SlideShare a Scribd company logo
1 of 4
Download to read offline
Sourcing Management and Sourcing Transition
Sourcing Management and Sourcing Transition




According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering
market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years.

Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to
innovate faster than its competition and deliver their products to market first, supplement their
development teams and re-balance their development priorities in order to accelerate revenue
generation. Management and investors want to lower total cost of ownership and increase shareholder
value. Due to the standardization of software engineering processes, pricing pressure and margin
compression, evolving enterprise customer expectations, software companies are forced with the task of
delivering more complex product development with limited and decreasingly time frames.

Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven
by fundamental changes in customers' purchasing behavior.

To overcome all or some of the above problems more and more software companies turn to Product
Outsourcing i.e. hiring external vendors to develop a product for the company.




The life cycle of an outsourcing engagement for software company usually consists of six distinct phases.
The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1):

Exhibit 2.1




It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a
regular basis.

The essence of product outsourcing is that it shifts a company's focus from managing resources in
managing results. So outsourcing demands a more advanced approach to performance management,
one that ensures that the desired results are defined clearly and reflect the company's true requirements.
Also an outsourcing management approach makes certain that the outsourcing results are reported

                                                                                 © Altoros Systems     2
Sourcing Management and Sourcing Transition



regularly and quickly adjusted as needed. It is very important to constantly evaluate the outsourcer’s
performance against evaluation criteria on a regular basis.



As software development companies move to measuring performance of their outsourcing initiatives and
SLA-based outsourcing relationships, metrics assume critical importance. Proper selection of metrics is a
key to motivating the right expectations and establishing success criteria for a successful relationship in
order to maintain R&D quality and monitor the support and maintenance activities.

Some of the metrics which can be used are:

1. Number of problem requests (PR) per day/week/month
2. Mean time / Average time / Average resources required to resolve a PR
3. Number of code fixes per day/week/month
4. Average number of lines of code affected per PR
5. Average time spent for PR that requires code modification
6. Response time

The above are only a few of the metrics that can be collected to track and measure performance. Similar
metrics should be collected in areas like testing, release management, customer satisfaction etc.

In cases that the outsourcing process or end-result is complicated, sub-categories or criteria should be
set.

Table 2.1.1. Criteria and Sub criteria of Outsourcing Evaluation




 Experience                                            Specialized knowledge and skill-set of a team.

 Communication                                         Detailed and frequent reporting. Fast response.

 Contract uphold                                       On - time delivery. Contract terms uphold.

 Efficiency                                            Projects delivered on time and on budget. High
                                                       quality end-product. Goal achievement.

Source: Avlonitis G.

Therefore software companies need consider the following guidelines when choosing metrics for offshore
outsourcing performance management:

1. Select metrics that correspond to factors within control of each party
2. Select metrics that motivate both parties to improve the relationship
3. Seek to collect a manageable amount of information.
4. Set baseline and target values.

Although it is easy to overwhelm the outsourcing relationship with performance management standards,
Independent Software Vendors need to consider maturity of their software engineering processes and
choose metrics that are objective, produce a reasonable volume of data, and are easy to collect at
minimal expense. The objective in metrics-based performance management is to be able to measure and
adjust performance, gradually build a successful and strategic relationship between client and provider.

                                                                                 © Altoros Systems       3
Sourcing Management and Sourcing Transition




Although it is easy to overwhelm the outsourcing relationship with performance management standards,
Independent Software Vendors need to consider maturity of their software engineering processes and
choose metrics that are objective.

Just as organizations have a disaster recovery plans that they create yearly, so should software
companies have an exit plan for any outsourcing relationship. It might be disaster recover or even BOT
(Build-Operate-Transfer) – a business model leveraged by companies that are seeking to establish a
R&D initiative but are not ready to invest and take responsibilities and manage risks before realizing the
benefits of a dedicated or captive engineering facility offshore. The model allows companies to set up
operations with minimal investment while leveraging a localized partner who executes both a
comprehensive build and operate program and implements IT best practices subsequently transferring
the operation to client ownership.

During this phase, a software company should evaluate the outcomes of current outsourcing
engagement, compare its initial goals and expectations against outsourcer’s performance and make a
qualified decision on how to evolve the relationship with outsourcing service provider in order to achieve
strategic objectives.




     One must outsource the "bottlenecks", the things that are really keeping the company from
      growing profitably.
     One must pick great partners, check them out and speak to their customers.
     Once outsourcing is done, the outsourcer must be regarded as part of the company and treated
        as such.
     One must demand excellence, since outsourcing is what the outsourcer does for a living.
     Outsourcing might scare employees. One must communicate honestly with them.



     Fear of loss of control.
     Work viewed as too strategic.
     Company's unique culture.
     Measuring the value.

Source: Corbet M. F.

Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and
large software companies for many different reasons. Cost reduction is typically the basis for offshore
outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by
constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as
operational difficulties associated with global outsourcing are gradually removed.

Having the right strategic offshore roadmap and governance model is critical.




Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com

                                                                                 © Altoros Systems     4

More Related Content

More from Altoros

More from Altoros (20)

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 
What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?
 
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.jsBluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
 
Deep Learning in Finance
Deep Learning in FinanceDeep Learning in Finance
Deep Learning in Finance
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 

Outsourcing Life Cycle: Sourcing Management and Sourcing Transition

  • 1. Sourcing Management and Sourcing Transition
  • 2. Sourcing Management and Sourcing Transition According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. The life cycle of an outsourcing engagement for software company usually consists of six distinct phases. The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1): Exhibit 2.1 It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a regular basis. The essence of product outsourcing is that it shifts a company's focus from managing resources in managing results. So outsourcing demands a more advanced approach to performance management, one that ensures that the desired results are defined clearly and reflect the company's true requirements. Also an outsourcing management approach makes certain that the outsourcing results are reported © Altoros Systems 2
  • 3. Sourcing Management and Sourcing Transition regularly and quickly adjusted as needed. It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a regular basis. As software development companies move to measuring performance of their outsourcing initiatives and SLA-based outsourcing relationships, metrics assume critical importance. Proper selection of metrics is a key to motivating the right expectations and establishing success criteria for a successful relationship in order to maintain R&D quality and monitor the support and maintenance activities. Some of the metrics which can be used are: 1. Number of problem requests (PR) per day/week/month 2. Mean time / Average time / Average resources required to resolve a PR 3. Number of code fixes per day/week/month 4. Average number of lines of code affected per PR 5. Average time spent for PR that requires code modification 6. Response time The above are only a few of the metrics that can be collected to track and measure performance. Similar metrics should be collected in areas like testing, release management, customer satisfaction etc. In cases that the outsourcing process or end-result is complicated, sub-categories or criteria should be set. Table 2.1.1. Criteria and Sub criteria of Outsourcing Evaluation Experience Specialized knowledge and skill-set of a team. Communication Detailed and frequent reporting. Fast response. Contract uphold On - time delivery. Contract terms uphold. Efficiency Projects delivered on time and on budget. High quality end-product. Goal achievement. Source: Avlonitis G. Therefore software companies need consider the following guidelines when choosing metrics for offshore outsourcing performance management: 1. Select metrics that correspond to factors within control of each party 2. Select metrics that motivate both parties to improve the relationship 3. Seek to collect a manageable amount of information. 4. Set baseline and target values. Although it is easy to overwhelm the outsourcing relationship with performance management standards, Independent Software Vendors need to consider maturity of their software engineering processes and choose metrics that are objective, produce a reasonable volume of data, and are easy to collect at minimal expense. The objective in metrics-based performance management is to be able to measure and adjust performance, gradually build a successful and strategic relationship between client and provider. © Altoros Systems 3
  • 4. Sourcing Management and Sourcing Transition Although it is easy to overwhelm the outsourcing relationship with performance management standards, Independent Software Vendors need to consider maturity of their software engineering processes and choose metrics that are objective. Just as organizations have a disaster recovery plans that they create yearly, so should software companies have an exit plan for any outsourcing relationship. It might be disaster recover or even BOT (Build-Operate-Transfer) – a business model leveraged by companies that are seeking to establish a R&D initiative but are not ready to invest and take responsibilities and manage risks before realizing the benefits of a dedicated or captive engineering facility offshore. The model allows companies to set up operations with minimal investment while leveraging a localized partner who executes both a comprehensive build and operate program and implements IT best practices subsequently transferring the operation to client ownership. During this phase, a software company should evaluate the outcomes of current outsourcing engagement, compare its initial goals and expectations against outsourcer’s performance and make a qualified decision on how to evolve the relationship with outsourcing service provider in order to achieve strategic objectives.  One must outsource the "bottlenecks", the things that are really keeping the company from growing profitably.  One must pick great partners, check them out and speak to their customers.  Once outsourcing is done, the outsourcer must be regarded as part of the company and treated as such.  One must demand excellence, since outsourcing is what the outsourcer does for a living.  Outsourcing might scare employees. One must communicate honestly with them.  Fear of loss of control.  Work viewed as too strategic.  Company's unique culture.  Measuring the value. Source: Corbet M. F. Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 4