Office of E-Gov and IT, OMB March 2006 Table of Contents FOREWORD...2 1 OBJECTIVES OF THE LINES OF BUSINESS CONCEPT OF OPERATIONS...3
More informationFUJITSU Transformational Application Managed Services
FUJITSU Application Managed Services Going digital What does it mean for Applications Management? Most public and private sector enterprises recognize that going digital will drive business agility and
More informationInnovation through Outsourcing
Innovation through Outsourcing Timothy Gehrig timothy.gehrig@cedarcrestone.com David Moore david.moore@cedarcrestone.com Agenda Expectations CedarCrestone Introduction Market Direction Outsourcing Solutions
More informationRoadmap for Selecting a Contact Center Infrastructure Solution
Roadmap for Selecting a Contact Center Infrastructure Solution June 2012 Sponsored By: Table of Contents Getting Started with a Contact Center Infrastructure Selection Process... 1 The RFP Process... 2
More informationVendor Management. Minimizing Value Leakage. Deloitte Consulting LLP. November 19, 2013
Vendor Management Minimizing Value Leakage Deloitte Consulting LLP November 19, 2013 Vendor Management is a rapidly emerging business practice in the outsourcing industry Define sourcing strategy Assess
More informationWHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
More information2015 Trends & Insights
Asia Pacific Mobility The Asia Pacific Mobility Brookfield Global Relocation Services Trends & Insights report is reflective of the global economy which is strongly tied with the economic realities of
More informationProgram Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT provides and supports the infrastructure and custom development for NIU s core human resources system: The PeopleSoft Human Resources Management System (PS- HR) provides core functionality
More informationAPPROACHES TO SPEND ANALYSIS AND SOURCING WITH IMMEDIATE ROI THAT NO ONE TOLD YOU ABOUT, UNTIL NOW
APPROACHES TO SPEND ANALYSIS AND SOURCING WITH IMMEDIATE ROI THAT NO ONE TOLD YOU ABOUT, UNTIL NOW Enporion, Inc. September, 2008 www.enporion.com TABLE OF CONTENTS Introduction... 3 With benefits like
More informationInformation Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
More informationI N D U S T R Y D E V E L O P M E N T S A N D M O D E L S. I D C M a t u r i t y M o d e l : P r i n t a n d D o c u m e n t M a n a g e m e n t
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com E X C E R P T I N D U S T R Y D E V E L O P M E N T S A N D M O D E L S I D C M a t u r i t y M o
More informationThe Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
More informationCisco Unified Workforce Optimization for Cisco Unified Contact Center Express
Cisco Unified Workforce Optimization for Cisco Unified Contact Center Express Cisco Unified Communications is a comprehensive IP communications system of voice, video, data, and mobility products and applications.
More informationOutsourcing Models: Aligning Sourcing Strategy to Business Objectives
Outsourcing Models: Aligning Sourcing Strategy to Business Objectives - Manish Subramanian, Rohini Williams An Introduction The term offshore outsourcing brings to mind images of work flowing from large
More informationfor Oil & Gas Industry
Wipro s Upstream Storage Solution for Oil & Gas Industry 1 www.wipro.com/industryresearch TABLE OF CONTENTS Executive summary 3 Business Appreciation of Upstream Storage Challenges...4 Wipro s Upstream
More informationHR Function Optimization
HR Function Optimization People & Change Advisory Services kpmg.com/in Unlocking the value of human capital Human Resources function is now recognized as a strategic enabler, aimed at delivering sustainable
More informationPricing Strategy Services Industry. Akash Rathod akashbabu@hotmail.com
Pricing Strategy Services Industry Akash Rathod akashbabu@hotmail.com Topics Why Pricing is important? Pricing Maturity Roadmap How to develop the pricing structure Pricing Process and Governance When
More informationOperations Excellence in Professional Services Firms
Operations Excellence in Professional Services Firms Published by KENNEDY KENNEDY Consulting Research Consulting Research & Advisory & Advisory Sponsored by Table of Contents Introduction... 3 Market Challenges
More informationSample Career Development Roadmap
Sample Career Development Roadmap Copyright TalentAlign IP (2006-2012) May not be copied or alienated without prior written permission Career Development Roadmap TM ABC Version: 1.0 ABC Career Development
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationSetting the Record Straight About Cloud-Based Contact Centers
Setting the Record Straight About Cloud-Based Contact Centers September 2012 Sponsored by: - 1-2012 DMG Consulting LLC Table of Contents Introduction... 1 Cloud-Based Solutions Are Secure... 1 Cloud-Based
More informationDifferentiate your business with a cloud contact center
Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September
More informationPRIMAVERA PORTFOLIO MANAGEMENT
PRIMAVERA PORTFOLIO MANAGEMENT Every business faces critical enterprise investment decisions. Making these decisions is among your most pressing challenges. Your PORTFOLIO MANAGEMENT FEATURES Delivers
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationCA Service Desk Manager
PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES
More informationAppendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
More informationMoving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them
Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Table of Contents Executive Summary... 3 Introduction: Opportunities of SaaS... 3 Introducing Nimsoft Service
More information75% On the Record. Is Your Organization s Records Management Program Providing High Value or High Risk?
Records Management SUrvey Report 75% of Most Respondents Said a Senior Executive Oversees the Records Program On the Record Is Your Organization s Records Management Program Providing High Value or High
More informationPERFORMANCE MANAGEMENT
PERFORMANCE MANAGEMENT integrated software solutions 01 EXECUTIVE SUMMARY SOLUTION OVERVIEW Concerto provides a secure, web-based solution incorporating complete project and programme performance management
More informationAddress IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
More informationState of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
More informationA Wissen White Paper. Effectively utilizing an offshore Remote DBA team augmentation strategy to increase productivity and reduce costs
A Wissen White Paper Effectively utilizing an offshore Remote DBA team augmentation strategy to increase productivity and reduce costs Introduction Increasing the mileage for a company s financial resources
More informationStartup Toolbox: Budgeting
Startup Toolbox: Budgeting Issued by Alyssa Gregory Many small business owners struggle with finding sufficient funds at some point in the lifecycle of their business. This toolbox will help you learn
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationA discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
More informationProgram Summary. Criterion 1: Importance to University Mission / Operations. Importance to Mission
Program Summary DoIT supports and provides the infrastructure and custom development for NIU s core financial systems: PeopleSoft Financial Management (PS- FMS) provides financial information to over 200
More informationHow Technology Supports Project, Program and Portfolio Management
WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY
More informationHow do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as
How do you manage the growing complexity of software development? Is your software development organization as responsive to your business needs as it could be? Borland Core SDP enables your IT organization
More informationCertkiller. 810-420.37Q.A. Cisco 810-420 Understanding Cisco Business Value Analysis Fundamentals
Certkiller. 810-420.37Q.A Number: Cisco 810-420 Passing Score: 800 Time Limit: 120 min File Version: 4.5 http://www.gratisexam.com/ Cisco 810-420 Understanding Cisco Business Value Analysis Fundamentals
More informationNEW YORK STATE-WIDE PAYROLL CONFERENCE. Presented to:
NEW YORK STATE-WIDE PAYROLL CONFERENCE Presented to: Felicia Cheek, Practice Leader Global Time to Pay Advisory 15 September 2014 Statement of Confidentiality and Usage Restrictions This document contains
More informationA Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I
IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services
More informationcan you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
More informationNational Geospatial Data Asset Management Plan
National Geospatial Data Asset Management Plan Portfolio Management Implementation Plan for the OMB Circular A 16 Supplemental Guidance as it relates to OMB Circular A 16, Coordination of Geographic Information
More informationRisk Solutions, Inc. Outsourcing Risk Management Services & Qualifications
Risk Solutions, Inc. Outsourcing Risk Management Services & Qualifications Introduction In order to improve quality, efficiency and profitability, many companies seek to focus their internal resources
More informationCisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
More informationTransforming Your Core Banking and Lending Platform
Transforming Your Core Banking and Lending Platform Dramatically improve your bank s core systems to increase operating agility, lower time to market, reduce costs and better manage risk and regulatory
More informationWhat are the three types of metrics that an organization should collect to support Continual Service Improvement (CSI)?
ITIL Foundation mock exam 1 1. The Process Owner is responsible for which of the following? 1. Documenting the process 2. Defining process Key Performance Indicators (KPI) 3. Improve the process 4. Perform
More informationEND TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
More informationThe Missing Links in Back-Office Business Process Management
The Missing Links in Back-Office Business Process Management 2012 Sponsored by: 2011 DMG Consulting LLC -1- March 2011 Table of Contents The Back-Office Staff Optimization Opportunity... 1 You Cannot Manage
More informationView Point. Oracle Applications and the economics of Cloud Computing. Abstract
View Point Oracle Applications and the economics of Cloud Computing Mandar Bhale Abstract Cloud computing is making waves in the Enterprise package space as the latest trend in Information Technology.
More informationIT Operations Management: A Service Delivery Primer
IT Operations Management: A Service Delivery Primer Agile Service Delivery Creates Business Value Today, IT has to innovate at an ever- increasing pace to meet accelerating business demands. Rapid service
More informationagility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
More informationField Sales Manager Job Description
SALES FORCE JOB DESCRIPTIONS Field Sales Manager Job Description The Sales Management Association +1 312 278-3356 www.salesmanagement.org About The Sales Management Association The Sales Management Association
More informationRoles within ITIL V3. Contents
Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for
More informationDATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
More informationTECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
More informationService Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
More informationUniversity of Wisconsin - Platteville UNIVERSITY WIDE INFORMATION TECHNOLOGY STRATEGIC PLAN 2014
University of Wisconsin - Platteville UNIVERSITY WIDE INFORMATION TECHNOLOGY STRATEGIC PLAN 2014 Strategic PRIORITIES 1 UNIVERSITY WIDE IT STRATEGIC PLAN ITS is a trusted partner with the University of
More informationData Center Consolidation in the Federal Government Looking beyond the technology
Data Center Consolidation in the Federal Government Looking beyond the technology Overview The reported number of Federal data centers grew from 432 in 1998 to 2,094 in 2010 1, an increase that is costly,
More informationIT Governance. What is it and how to audit it. 21 April 2009
What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures
More informationSOA Adoption Challenges
Introduction Raju Alluri SOA adoption is evolutionary rather than revolutionary. It is a journey and not an end state. There are many challenges in the SOA journey. First and foremost, the challenge is
More informationEnabling Business Transformation with Enterprise Architecture and IT Service Management
Cisco IT Article September 2012 Enterprise Architecture and IT Service Management Business Transformation through Architectures Enabling Business Transformation with Enterprise Architecture and IT Service
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More information