SlideShare una empresa de Scribd logo
1 de 21
Clean Before You Move
Why you should have your house on order before you source your IT?



Ewout Dekkinga, IT architect Cloud & DC Services
Avoid…




         © 2013 Unisys Corporation. All rights reserved.   2
Topics and content




  Context /     Multi
                         Workloads   Governance                    Conclusions
   trends     sourcing




                                       © 2013 Unisys Corporation. All rights reserved.   3
The Industry Perspective
Trends and Technology Drivers



66%                                                            90%




                                                                                  http://www.disruptiveittrends.com/
63%                                                           1/3



                                © 2013 Unisys Corporation. All rights reserved.   4
The Disruptive Technology Paradox
     Simplicity for End Users drives Complexity for IT

Continued IT Innovation is driving commoditization and simplicity for end-users, but masks
     an internal complexity that creates new management challenges for Enterprise IT

       Technology Shifts…                        Creating New Forms of
                                              Complexity for Enterprise CIOs…
                Infrastructural shift to
                Cloud Computing              • Cloud Computing is resulting in multiple
                                               deployment models for data centers
                                               including public and private clouds
        Shift to mobility as
        the “new desktop”                    • Mobile Computing is resulting in multiple
                                               device types for end users from
                                               smartphones, to tablets and laptops
                   Collaborative shift to
                   social computing          • Cloud, mobile and social computing
                                               increasingly part of application design
      Informational shift to                 • Big Data is driving storage rationalization to
     unstructured data and                     control costs and information infrastructure
         real time analytics
                                               transformation to gain business insights

            Cyber-security shift towards
                                             • These trends are creating an increasingly
            “zero trust” security models       porous CyberSecurity perimeter


                                                     Exchange Forum | ©Unisys Corporation. All rights reserved.
                                                               © 2013 2012 Unisys Corporation. All rights reserved.   5
                                                                                                                      5
What is Multi-sourcing?
A Selective usage of different sourcing methods


• Outsourcing
   – Hand-over operations
   – All or nothing
• Sourcing (in/out)
   –   On-premise
   –   Co-location
   –   Managed hosting
   –   Managed service
   –   Hybride IT


        Question of IT sourcing is not IF but What, Why, How & Where



                                                 © 2013 Unisys Corporation. All rights reserved.   6
Traditional outsourcing
One size fits all?




                          © 2013 Unisys Corporation. All rights reserved.   7
The Industry Perspective
    The paradox of interests in outsourcing
                                Once the contract has been signed,
            the goals of both parties take on their more natural business characteristics
                                                 ...




                  Client’s viewpoint:                                 Service Provider’s viewpoint:
The client wants to get:                                              Service Provider wants to deliver:
 Everything the Service Provider can offer . . .                      The things that have to be delivered by contract
 At the highest levels of quality, with the fast possible response    While doing everything possible to increase revenue and profit
  times . . .                                                          At the lowest cost possible
 With as many additional and value added services included (at
  no charge) – provided at the lowest possible cost

  And enjoy Immediate reductions in charges if volumes drop             And receive Notice for all changes
  or there is a need to scale back                                      and Payment for exceptions
  And ! The Client will reward their staff for making the above         And ! The Service Provider will reward its staff for making the
  take place                                                            above take place

                        Source: TPI Governance Insights; 11/2011                        © 2013 Unisys Corporation. All rights reserved.   8
Today’s IT environment
Transformed with multiple users, devices, applications and data sources

                                 Multiple application sources :
                                 Corporate Applications
                                 Public Software as a service/Various App stores




 Multiple user realities:
 • Private user                                       Hybrid
 • Corporate user                Hosted
                                                                       Outsourced
 • e-Citizen                     Private
                                 Clouds
                                                  Enterprise           Information
                                           Internal                      system
                                            Private              Internal
                                           Clouds      Public Information                       Multiple Data sources:
                                                       Clouds    system
                                                                                                Corporate
                                                                                                Social network
                                                                                                Community data
                                                                                                Unstructured data
                            Multiple user devices:
                            Mobile devices
                            Corporate devices
                            BYOD

                                                                            © 2013 Unisys Corporation. All rights reserved.   9
New sourcing models?
Fog is a cloud around your head!



• Alternative methods to have external parties deliver (parts
  of) the IT of your organization.
• Service Level Agreements (managed Services)
• IT Outsourcing
• BPO
• Cloud…




                                         © 2013 Unisys Corporation. All rights reserved.   10
Balance Efficiency and Effectiveness
The Performance Zone


     IT Waste And
     Overspending
          Point Solution
          Delivery




                                   Silo Delivery

                             Missed Business
                             Expectations


                                © 2013 Unisys Corporation. All rights reserved.   11
Today’s hybrid IT environment
Managed freedom of sourcing


               Borderless, Virtual, Automated, Visible and Secure

          Processes                           Policies                                      Architecture




        Internal           Internal           Hosted                                      Outsourced
          Data                                                   Public
                            Private           Private                                        Data
        Centers                                                  Clouds
                           Clouds             Clouds                                       Centers




   Security                 Governance                      Integration                              Applications


   Hybrid Enterprise
   A Hybrid Enterprise is a composition of cloud, non-cloud, internal and external IT service delivery
   models that remain unique entities but are bound together by an integrated management
   environment, and common technology, processes and policies to optimize agility, enable data
   and application portability, and reduce risk.

                                                                   © 2013 Unisys Corporation. All rights reserved.   12
Overcoming the Challenges
    With Application, Infrastructure and Management.


         Current              Multi-Sourcing approach                             Target
       Environment:           towards the Hybrid                               Environment:
                              Enterprise:

•    High fixed costs                                                 •     Low fixed costs

•    Low resource                                                     •     High resource
     utilization                                                            utilization
                                                 Goal
•                                Roadmap                              •
     Inflexible environment                     Setting                     Flexible environment

•    Labor costs high                                                 •     Labor costs optimized

                                 Feasibility   Workload




                                                          © 2013 Unisys Corporation. All rights reserved.   13
Application Assessment
                          Workload Analysis

                          Assess applications, maps its interdependency, provides blue print of environment
                          and determines the best fit by leveraging automation (tools) and reducing
                          migration time by up to 60% compared to manual based methods.


                                                                Business-As-Usual           Mission Critical                 Innovation




                                                                                                                             Applications

                                                                                                                        Business Goals

                                                                    Intelligent Application Alignment Service
ISBN: 978-0-12-374956-7




                                                                                                                    Migration Strategy
                                                                                                                             Roadmap

                                                                                                               Internal IT
                                                                       Private           Public
                                                                       Clouds            Clouds                   Outsourced IT

                                                                                 Cloud                           Non-Cloud


                                                                                           © 2013 Unisys Corporation. All rights reserved.   14
New sourcing models provide a lot more choices
Improving efficiency and flexibility




                                       © 2013 Unisys Corporation. All rights reserved.   15
Infrastructure is a utility, applications are sticky
Applications are the large part of the service




                                          © 2013 Unisys Corporation. All rights reserved.   16
Finding the best fit for all workloads
Not everything is utility!




                                    © 2013 Unisys Corporation. All rights reserved.   17
Why is Governance so important?
 The Realities of Managing Multi-Sourcing



      Multi-Sourcing is often underestimated and market observations show
      that expected benefits are often not realized due to ineffective
      management.

                                                                       Source: TPI – Trends in Multi-sourcing 2010




              • “Lack of management is         • “63% of companies                         • “Companies report
                central to the problems with     surveyed believe they                       between 5% and 30%
                multiple sourcing. 84% of        lose an average of 25%                      of the expected value of
Impact of       companies do not have
                what they regard as a
                                                 of contract value due to                    their transaction is lost
                                                 poor governance.”                           through ineffective
Poor            mature governance model.”
                                                                                             governance.”
Governance     Survey by PA Consulting,
               Financial Times
                                                International Association of
                                                Outsourcing Professionals                    TPI Research Study

              Central To All                   Lost Contract                               Lost Value of
              Problems                         Value                                       Transaction



                                                                         © 2013 Unisys Corporation. All rights reserved.   18
Core Components of the Governance Approach
   “Get your house on order”




                                    Simplified                      Improves
  improves Business                Multi-Sourcing                 Productivity &                                Control
        Value                      Environments                   Performance                                  IT Costs

• Supports business goals     • Enhance and simplifies      • Increases collaboration              • Consistent Service
  strategically through IT      multi-vendor management       and visibility                         Delivery with Improved
                                                                                                     Quality
• Enhances Business           • Enables strategic           • Increases understanding of
  Continuity                    partnering in a multi         expectations and means to            • Improves cost savings
                                source environment            accomplish them
• Fosters proactive                                                                                • Reduces operational
  improvement and             • Clarifies accountability    • Effective problem                      complexities
  innovation                    across the IT environment     management with faster
                                                              resolution                           • Enhances resource
• Improves focus,             • Strengthens relationships                                            utilization
  prioritization to provide     and improves                • Identifies scope for
  insights into                 communication                 automation and enables it
  opportunities

                                                                            © 2013 Unisys Corporation. All rights reserved.   19
Concluding statements

           Today’s business challenges and IT capabilities
           demand a different, more flexible, sourcing model


  Multi-Sourcing offers a fit for purpose delivery model
  based on mixing all available sourcing structures


            The optimal sourcing unit is the workload


  Without a proper governance structure, multi sourcing is
  not achievable


      With mapped workloads and proper governance
  your IT-house is on order, and your organization is ready
    to benefit of the opportunities of modern IT sourcing.
                                                     © 2013 Unisys Corporation. All rights reserved.   20
Thank you!




 © 2013 Unisys Corporation. All rights reserved.   21

Más contenido relacionado

La actualidad más candente

Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
threesixty
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
Hossam Hassanien
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
acijjournal
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
Novell
 

La actualidad más candente (20)

Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Smau Bari 2012 Roberto Cherubini
Smau Bari 2012   Roberto CherubiniSmau Bari 2012   Roberto Cherubini
Smau Bari 2012 Roberto Cherubini
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 

Destacado

Presentazione retica 2012
Presentazione retica 2012Presentazione retica 2012
Presentazione retica 2012
Paolo Moro
 
Fronterdagkommunikation
FronterdagkommunikationFronterdagkommunikation
Fronterdagkommunikation
Michael Bang
 
Intro to tsql unit 14
Intro to tsql   unit 14Intro to tsql   unit 14
Intro to tsql unit 14
Syed Asrarali
 
The victorian era[1]
The victorian era[1]The victorian era[1]
The victorian era[1]
Ada Villalba
 
Nadal 2012
Nadal 2012Nadal 2012
Nadal 2012
XISCA
 
Intro to tsql unit 6
Intro to tsql   unit 6Intro to tsql   unit 6
Intro to tsql unit 6
Syed Asrarali
 

Destacado (20)

Presentazione retica 2012
Presentazione retica 2012Presentazione retica 2012
Presentazione retica 2012
 
What is Spark the Rise
What is Spark the RiseWhat is Spark the Rise
What is Spark the Rise
 
Fronterdagkommunikation
FronterdagkommunikationFronterdagkommunikation
Fronterdagkommunikation
 
Energy
EnergyEnergy
Energy
 
Presentation stremtsi
Presentation stremtsiPresentation stremtsi
Presentation stremtsi
 
Coding dojo
Coding dojoCoding dojo
Coding dojo
 
Romania
RomaniaRomania
Romania
 
My-Martglobal.com | Business proposal toko belanja my mart global
My-Martglobal.com | Business proposal toko belanja my mart globalMy-Martglobal.com | Business proposal toko belanja my mart global
My-Martglobal.com | Business proposal toko belanja my mart global
 
B2B email marketing rechenda smith
B2B email marketing rechenda smithB2B email marketing rechenda smith
B2B email marketing rechenda smith
 
Intro to tsql unit 14
Intro to tsql   unit 14Intro to tsql   unit 14
Intro to tsql unit 14
 
Article Review
Article ReviewArticle Review
Article Review
 
Things to do in the Digital Afterlife when you're dead
Things to do in the Digital Afterlife when you're deadThings to do in the Digital Afterlife when you're dead
Things to do in the Digital Afterlife when you're dead
 
SEU_April
SEU_AprilSEU_April
SEU_April
 
The victorian era[1]
The victorian era[1]The victorian era[1]
The victorian era[1]
 
About the word "Nigthmare"
About the word "Nigthmare"About the word "Nigthmare"
About the word "Nigthmare"
 
HE Student Induction 13/14
HE Student Induction 13/14HE Student Induction 13/14
HE Student Induction 13/14
 
Nadal 2012
Nadal 2012Nadal 2012
Nadal 2012
 
EBS Digest #5
EBS Digest #5 EBS Digest #5
EBS Digest #5
 
Lentera news ed. #22 Maret 2016
Lentera news ed. #22 Maret 2016Lentera news ed. #22 Maret 2016
Lentera news ed. #22 Maret 2016
 
Intro to tsql unit 6
Intro to tsql   unit 6Intro to tsql   unit 6
Intro to tsql unit 6
 

Similar a Get your house on order

cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
Jonathan Houston
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four Walls
InSync Conference
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial services
IBM India Smarter Computing
 
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
IBM India Smarter Computing
 
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canadaMISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Ontario Cloud SIG
 

Similar a Get your house on order (20)

Hybride Cloud Strategy
Hybride Cloud StrategyHybride Cloud Strategy
Hybride Cloud Strategy
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
cloud computing - isaca conference 2012
cloud computing - isaca conference 2012cloud computing - isaca conference 2012
cloud computing - isaca conference 2012
 
Cloud services full description
Cloud services full descriptionCloud services full description
Cloud services full description
 
Z105745 ibmz-cloud-cairo-v1902a
Z105745 ibmz-cloud-cairo-v1902aZ105745 ibmz-cloud-cairo-v1902a
Z105745 ibmz-cloud-cairo-v1902a
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
 
Mobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four WallsMobilize Your Enterprise: Think Outside the Four Walls
Mobilize Your Enterprise: Think Outside the Four Walls
 
Dispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial servicesDispelling the Vapour around Cloud for Financial services
Dispelling the Vapour around Cloud for Financial services
 
MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101MISA Cloud workshop - Cloud 101
MISA Cloud workshop - Cloud 101
 
Intalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップIntalio Cloud V4 ロードマップ
Intalio Cloud V4 ロードマップ
 
Dispelling the Vapour around Cloud
Dispelling the Vapour around Cloud Dispelling the Vapour around Cloud
Dispelling the Vapour around Cloud
 
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
 
Dispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network ManagementDispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network Management
 
Dispelling The Vapor Around Cloud Computing
Dispelling The Vapor Around Cloud ComputingDispelling The Vapor Around Cloud Computing
Dispelling The Vapor Around Cloud Computing
 
Dispelling the vapor around cloud computing
Dispelling the vapor around cloud computingDispelling the vapor around cloud computing
Dispelling the vapor around cloud computing
 
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canadaMISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
MISA Cloud Workshop_ Roadmap to a municipal community cloud in canada
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 

Más de Dekkinga, Ewout

Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboard
Dekkinga, Ewout
 
Efficiënt gebruik van de opslag
Efficiënt gebruik van de opslagEfficiënt gebruik van de opslag
Efficiënt gebruik van de opslag
Dekkinga, Ewout
 

Más de Dekkinga, Ewout (7)

Digitaal onvoltooid verleden tijdv2
Digitaal onvoltooid verleden tijdv2Digitaal onvoltooid verleden tijdv2
Digitaal onvoltooid verleden tijdv2
 
Forward unisys
Forward unisysForward unisys
Forward unisys
 
Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboard
 
Data veiligstellen is nog een hele klus
Data veiligstellen is nog een hele klusData veiligstellen is nog een hele klus
Data veiligstellen is nog een hele klus
 
Efficiënt gebruik van de opslag
Efficiënt gebruik van de opslagEfficiënt gebruik van de opslag
Efficiënt gebruik van de opslag
 
Meet de gezondheid van de opslag
Meet de gezondheid van de opslagMeet de gezondheid van de opslag
Meet de gezondheid van de opslag
 
Opslag bepaalt het systeemprestatieniveau
Opslag bepaalt het systeemprestatieniveauOpslag bepaalt het systeemprestatieniveau
Opslag bepaalt het systeemprestatieniveau
 

Último

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Último (20)

Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 

Get your house on order

  • 1. Clean Before You Move Why you should have your house on order before you source your IT? Ewout Dekkinga, IT architect Cloud & DC Services
  • 2. Avoid… © 2013 Unisys Corporation. All rights reserved. 2
  • 3. Topics and content Context / Multi Workloads Governance Conclusions trends sourcing © 2013 Unisys Corporation. All rights reserved. 3
  • 4. The Industry Perspective Trends and Technology Drivers 66% 90% http://www.disruptiveittrends.com/ 63% 1/3 © 2013 Unisys Corporation. All rights reserved. 4
  • 5. The Disruptive Technology Paradox Simplicity for End Users drives Complexity for IT Continued IT Innovation is driving commoditization and simplicity for end-users, but masks an internal complexity that creates new management challenges for Enterprise IT Technology Shifts… Creating New Forms of Complexity for Enterprise CIOs… Infrastructural shift to Cloud Computing • Cloud Computing is resulting in multiple deployment models for data centers including public and private clouds Shift to mobility as the “new desktop” • Mobile Computing is resulting in multiple device types for end users from smartphones, to tablets and laptops Collaborative shift to social computing • Cloud, mobile and social computing increasingly part of application design Informational shift to • Big Data is driving storage rationalization to unstructured data and control costs and information infrastructure real time analytics transformation to gain business insights Cyber-security shift towards • These trends are creating an increasingly “zero trust” security models porous CyberSecurity perimeter Exchange Forum | ©Unisys Corporation. All rights reserved. © 2013 2012 Unisys Corporation. All rights reserved. 5 5
  • 6. What is Multi-sourcing? A Selective usage of different sourcing methods • Outsourcing – Hand-over operations – All or nothing • Sourcing (in/out) – On-premise – Co-location – Managed hosting – Managed service – Hybride IT Question of IT sourcing is not IF but What, Why, How & Where © 2013 Unisys Corporation. All rights reserved. 6
  • 7. Traditional outsourcing One size fits all? © 2013 Unisys Corporation. All rights reserved. 7
  • 8. The Industry Perspective The paradox of interests in outsourcing Once the contract has been signed, the goals of both parties take on their more natural business characteristics ... Client’s viewpoint: Service Provider’s viewpoint: The client wants to get: Service Provider wants to deliver:  Everything the Service Provider can offer . . .  The things that have to be delivered by contract  At the highest levels of quality, with the fast possible response  While doing everything possible to increase revenue and profit times . . .  At the lowest cost possible  With as many additional and value added services included (at no charge) – provided at the lowest possible cost And enjoy Immediate reductions in charges if volumes drop And receive Notice for all changes or there is a need to scale back and Payment for exceptions And ! The Client will reward their staff for making the above And ! The Service Provider will reward its staff for making the take place above take place Source: TPI Governance Insights; 11/2011 © 2013 Unisys Corporation. All rights reserved. 8
  • 9. Today’s IT environment Transformed with multiple users, devices, applications and data sources Multiple application sources : Corporate Applications Public Software as a service/Various App stores Multiple user realities: • Private user Hybrid • Corporate user Hosted Outsourced • e-Citizen Private Clouds Enterprise Information Internal system Private Internal Clouds Public Information Multiple Data sources: Clouds system Corporate Social network Community data Unstructured data Multiple user devices: Mobile devices Corporate devices BYOD © 2013 Unisys Corporation. All rights reserved. 9
  • 10. New sourcing models? Fog is a cloud around your head! • Alternative methods to have external parties deliver (parts of) the IT of your organization. • Service Level Agreements (managed Services) • IT Outsourcing • BPO • Cloud… © 2013 Unisys Corporation. All rights reserved. 10
  • 11. Balance Efficiency and Effectiveness The Performance Zone IT Waste And Overspending Point Solution Delivery Silo Delivery Missed Business Expectations © 2013 Unisys Corporation. All rights reserved. 11
  • 12. Today’s hybrid IT environment Managed freedom of sourcing Borderless, Virtual, Automated, Visible and Secure Processes Policies Architecture Internal Internal Hosted Outsourced Data Public Private Private Data Centers Clouds Clouds Clouds Centers Security Governance Integration Applications Hybrid Enterprise A Hybrid Enterprise is a composition of cloud, non-cloud, internal and external IT service delivery models that remain unique entities but are bound together by an integrated management environment, and common technology, processes and policies to optimize agility, enable data and application portability, and reduce risk. © 2013 Unisys Corporation. All rights reserved. 12
  • 13. Overcoming the Challenges With Application, Infrastructure and Management. Current Multi-Sourcing approach Target Environment: towards the Hybrid Environment: Enterprise: • High fixed costs • Low fixed costs • Low resource • High resource utilization utilization Goal • Roadmap • Inflexible environment Setting Flexible environment • Labor costs high • Labor costs optimized Feasibility Workload © 2013 Unisys Corporation. All rights reserved. 13
  • 14. Application Assessment Workload Analysis Assess applications, maps its interdependency, provides blue print of environment and determines the best fit by leveraging automation (tools) and reducing migration time by up to 60% compared to manual based methods. Business-As-Usual Mission Critical Innovation Applications Business Goals Intelligent Application Alignment Service ISBN: 978-0-12-374956-7 Migration Strategy Roadmap Internal IT Private Public Clouds Clouds Outsourced IT Cloud Non-Cloud © 2013 Unisys Corporation. All rights reserved. 14
  • 15. New sourcing models provide a lot more choices Improving efficiency and flexibility © 2013 Unisys Corporation. All rights reserved. 15
  • 16. Infrastructure is a utility, applications are sticky Applications are the large part of the service © 2013 Unisys Corporation. All rights reserved. 16
  • 17. Finding the best fit for all workloads Not everything is utility! © 2013 Unisys Corporation. All rights reserved. 17
  • 18. Why is Governance so important? The Realities of Managing Multi-Sourcing Multi-Sourcing is often underestimated and market observations show that expected benefits are often not realized due to ineffective management. Source: TPI – Trends in Multi-sourcing 2010 • “Lack of management is • “63% of companies • “Companies report central to the problems with surveyed believe they between 5% and 30% multiple sourcing. 84% of lose an average of 25% of the expected value of Impact of companies do not have what they regard as a of contract value due to their transaction is lost poor governance.” through ineffective Poor mature governance model.” governance.” Governance Survey by PA Consulting, Financial Times International Association of Outsourcing Professionals TPI Research Study Central To All Lost Contract Lost Value of Problems Value Transaction © 2013 Unisys Corporation. All rights reserved. 18
  • 19. Core Components of the Governance Approach “Get your house on order” Simplified Improves improves Business Multi-Sourcing Productivity & Control Value Environments Performance IT Costs • Supports business goals • Enhance and simplifies • Increases collaboration • Consistent Service strategically through IT multi-vendor management and visibility Delivery with Improved Quality • Enhances Business • Enables strategic • Increases understanding of Continuity partnering in a multi expectations and means to • Improves cost savings source environment accomplish them • Fosters proactive • Reduces operational improvement and • Clarifies accountability • Effective problem complexities innovation across the IT environment management with faster resolution • Enhances resource • Improves focus, • Strengthens relationships utilization prioritization to provide and improves • Identifies scope for insights into communication automation and enables it opportunities © 2013 Unisys Corporation. All rights reserved. 19
  • 20. Concluding statements Today’s business challenges and IT capabilities demand a different, more flexible, sourcing model Multi-Sourcing offers a fit for purpose delivery model based on mixing all available sourcing structures The optimal sourcing unit is the workload Without a proper governance structure, multi sourcing is not achievable With mapped workloads and proper governance your IT-house is on order, and your organization is ready to benefit of the opportunities of modern IT sourcing. © 2013 Unisys Corporation. All rights reserved. 20
  • 21. Thank you! © 2013 Unisys Corporation. All rights reserved. 21

Notas del editor

  1. Data Driven Matcher Pattern Data Aggregator Pattern Complex Calculator Pattern Numerical Processor Pattern Transformation Pattern