SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Sourcing Management and Sourcing Transition
Sourcing Management and Sourcing Transition




According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering
market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years.

Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to
innovate faster than its competition and deliver their products to market first, supplement their
development teams and re-balance their development priorities in order to accelerate revenue
generation. Management and investors want to lower total cost of ownership and increase shareholder
value. Due to the standardization of software engineering processes, pricing pressure and margin
compression, evolving enterprise customer expectations, software companies are forced with the task of
delivering more complex product development with limited and decreasingly time frames.

Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven
by fundamental changes in customers' purchasing behavior.

To overcome all or some of the above problems more and more software companies turn to Product
Outsourcing i.e. hiring external vendors to develop a product for the company.




The life cycle of an outsourcing engagement for software company usually consists of six distinct phases.
The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1):

Exhibit 2.1




It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a
regular basis.

The essence of product outsourcing is that it shifts a company's focus from managing resources in
managing results. So outsourcing demands a more advanced approach to performance management,
one that ensures that the desired results are defined clearly and reflect the company's true requirements.
Also an outsourcing management approach makes certain that the outsourcing results are reported

                                                                                 © Altoros Systems     2
Sourcing Management and Sourcing Transition



regularly and quickly adjusted as needed. It is very important to constantly evaluate the outsourcer’s
performance against evaluation criteria on a regular basis.



As software development companies move to measuring performance of their outsourcing initiatives and
SLA-based outsourcing relationships, metrics assume critical importance. Proper selection of metrics is a
key to motivating the right expectations and establishing success criteria for a successful relationship in
order to maintain R&D quality and monitor the support and maintenance activities.

Some of the metrics which can be used are:

1. Number of problem requests (PR) per day/week/month
2. Mean time / Average time / Average resources required to resolve a PR
3. Number of code fixes per day/week/month
4. Average number of lines of code affected per PR
5. Average time spent for PR that requires code modification
6. Response time

The above are only a few of the metrics that can be collected to track and measure performance. Similar
metrics should be collected in areas like testing, release management, customer satisfaction etc.

In cases that the outsourcing process or end-result is complicated, sub-categories or criteria should be
set.

Table 2.1.1. Criteria and Sub criteria of Outsourcing Evaluation




 Experience                                            Specialized knowledge and skill-set of a team.

 Communication                                         Detailed and frequent reporting. Fast response.

 Contract uphold                                       On - time delivery. Contract terms uphold.

 Efficiency                                            Projects delivered on time and on budget. High
                                                       quality end-product. Goal achievement.

Source: Avlonitis G.

Therefore software companies need consider the following guidelines when choosing metrics for offshore
outsourcing performance management:

1. Select metrics that correspond to factors within control of each party
2. Select metrics that motivate both parties to improve the relationship
3. Seek to collect a manageable amount of information.
4. Set baseline and target values.

Although it is easy to overwhelm the outsourcing relationship with performance management standards,
Independent Software Vendors need to consider maturity of their software engineering processes and
choose metrics that are objective, produce a reasonable volume of data, and are easy to collect at
minimal expense. The objective in metrics-based performance management is to be able to measure and
adjust performance, gradually build a successful and strategic relationship between client and provider.

                                                                                 © Altoros Systems       3
Sourcing Management and Sourcing Transition




Although it is easy to overwhelm the outsourcing relationship with performance management standards,
Independent Software Vendors need to consider maturity of their software engineering processes and
choose metrics that are objective.

Just as organizations have a disaster recovery plans that they create yearly, so should software
companies have an exit plan for any outsourcing relationship. It might be disaster recover or even BOT
(Build-Operate-Transfer) – a business model leveraged by companies that are seeking to establish a
R&D initiative but are not ready to invest and take responsibilities and manage risks before realizing the
benefits of a dedicated or captive engineering facility offshore. The model allows companies to set up
operations with minimal investment while leveraging a localized partner who executes both a
comprehensive build and operate program and implements IT best practices subsequently transferring
the operation to client ownership.

During this phase, a software company should evaluate the outcomes of current outsourcing
engagement, compare its initial goals and expectations against outsourcer’s performance and make a
qualified decision on how to evolve the relationship with outsourcing service provider in order to achieve
strategic objectives.




     One must outsource the "bottlenecks", the things that are really keeping the company from
      growing profitably.
     One must pick great partners, check them out and speak to their customers.
     Once outsourcing is done, the outsourcer must be regarded as part of the company and treated
        as such.
     One must demand excellence, since outsourcing is what the outsourcer does for a living.
     Outsourcing might scare employees. One must communicate honestly with them.



     Fear of loss of control.
     Work viewed as too strategic.
     Company's unique culture.
     Measuring the value.

Source: Corbet M. F.

Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and
large software companies for many different reasons. Cost reduction is typically the basis for offshore
outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by
constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as
operational difficulties associated with global outsourcing are gradually removed.

Having the right strategic offshore roadmap and governance model is critical.




Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com

                                                                                 © Altoros Systems     4

Weitere Àhnliche Inhalte

Mehr von Altoros

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksAltoros
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Altoros
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a BlockchainAltoros
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Altoros
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and KubernetesAltoros
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingAltoros
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple NodesAltoros
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayAltoros
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for KubernetesAltoros
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryAltoros
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFAltoros
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedAltoros
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsAltoros
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionAltoros
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesAltoros
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoTAltoros
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentAltoros
 
What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?Altoros
 
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.jsBluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.jsAltoros
 
Deep Learning in Finance
Deep Learning in FinanceDeep Learning in Finance
Deep Learning in FinanceAltoros
 

Mehr von Altoros (20)

SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 
What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?
 
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.jsBluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
Bluemix Live Sync: Speed Up Maintenance and Delivery for Node.js
 
Deep Learning in Finance
Deep Learning in FinanceDeep Learning in Finance
Deep Learning in Finance
 

KĂŒrzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

KĂŒrzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Outsourcing Life Cycle: Sourcing Management and Sourcing Transition

  • 1. Sourcing Management and Sourcing Transition
  • 2. Sourcing Management and Sourcing Transition According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. The life cycle of an outsourcing engagement for software company usually consists of six distinct phases. The diagram below illustrates their chronological order and the way they build on each other (Exhibit 2.1): Exhibit 2.1 It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a regular basis. The essence of product outsourcing is that it shifts a company's focus from managing resources in managing results. So outsourcing demands a more advanced approach to performance management, one that ensures that the desired results are defined clearly and reflect the company's true requirements. Also an outsourcing management approach makes certain that the outsourcing results are reported © Altoros Systems 2
  • 3. Sourcing Management and Sourcing Transition regularly and quickly adjusted as needed. It is very important to constantly evaluate the outsourcer’s performance against evaluation criteria on a regular basis. As software development companies move to measuring performance of their outsourcing initiatives and SLA-based outsourcing relationships, metrics assume critical importance. Proper selection of metrics is a key to motivating the right expectations and establishing success criteria for a successful relationship in order to maintain R&D quality and monitor the support and maintenance activities. Some of the metrics which can be used are: 1. Number of problem requests (PR) per day/week/month 2. Mean time / Average time / Average resources required to resolve a PR 3. Number of code fixes per day/week/month 4. Average number of lines of code affected per PR 5. Average time spent for PR that requires code modification 6. Response time The above are only a few of the metrics that can be collected to track and measure performance. Similar metrics should be collected in areas like testing, release management, customer satisfaction etc. In cases that the outsourcing process or end-result is complicated, sub-categories or criteria should be set. Table 2.1.1. Criteria and Sub criteria of Outsourcing Evaluation Experience Specialized knowledge and skill-set of a team. Communication Detailed and frequent reporting. Fast response. Contract uphold On - time delivery. Contract terms uphold. Efficiency Projects delivered on time and on budget. High quality end-product. Goal achievement. Source: Avlonitis G. Therefore software companies need consider the following guidelines when choosing metrics for offshore outsourcing performance management: 1. Select metrics that correspond to factors within control of each party 2. Select metrics that motivate both parties to improve the relationship 3. Seek to collect a manageable amount of information. 4. Set baseline and target values. Although it is easy to overwhelm the outsourcing relationship with performance management standards, Independent Software Vendors need to consider maturity of their software engineering processes and choose metrics that are objective, produce a reasonable volume of data, and are easy to collect at minimal expense. The objective in metrics-based performance management is to be able to measure and adjust performance, gradually build a successful and strategic relationship between client and provider. © Altoros Systems 3
  • 4. Sourcing Management and Sourcing Transition Although it is easy to overwhelm the outsourcing relationship with performance management standards, Independent Software Vendors need to consider maturity of their software engineering processes and choose metrics that are objective. Just as organizations have a disaster recovery plans that they create yearly, so should software companies have an exit plan for any outsourcing relationship. It might be disaster recover or even BOT (Build-Operate-Transfer) – a business model leveraged by companies that are seeking to establish a R&D initiative but are not ready to invest and take responsibilities and manage risks before realizing the benefits of a dedicated or captive engineering facility offshore. The model allows companies to set up operations with minimal investment while leveraging a localized partner who executes both a comprehensive build and operate program and implements IT best practices subsequently transferring the operation to client ownership. During this phase, a software company should evaluate the outcomes of current outsourcing engagement, compare its initial goals and expectations against outsourcer’s performance and make a qualified decision on how to evolve the relationship with outsourcing service provider in order to achieve strategic objectives.  One must outsource the "bottlenecks", the things that are really keeping the company from growing profitably.  One must pick great partners, check them out and speak to their customers.  Once outsourcing is done, the outsourcer must be regarded as part of the company and treated as such.  One must demand excellence, since outsourcing is what the outsourcer does for a living.  Outsourcing might scare employees. One must communicate honestly with them.  Fear of loss of control.  Work viewed as too strategic.  Company's unique culture.  Measuring the value. Source: Corbet M. F. Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 4