SlideShare ist ein Scribd-Unternehmen logo
1 von 12
IT Software Sourcing - Overview
MehulVora
Index
1. InformationTechnology SpendTaxonomy
2. IT Sourcing Arrangements
3. IT Software CategoryTree
4. IT Software BuzzWords
- IT Software BuzzWords continued..
5. Sourcing Approach & Strategy
6. Savings Levers
7. Contractual Best Practices
8. IT Software Category Management Best Practices
InformationTechnology SpendTaxonomy
Tier 1 - Group Tier 2 - Family Tier 3 - Category Tier 4 - Commodity (Subcategory) * Strategy/Execution
INDIRECT GOODS AND
SERVICES
IT/ TELECOM
IT HARDWARE
HARDWARE MAINTENANCE G/R or R/R
INFRASTRUCTURE G/G or G/R
IT HARDWARE OTHERS
WORKPLACE G/R
IT SERVICES
HELP DESK SUPPORT R/R
HOSTING SERVICES
IMPLEMENTATION & INTEGRATION G/R
IT CONSULTING G/G
IT MANAGED SERVICE PROVIDER G/G or G/R
IT NETWORK MONITORING G/G
IT STAFFING SERVICES R/R
IT SUPPORT SERVICES G/R
SECURITY
IT SOFTWARE
BUSINESS APPLICATIONS & SUPPORT G/G
ERP LICENSES G/G
ERP MAINTENANCE & SUPPORT G/G
INFRASTRUCTURE G/R
SECURITY G/R
SOFTWARE OTHERS
WORKPLACE
TELECOMMUNICATIONS -
EQUIPMENT, SERVICES AND
SUPPORT
AUDIO / VISUAL EQUIPMENT & MAINTENANCE R/R
CONFERENCING SERVICES & SUPPORT R/R
DESKTOP PHONES R/R
MOBILE EQUIPMENT G/R or R/R or R/L
MOBILE SERVICES & SUPPORT R/R or R/L
TELECOM MANAGED SERVICES PROVIDERS R/R
WAN EQUIPMENT G/G or G/R
WAN SERVICES & SUPPORT G/G or G/R
WAN TRANSPORT G/G or G/R
WIFI EQUIPMENT G/G or G/R
WIFI SERVICES & SUPPORT G/G or G/R
G = Global
R = Regional
L = Local
*The Strategy and Execution is dependent on the size of an organization, geographical spread, centralized vs.
decentralized model of the procurement function etc.
Companies typically pursue sourcing of IT in four different types of
arrangements.
Insourcing –
“Providing the IT services
internally”
Gartner Group.
• Differentiating Solutions Delivery
• Differentiating Infrastructure
Strategic Alliance –
“Integrating the core competencies
with external capabilities of allies
to generate growth” The Warren Company.
•Differentiating Solutions Delivery
• Differentiating Infrastructure
Joint Venture –
“Formalized alliances resulting in the
creation of a new space, separate
business entity” The Warren Company.
•Commodity Solutions Delivery
• Commodity Infrastructure
Differentiating
Commodity
Outsourcing –
“Contractual relationship with
an outside vendor to assume
responsibility for one or more
of IT functions” CIO Magazine.
• Commodity Solutions Delivery
• Commodity Infrastructure
Strategic Alliances leverage a
company’s
resources...and competencies,
adding
significant value to the
marketplace
and the bottom line.
There is a growing evolution
toward
vendors...partnering with other
vendors
to increase capabilities to win
business.
IT Sourcing Arrangements
IT Software CategoryTree
IT Software
Systems &
Network Software
•Operating System
•Office Productivity Suite
•Network Management
•Security
•Mobile Device Management
•Collaboration
Supply Chain
Management
HRM
Corporate
Performance
Management
Content
Management
CRM ERP
Business Application
Software
•WMS
•TMS
•Supply Chain
Planning
•Inventory
Optimization
•Customs filings and
brokerage
•FTZ Management
•Retail POS
•EDI
•Payroll
•Time & Attendance
•Benefits
Management
•Recruiting
•Training
•Performance
Management
•Leadership
Planning
•Budgeting, planning
and forecasting
•Profitability
modelling &
optimization
•Financial
consolidation, close
•Financial &
management
reporting &disclosure
•Catalog
Management
•Digital Asset
Management
•Authoring
Software
•Translation/
Globalization
Software
•Web Content
Management
•Help Desk
•Web chat/ email
•Sales automation
•Marketing
automation
•Call center
management
•Warranty & Claim
Management
•Customer Data
Management
•Product Life Cycle
Management
•Customer
Relationship
Management
•Supply Chain
Management
•Supplier
Relationship
Management
IT Software
BuzzWords
➢ Deploy: To install, test and implement a computer system or application
➢ In-memory Analytics: Business Intelligence deployments are typically disk-based, meaning the application
queries data stored on physical disks. In contrast, with in-memory analytics, the queries and data reside in
the server's random access memory (RAM). In-memory analytics helps improve the overall speed of a BI
system and provides business-intelligence users with faster answers.
➢ Legacy: In computing terms, the word legacy is used to describe outdated or obsolete technology and
equipment that is still being used by an individual or organization.
➢ Legacy Applications: An application in which a company or organization has already invested considerable
time and money. Typically, legacy applications are database management systems (DBMSs) running
on mainframes or minicomputers. An important feature of new software products is the ability to work with
a company's legacy applications, or at least be able to import data from them
➢ Multi-user interface: Typically refers to an operating system that allows concurrent access by multiple users
on the system
➢ OpenDocument Format (ODF): It is an ISO standard (ISO/IEC JTC 1/SC 34N0681). An open file
format enables users of varying office suites to exchange documents, such as text-based
documents, spreadsheets, charts, or databases, freely with one another. Any software maker can ensure its
own application can read and write this format.
➢ User Session: The period of time a user interfaces with an application. The user session begins when the
user accesses the application and ends when the user quits the application.
➢ Vertical Application: A vertical application is any software application that supports a specific business
process and targets a smaller number of users with specific skill sets and job responsibilities within an
organization. E.g.: ERP, CRM.
IT Software
BuzzWords
➢ Virtualization: Vvirtualization means to create a virtual version of a device or resource, such as
a server, storage device, network or even an operating system where the framework divides the resource
into one or more execution environments.
➢ User Interface (UI): The junction between a user and a computer program. An interface is a set
of commands or menus through which a user communicates with a program. A command-driven interface is
one in which you enter commands. A menu-driven interface is one in which you select command choices
from various menus displayed on the screen.
➢ Widget: Is a generic term for the part of a GUI that allows the user to interface with
the application and operating system. The term also refers to the program that is written in order to make
the graphic widget in the GUI look and perform in a specified way, depending on what action the user takes
while interfacing with the GUI. The term widget is used to refer to either the graphic component or its
controlling program or to refer to the combination of both.
➢ Customization
➢ Configuration: Configuration uses the inherent flexibility of the enterprise software to add fields, change
field names, modify drop-down lists, or add buttons. Configurations are made using powerful built-in tool
sets
➢ Customization : Involves code changes to create functionality that is not available through configuration.
Customization can be costly and can complicate future upgrades to the software because the code changes
may not easily migrate to the new version. Wherever possible, companies should avoid customization by
using configuration to meet their goals. Companies also should understand their vendor's particular
terminology with regard to this issue since words like "modifications" or "extensions" often mean different
things to different vendors.
IT Software sourcing requires detailed homework before going to the
market
Sourcing Approach
 Software sourcing process requires more than just the knowledge of application/ solutions but also the existing
best practices, key emerging industry specific trends
 Engaging research firms for initial conditioning and external SMEs for complex solutions (ERPs/ CRM) will
significantly reduce the failure risks, alternatively use RFI to understand market offering
 Leverage market competition to your advantage by giving all potential suppliers equal opportunity (no
preferential treatment for senior stakeholder’s recommended vendor)
 Finalize a preliminary budget, the extent of requirements will eventually determine the final price
 Combined RFI/RFP round, option to do a second round with shortlisted suppliers with an outlier report of their
initial offer to focus on the areas of improvement
Sourcing Strategy
 Invite supplier based on RFI score or if doing an RFP shortlist supplier based on research recommendations, post
RFP short listing engage with reference for evaluating services and satisfaction
 Use the sourcing process to assess difference license types and software delivery models for comprehensive TCO
analysis
 Focus on other costs like: Training, Hardware requirements, internal resource for solution administration,
helpdesk and support
 Provide opportunity to bidders to demonstrate the solution or share key business workflows that have been
useful to your organization Successful sourcing strategies include executing long term agreements,
 Finalize the process with a direct negotiation
Efficiently deploying savings levers can reduce upfront software
acquisitions costs
Procurement
Savings Levers
Effective Demand
Management
Improved
Purchasing
Processes and
Practices
Effective Supply
Management
“Strategic Sourcing”
• Identify bidders base on solution capability
• Capture pricing at a granular level
• Use SLA’s levels obtained during RPF/RFI as the
bases for Service delivery and management
• Push for pricing concessions over different contract
durations
• Negotiate on scope and the rate to avoid later
stage cost bumps
• Limit number of licenses at the start of the program
• Keep a pool of fixed and floater licenses to keep
costs down
• Develop process to manage licenses (IT asset
management program) to track license
requirements and allocations across Bus
• Consolidate T&M related activities for better
negotiations (a high and vague number will attract
additional & high T&M costs)
• Finalize costs of follow-up activities (T&M) charges
or ask for standard pricing for standard activities
• Track budget vs actual costs for controlling costs
• Incentivize vendor to provide a guaranteed
maximum pricing options
• Include mechanism/formula for price hike for license and maintenance fees once the initial term is
over. Consumer Price Index is a safe benchmark.
• In some cases, if the rollout plan is stretched, the clients explore the option of starting with SaaS (to
keep Capital Costs low) and switch to License Model when the number of purchases reach a threshold.
Include the verbiage/rates for switching at different point of times during the contract period.
• SLAs for support/maintenance and Subscription service offerings
• Escalation Matrix for prioritization of situation based on criticality and associated response/resolution time.
• The contract should carry clear credit structure to reimburse the client if services are not met.
• Termination Scenarios –
• Termination for Convenience from Client – Notice Period and Minimum Lock In period guidelines should be
defined. Generally a 1 year lock in and 1 month notice period is a good scenario for SaaS. Incase where
discounts are tied to contract time period, the contract should define client returning only the discount benefits
and not bear the impact of the entire software cost.
• Termination from Supplier – Pro rated license fees to be returned to the client incase of SaaS. For Licenses, the
unamortized cost (based on a negotiated formula) should be returned to the client.
IT Software - Contractual Best Practices
IT Software - Category Management Best Practices
Internal Resistance
Demand and Contract Management
Change Management
Issue Considerations
• Alignment of the business team is essential to drive supplier selection. Often
business units/teams clash on the choice of suppliers. Procurement can add value by
showcasing metrics like per unit cost/TCO over 3-5 year period along with capability
scores to drive home the selection.
•During Maintenance renewals
•Evaluate ticket data from previous years to analyze incident data and criticality data
from previous year . Question clients need for more expensive support plans
•Cancel support on licenses not being used. This is more pronounced in enterprise
user licenses where users leave the company but the company continues to pay
maintenance. True Up and Procurement analysis of the data is a key value add step
here.
• Change Management effort is significant as it involves resources on client side
• Time and efforts on client end should be aligned as per timelines.
• Ensure senior executive sponsorship
• Engage with key users and stake-holders early and throughout the process
Compliance
• Ensure strict guidelines to prevent rogue software purchases at a plant or office
level. Software malfunctioning can cripple the entire IT infrastructure.
• Year end follow ups with suppliers to true up on license numbers and savings check
(if the discounts are based on achieving certain number of volume targets)
ThankYou

Weitere ähnliche Inhalte

Was ist angesagt?

Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...India Scrum Enthusiasts Community
 
IACT406 eBusiness Plan - Opportunity Identification
IACT406 eBusiness Plan - Opportunity IdentificationIACT406 eBusiness Plan - Opportunity Identification
IACT406 eBusiness Plan - Opportunity IdentificationNurhazman Abdul Aziz
 
Purchase Request Process For Small to Medium Sized Company
Purchase Request Process For Small to Medium Sized CompanyPurchase Request Process For Small to Medium Sized Company
Purchase Request Process For Small to Medium Sized CompanyBill Kohnen
 
BT Monitor Benchmark 2013
BT Monitor Benchmark 2013BT Monitor Benchmark 2013
BT Monitor Benchmark 2013Ilmari Nyström
 
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)ELSCC
 
Procurement Management Information System (PMIS) for Improving Public Procure...
Procurement Management Information System (PMIS) for Improving Public Procure...Procurement Management Information System (PMIS) for Improving Public Procure...
Procurement Management Information System (PMIS) for Improving Public Procure...Shree Ram Dhakal
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171IBMgbsNA
 
FNB's Decision Management Journey: Transforming IT towards sustainable busine...
FNB's Decision Management Journey: Transforming IT towards sustainable busine...FNB's Decision Management Journey: Transforming IT towards sustainable busine...
FNB's Decision Management Journey: Transforming IT towards sustainable busine...Avsharn
 
Website Vendor Selection Tool
Website Vendor Selection Tool Website Vendor Selection Tool
Website Vendor Selection Tool Demand Metric
 
E tom awareness session for quick overview and deployment
E tom awareness session for quick overview and deploymentE tom awareness session for quick overview and deployment
E tom awareness session for quick overview and deploymentPraveen Kumar Kambhampati
 
Application Framework
Application FrameworkApplication Framework
Application FrameworkAyub Qureshi
 
Taxonomy of an Electronic procurement system
Taxonomy of an Electronic procurement systemTaxonomy of an Electronic procurement system
Taxonomy of an Electronic procurement systemmybestluxe.com
 
International Supply Chain Management - Outsourcing for a competitive advantage
International Supply Chain Management - Outsourcing for a competitive advantageInternational Supply Chain Management - Outsourcing for a competitive advantage
International Supply Chain Management - Outsourcing for a competitive advantageMustafa Mert Dikmen, MSc
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2Frank Corris
 
SRM Sourcing - Overview
SRM Sourcing - OverviewSRM Sourcing - Overview
SRM Sourcing - Overviewraj_gladiator5
 

Was ist angesagt? (20)

Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...Agile Tour 2016 Chennai - Vendor selection  an interactive process by Karthik...
Agile Tour 2016 Chennai - Vendor selection an interactive process by Karthik...
 
IACT406 eBusiness Plan - Opportunity Identification
IACT406 eBusiness Plan - Opportunity IdentificationIACT406 eBusiness Plan - Opportunity Identification
IACT406 eBusiness Plan - Opportunity Identification
 
Etom
EtomEtom
Etom
 
Purchase Request Process For Small to Medium Sized Company
Purchase Request Process For Small to Medium Sized CompanyPurchase Request Process For Small to Medium Sized Company
Purchase Request Process For Small to Medium Sized Company
 
BT Monitor Benchmark 2013
BT Monitor Benchmark 2013BT Monitor Benchmark 2013
BT Monitor Benchmark 2013
 
Outsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & PrincipleOutsourcing - Reza Hagel CPO & Principle
Outsourcing - Reza Hagel CPO & Principle
 
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)
Indirect Procurement - Mr. Ashwani Singh (Watson Pharma)
 
Procurement Management Information System (PMIS) for Improving Public Procure...
Procurement Management Information System (PMIS) for Improving Public Procure...Procurement Management Information System (PMIS) for Improving Public Procure...
Procurement Management Information System (PMIS) for Improving Public Procure...
 
Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171Insight2014 ibm client_center_4_adv_analytics_7171
Insight2014 ibm client_center_4_adv_analytics_7171
 
E-Procurement
E-ProcurementE-Procurement
E-Procurement
 
FNB's Decision Management Journey: Transforming IT towards sustainable busine...
FNB's Decision Management Journey: Transforming IT towards sustainable busine...FNB's Decision Management Journey: Transforming IT towards sustainable busine...
FNB's Decision Management Journey: Transforming IT towards sustainable busine...
 
Website Vendor Selection Tool
Website Vendor Selection Tool Website Vendor Selection Tool
Website Vendor Selection Tool
 
E tom awareness session for quick overview and deployment
E tom awareness session for quick overview and deploymentE tom awareness session for quick overview and deployment
E tom awareness session for quick overview and deployment
 
Application Framework
Application FrameworkApplication Framework
Application Framework
 
Taxonomy of an Electronic procurement system
Taxonomy of an Electronic procurement systemTaxonomy of an Electronic procurement system
Taxonomy of an Electronic procurement system
 
International Supply Chain Management - Outsourcing for a competitive advantage
International Supply Chain Management - Outsourcing for a competitive advantageInternational Supply Chain Management - Outsourcing for a competitive advantage
International Supply Chain Management - Outsourcing for a competitive advantage
 
e-Procurement in Indian Government
e-Procurement in Indian Governmente-Procurement in Indian Government
e-Procurement in Indian Government
 
Vendor Management System - Introduction2
Vendor Management System - Introduction2Vendor Management System - Introduction2
Vendor Management System - Introduction2
 
SRM Sourcing - Overview
SRM Sourcing - OverviewSRM Sourcing - Overview
SRM Sourcing - Overview
 
E Procurement
E ProcurementE Procurement
E Procurement
 

Ähnlich wie IT Software Category

Thinking of Outsourcing IT Service? Your Search Ends Here!
Thinking of Outsourcing IT Service? Your Search Ends Here!Thinking of Outsourcing IT Service? Your Search Ends Here!
Thinking of Outsourcing IT Service? Your Search Ends Here!ISHIR
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking SystemBharat Kalia
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentKovair
 
Strategies of Licensing and Entitlement Management
Strategies of Licensing and Entitlement ManagementStrategies of Licensing and Entitlement Management
Strategies of Licensing and Entitlement ManagementFlexera
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxZEESHANMEHMOOD43
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devopsUlf Mattsson
 
Software Maintenance & Support Rationalization
Software Maintenance & Support RationalizationSoftware Maintenance & Support Rationalization
Software Maintenance & Support RationalizationFlexera
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareTibbs Pereira
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirementshapy
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyPaul Osterberg
 
From Components To Services
From Components To ServicesFrom Components To Services
From Components To ServicesJames Phillips
 
Interactive selling solutions for complex manufacturing
Interactive selling solutions for complex manufacturingInteractive selling solutions for complex manufacturing
Interactive selling solutions for complex manufacturingCincom Systems
 
Ch07-Moving into Design
Ch07-Moving into DesignCh07-Moving into Design
Ch07-Moving into DesignFajar Baskoro
 
Cut through Microsoft licensing complexity
Cut through Microsoft licensing complexityCut through Microsoft licensing complexity
Cut through Microsoft licensing complexityInfo-Tech Research Group
 
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Cognizant
 
FlexNet Operations Administration Training
FlexNet Operations Administration TrainingFlexNet Operations Administration Training
FlexNet Operations Administration TrainingFlexera
 

Ähnlich wie IT Software Category (20)

Thinking of Outsourcing IT Service? Your Search Ends Here!
Thinking of Outsourcing IT Service? Your Search Ends Here!Thinking of Outsourcing IT Service? Your Search Ends Here!
Thinking of Outsourcing IT Service? Your Search Ends Here!
 
Business rules-extraction
Business rules-extractionBusiness rules-extraction
Business rules-extraction
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications Development
 
Strategies of Licensing and Entitlement Management
Strategies of Licensing and Entitlement ManagementStrategies of Licensing and Entitlement Management
Strategies of Licensing and Entitlement Management
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptx
 
How to add security in dataops and devops
How to add security in dataops and devopsHow to add security in dataops and devops
How to add security in dataops and devops
 
Software Maintenance & Support Rationalization
Software Maintenance & Support RationalizationSoftware Maintenance & Support Rationalization
Software Maintenance & Support Rationalization
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
 
Week8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical RequirementsWeek8 Topic1 Translate Business Needs Into Technical Requirements
Week8 Topic1 Translate Business Needs Into Technical Requirements
 
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your TechnologyStrategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
Strategy Basecamp's IT Diagnostic - Six Steps to Improving Your Technology
 
From Components To Services
From Components To ServicesFrom Components To Services
From Components To Services
 
Interactive selling solutions for complex manufacturing
Interactive selling solutions for complex manufacturingInteractive selling solutions for complex manufacturing
Interactive selling solutions for complex manufacturing
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Ch07-Moving into Design
Ch07-Moving into DesignCh07-Moving into Design
Ch07-Moving into Design
 
SampleDecPkg.ppt
SampleDecPkg.pptSampleDecPkg.ppt
SampleDecPkg.ppt
 
Cut through Microsoft licensing complexity
Cut through Microsoft licensing complexityCut through Microsoft licensing complexity
Cut through Microsoft licensing complexity
 
Print report
Print reportPrint report
Print report
 
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
 
FlexNet Operations Administration Training
FlexNet Operations Administration TrainingFlexNet Operations Administration Training
FlexNet Operations Administration Training
 

Kürzlich hochgeladen

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Kürzlich hochgeladen (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

IT Software Category

  • 1. IT Software Sourcing - Overview MehulVora
  • 2. Index 1. InformationTechnology SpendTaxonomy 2. IT Sourcing Arrangements 3. IT Software CategoryTree 4. IT Software BuzzWords - IT Software BuzzWords continued.. 5. Sourcing Approach & Strategy 6. Savings Levers 7. Contractual Best Practices 8. IT Software Category Management Best Practices
  • 3. InformationTechnology SpendTaxonomy Tier 1 - Group Tier 2 - Family Tier 3 - Category Tier 4 - Commodity (Subcategory) * Strategy/Execution INDIRECT GOODS AND SERVICES IT/ TELECOM IT HARDWARE HARDWARE MAINTENANCE G/R or R/R INFRASTRUCTURE G/G or G/R IT HARDWARE OTHERS WORKPLACE G/R IT SERVICES HELP DESK SUPPORT R/R HOSTING SERVICES IMPLEMENTATION & INTEGRATION G/R IT CONSULTING G/G IT MANAGED SERVICE PROVIDER G/G or G/R IT NETWORK MONITORING G/G IT STAFFING SERVICES R/R IT SUPPORT SERVICES G/R SECURITY IT SOFTWARE BUSINESS APPLICATIONS & SUPPORT G/G ERP LICENSES G/G ERP MAINTENANCE & SUPPORT G/G INFRASTRUCTURE G/R SECURITY G/R SOFTWARE OTHERS WORKPLACE TELECOMMUNICATIONS - EQUIPMENT, SERVICES AND SUPPORT AUDIO / VISUAL EQUIPMENT & MAINTENANCE R/R CONFERENCING SERVICES & SUPPORT R/R DESKTOP PHONES R/R MOBILE EQUIPMENT G/R or R/R or R/L MOBILE SERVICES & SUPPORT R/R or R/L TELECOM MANAGED SERVICES PROVIDERS R/R WAN EQUIPMENT G/G or G/R WAN SERVICES & SUPPORT G/G or G/R WAN TRANSPORT G/G or G/R WIFI EQUIPMENT G/G or G/R WIFI SERVICES & SUPPORT G/G or G/R G = Global R = Regional L = Local *The Strategy and Execution is dependent on the size of an organization, geographical spread, centralized vs. decentralized model of the procurement function etc.
  • 4. Companies typically pursue sourcing of IT in four different types of arrangements. Insourcing – “Providing the IT services internally” Gartner Group. • Differentiating Solutions Delivery • Differentiating Infrastructure Strategic Alliance – “Integrating the core competencies with external capabilities of allies to generate growth” The Warren Company. •Differentiating Solutions Delivery • Differentiating Infrastructure Joint Venture – “Formalized alliances resulting in the creation of a new space, separate business entity” The Warren Company. •Commodity Solutions Delivery • Commodity Infrastructure Differentiating Commodity Outsourcing – “Contractual relationship with an outside vendor to assume responsibility for one or more of IT functions” CIO Magazine. • Commodity Solutions Delivery • Commodity Infrastructure Strategic Alliances leverage a company’s resources...and competencies, adding significant value to the marketplace and the bottom line. There is a growing evolution toward vendors...partnering with other vendors to increase capabilities to win business. IT Sourcing Arrangements
  • 5. IT Software CategoryTree IT Software Systems & Network Software •Operating System •Office Productivity Suite •Network Management •Security •Mobile Device Management •Collaboration Supply Chain Management HRM Corporate Performance Management Content Management CRM ERP Business Application Software •WMS •TMS •Supply Chain Planning •Inventory Optimization •Customs filings and brokerage •FTZ Management •Retail POS •EDI •Payroll •Time & Attendance •Benefits Management •Recruiting •Training •Performance Management •Leadership Planning •Budgeting, planning and forecasting •Profitability modelling & optimization •Financial consolidation, close •Financial & management reporting &disclosure •Catalog Management •Digital Asset Management •Authoring Software •Translation/ Globalization Software •Web Content Management •Help Desk •Web chat/ email •Sales automation •Marketing automation •Call center management •Warranty & Claim Management •Customer Data Management •Product Life Cycle Management •Customer Relationship Management •Supply Chain Management •Supplier Relationship Management
  • 6. IT Software BuzzWords ➢ Deploy: To install, test and implement a computer system or application ➢ In-memory Analytics: Business Intelligence deployments are typically disk-based, meaning the application queries data stored on physical disks. In contrast, with in-memory analytics, the queries and data reside in the server's random access memory (RAM). In-memory analytics helps improve the overall speed of a BI system and provides business-intelligence users with faster answers. ➢ Legacy: In computing terms, the word legacy is used to describe outdated or obsolete technology and equipment that is still being used by an individual or organization. ➢ Legacy Applications: An application in which a company or organization has already invested considerable time and money. Typically, legacy applications are database management systems (DBMSs) running on mainframes or minicomputers. An important feature of new software products is the ability to work with a company's legacy applications, or at least be able to import data from them ➢ Multi-user interface: Typically refers to an operating system that allows concurrent access by multiple users on the system ➢ OpenDocument Format (ODF): It is an ISO standard (ISO/IEC JTC 1/SC 34N0681). An open file format enables users of varying office suites to exchange documents, such as text-based documents, spreadsheets, charts, or databases, freely with one another. Any software maker can ensure its own application can read and write this format. ➢ User Session: The period of time a user interfaces with an application. The user session begins when the user accesses the application and ends when the user quits the application. ➢ Vertical Application: A vertical application is any software application that supports a specific business process and targets a smaller number of users with specific skill sets and job responsibilities within an organization. E.g.: ERP, CRM.
  • 7. IT Software BuzzWords ➢ Virtualization: Vvirtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments. ➢ User Interface (UI): The junction between a user and a computer program. An interface is a set of commands or menus through which a user communicates with a program. A command-driven interface is one in which you enter commands. A menu-driven interface is one in which you select command choices from various menus displayed on the screen. ➢ Widget: Is a generic term for the part of a GUI that allows the user to interface with the application and operating system. The term also refers to the program that is written in order to make the graphic widget in the GUI look and perform in a specified way, depending on what action the user takes while interfacing with the GUI. The term widget is used to refer to either the graphic component or its controlling program or to refer to the combination of both. ➢ Customization ➢ Configuration: Configuration uses the inherent flexibility of the enterprise software to add fields, change field names, modify drop-down lists, or add buttons. Configurations are made using powerful built-in tool sets ➢ Customization : Involves code changes to create functionality that is not available through configuration. Customization can be costly and can complicate future upgrades to the software because the code changes may not easily migrate to the new version. Wherever possible, companies should avoid customization by using configuration to meet their goals. Companies also should understand their vendor's particular terminology with regard to this issue since words like "modifications" or "extensions" often mean different things to different vendors.
  • 8. IT Software sourcing requires detailed homework before going to the market Sourcing Approach  Software sourcing process requires more than just the knowledge of application/ solutions but also the existing best practices, key emerging industry specific trends  Engaging research firms for initial conditioning and external SMEs for complex solutions (ERPs/ CRM) will significantly reduce the failure risks, alternatively use RFI to understand market offering  Leverage market competition to your advantage by giving all potential suppliers equal opportunity (no preferential treatment for senior stakeholder’s recommended vendor)  Finalize a preliminary budget, the extent of requirements will eventually determine the final price  Combined RFI/RFP round, option to do a second round with shortlisted suppliers with an outlier report of their initial offer to focus on the areas of improvement Sourcing Strategy  Invite supplier based on RFI score or if doing an RFP shortlist supplier based on research recommendations, post RFP short listing engage with reference for evaluating services and satisfaction  Use the sourcing process to assess difference license types and software delivery models for comprehensive TCO analysis  Focus on other costs like: Training, Hardware requirements, internal resource for solution administration, helpdesk and support  Provide opportunity to bidders to demonstrate the solution or share key business workflows that have been useful to your organization Successful sourcing strategies include executing long term agreements,  Finalize the process with a direct negotiation
  • 9. Efficiently deploying savings levers can reduce upfront software acquisitions costs Procurement Savings Levers Effective Demand Management Improved Purchasing Processes and Practices Effective Supply Management “Strategic Sourcing” • Identify bidders base on solution capability • Capture pricing at a granular level • Use SLA’s levels obtained during RPF/RFI as the bases for Service delivery and management • Push for pricing concessions over different contract durations • Negotiate on scope and the rate to avoid later stage cost bumps • Limit number of licenses at the start of the program • Keep a pool of fixed and floater licenses to keep costs down • Develop process to manage licenses (IT asset management program) to track license requirements and allocations across Bus • Consolidate T&M related activities for better negotiations (a high and vague number will attract additional & high T&M costs) • Finalize costs of follow-up activities (T&M) charges or ask for standard pricing for standard activities • Track budget vs actual costs for controlling costs • Incentivize vendor to provide a guaranteed maximum pricing options
  • 10. • Include mechanism/formula for price hike for license and maintenance fees once the initial term is over. Consumer Price Index is a safe benchmark. • In some cases, if the rollout plan is stretched, the clients explore the option of starting with SaaS (to keep Capital Costs low) and switch to License Model when the number of purchases reach a threshold. Include the verbiage/rates for switching at different point of times during the contract period. • SLAs for support/maintenance and Subscription service offerings • Escalation Matrix for prioritization of situation based on criticality and associated response/resolution time. • The contract should carry clear credit structure to reimburse the client if services are not met. • Termination Scenarios – • Termination for Convenience from Client – Notice Period and Minimum Lock In period guidelines should be defined. Generally a 1 year lock in and 1 month notice period is a good scenario for SaaS. Incase where discounts are tied to contract time period, the contract should define client returning only the discount benefits and not bear the impact of the entire software cost. • Termination from Supplier – Pro rated license fees to be returned to the client incase of SaaS. For Licenses, the unamortized cost (based on a negotiated formula) should be returned to the client. IT Software - Contractual Best Practices
  • 11. IT Software - Category Management Best Practices Internal Resistance Demand and Contract Management Change Management Issue Considerations • Alignment of the business team is essential to drive supplier selection. Often business units/teams clash on the choice of suppliers. Procurement can add value by showcasing metrics like per unit cost/TCO over 3-5 year period along with capability scores to drive home the selection. •During Maintenance renewals •Evaluate ticket data from previous years to analyze incident data and criticality data from previous year . Question clients need for more expensive support plans •Cancel support on licenses not being used. This is more pronounced in enterprise user licenses where users leave the company but the company continues to pay maintenance. True Up and Procurement analysis of the data is a key value add step here. • Change Management effort is significant as it involves resources on client side • Time and efforts on client end should be aligned as per timelines. • Ensure senior executive sponsorship • Engage with key users and stake-holders early and throughout the process Compliance • Ensure strict guidelines to prevent rogue software purchases at a plant or office level. Software malfunctioning can cripple the entire IT infrastructure. • Year end follow ups with suppliers to true up on license numbers and savings check (if the discounts are based on achieving certain number of volume targets)