SlideShare una empresa de Scribd logo
1 de 65
Descargar para leer sin conexión
Business-Oriented Trends in IT
Outsourcing
Alan McSweeney
January 30, 2012 2
Objectives
• To identify business-oriented trends in Information
Technology outsourcing
January 30, 2012 3
Topics
• Outsourcing Trends
• Business-Oriented General IT Trends
• Transition and Transformation Within Outsourcing
• Outsourcing and Innovation
• A (Financial) Tale of Three Outsourcing Vendors
January 30, 2012 4
ITO Trends
January 30, 2012 5
State of Outsourcing in 2011
• Survey conducted by the London School of
Economics Outsourcing Unit
• 1,209 Buyers, Providers and Advisors of Outsourcing
Services
• Large study across spectrum of outsourcing industry
• Provides insight into market trends and therefore
should be part of any organisation’s strategy
January 30, 2012 6
State of Outsourcing in 2011
• Key points
− Outsourcing increasing across all organisation sizes and
organisations that do not currently outsource
− Cost an important factor
− After cost, track record, culture, global scale and knowledge are
important
− Advisors playing an increasingly important role
− Outsourcing providers not aware of how they are perceived
− Focus is on business benefits rather than technology
January 30, 2012 7
State of Outsourcing in 2011 – Some Results
• Nearly three quarters or organisations plan to increase outsourcing activities
• 59% of organisations with a shared services function and planning to increase outsourcing significantly
− Shared services function is an organisational infrastructural stepping stone to outsourcing
• Key reasons for outsourcing are
− Cost reduction - 60-76% view as very important, depending on organisation size
− More effective operations - 50-64% view as very important, depending on organisation size
• 46% have found outsourcing very effective in reducing costs
• 35% have found outsourcing ineffective in innovation
• 31% have found outsourcing ineffective in proving access to new technology
• 31% have found outsourcing ineffective in proving access to business process knowledge and experience
• In-house delivery of IT and Business Processes still dominates with outsourcing limited to Help Desk and application
development and support
• Factors rated as very important such as not being convinced of service providers’ capabilities (39%), not being
convinced of long-term business benefits (30%), insufficient short-term cost savings (37%) and fear of disruption
limiting (31%) decisions to outsource
• 29% of outsourcing suppliers view buyers not being convinced of their capabilities as being very important - gulf
between buyer and provider
• IT infrastructure and application development and maintenance outsourcing are seen as the core outsourcing areas
by buyers
− 68% already outsource infrastructure and will increase or plan to outsource
− 62% already outsource application development and maintenance outsourcing and will increase or plan to outsource
• 63% of medium-sized companies and 44% of large companies say outsourcing has been very effective in reducing
costs
• Buyers rate financial stability, track record and change management/governance process delivery, scale, industry
specific knowledge and culture as the most critically important skills of outsourcing suppliers
• The role of advisor in working with buyers on outsourcing is increasing
January 30, 2012 8
Study Respondents’ Profile
January 30, 2012 9
Buyers’ Organisation Size by Revenue
January 30, 2012 10
Buyers’ Industries
January 30, 2012 11
Outsourcing And Shared Services Delivery
Dominate Global Service Models Over Next 3 Years
• Emerging from the recession, will your company increase / reduce its reliance on
the following operating models for general and administrative functions, over the
next three years?
January 30, 2012 12
Most Organisations With Shared Services Are
Increasing Outsourcing
• Emerging from the recession, will your company increase / reduce its reliance on the
following operating models for your general and administrative functions, over the next 3
years?
January 30, 2012 13
Business Challenges Driving Outsourcing In 2011
• How Important Are The Following Business Drivers Behind Your
Company's IT Outsourcing And BPO Decision-Making This Year?
− Answer = Very Important
January 30, 2012 14
Europeans Want To Drive Out Cost And Globalise –
Without Changing Their Processes
• How Important Are The Following Business Drivers Behind Your Company's IT
Outsourcing And BPO Decision-Making This Year?
− Answer = Very Important
January 30, 2012 15
Buyers Achieving Modest Business Results Beyond
Cost-Reduction With Their Outsourcing Initiatives
• How Effective Have Your Current Outsourcing Initiatives Been
At Achieving The Following Business Benefits To-Date?
January 30, 2012 16
What Is Your Primary Sourcing Model For Managing
The Following IT and Business Processes?
• Untapped sourcing potential
• In-house delivery of IT and Business Processes still dominant in 2011
January 30, 2012 17
Concerns Holding Back Outsourcing In 2011
• How Important Are The Following Factors Preventing Your Organisation From IT
Outsourcing Or Business Processes Over The Next 12 Months?
January 30, 2012 18
Providers Oblivious To Buyers’ Perception Of Them
• How Important Are The Following Factors In Preventing Your Clients From Outsourcing IT
Or Business Processes Over The Next 12 Months? (Outsourcing Providers)
January 30, 2012 19
Demand For Core General And Administrative
Outsourcing Reaches Unprecedented Levels
January 30, 2012 20
First-Time Enterprise Buyers Look To Jump Into BPO
• % Buy-side organizations looking to outsource for the first time over
the next 12 months
January 30, 2012 21
Effectiveness Of Current Outsourcing Engagements:
Mid-Market Organisations Benefitting The Most
• How Effective Have Your Current Outsourcing Initiatives Been For Achieving The
Following Business Benefits To-Date?
− Answer = Very Effective
January 30, 2012 22
The Enterprise Market Gears Up For An Aggressive
Spike In Scope-Expansion Across Maturing Functions
• % Buy-Side Organisations Already Outsourcing And
Intending To Increase Scope Over The Next 12 Months
January 30, 2012 23
After Financial Considerations, Buyers Care (Or Say They
Care) About The Governance, Industry Acumen And Cultural
Attributes Of Providers
• How Important Are The Following Attributes To Your Clients Today,
When Considering A Service Provider Relationship For IT/BPO
Services?
January 30, 2012 24
Providers Underestimate Importance Buyers Place
On Change Management, Governance And Culture
January 30, 2012 25
Advisors Are Buoyant About It When Looking At
Future Outsourcing Plans
• Do You Expect Your Clients To Increase Or Reduce Their Activity
Across The Following Areas, Over The Next 18 Months?
− Outsourcing Advisers And Suppliers
January 30, 2012 26
Management Consultants Increasingly Influencing
Outsourcing
• Extent By Which Providers Have Been Seeing The Following Advisors
Influence Their Clients' Outsourcing Decision-Making Over The Last
Six Months
January 30, 2012 27
ITO Concerns
• Transition takes too long
• Not integrated
• Business disruptions
• Increased business risk
• Lower service quality
• Treatment of acquired employees
• Does not deliver value
• High cost of operation
• Confusion over what is being sold
January 30, 2012 28
Analysis of Some Information Technology Trends
• AICPA – Survey of members from 2001 to 2011 on initiatives in IT
that are of concern to their 370,000 members
− http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURC
ES/TOPTECHNOLOGYINITIATIVES/Pages/2011TopTechInitiatives.aspx
• Gartner – well known analyst company
• Two very different views of information technology trends
− Business-oriented
− Technology-oriented
• IT tends to be concerned with technology trends for themselves
rather than their application to business
• IT outsourcing needs to concern itself with business needs rather
than just pure IT
January 30, 2012 29
Gartner – Key IT Trends 2008 - 2011
2011 2010 2009 2008
1 Cloud Computing Cloud Computing Virtualisation Green IT
2 Mobile Applications and Media
Tablets
Advanced Analytics Cloud Computing Unified Communications
3 Social Communications and
Collaboration
Client Computing Servers - Beyond Blades Business Process Modelling
4 Video IT for Green Web-Oriented
Architectures
Metadata Management
5 Next Generation Analytics Reshaping the Data Centre Enterprise Mashups Virtualisation 2.0
6 Social Analytics Social Computing Specialised Systems Mashup and Composite
Applications
7 Context-Aware Computing Security – Activity
Monitoring
Social Software and Social
Networking
Web Platform and Web-
Oriented Architectures
8 Storage Class Memory Flash Memory Unified Communications Computing Fabric
9 Ubiquitous Computing Virtualisation for
Availability
Business Intelligence Real World Web
10 Fabric-Based Infrastructure and
Computers
Mobile Applications Green IT Social Software
• How relevant are these trends to the business and to end-user organisations?
• Where have the old trends gone to – lack of continuity between years?
• Are they fads more than trends?
January 30, 2012 30
AICPA Top 10 IT Initiatives 2001-2011
2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001
1 Security Of Data, Code
& Communications /
Data Security &
Document Retention /
Security Threats
Control and Use of
Mobile Devices
Information
Security
Management
Information
Security
Management
Information
Security
Management
Information
Security
Information
Security
Information
Security
Information
Security
Business And
Financial Reporting
Applications
Information
Security And
Controls
2 Connectivity / Wireless
Access / High Speed
Internet Connections /
Voice And Data
Information
Security
Privacy
Management
IT Governance Identity And Access
Management
Assurance And
Compliance
Applications
Electronic
Document
Management
Spam Technology Business
Information
Management
Training And
Technology
Competency
E-Business
3 Backup Solutions/
Disaster Recovery/
Business Continuity
Data Retention
Policies and
Structure
Secure Data File
Storage,
Transmission And
Exchange
Business Continuity
Management And
Disaster Recovery
Planning
Conforming To
Assurance And
Compliance
Standards
Disaster And
Business Continuity
Planning
Data Integration Digital OptimisationApplication
Integration
Information
Security and
Controls
Electronically-
based Business and
Financial Reporting
4 Secure Electronic
Collaboration With
Clients – Client Portals
Remote Access Business Process
Improvement,
Work Flow and
Process Exception
Alerts
Privacy
Management
Privacy
Management
IT Governance Spam Technology Database and
Application
Integration
Web Services Quality of Service Privacy
5 Paperless Workflow/
Paperless Technology
Staff and
Management
Training
Mobile and Remote
Computing
Business Process
Improvement,
Workflow and
Process Exception
Alerts
Disaster Recovery
Planning and
Business Continuity
Management
Privacy
Management
Disaster Recovery Wireless
Technologies
Disaster Recovery Disaster Recovery
Planning and
Business Continuity
Management
Training and
Technology
competency
6 Laptop Security /
Encryption
Process
Documentation and
improvements
Training and
Competency
Identity and Access
Management
IT Governance Digital Identity and
Authentication
Technologies
Collaboration and
Messaging
Technologies
Disaster Recovery Wireless
Technologies
Communication
Technologies
Bandwidth
Disaster Recovery
7 Small Business
Software / Office 2010
/ Windows 7
Saving and Making
Money
w/Technology
Identity and Access
Management
Conforming to
Assurance and
Compliance
Standards
Securing and
Controlling
Information
Distribution
Wireless
Technologies
Wireless
Technologies
Data Mining Intrusion Detection Remote
Connectivity Tools
Qualified IT
Personnel
8 User Mobility/ Mobile
Computing/ Mobile
Devices
Technology Cost
Controls
Improved
Application and
Data Integration
Business
Intelligence
Mobile and Remote
Computing
Application and
Data Integration
Authentication
Technologies
Virtual Office Intrusion Detection Web-Based and
Web-Enabled
Applications
Quality of Service
9 Tax Software/
Electronic Transmittals
Of Tax Forms
Budget Processes Document, Forms,
Content and
Knowledge
Management
Mobile and Remote
Computing
Electronic Archiving
and Data Retention
Paperless Digital
Technologies
Storage
Technologies
Business Exchange
Technology
Customer
Relationship
Management
Qualified IT
personnel
Electronic Audit
Trail
10Server Virtualization
And Consolidation
Project
Management &
Deployment of
New Systems
Electronic Data
Retention Strategy
Document, Forms,
Content and
Knowledge
Management
Document, Content
and Knowledge
Management
Spyware Detection
and Removal
Learning and
Training
Competency
Messaging
Applications
Privacy Messaging
Applications (e-
mail, faxing,
voicemail, instant
messaging)
Application Service
Provider
January 30, 2012 31
AICPA Top 10 IT Initiatives 2005-2011
2011 2010 2009 2008 2007 2006 2005
1 Security Of Data, Code &
Communications / Data
Security & Document
Retention / Security Threats
Control and Use of
Mobile Devices
Information Security
Management
Information Security
Management
Information Security
Management
Information Security Information Security
2 Connectivity / Wireless
Access / High Speed
Internet Connections /
Voice And Data
Information Security Privacy Management IT Governance Identity And Access
Management
Assurance And
Compliance Applications
Electronic Document
Management
3 Backup Solutions/ Disaster
Recovery/ Business
Continuity
Data Retention Policies
and Structure
Secure Data File
Storage, Transmission
And Exchange
Business Continuity
Management And
Disaster Recovery
Planning
Conforming To Assurance
And Compliance
Standards
Disaster And Business
Continuity Planning
Data Integration
4 Secure Electronic
Collaboration With Clients –
Client Portals
Remote Access Business Process
Improvement, Work
Flow and Process
Exception Alerts
Privacy Management Privacy Management IT Governance Spam Technology
5 Paperless Workflow/
Paperless Technology
Staff and Management
Training
Mobile and Remote
Computing
Business Process
Improvement,
Workflow and Process
Exception Alerts
Disaster Recovery
Planning and Business
Continuity Management
Privacy Management Disaster Recovery
6 Laptop Security / EncryptionProcess Documentation
and improvements
Training and
Competency
Identity and Access
Management
IT Governance Digital Identity and
Authentication
Technologies
Collaboration and
Messaging Technologies
7 Small Business Software /
Office 2010 / Windows 7
Saving and Making
Money w/Technology
Identity and Access
Management
Conforming to
Assurance and
Compliance Standards
Securing and Controlling
Information Distribution
Wireless Technologies Wireless Technologies
8 User Mobility/ Mobile
Computing/ Mobile Devices
Technology Cost
Controls
Improved Application
and Data Integration
Business Intelligence Mobile and Remote
Computing
Application and Data
Integration
Authentication
Technologies
9 Tax Software/ Electronic
Transmittals Of Tax Forms
Budget Processes Document, Forms,
Content and Knowledge
Management
Mobile and Remote
Computing
Electronic Archiving and
Data Retention
Paperless Digital
Technologies
Storage Technologies
10 Server Virtualization And
Consolidation
Project Management &
Deployment of New
Systems
Electronic Data
Retention Strategy
Document, Forms,
Content and
Knowledge
Management
Document, Content and
Knowledge Management
Spyware Detection and
Removal
Learning and Training
Competency
January 30, 2012 32
Security, Privacy, Governance, Disaster Recovery
2011 2010 2009 2008 2007 2006 2005
1 Security Of Data, Code &
Communications / Data
Security & Document
Retention / Security Threats
Control and Use of
Mobile Devices
Information Security
Management
Information Security
Management
Information Security
Management
Information Security Information Security
2 Connectivity / Wireless
Access / High Speed Internet
Connections / Voice And Data
Information Security Privacy Management IT Governance Identity And Access
Management
Assurance And
Compliance Applications
Electronic Document
Management
3 Backup Solutions/ Disaster
Recovery/ Business
Continuity
Data Retention
Policies and Structure
Secure Data File
Storage, Transmission
And Exchange
Business Continuity
Management And
Disaster Recovery
Planning
Conforming To Assurance
And Compliance
Standards
Disaster And Business
Continuity Planning
Data Integration
4 Secure Electronic
Collaboration With Clients –
Client Portals
Remote Access Business Process
Improvement, Work
Flow and Process
Exception Alerts
Privacy Management Privacy Management IT Governance Spam Technology
5 Paperless Workflow/
Paperless Technology
Staff and Management
Training
Mobile and Remote
Computing
Business Process
Improvement,
Workflow and Process
Exception Alerts
Disaster Recovery
Planning and Business
Continuity Management
Privacy Management Disaster Recovery
6 Laptop Security / Encryption Process
Documentation and
improvements
Training and
Competency
Identity and Access
Management
IT Governance Digital Identity and
Authentication
Technologies
Collaboration and
Messaging Technologies
7 Small Business Software /
Office 2010 / Windows 7
Saving and Making
Money w/Technology
Identity and Access
Management
Conforming to
Assurance and
Compliance Standards
Securing and Controlling
Information Distribution
Wireless Technologies Wireless Technologies
8 User Mobility/ Mobile
Computing/ Mobile Devices
Technology Cost
Controls
Improved Application
and Data Integration
Business Intelligence Mobile and Remote
Computing
Application and Data
Integration
Authentication
Technologies
9 Tax Software/ Electronic
Transmittals Of Tax Forms
Budget Processes Document, Forms,
Content and Knowledge
Management
Mobile and Remote
Computing
Electronic Archiving and
Data Retention
Paperless Digital
Technologies
Storage Technologies
10 Server Virtualization And
Consolidation
Project Management
& Deployment of New
Systems
Electronic Data
Retention Strategy
Document, Forms,
Content and
Knowledge
Management
Document, Content and
Knowledge Management
Spyware Detection and
Removal
Learning and Training
Competency
January 30, 2012 33
Data, Information and Document Management/
Integration and Analysis and Related Initiatives
2011 2010 2009 2008 2007 2006 2005
1 Security Of Data, Code &
Communications / Data
Security & Document
Retention / Security Threats
Control and Use of
Mobile Devices
Information Security
Management
Information Security
Management
Information Security
Management
Information Security Information Security
2 Connectivity / Wireless
Access / High Speed Internet
Connections / Voice And Data
Information Security Privacy Management IT Governance Identity And Access
Management
Assurance And
Compliance Applications
Electronic Document
Management
3 Backup Solutions/ Disaster
Recovery/ Business
Continuity
Data Retention Policies
and Structure
Secure Data File
Storage, Transmission
And Exchange
Business Continuity
Management And
Disaster Recovery
Planning
Conforming To Assurance
And Compliance
Standards
Disaster And Business
Continuity Planning
Data Integration
4 Secure Electronic
Collaboration With Clients –
Client Portals
Remote Access Business Process
Improvement, Work
Flow and Process
Exception Alerts
Privacy Management Privacy Management IT Governance Spam Technology
5 Paperless Workflow/
Paperless Technology
Staff and Management
Training
Mobile and Remote
Computing
Business Process
Improvement,
Workflow and Process
Exception Alerts
Disaster Recovery
Planning and Business
Continuity Management
Privacy Management Disaster Recovery
6 Laptop Security / Encryption Process
Documentation and
improvements
Training and
Competency
Identity and Access
Management
IT Governance Digital Identity and
Authentication
Technologies
Collaboration and
Messaging Technologies
7 Small Business Software /
Office 2010 / Windows 7
Saving and Making
Money w/Technology
Identity and Access
Management
Conforming to
Assurance and
Compliance Standards
Securing and Controlling
Information Distribution
Wireless Technologies Wireless Technologies
8 User Mobility/ Mobile
Computing/ Mobile Devices
Technology Cost
Controls
Improved Application
and Data Integration
Business Intelligence Mobile and Remote
Computing
Application and Data
Integration
Authentication
Technologies
9 Tax Software/ Electronic
Transmittals Of Tax Forms
Budget Processes Document, Forms,
Content and
Knowledge
Management
Mobile and Remote
Computing
Electronic Archiving and
Data Retention
Paperless Digital
Technologies
Storage Technologies
10 Server Virtualization And
Consolidation
Project Management
& Deployment of New
Systems
Electronic Data
Retention Strategy
Document, Forms,
Content and
Knowledge
Management
Document, Content and
Knowledge
Management
Spyware Detection and
Removal
Learning and Training
Competency
January 30, 2012 34
AICPA Top IT Initiatives
• Notice any differences?
• Business-oriented focus of IT initiatives
− Not concerned with IT plumbing and infrastructure (such as cloud)
but on business concerns - running the business - and business-
related IT concerns – potential impact of IT systems on the wider
business
− Security, privacy, disaster recovery/business continuity and
governance concerns dominate
• How will pure technology trends assist in delivering these
initiatives?
• Effective IT outsourcing assist with addressing these
concerns
January 30, 2012 35
Transition and Transformation Within Outsourcing
• Transition is the entire process for assuming operational
responsibility for the acquired entity
− Transition moves the acquired entity organization from its current mode of
operation to an integrated managed mode of operation
− Transition includes the takeover of the “as-is” business and operating
environment as well as contractual requirements necessary to facilitate the
transfer.
• Transformation is the implementation of completed integrated
solution within a specified time, that lead to entirely integrated
operation, service enhancements and/or quality, productivity,
technology improvements and cost savings/reductions
• An approach to transformation is very important for successful
outsourcing
• Transformation is the basis for greater cost savings and innovation
• Outsourcing without transformation is a risk as what is outsourced
can stagnate over time
January 30, 2012 36
Transition and Transformation
Transition Transformation
Steady State
Operation
Customer
Infrastructure
and
Applications,
Staff, Support
Processes and
Tools
Customer
Infrastructure
and
Applications,
Transferred
and Being
Supported by
Supplier
Standardised
Infrastructure
Through
Refresh,
Customer
Support
Processes and
Tools
Replaced by
Supplier
Standards
Primary
Support
Transferred to
Appropriate
Cost Location
• Transition and transformation is a process that must be articulated effectively to
customers
• Customer must understand the implications and must accept the process
• Delays or stoppages affect supplier’s costs
January 30, 2012 37
Evaluation and
Decision
Negotiation and
Contract Signing
Pre-Operation and
Pre-Integration
Start
Transition Transformation
Steady State
Operation of
Integrated Entity
Preliminary
Transition Plan
Due Diligence
Final Transition Plan
Integration
Preparation
Transition Initiation
Finalise Integration
Solution
Architecture
Due Diligence
Review and
Confirmation
Transformation
Planning
Contract
Effective Date
Service
Commencement Date
Outsourcing Process
Contract Review
Transformation
Delivery
Transition
Completed
Transformation
Completed
January 30, 2012 38
Propose, Negotiate and Close
Planning
Research, Analysis, Identification
Preliminary Transition and
Transformation Plans
Due Diligence
Final Integrated Transition Plan
Transition Transformation
Ongoing
Operation
Transition Initiation/Kick-off
Post Contract Verification
Solution Handoff
Acquisition Management Office
Transfer
Operation Commencement
Preparation
Final Integrated Transition Plan
Transformation Initiation/Kick-off
Stabilisation
Standardisation
Transformation Close
Signed Contract
Integration Start
Review
Transition
Criteria Achieved
Terms and
Conditions
Transition to
Delivery Handoff
Transformation
Review
Transformation
Criteria Achieved
Transformation
to Delivery
Handoff
Delivery
Quality Review
Milestone
Handoff Events
Key Reporting
Events
Acquisition
Engagement Stage
Transition and
Transformation Phase
Activity
Transition and Transformation Management
January 30, 2012 39
Types of Outsourcing Arrangement
• Efficiency/Utility (Make it Cheaper) arrangement outsourcing
focuses primarily on cost control and, over time, cost reduction, with
the goal of maintaining consistency in the delivery of services
• Business Enhancement (Make it Better) arrangement is about
business productivity. The organisation’s performance, as compared
with their competitors, will improve, resulting in movement toward
defined business goals
• Transformational (Make me Money) arrangement is characterised
by a partnership between the service provider and service recipient
that is focused on innovation and new business, changing the very
basis on which an organisation competes
• Which arrangement are you looking for?
• Clearly understand what your expectations are
January 30, 2012 40
Problems With Outsourcing
• Many organisations take a “fire and forget” approach to
outsourcing
• Problems with outsourcing are as much the fault of the
outsourcing organisation as they are of the supplier
• Outsourcing organisation need to define an operating
model and be engaged with the outsourcing relationship
• You can outsource anything except the management of
the outsourcing relationship
January 30, 2012 41
Outsourcing and Innovation
• Outsourcing is not viewed by buyers or suppliers as a
source of innovation
− Not seen as an agent of change, innovation, transformation,
access to new technology
• Outsourcing is seen as “your mess for less”
• Buyers neglect the value of transformation and how it can
contribute to innovation and generate real business
benefits
• Providers do not sell transformation as a pre-requisite for
innovation as well as further cost savings
• Companies looking to outsource should look for a
transformation and innovation vision from their supplier
January 30, 2012 42
Business Challenges Driving Outsourcing In 2011
• How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing
And BPO Decision-Making This Year?
− Answer = Very Important
• Innovation, Change, Access to New Technology, Transformation seen as relatively
unimportant
January 30, 2012 43
Europeans Want To Drive Out Cost And Globalise –
Without Changing Their Processes
• How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing And BPO
Decision-Making This Year?
− Answer = Very Important
• Innovation, Change, Access to New Technology, Transformation seen as relatively unimportant
outside Asia
January 30, 2012 44
Buyers Achieving Modest Business Results Beyond
Cost-Reduction With Their Outsourcing Initiatives
• How Effective Have Your Current Outsourcing Initiatives Been At Achieving The
Following Business Benefits To-Date?
• Existing outsourcing suppliers not seen as effective in delivering Innovation,
Change, Access to New Technology, Transformation
January 30, 2012 45
Effectiveness Of Current Outsourcing Engagements:
Mid-Market Organisations Benefitting The Most
• How Effective Have Your Current Outsourcing Initiatives Been For Achieving The Following Business
Benefits To-Date?
− Answer = Very Effective
• Existing outsourcing initiatives not seen as effective in delivering Innovation, Change, Access to New
Technology, Transformation
January 30, 2012 46
After Financial Considerations, Buyers Care (Or Say They
Care) About The Governance, Industry Acumen And Cultural
Attributes Of Providers
• How Important Are The Following Attributes To Your Clients Today, When
Considering A Service Provider Relationship For IT/BPO Services?
• Buyers of outsourcing services do not rate Innovation and Transformation as
important supplier attributes
January 30, 2012 47
Providers Underestimate Importance Buyers Place
On Change Management, Governance And Culture
• Buyers of outsourcing services do not rate Innovation and Transformation as
important supplier attributes but suppliers still underestimate the important of
Innovation
January 30, 2012 48
Transformation Process Introduces Standardisation
and Enables Innovation
• Takes disparate set of
sources and creates
standard model
• Effective
transformation is an
enabler of innovation
with IT function
− On-demand self-
service
− Elastic
− Measured and
metered usage and
pricing
− Scale
− Resilience
− Available
− Secure
From … To …
January 30, 2012 49
A (Financial) Tale of Three Outsourcing Vendors
• Sample analysis of three vendors involved in outsourcing
− Dell – small outsourcing practice based on acquisition of Perot
Systems and legacy outsourcing business
− HP – large outsourcing vendor with expanded practice since the
acquisition of EDS
− IBM – large outsourcing vendor
• By no means exhaustive – there are many outsourcing
service providers
January 30, 2012 50
Vendor Comparison Summary
• Outsourcing Revenue for Dell includes all services including
outsourcing
• Dell performing poorly relative to its competitors:
− Lower margins
− Lower proportion of service and outsourcing revenues
2010 2009 2008
Dell HP IBM Dell HP IBM Dell HP IBM
Revenue 52,902 126,033 99,870 61,101 114,552 95,758 61,133 118,364 103,630
Gross Margin 9,261 29,996 46,040 10,957 27,034 43,761 11,671 28,644 45,701
Gross Margin % 17.5% 23.8% 46.1% 17.9% 23.6% 45.7% 19.1% 24.2% 44.1%
Net Income 1,433 8,761 14,833 2,478 7,660 13,425 2,947 8,329 12,334
Net Income % 2.7% 7.0% 14.9% 4.1% 6.7% 14.0% 4.8% 7.0% 11.9%
Outsourcing Revenue 5,622 18,835 22,241 5,351 18,692 21,620 4,980 8,211 22,733
Outsourcing Revenue % 10.60% 14.90% 22.30% 8.80% 16.30% 22.60% 8.10% 6.90% 21.90%
January 30, 2012 51
Vendor Comparison
• Compare Dell, HP and IBM
• Comparisons taken from 10-K filings
• Difficult to make exact comparison
− Major service-related takeovers
• Dell acquire Perot in Nov 2009
• HP acquire EDS in Aug 2008
• Classification of revenues not consistent between years
• Restatement of revenues
− Dell 2010 10 K
• Services revenue for 2009 = 5,351
• Services revenue for 2008 = 4,980
• Dell 2009 10 K
• Services revenue for 2009 = 5,715
• Services revenue for 2008 = 5,320
January 30, 2012 52
Vendor Comparison
• Which vendor can articulate a transformation vision for
your organisation?
January 30, 2012 53
IBM
• Revenue from
− Hardware – classified as Systems and Technology
− Software
− Services – divided into:
• Global Technology Services - provides IT infrastructure services and
business process services, including outsourcing and other services
• Global Business Services - provides professional services and application
management services
− Outsourcing classified as:
• Strategic Outsourcing Services - existing infrastructure
• Global Process Services - standardised processing platforms and business
process outsourcing
• Gross margins not reported down to outsourcing business
area
January 30, 2012 54
IBM – Financial Summary
2010 2009 2008 2007 2006
Revenue 99,870 95,758 103,630 98,786 91,424
Gross Margin 46,040 43,761 45,701 41,688 38,307
Gross Margin % 46.1% 45.7% 44.1% 42.2% 41.9%
Net Income 14,833 13,425 12,334 10,418 9,492
Net Income % 14.9% 14.0% 11.9% 10.5% 10.4%
Global Technology Services Revenue Total 38,201 37,347 39,264 36,103 32,322
Global Technology Services Total Gross Margin 34.7% 35.0% 32.60% 29.90% 29.80%
Global Technology Services Revenue (Excluding Outsourcing) 15,960 15,727 16,531 15,108 13,433
Outsourcing Revenue 22,241 21,620 22,733 20,995 18,889
Outsourcing Revenue % 22.3% 22.6% 21.9% 21.3% 20.7%
Global Business Services 18,223 17,653 19,628 18,041 15,969
Global Business Services Gross Margin % 46.1% 45.7% 26.70% 23.50% 23.10%
Software 22,485 21,396 22,089 19,982 18,161
Software Gross Margin % 86.9% 86.0% 85.40% 85.20% 85.20%
Systems and Technology 17,973 16,190 19,287 21,317 21,970
Systems and Technology Gross Margin % 46.1% 45.7% 38.10% 39.70% 37.70%
Global Financing 2,238 2,302 2,559 2,502 2,365
Global Financing Gross Margin % 51.3% 47.5% 51.30% 46.70% 50.30%
January 30, 2012 55
IBM – Financial Summary
January 30, 2012 56
IBM – Financial Summary
January 30, 2012 57
IBM – Financial Summary
• Consistent performance
• Balanced across product and service areas
• C. 22% revenue from outsourcing
January 30, 2012 58
HP
• Revenue from
− Services – classified under:
• Infrastructure Technology Outsourcing
• Business Process Outsourcing
• Technology Services
• Application Services
− ESS – Enterprise Systems, Storage and Networking
− Software
− Personal Systems
− Imaging and Printing
− Financing
• Does not report Net Income for individual business lines
− Earning from Operations rather than Net Income – includes acquired intangible
assets, pension settlements, etc.
− Earning from Operations greater than Net Income by c 30%
January 30, 2012 59
HP – Financial Summary
2010 2009 2008
Revenue 126,033 114,552 118,364
Gross Margin 29,996 27,034 28,644
Gross Margin % 23.8% 23.6% 24.2%
Earnings from Operations 11,479 10,136 10,473
Earnings from Operations % 9.1% 8.8% 8.8%
Net Income 8,761 7,660 8,329
Net Income % 7.0% 6.7% 7.0%
Total Services (Including Outsourcing) Revenue 34,935 34,693 20,977
Total Services (Including Outsourcing) Earning from Operations 5,609 5,044 2,518
Total Services (Including Outsourcing) Earning from Operations % 16.1% 14.5% 12.0%
Infrastructure Technology Outsourcing 15,963 15,751 7,488
Business Process Outsourcing 2,872 2,941 723
Total Outsourcing 18,835 18,692 8,211
Total Outsourcing % 14.9% 16.3% 6.9%
ESS Revenue 18,651 15,359 19,400
ESS Earnings from Operations 2,402 1,518 2,577
ESS Earnings from Operations % 12.9% 9.9% 13.3%
Software Revenue 3,586 3,572 4,220
Software Earnings from Operations 759 684 499
Software Earnings from Operations % 21.2% 19.1% 11.8%
Personal Systems Revenue 40,741 35,305 42,295
Personal Systems Earnings from Operations 2,032 1,661 2,375
Personal Systems Earnings from Operations % 5.0% 4.7% 5.6%
Imaging and Printing Revenue 25,764 24,011 29,614
Imaging and Printing Earnings from Operations 4,412 4,310 4,559
Imaging and Printing Earnings from Operations % 17.1% 18.0% 15.4%
Financing Revenue 3,047 2,673 2,698
Financing Earnings from Operations 281 206 192
Financing Earnings from Operations % 9.2% 7.7% 7.1%
January 30, 2012 60
HP – Financial Summary
January 30, 2012 61
HP – Financial Summary
January 30, 2012 62
HP – Financial Summary
• Substantial increase in outsourcing revenue after EDS
acquisition
• Services Earning from Operations % substantially greater
than average Earning from Operations % across all
business areas
− Services including outsourcing more profitable
January 30, 2012 63
Dell – Financial Summary
2010 2009 2008
Revenue 52,902 61,101 61,133
Gross Margin 9,261 10,957 11,671
Gross Margin % 17.5% 17.9% 19.1%
Net Income 1,433 2,478 2,947
Net Income % 2.7% 4.1% 4.8%
Product Revenue 43,697 52,337 53,728
Product Revenue % 82.6% 85.7% 87.9%
Product Revenue Gross Margin 6,163 7,667 8,579
Product Revenue Gross Margin % 14.1% 14.6% 16.0%
Service Revenue Including Software 9,205 8,764 7,405
Service Revenue Including Software % 17.4% 14.3% 12.1%
Service Revenue Gross Margin 3,098 3,290 3,290
Service Revenue Gross Margin % 33.7% 37.5% 44.4%
Service Revenue Excluding Software 5,622 5,351 4,980
Service Revenue Excluding Software % 10.6% 8.8% 8.1%
January 30, 2012 64
Dell – Product/Software/Services Breakdown
January 30, 2012 65
Dell – Product/Software/Services Breakdown

Más contenido relacionado

La actualidad más candente

Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT FunctionAlan McSweeney
 
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...Alan McSweeney
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Alan McSweeney
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureAlan McSweeney
 
So You Think You Need A Digital Strategy
So You Think You Need A Digital StrategySo You Think You Need A Digital Strategy
So You Think You Need A Digital StrategyAlan McSweeney
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsAlan McSweeney
 
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Alan McSweeney
 
Real Time Data Strategy and Architecture
Real Time Data Strategy and ArchitectureReal Time Data Strategy and Architecture
Real Time Data Strategy and ArchitectureAlan McSweeney
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureAlan McSweeney
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Alan McSweeney
 
Requirements Gathering And Management
Requirements Gathering And ManagementRequirements Gathering And Management
Requirements Gathering And ManagementAlan McSweeney
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of RequirementsAlan McSweeney
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementAlan McSweeney
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider GovernanceAlan McSweeney
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureAlan McSweeney
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureAlan McSweeney
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And ArchitectureAlan McSweeney
 
Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceAlan McSweeney
 
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Alan McSweeney
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyAlan McSweeney
 

La actualidad más candente (20)

Investing Intelligently In The IT Function
Investing Intelligently In The IT FunctionInvesting Intelligently In The IT Function
Investing Intelligently In The IT Function
 
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
The I Word: Moving Innovation from Research and Development (R&D) to Ideation...
 
Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...Comprehensive And Integrated Approach To Project Management And Solution Deli...
Comprehensive And Integrated Approach To Project Management And Solution Deli...
 
Digital Transformation And Solution Architecture
Digital Transformation And Solution ArchitectureDigital Transformation And Solution Architecture
Digital Transformation And Solution Architecture
 
So You Think You Need A Digital Strategy
So You Think You Need A Digital StrategySo You Think You Need A Digital Strategy
So You Think You Need A Digital Strategy
 
Review of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability ModelsReview of Information Technology Function Critical Capability Models
Review of Information Technology Function Critical Capability Models
 
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
Structured Approach to Implementing and Operating Outsourcing and Managed Ser...
 
Real Time Data Strategy and Architecture
Real Time Data Strategy and ArchitectureReal Time Data Strategy and Architecture
Real Time Data Strategy and Architecture
 
Maximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise ArchitectureMaximising The Value and Benefits of Enterprise Architecture
Maximising The Value and Benefits of Enterprise Architecture
 
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
Notes on an ITO Appliance Approach to Productising and Industrialising IT Out...
 
Requirements Gathering And Management
Requirements Gathering And ManagementRequirements Gathering And Management
Requirements Gathering And Management
 
The Myth Of Requirements
The Myth Of RequirementsThe Myth Of Requirements
The Myth Of Requirements
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider Governance
 
Digital Transformation And Enterprise Architecture
Digital Transformation And Enterprise ArchitectureDigital Transformation And Enterprise Architecture
Digital Transformation And Enterprise Architecture
 
Incorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution ArchitectureIncorporating A DesignOps Approach Into Solution Architecture
Incorporating A DesignOps Approach Into Solution Architecture
 
Approach To It Strategy And Architecture
Approach To It Strategy And ArchitectureApproach To It Strategy And Architecture
Approach To It Strategy And Architecture
 
Solution Architecture And User And Customer Experience
Solution Architecture And User And Customer ExperienceSolution Architecture And User And Customer Experience
Solution Architecture And User And Customer Experience
 
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
Enterprise Business Analysis Capability - Strategic Asset for Business Alignm...
 
Data Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data StrategyData Audit Approach To Developing An Enterprise Data Strategy
Data Audit Approach To Developing An Enterprise Data Strategy
 

Destacado

Outsourcing and Managed Services - Developing a Common Language Between Suppl...
Outsourcing and Managed Services - Developing a Common Language Between Suppl...Outsourcing and Managed Services - Developing a Common Language Between Suppl...
Outsourcing and Managed Services - Developing a Common Language Between Suppl...Alan McSweeney
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleAlan McSweeney
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Alan McSweeney
 
Outsourcing And Cloud Computing
Outsourcing And Cloud ComputingOutsourcing And Cloud Computing
Outsourcing And Cloud ComputingAlan McSweeney
 
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Alan McSweeney
 
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Alan McSweeney
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentAlan McSweeney
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementAlan McSweeney
 
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Alan McSweeney
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented ArchitectureAlan McSweeney
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Alan McSweeney
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept WorkshopAlan McSweeney
 
Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution ArchitectureAlan McSweeney
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsAlan McSweeney
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity ModelsAlan McSweeney
 
IT Outsourcing Trends - 2016 and beyond
IT Outsourcing Trends - 2016 and beyond IT Outsourcing Trends - 2016 and beyond
IT Outsourcing Trends - 2016 and beyond Euro IT Group
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution ArchitectureAlan McSweeney
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificKimmy Chen
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Alan McSweeney
 

Destacado (19)

Outsourcing and Managed Services - Developing a Common Language Between Suppl...
Outsourcing and Managed Services - Developing a Common Language Between Suppl...Outsourcing and Managed Services - Developing a Common Language Between Suppl...
Outsourcing and Managed Services - Developing a Common Language Between Suppl...
 
The Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level RoleThe Chief Skeptical Officer – A New C-Level Role
The Chief Skeptical Officer – A New C-Level Role
 
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
Developing an Acquisition Centre of Excellence for Effective Sourcing and Sup...
 
Outsourcing And Cloud Computing
Outsourcing And Cloud ComputingOutsourcing And Cloud Computing
Outsourcing And Cloud Computing
 
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
 
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
Taking a Performance-Based Services Approach to Improve the Effectiveness of ...
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
 
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
Conway's Law, Cognitive Diversity, Organisation Transformation And Solution D...
 
Process Oriented Architecture
Process Oriented ArchitectureProcess Oriented Architecture
Process Oriented Architecture
 
Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1Introduction To Business Architecture – Part 1
Introduction To Business Architecture – Part 1
 
Solution Architecture Concept Workshop
Solution Architecture Concept WorkshopSolution Architecture Concept Workshop
Solution Architecture Concept Workshop
 
Complexity and Solution Architecture
Complexity and Solution ArchitectureComplexity and Solution Architecture
Complexity and Solution Architecture
 
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution OptionsSolution Architecture – Approach to Rapidly Scoping The Initial Solution Options
Solution Architecture – Approach to Rapidly Scoping The Initial Solution Options
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 
IT Outsourcing Trends - 2016 and beyond
IT Outsourcing Trends - 2016 and beyond IT Outsourcing Trends - 2016 and beyond
IT Outsourcing Trends - 2016 and beyond
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
IT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay PacificIT Outsourcing of Cathay Pacific
IT Outsourcing of Cathay Pacific
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 

Similar a Business-Oriented Trends in IT Outsourcing

A Business case study on LinkedIn
A Business case study on LinkedInA Business case study on LinkedIn
A Business case study on LinkedInMayank Banerjee
 
Transforming TBED Through Technology
Transforming TBED Through TechnologyTransforming TBED Through Technology
Transforming TBED Through TechnologyJumpStart Inc
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperIBM
 
Rethink the Tech Buyer's Journey
Rethink the Tech Buyer's JourneyRethink the Tech Buyer's Journey
Rethink the Tech Buyer's JourneyBlack Marketing
 
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914Us sdt 2014_globaloutsourcinginsourcingsurvey_051914
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914Franco Ferrario
 
MIS Unit 1 Dr. Vijay.pptx
MIS Unit 1 Dr. Vijay.pptxMIS Unit 1 Dr. Vijay.pptx
MIS Unit 1 Dr. Vijay.pptxVikasRai405977
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business caseRaquel Miranda
 
Automotive IT Strategy: IT Sourcing
Automotive IT Strategy: IT SourcingAutomotive IT Strategy: IT Sourcing
Automotive IT Strategy: IT SourcingDeloitte Deutschland
 
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...KBIZEAU
 
Lecture 1a it and strategy
Lecture 1a   it and strategyLecture 1a   it and strategy
Lecture 1a it and strategyMohammad Salman
 
Large scale it projects
Large scale it projectsLarge scale it projects
Large scale it projectsGunjan Rana
 
Presentation (1) (3).pptx
Presentation (1) (3).pptxPresentation (1) (3).pptx
Presentation (1) (3).pptxAkhil269877
 
Thinking and behaving digitally
Thinking and behaving digitally Thinking and behaving digitally
Thinking and behaving digitally Duncan Chapple
 
Emerging leaders conference_future_of_budgeting
Emerging leaders conference_future_of_budgetingEmerging leaders conference_future_of_budgeting
Emerging leaders conference_future_of_budgetingTim Richardson
 
Operation management intro
Operation management  introOperation management  intro
Operation management introStudsPlanet.com
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and designsakshi garg
 
LECTURE 3: Critical Factors in Managing Technology
LECTURE 3: Critical Factors in Managing TechnologyLECTURE 3: Critical Factors in Managing Technology
LECTURE 3: Critical Factors in Managing TechnologyBC Chew
 

Similar a Business-Oriented Trends in IT Outsourcing (20)

A Business case study on LinkedIn
A Business case study on LinkedInA Business case study on LinkedIn
A Business case study on LinkedIn
 
Transforming TBED Through Technology
Transforming TBED Through TechnologyTransforming TBED Through Technology
Transforming TBED Through Technology
 
Future of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paperFuture of enterprise IT function IBM white paper
Future of enterprise IT function IBM white paper
 
Rethink the Tech Buyer's Journey
Rethink the Tech Buyer's JourneyRethink the Tech Buyer's Journey
Rethink the Tech Buyer's Journey
 
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914Us sdt 2014_globaloutsourcinginsourcingsurvey_051914
Us sdt 2014_globaloutsourcinginsourcingsurvey_051914
 
MIS Unit 1 Dr. Vijay.pptx
MIS Unit 1 Dr. Vijay.pptxMIS Unit 1 Dr. Vijay.pptx
MIS Unit 1 Dr. Vijay.pptx
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business case
 
Automotive IT Strategy 2021
Automotive IT Strategy 2021Automotive IT Strategy 2021
Automotive IT Strategy 2021
 
Automotive IT Strategy: IT Sourcing
Automotive IT Strategy: IT SourcingAutomotive IT Strategy: IT Sourcing
Automotive IT Strategy: IT Sourcing
 
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
 
Lecture 1a it and strategy
Lecture 1a   it and strategyLecture 1a   it and strategy
Lecture 1a it and strategy
 
it and strategy
it and strategyit and strategy
it and strategy
 
Large scale it projects
Large scale it projectsLarge scale it projects
Large scale it projects
 
Presentation (1) (3).pptx
Presentation (1) (3).pptxPresentation (1) (3).pptx
Presentation (1) (3).pptx
 
Thinking and behaving digitally
Thinking and behaving digitally Thinking and behaving digitally
Thinking and behaving digitally
 
HWZ-Darden Konferenz: Leadership in the new
HWZ-Darden Konferenz: Leadership in the newHWZ-Darden Konferenz: Leadership in the new
HWZ-Darden Konferenz: Leadership in the new
 
Emerging leaders conference_future_of_budgeting
Emerging leaders conference_future_of_budgetingEmerging leaders conference_future_of_budgeting
Emerging leaders conference_future_of_budgeting
 
Operation management intro
Operation management  introOperation management  intro
Operation management intro
 
2 growth, concept and design
2 growth, concept and design2 growth, concept and design
2 growth, concept and design
 
LECTURE 3: Critical Factors in Managing Technology
LECTURE 3: Critical Factors in Managing TechnologyLECTURE 3: Critical Factors in Managing Technology
LECTURE 3: Critical Factors in Managing Technology
 

Más de Alan McSweeney

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdfAlan McSweeney
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfAlan McSweeney
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Alan McSweeney
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Alan McSweeney
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution SecurityAlan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security ArchitectureAlan McSweeney
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsAlan McSweeney
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Alan McSweeney
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Alan McSweeney
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureAlan McSweeney
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Alan McSweeney
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual ChartsAlan McSweeney
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Alan McSweeney
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataAlan McSweeney
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureAlan McSweeney
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Alan McSweeney
 

Más de Alan McSweeney (20)

Data Architecture for Solutions.pdf
Data Architecture for Solutions.pdfData Architecture for Solutions.pdf
Data Architecture for Solutions.pdf
 
Solution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdfSolution Architecture and Solution Estimation.pdf
Solution Architecture and Solution Estimation.pdf
 
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
Validating COVID-19 Mortality Data and Deaths for Ireland March 2020 – March ...
 
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
Analysis of the Numbers of Catholic Clergy and Members of Religious in Irelan...
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 
Solution Architecture And Solution Security
Solution Architecture And Solution SecuritySolution Architecture And Solution Security
Solution Architecture And Solution Security
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Solution Security Architecture
Solution Security ArchitectureSolution Security Architecture
Solution Security Architecture
 
Solution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation SolutionsSolution Architecture And (Robotic) Process Automation Solutions
Solution Architecture And (Robotic) Process Automation Solutions
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
Comparison of COVID-19 Mortality Data and Deaths for Ireland March 2020 – Mar...
 
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
Analysis of Decentralised, Distributed Decision-Making For Optimising Domesti...
 
Operational Risk Management Data Validation Architecture
Operational Risk Management Data Validation ArchitectureOperational Risk Management Data Validation Architecture
Operational Risk Management Data Validation Architecture
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Ireland 2019 and 2020 Compared - Individual Charts
Ireland   2019 and 2020 Compared - Individual ChartsIreland   2019 and 2020 Compared - Individual Charts
Ireland 2019 and 2020 Compared - Individual Charts
 
Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020Analysis of Irish Mortality Using Public Data Sources 2014-2020
Analysis of Irish Mortality Using Public Data Sources 2014-2020
 
Ireland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In DataIreland – 2019 And 2020 Compared In Data
Ireland – 2019 And 2020 Compared In Data
 
Critical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference ArchitectureCritical Review of Open Group IT4IT Reference Architecture
Critical Review of Open Group IT4IT Reference Architecture
 
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
Analysis of Possible Excess COVID-19 Deaths in Ireland From Jan 2020 to Jun 2020
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Business-Oriented Trends in IT Outsourcing

  • 1. Business-Oriented Trends in IT Outsourcing Alan McSweeney
  • 2. January 30, 2012 2 Objectives • To identify business-oriented trends in Information Technology outsourcing
  • 3. January 30, 2012 3 Topics • Outsourcing Trends • Business-Oriented General IT Trends • Transition and Transformation Within Outsourcing • Outsourcing and Innovation • A (Financial) Tale of Three Outsourcing Vendors
  • 4. January 30, 2012 4 ITO Trends
  • 5. January 30, 2012 5 State of Outsourcing in 2011 • Survey conducted by the London School of Economics Outsourcing Unit • 1,209 Buyers, Providers and Advisors of Outsourcing Services • Large study across spectrum of outsourcing industry • Provides insight into market trends and therefore should be part of any organisation’s strategy
  • 6. January 30, 2012 6 State of Outsourcing in 2011 • Key points − Outsourcing increasing across all organisation sizes and organisations that do not currently outsource − Cost an important factor − After cost, track record, culture, global scale and knowledge are important − Advisors playing an increasingly important role − Outsourcing providers not aware of how they are perceived − Focus is on business benefits rather than technology
  • 7. January 30, 2012 7 State of Outsourcing in 2011 – Some Results • Nearly three quarters or organisations plan to increase outsourcing activities • 59% of organisations with a shared services function and planning to increase outsourcing significantly − Shared services function is an organisational infrastructural stepping stone to outsourcing • Key reasons for outsourcing are − Cost reduction - 60-76% view as very important, depending on organisation size − More effective operations - 50-64% view as very important, depending on organisation size • 46% have found outsourcing very effective in reducing costs • 35% have found outsourcing ineffective in innovation • 31% have found outsourcing ineffective in proving access to new technology • 31% have found outsourcing ineffective in proving access to business process knowledge and experience • In-house delivery of IT and Business Processes still dominates with outsourcing limited to Help Desk and application development and support • Factors rated as very important such as not being convinced of service providers’ capabilities (39%), not being convinced of long-term business benefits (30%), insufficient short-term cost savings (37%) and fear of disruption limiting (31%) decisions to outsource • 29% of outsourcing suppliers view buyers not being convinced of their capabilities as being very important - gulf between buyer and provider • IT infrastructure and application development and maintenance outsourcing are seen as the core outsourcing areas by buyers − 68% already outsource infrastructure and will increase or plan to outsource − 62% already outsource application development and maintenance outsourcing and will increase or plan to outsource • 63% of medium-sized companies and 44% of large companies say outsourcing has been very effective in reducing costs • Buyers rate financial stability, track record and change management/governance process delivery, scale, industry specific knowledge and culture as the most critically important skills of outsourcing suppliers • The role of advisor in working with buyers on outsourcing is increasing
  • 8. January 30, 2012 8 Study Respondents’ Profile
  • 9. January 30, 2012 9 Buyers’ Organisation Size by Revenue
  • 10. January 30, 2012 10 Buyers’ Industries
  • 11. January 30, 2012 11 Outsourcing And Shared Services Delivery Dominate Global Service Models Over Next 3 Years • Emerging from the recession, will your company increase / reduce its reliance on the following operating models for general and administrative functions, over the next three years?
  • 12. January 30, 2012 12 Most Organisations With Shared Services Are Increasing Outsourcing • Emerging from the recession, will your company increase / reduce its reliance on the following operating models for your general and administrative functions, over the next 3 years?
  • 13. January 30, 2012 13 Business Challenges Driving Outsourcing In 2011 • How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing And BPO Decision-Making This Year? − Answer = Very Important
  • 14. January 30, 2012 14 Europeans Want To Drive Out Cost And Globalise – Without Changing Their Processes • How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing And BPO Decision-Making This Year? − Answer = Very Important
  • 15. January 30, 2012 15 Buyers Achieving Modest Business Results Beyond Cost-Reduction With Their Outsourcing Initiatives • How Effective Have Your Current Outsourcing Initiatives Been At Achieving The Following Business Benefits To-Date?
  • 16. January 30, 2012 16 What Is Your Primary Sourcing Model For Managing The Following IT and Business Processes? • Untapped sourcing potential • In-house delivery of IT and Business Processes still dominant in 2011
  • 17. January 30, 2012 17 Concerns Holding Back Outsourcing In 2011 • How Important Are The Following Factors Preventing Your Organisation From IT Outsourcing Or Business Processes Over The Next 12 Months?
  • 18. January 30, 2012 18 Providers Oblivious To Buyers’ Perception Of Them • How Important Are The Following Factors In Preventing Your Clients From Outsourcing IT Or Business Processes Over The Next 12 Months? (Outsourcing Providers)
  • 19. January 30, 2012 19 Demand For Core General And Administrative Outsourcing Reaches Unprecedented Levels
  • 20. January 30, 2012 20 First-Time Enterprise Buyers Look To Jump Into BPO • % Buy-side organizations looking to outsource for the first time over the next 12 months
  • 21. January 30, 2012 21 Effectiveness Of Current Outsourcing Engagements: Mid-Market Organisations Benefitting The Most • How Effective Have Your Current Outsourcing Initiatives Been For Achieving The Following Business Benefits To-Date? − Answer = Very Effective
  • 22. January 30, 2012 22 The Enterprise Market Gears Up For An Aggressive Spike In Scope-Expansion Across Maturing Functions • % Buy-Side Organisations Already Outsourcing And Intending To Increase Scope Over The Next 12 Months
  • 23. January 30, 2012 23 After Financial Considerations, Buyers Care (Or Say They Care) About The Governance, Industry Acumen And Cultural Attributes Of Providers • How Important Are The Following Attributes To Your Clients Today, When Considering A Service Provider Relationship For IT/BPO Services?
  • 24. January 30, 2012 24 Providers Underestimate Importance Buyers Place On Change Management, Governance And Culture
  • 25. January 30, 2012 25 Advisors Are Buoyant About It When Looking At Future Outsourcing Plans • Do You Expect Your Clients To Increase Or Reduce Their Activity Across The Following Areas, Over The Next 18 Months? − Outsourcing Advisers And Suppliers
  • 26. January 30, 2012 26 Management Consultants Increasingly Influencing Outsourcing • Extent By Which Providers Have Been Seeing The Following Advisors Influence Their Clients' Outsourcing Decision-Making Over The Last Six Months
  • 27. January 30, 2012 27 ITO Concerns • Transition takes too long • Not integrated • Business disruptions • Increased business risk • Lower service quality • Treatment of acquired employees • Does not deliver value • High cost of operation • Confusion over what is being sold
  • 28. January 30, 2012 28 Analysis of Some Information Technology Trends • AICPA – Survey of members from 2001 to 2011 on initiatives in IT that are of concern to their 370,000 members − http://www.aicpa.org/INTERESTAREAS/INFORMATIONTECHNOLOGY/RESOURC ES/TOPTECHNOLOGYINITIATIVES/Pages/2011TopTechInitiatives.aspx • Gartner – well known analyst company • Two very different views of information technology trends − Business-oriented − Technology-oriented • IT tends to be concerned with technology trends for themselves rather than their application to business • IT outsourcing needs to concern itself with business needs rather than just pure IT
  • 29. January 30, 2012 29 Gartner – Key IT Trends 2008 - 2011 2011 2010 2009 2008 1 Cloud Computing Cloud Computing Virtualisation Green IT 2 Mobile Applications and Media Tablets Advanced Analytics Cloud Computing Unified Communications 3 Social Communications and Collaboration Client Computing Servers - Beyond Blades Business Process Modelling 4 Video IT for Green Web-Oriented Architectures Metadata Management 5 Next Generation Analytics Reshaping the Data Centre Enterprise Mashups Virtualisation 2.0 6 Social Analytics Social Computing Specialised Systems Mashup and Composite Applications 7 Context-Aware Computing Security – Activity Monitoring Social Software and Social Networking Web Platform and Web- Oriented Architectures 8 Storage Class Memory Flash Memory Unified Communications Computing Fabric 9 Ubiquitous Computing Virtualisation for Availability Business Intelligence Real World Web 10 Fabric-Based Infrastructure and Computers Mobile Applications Green IT Social Software • How relevant are these trends to the business and to end-user organisations? • Where have the old trends gone to – lack of continuity between years? • Are they fads more than trends?
  • 30. January 30, 2012 30 AICPA Top 10 IT Initiatives 2001-2011 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 1 Security Of Data, Code & Communications / Data Security & Document Retention / Security Threats Control and Use of Mobile Devices Information Security Management Information Security Management Information Security Management Information Security Information Security Information Security Information Security Business And Financial Reporting Applications Information Security And Controls 2 Connectivity / Wireless Access / High Speed Internet Connections / Voice And Data Information Security Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management Spam Technology Business Information Management Training And Technology Competency E-Business 3 Backup Solutions/ Disaster Recovery/ Business Continuity Data Retention Policies and Structure Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration Digital OptimisationApplication Integration Information Security and Controls Electronically- based Business and Financial Reporting 4 Secure Electronic Collaboration With Clients – Client Portals Remote Access Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology Database and Application Integration Web Services Quality of Service Privacy 5 Paperless Workflow/ Paperless Technology Staff and Management Training Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery Wireless Technologies Disaster Recovery Disaster Recovery Planning and Business Continuity Management Training and Technology competency 6 Laptop Security / Encryption Process Documentation and improvements Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies Disaster Recovery Wireless Technologies Communication Technologies Bandwidth Disaster Recovery 7 Small Business Software / Office 2010 / Windows 7 Saving and Making Money w/Technology Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies Data Mining Intrusion Detection Remote Connectivity Tools Qualified IT Personnel 8 User Mobility/ Mobile Computing/ Mobile Devices Technology Cost Controls Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies Virtual Office Intrusion Detection Web-Based and Web-Enabled Applications Quality of Service 9 Tax Software/ Electronic Transmittals Of Tax Forms Budget Processes Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies Business Exchange Technology Customer Relationship Management Qualified IT personnel Electronic Audit Trail 10Server Virtualization And Consolidation Project Management & Deployment of New Systems Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency Messaging Applications Privacy Messaging Applications (e- mail, faxing, voicemail, instant messaging) Application Service Provider
  • 31. January 30, 2012 31 AICPA Top 10 IT Initiatives 2005-2011 2011 2010 2009 2008 2007 2006 2005 1 Security Of Data, Code & Communications / Data Security & Document Retention / Security Threats Control and Use of Mobile Devices Information Security Management Information Security Management Information Security Management Information Security Information Security 2 Connectivity / Wireless Access / High Speed Internet Connections / Voice And Data Information Security Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management 3 Backup Solutions/ Disaster Recovery/ Business Continuity Data Retention Policies and Structure Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration 4 Secure Electronic Collaboration With Clients – Client Portals Remote Access Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology 5 Paperless Workflow/ Paperless Technology Staff and Management Training Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery 6 Laptop Security / EncryptionProcess Documentation and improvements Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies 7 Small Business Software / Office 2010 / Windows 7 Saving and Making Money w/Technology Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies 8 User Mobility/ Mobile Computing/ Mobile Devices Technology Cost Controls Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies 9 Tax Software/ Electronic Transmittals Of Tax Forms Budget Processes Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies 10 Server Virtualization And Consolidation Project Management & Deployment of New Systems Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency
  • 32. January 30, 2012 32 Security, Privacy, Governance, Disaster Recovery 2011 2010 2009 2008 2007 2006 2005 1 Security Of Data, Code & Communications / Data Security & Document Retention / Security Threats Control and Use of Mobile Devices Information Security Management Information Security Management Information Security Management Information Security Information Security 2 Connectivity / Wireless Access / High Speed Internet Connections / Voice And Data Information Security Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management 3 Backup Solutions/ Disaster Recovery/ Business Continuity Data Retention Policies and Structure Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration 4 Secure Electronic Collaboration With Clients – Client Portals Remote Access Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology 5 Paperless Workflow/ Paperless Technology Staff and Management Training Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery 6 Laptop Security / Encryption Process Documentation and improvements Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies 7 Small Business Software / Office 2010 / Windows 7 Saving and Making Money w/Technology Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies 8 User Mobility/ Mobile Computing/ Mobile Devices Technology Cost Controls Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies 9 Tax Software/ Electronic Transmittals Of Tax Forms Budget Processes Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies 10 Server Virtualization And Consolidation Project Management & Deployment of New Systems Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency
  • 33. January 30, 2012 33 Data, Information and Document Management/ Integration and Analysis and Related Initiatives 2011 2010 2009 2008 2007 2006 2005 1 Security Of Data, Code & Communications / Data Security & Document Retention / Security Threats Control and Use of Mobile Devices Information Security Management Information Security Management Information Security Management Information Security Information Security 2 Connectivity / Wireless Access / High Speed Internet Connections / Voice And Data Information Security Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management 3 Backup Solutions/ Disaster Recovery/ Business Continuity Data Retention Policies and Structure Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration 4 Secure Electronic Collaboration With Clients – Client Portals Remote Access Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology 5 Paperless Workflow/ Paperless Technology Staff and Management Training Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery 6 Laptop Security / Encryption Process Documentation and improvements Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies 7 Small Business Software / Office 2010 / Windows 7 Saving and Making Money w/Technology Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies 8 User Mobility/ Mobile Computing/ Mobile Devices Technology Cost Controls Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies 9 Tax Software/ Electronic Transmittals Of Tax Forms Budget Processes Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies 10 Server Virtualization And Consolidation Project Management & Deployment of New Systems Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency
  • 34. January 30, 2012 34 AICPA Top IT Initiatives • Notice any differences? • Business-oriented focus of IT initiatives − Not concerned with IT plumbing and infrastructure (such as cloud) but on business concerns - running the business - and business- related IT concerns – potential impact of IT systems on the wider business − Security, privacy, disaster recovery/business continuity and governance concerns dominate • How will pure technology trends assist in delivering these initiatives? • Effective IT outsourcing assist with addressing these concerns
  • 35. January 30, 2012 35 Transition and Transformation Within Outsourcing • Transition is the entire process for assuming operational responsibility for the acquired entity − Transition moves the acquired entity organization from its current mode of operation to an integrated managed mode of operation − Transition includes the takeover of the “as-is” business and operating environment as well as contractual requirements necessary to facilitate the transfer. • Transformation is the implementation of completed integrated solution within a specified time, that lead to entirely integrated operation, service enhancements and/or quality, productivity, technology improvements and cost savings/reductions • An approach to transformation is very important for successful outsourcing • Transformation is the basis for greater cost savings and innovation • Outsourcing without transformation is a risk as what is outsourced can stagnate over time
  • 36. January 30, 2012 36 Transition and Transformation Transition Transformation Steady State Operation Customer Infrastructure and Applications, Staff, Support Processes and Tools Customer Infrastructure and Applications, Transferred and Being Supported by Supplier Standardised Infrastructure Through Refresh, Customer Support Processes and Tools Replaced by Supplier Standards Primary Support Transferred to Appropriate Cost Location • Transition and transformation is a process that must be articulated effectively to customers • Customer must understand the implications and must accept the process • Delays or stoppages affect supplier’s costs
  • 37. January 30, 2012 37 Evaluation and Decision Negotiation and Contract Signing Pre-Operation and Pre-Integration Start Transition Transformation Steady State Operation of Integrated Entity Preliminary Transition Plan Due Diligence Final Transition Plan Integration Preparation Transition Initiation Finalise Integration Solution Architecture Due Diligence Review and Confirmation Transformation Planning Contract Effective Date Service Commencement Date Outsourcing Process Contract Review Transformation Delivery Transition Completed Transformation Completed
  • 38. January 30, 2012 38 Propose, Negotiate and Close Planning Research, Analysis, Identification Preliminary Transition and Transformation Plans Due Diligence Final Integrated Transition Plan Transition Transformation Ongoing Operation Transition Initiation/Kick-off Post Contract Verification Solution Handoff Acquisition Management Office Transfer Operation Commencement Preparation Final Integrated Transition Plan Transformation Initiation/Kick-off Stabilisation Standardisation Transformation Close Signed Contract Integration Start Review Transition Criteria Achieved Terms and Conditions Transition to Delivery Handoff Transformation Review Transformation Criteria Achieved Transformation to Delivery Handoff Delivery Quality Review Milestone Handoff Events Key Reporting Events Acquisition Engagement Stage Transition and Transformation Phase Activity Transition and Transformation Management
  • 39. January 30, 2012 39 Types of Outsourcing Arrangement • Efficiency/Utility (Make it Cheaper) arrangement outsourcing focuses primarily on cost control and, over time, cost reduction, with the goal of maintaining consistency in the delivery of services • Business Enhancement (Make it Better) arrangement is about business productivity. The organisation’s performance, as compared with their competitors, will improve, resulting in movement toward defined business goals • Transformational (Make me Money) arrangement is characterised by a partnership between the service provider and service recipient that is focused on innovation and new business, changing the very basis on which an organisation competes • Which arrangement are you looking for? • Clearly understand what your expectations are
  • 40. January 30, 2012 40 Problems With Outsourcing • Many organisations take a “fire and forget” approach to outsourcing • Problems with outsourcing are as much the fault of the outsourcing organisation as they are of the supplier • Outsourcing organisation need to define an operating model and be engaged with the outsourcing relationship • You can outsource anything except the management of the outsourcing relationship
  • 41. January 30, 2012 41 Outsourcing and Innovation • Outsourcing is not viewed by buyers or suppliers as a source of innovation − Not seen as an agent of change, innovation, transformation, access to new technology • Outsourcing is seen as “your mess for less” • Buyers neglect the value of transformation and how it can contribute to innovation and generate real business benefits • Providers do not sell transformation as a pre-requisite for innovation as well as further cost savings • Companies looking to outsource should look for a transformation and innovation vision from their supplier
  • 42. January 30, 2012 42 Business Challenges Driving Outsourcing In 2011 • How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing And BPO Decision-Making This Year? − Answer = Very Important • Innovation, Change, Access to New Technology, Transformation seen as relatively unimportant
  • 43. January 30, 2012 43 Europeans Want To Drive Out Cost And Globalise – Without Changing Their Processes • How Important Are The Following Business Drivers Behind Your Company's IT Outsourcing And BPO Decision-Making This Year? − Answer = Very Important • Innovation, Change, Access to New Technology, Transformation seen as relatively unimportant outside Asia
  • 44. January 30, 2012 44 Buyers Achieving Modest Business Results Beyond Cost-Reduction With Their Outsourcing Initiatives • How Effective Have Your Current Outsourcing Initiatives Been At Achieving The Following Business Benefits To-Date? • Existing outsourcing suppliers not seen as effective in delivering Innovation, Change, Access to New Technology, Transformation
  • 45. January 30, 2012 45 Effectiveness Of Current Outsourcing Engagements: Mid-Market Organisations Benefitting The Most • How Effective Have Your Current Outsourcing Initiatives Been For Achieving The Following Business Benefits To-Date? − Answer = Very Effective • Existing outsourcing initiatives not seen as effective in delivering Innovation, Change, Access to New Technology, Transformation
  • 46. January 30, 2012 46 After Financial Considerations, Buyers Care (Or Say They Care) About The Governance, Industry Acumen And Cultural Attributes Of Providers • How Important Are The Following Attributes To Your Clients Today, When Considering A Service Provider Relationship For IT/BPO Services? • Buyers of outsourcing services do not rate Innovation and Transformation as important supplier attributes
  • 47. January 30, 2012 47 Providers Underestimate Importance Buyers Place On Change Management, Governance And Culture • Buyers of outsourcing services do not rate Innovation and Transformation as important supplier attributes but suppliers still underestimate the important of Innovation
  • 48. January 30, 2012 48 Transformation Process Introduces Standardisation and Enables Innovation • Takes disparate set of sources and creates standard model • Effective transformation is an enabler of innovation with IT function − On-demand self- service − Elastic − Measured and metered usage and pricing − Scale − Resilience − Available − Secure From … To …
  • 49. January 30, 2012 49 A (Financial) Tale of Three Outsourcing Vendors • Sample analysis of three vendors involved in outsourcing − Dell – small outsourcing practice based on acquisition of Perot Systems and legacy outsourcing business − HP – large outsourcing vendor with expanded practice since the acquisition of EDS − IBM – large outsourcing vendor • By no means exhaustive – there are many outsourcing service providers
  • 50. January 30, 2012 50 Vendor Comparison Summary • Outsourcing Revenue for Dell includes all services including outsourcing • Dell performing poorly relative to its competitors: − Lower margins − Lower proportion of service and outsourcing revenues 2010 2009 2008 Dell HP IBM Dell HP IBM Dell HP IBM Revenue 52,902 126,033 99,870 61,101 114,552 95,758 61,133 118,364 103,630 Gross Margin 9,261 29,996 46,040 10,957 27,034 43,761 11,671 28,644 45,701 Gross Margin % 17.5% 23.8% 46.1% 17.9% 23.6% 45.7% 19.1% 24.2% 44.1% Net Income 1,433 8,761 14,833 2,478 7,660 13,425 2,947 8,329 12,334 Net Income % 2.7% 7.0% 14.9% 4.1% 6.7% 14.0% 4.8% 7.0% 11.9% Outsourcing Revenue 5,622 18,835 22,241 5,351 18,692 21,620 4,980 8,211 22,733 Outsourcing Revenue % 10.60% 14.90% 22.30% 8.80% 16.30% 22.60% 8.10% 6.90% 21.90%
  • 51. January 30, 2012 51 Vendor Comparison • Compare Dell, HP and IBM • Comparisons taken from 10-K filings • Difficult to make exact comparison − Major service-related takeovers • Dell acquire Perot in Nov 2009 • HP acquire EDS in Aug 2008 • Classification of revenues not consistent between years • Restatement of revenues − Dell 2010 10 K • Services revenue for 2009 = 5,351 • Services revenue for 2008 = 4,980 • Dell 2009 10 K • Services revenue for 2009 = 5,715 • Services revenue for 2008 = 5,320
  • 52. January 30, 2012 52 Vendor Comparison • Which vendor can articulate a transformation vision for your organisation?
  • 53. January 30, 2012 53 IBM • Revenue from − Hardware – classified as Systems and Technology − Software − Services – divided into: • Global Technology Services - provides IT infrastructure services and business process services, including outsourcing and other services • Global Business Services - provides professional services and application management services − Outsourcing classified as: • Strategic Outsourcing Services - existing infrastructure • Global Process Services - standardised processing platforms and business process outsourcing • Gross margins not reported down to outsourcing business area
  • 54. January 30, 2012 54 IBM – Financial Summary 2010 2009 2008 2007 2006 Revenue 99,870 95,758 103,630 98,786 91,424 Gross Margin 46,040 43,761 45,701 41,688 38,307 Gross Margin % 46.1% 45.7% 44.1% 42.2% 41.9% Net Income 14,833 13,425 12,334 10,418 9,492 Net Income % 14.9% 14.0% 11.9% 10.5% 10.4% Global Technology Services Revenue Total 38,201 37,347 39,264 36,103 32,322 Global Technology Services Total Gross Margin 34.7% 35.0% 32.60% 29.90% 29.80% Global Technology Services Revenue (Excluding Outsourcing) 15,960 15,727 16,531 15,108 13,433 Outsourcing Revenue 22,241 21,620 22,733 20,995 18,889 Outsourcing Revenue % 22.3% 22.6% 21.9% 21.3% 20.7% Global Business Services 18,223 17,653 19,628 18,041 15,969 Global Business Services Gross Margin % 46.1% 45.7% 26.70% 23.50% 23.10% Software 22,485 21,396 22,089 19,982 18,161 Software Gross Margin % 86.9% 86.0% 85.40% 85.20% 85.20% Systems and Technology 17,973 16,190 19,287 21,317 21,970 Systems and Technology Gross Margin % 46.1% 45.7% 38.10% 39.70% 37.70% Global Financing 2,238 2,302 2,559 2,502 2,365 Global Financing Gross Margin % 51.3% 47.5% 51.30% 46.70% 50.30%
  • 55. January 30, 2012 55 IBM – Financial Summary
  • 56. January 30, 2012 56 IBM – Financial Summary
  • 57. January 30, 2012 57 IBM – Financial Summary • Consistent performance • Balanced across product and service areas • C. 22% revenue from outsourcing
  • 58. January 30, 2012 58 HP • Revenue from − Services – classified under: • Infrastructure Technology Outsourcing • Business Process Outsourcing • Technology Services • Application Services − ESS – Enterprise Systems, Storage and Networking − Software − Personal Systems − Imaging and Printing − Financing • Does not report Net Income for individual business lines − Earning from Operations rather than Net Income – includes acquired intangible assets, pension settlements, etc. − Earning from Operations greater than Net Income by c 30%
  • 59. January 30, 2012 59 HP – Financial Summary 2010 2009 2008 Revenue 126,033 114,552 118,364 Gross Margin 29,996 27,034 28,644 Gross Margin % 23.8% 23.6% 24.2% Earnings from Operations 11,479 10,136 10,473 Earnings from Operations % 9.1% 8.8% 8.8% Net Income 8,761 7,660 8,329 Net Income % 7.0% 6.7% 7.0% Total Services (Including Outsourcing) Revenue 34,935 34,693 20,977 Total Services (Including Outsourcing) Earning from Operations 5,609 5,044 2,518 Total Services (Including Outsourcing) Earning from Operations % 16.1% 14.5% 12.0% Infrastructure Technology Outsourcing 15,963 15,751 7,488 Business Process Outsourcing 2,872 2,941 723 Total Outsourcing 18,835 18,692 8,211 Total Outsourcing % 14.9% 16.3% 6.9% ESS Revenue 18,651 15,359 19,400 ESS Earnings from Operations 2,402 1,518 2,577 ESS Earnings from Operations % 12.9% 9.9% 13.3% Software Revenue 3,586 3,572 4,220 Software Earnings from Operations 759 684 499 Software Earnings from Operations % 21.2% 19.1% 11.8% Personal Systems Revenue 40,741 35,305 42,295 Personal Systems Earnings from Operations 2,032 1,661 2,375 Personal Systems Earnings from Operations % 5.0% 4.7% 5.6% Imaging and Printing Revenue 25,764 24,011 29,614 Imaging and Printing Earnings from Operations 4,412 4,310 4,559 Imaging and Printing Earnings from Operations % 17.1% 18.0% 15.4% Financing Revenue 3,047 2,673 2,698 Financing Earnings from Operations 281 206 192 Financing Earnings from Operations % 9.2% 7.7% 7.1%
  • 60. January 30, 2012 60 HP – Financial Summary
  • 61. January 30, 2012 61 HP – Financial Summary
  • 62. January 30, 2012 62 HP – Financial Summary • Substantial increase in outsourcing revenue after EDS acquisition • Services Earning from Operations % substantially greater than average Earning from Operations % across all business areas − Services including outsourcing more profitable
  • 63. January 30, 2012 63 Dell – Financial Summary 2010 2009 2008 Revenue 52,902 61,101 61,133 Gross Margin 9,261 10,957 11,671 Gross Margin % 17.5% 17.9% 19.1% Net Income 1,433 2,478 2,947 Net Income % 2.7% 4.1% 4.8% Product Revenue 43,697 52,337 53,728 Product Revenue % 82.6% 85.7% 87.9% Product Revenue Gross Margin 6,163 7,667 8,579 Product Revenue Gross Margin % 14.1% 14.6% 16.0% Service Revenue Including Software 9,205 8,764 7,405 Service Revenue Including Software % 17.4% 14.3% 12.1% Service Revenue Gross Margin 3,098 3,290 3,290 Service Revenue Gross Margin % 33.7% 37.5% 44.4% Service Revenue Excluding Software 5,622 5,351 4,980 Service Revenue Excluding Software % 10.6% 8.8% 8.1%
  • 64. January 30, 2012 64 Dell – Product/Software/Services Breakdown
  • 65. January 30, 2012 65 Dell – Product/Software/Services Breakdown