IT STRATEGY 4/16/2016 Assignment 5 Goals are met by successfully navigating the challenges presented along the path to the goal. Information Technology is looking to develop a plan to solve these challenges for the businesses to allow the organization to reach their goals. IT Strategy Table of Contents INTRODUCTION ............................................................................................................. 0 1. REQUIREMENTS AND ISSUE MANAGEMENT SYSTEMS........................................... 1 The Case Study ................................................................................................................................. 1 Scrum Impact on Relationships ........................................................................................................ 1 Making Scrum Successful ................................................................................................................. 1 Scrum Management Tracking Systems .......................................................................................... 2 2. DEALING WITH RISK................................................................................................ 3 The Case Study ................................................................................................................................. 3 Importance of Global Approach to Risk Management ............................................................. 3 Organizational Impact ..................................................................................................................... 3 Competitive Impact........................................................................................................................... 4 3. OUTSOURCING ....................................................................................................... 4 The Case Study ................................................................................................................................. 4 Why Outsource ................................................................................................................................. 4 Relationship Building ........................................................................................................................ 4 Determining What to Outsource .................................................................................................... 5 Service Level Agreements (SLA)..................................................................................................... 5 4. OFFSHORING .......................................................................................................... 6 The Case Study ................................................................................................................................. 6 Relationship Building in an Offshore Model ................................................................................ 6 Building a Successful Offshore Model .......................................................................................... 6 Using IT to Bring Teams Together ................................................................................................... 7 CONCLUSION ................................................................................................................. 7 REFERENCES ................................................................................................................... 8 APPENDIX A ................................................................................................................ 10 Kanban Board Examples .............................................................................................................. 10 Waterfall Model ............................................................................................................................ 10 Table of Figures Figure 1:SCRUM ............................................................................................................................................................. 1 Figure 2:TFS DASHBOARD ............................................................................................................................................ 2 Figure 3:RISK AND IMPACT .......................................................................................................................................... 3 Figure 4:SLA .................................................................................................................................................................... 5 Figure 5:RISKS AND STRATEGY................................................................................................................................... 6 INTRODUCTION Businesses often rely on Information Technology to develop the strategies to reach their goals. When developing a strategy, the first step is to define the goal(s) the strategy will help achieve. This goal is defined through the creation of requirements. Once the requirements are defined the team needs to determine how the requirements will be completed and what systems will be used to track these requirements. The requirements will need to be refined and then developed. Risks and issues which arise through development will need to be dealt with. Companies are often taking on risks but they should be calculated risks with strategies for managing them. Coming up with these strategies is a place where IT can help develop solutions. Outsourcing and offshoring are two strategies businesses have to gain talent which can be leveraged to help the organization achieve their goals. However, both of these options have their own set of risks and rewards that should be analyzed before choosing either of these strategies. The common bond between all of these strategies is they all have impacts on relationships and trust which have to be managed to achieve successful outcomes. “Take calculated risks. That is quite different from being rash” George S. Patton – US 4 Star General WWII “Ironically, in a changing world, playing it safe is one of the riskiest things you can do.” Reid Hoffman – Cofounder of LinkedIn IT Strategy 1. REQUIREMENTS AND ISSUE MANAGEMENT SYSTEMS The Case Study Shaw Industries was presented with the challenge of improving the relationship between IT and the business. Shaw industries decided to use Scrum as their development methodology to help improve these relationships. In Shaw’s case the business IT would meet for a 4-8-hour planning meeting and then jointly determine which projects could provide the best value for the company. The sprints would last 30 days and at the end of the sprit the business would review the progress. The process of Scrum forces the group to come up with tasks for the sprint and requires the teams to get back together sooner than a waterfall project would. Scrum Impact on Relationships Scrum can result in positive results for relationships and trust. Scrum forces the team and business to meet often, which will naturally foster trusting relationships. Scrum focuses on people and interactions as opposed to process and tools. (AgileManifesto, n.d.) At the beginning of each sprint the team and the business work to create the list of stories called the product backlog, which is stories to be worked on in the upcoming sprint. The continual FIGURE 1:SCRUM interaction between the stakeholder’s and the team at the end of each sprint fits Shaw’s plan to improve these relationships. Scrum breaks down the wall between the technical and business side allowing teams to work together for a common goal. (scrum methodology, n.d.) The quick turnaround on the product allows the business stakeholders to provide feedback that can then be incorporated into the next sprint. In the historical waterfall model teams would work until the entire product was built with little interaction between the technical and business owners after the requirements were gathered. (Comparing Traditional Systems Analysis and Design with Agile Methodologies, n.d.) (SEE APPENDIX FOR WATERFALL DIAGRAM) The short cycles of the scrum method bring the business and technical sides together to build workable pieces of the product every sprint instead of waiting “a year and a half” as Shaw did previously with the waterfall method. Making Scrum Successful Planning in scrum requires careful understanding of the consequences of not following traditional planning activities. In order to be successful in scrum teams have to understand the consequences of failing to plan. (Module 5, n.d.) In order to make up for the lack of planning the team mitigates this risk during the execution phase by having more oversight. (Module 5, n.d.) Business owners will see that scrum allows the team to be constantly innovating which will build confidence in the teams efforts. (4 Ways IT Can Inspire Business Confidence, 2015) There are several tools to provide stakeholders a view into the scrum team’s progress. 1 IT Strategy Scrum Management Tracking Systems The Scrum approach focuses on individuals and interactions over processes and tools but there are quite a few different tools out there to use for Scrum. One example is Team Foundation Server (TFS) Scrum Template. TFS allows teams to track their backlog of stories, current sprint stories and progress being made. (Batatt, 2013) TFS also provides tracking for defects or issues that occur during the development cycle. Most tools feature a Burndown chart which demonstrates the work progression over the course of the sprint. The burndown chart is normally a line graph that starts in the top left and gradually works down FIGURE 2:TFS DASHBOARD to the bottom right signifying the work the team has completed during the course of the sprint. The other major piece of a Scrum tracking system is a Kanban board. This board allows the team to move the work across the board through statuses until it is implemented. There are tools such as TFS, VersionOne, IBM Rational Team Concert, Jira, HP Agile Manager and many other systems which will allow companies visibility into the scrum project work. These tools are used primarily to provide a tool to communicate the team’s progress to whoever would want a view into their work. These types of tools help build trust between the business and IT because they demonstrate the work being accomplished by IT. 2 IT Strategy 2. DEALING WITH RISK The Case Study Flowserve an international leader in supplying pumps, valves, seals and other services around the world and they decided it was essential to simplify their IT structure. This program to simplify their IT structure had a very HIGH impact for the business and was also had a HIGH likelihood to fail if the risks were not managed properly. Flowserve took a collaborative approach to mitigate these risks. The changes to simplify their IT structure were necessitated by operational and regulatory pressure. The plan was to update IT processes, establish common infrastructure, implement a global help desk, and remove contrasting ERP systems. In order for this program to be successful it is going to require strong leadership, solid relationships and huge emphasis on risk management to be effective. Impor tance of Global Approach to Risk Management Flowserve being an international company has risk contingent on the regulations of the countries where the business is located. Flowserve was facing regulatory pressure and the pressures would be different depending on the locations where the business was operating. One example of the differences is the US has regulations like FTC and Sarbanes-Oxley while the European Union has the EU Data Privacy Directive. (Modle 4, n.d.) These different regulatory bodies and rules require different risk management processes. It is important that as Flowserve builds out their new IT landscape they analyze data to help manage their risk. With so many different regulatory pressures internationally on the business, the new analytics systems make it easier than ever to provide executives with the intelligence needed to make decisions. (Olavsrud, 2016) Since FIGURE 3:RISK AND IMPACT there is so many countries affected it is important that people raise risks up to the top so they can be managed as they arise. The countries global footprint made it essential that they build relationships across the organization to help mitigate the risks of this endeavor. Organizational Impact Collaboration and communication are the best ways to eliminate organizational risk and build trust. Flowserve appears to have done a good job of identifying the risks at the onset of the project during preliminary analysis. (Module 5, n.d.) One risk would be that the project fails because the project does not get the importance across the enterprise for which it deserves. Flowserve made an organizational decision to treat this project as more than just an IT project. Management raised the significance of the project to the enterprise level which helped mitigate the risk that the project would not get the attention it needed. This is important because the risk of failure on this project reaches much further into the tentacles of the business than the IT department. There was an organizational risk of employees not buying in because of existing relationship issues but this was effectively mitigated by bringing everyone together. (Info Systems and Analysis - Module 2, n.d.) Flowserve recognized that if they did not get buy in from their divisional representatives the project could fail. Mitigating this risk by getting everyone’s input should help build trust within the organization for the strategy decided. 3 IT Strategy Competitive Impact Flowserve was faced with the challenge of helping the business respond to operational and regulatory challenges, which if not solved could weaken their competitive position. Flowserve was planning to consolidate and eliminate many of their systems to increase the operating efficiency. Some of the potential technical risks were avoided by having engineers and sales representatives embedded into the process during the planning phase so they could help steer the business towards the decisions which had the least technical risk. (Info Systems and Analysis - Module 2, n.d.) In order to get a good understanding of what the business needs were, IT was going to have to work closely with the business to ensure that the application integration was done properly. Limiting the rework that IT has to do should help build trust from both sides in the collaborative approach. Having this communication ensures IT develops the architecture and business workflows correctly to position the company on a competitive trajectory. 3. OUTSOURCING The Case Study Centene will be using a third party to host their Hyperion module. Many companies outsource various extents of their IT systems. Using a third party to host parts of the application structure can make for some additional challenges with implementing a new system. In Centene’s case they had trouble setting up their technical environment and this could have been complicated by having a third party hosting the product. These risks can be mitigated through a good working relationship and establishing service level agreements between both IT groups. Why Outsource Outsourcing is done to some extent by lots of companies and there are various factors that can drive a business to outsource all or parts of their Information Technology operations. Some of the reasons for outsourcing include reducing cost, focusing on core, improve quality, increase speed to market, fostering innovation and conserving capital. (Module 5, n.d.) The common theme throughout IT strategy is the importance of relationship building and trust. These tenants of relationships and trust are the same even when outsourcing to a different company. Relationship Building Outsourcing different parts of an IT solution is a fairly common practice but it has many pitfalls and relies on a solid relationship from both parties. One important factor is that the vendor does not use change control as a method to get back money which was lost in their contract negotiation. (Overby, 2012) Communicating more openly from the onset will eliminate the need to have financial changes during the course of the relationship. Building a foundation of trust relies on solid SLA processes in place to support the partnership. In order to start the relationship out on the right foot there are important factors a company needs to determine for what to outsource based on their competitive and operational needs. 4 IT Strategy Determining What to Outsource Many functional parts of IT make sense to be outsourced so that the business can focus on its core offerings. One example of this is Netflix who outsources much of their IT infrastructure demands to Amazon Web Services. Netflix outsourcing their infrastructure to Amazon Web Services allows them to focus on their core business model which is content delivery. Outsourcing these services to Amazon also allows them to deploy much faster and increase their speed to market. (Netflix Case Study, n.d.) The move allowed Netflix to expand video services to more than 130 additional countries. (Loten, 2016) Some companies look to outsource whole functional IT groups. If companies like Centene look to outsource all of their IT, this is done with the expectation of reducing operating costs. (Computer Services Inc, 2016) Companies have to be contingent of the pitfalls of outsourcing their IT operations. It can be difficult to be innovative with your IT strategy if it is outsourced. (Why Companies Have Stopped Outsourcing IT, 2016) There is also potential risk of trade secrets being stolen by the outsourcing vendor. Recently a software company Tata Consultancy Ltd. was found guilty of stealing intellectual property from Epic, creator of hospital management software and Tata was fined 940 million dollars. (Chakraborty, 2016) If companies decide to outsource they need to make sure they have security limits on what the vendors have access to and clear auditing procedures to protect their intellectual property. In order to establish a trust between the company and the outsource provider it is important to have a framework of rules to build that trust upon. Service Level Agreements (SLA) Service Level Agreements (SLA) are an agreement that ensure vendors meet their agreed upon requirements. SLA’s should be built out with service level guarantees such as percentage of availability and response time. (Module 5, n.d.) When building these agreements, it is important to understand the complexities and degree of change necessary to fulfill the agreement. (Overby, 2012) For example, if Centene requires more redundant infrastructure, additional security or more support staffing at the third party vendor this should be listed in the agreement within the security/reliability requirements. (Overby, 2012) Other items which should be included in the SLA for security and reliability include backup power, firewalls and security update schedules. (Module 5, n.d.) Another important item to have specified in the agreement are the problem response guarantees and remedies in case the provider fails to FIGURE 4:SLA meet their guarantees in the agreement. (Module 5, n.d.) Finally the SLA should also list the manner in which the SLA will be monitored. This monitoring should include how payment will occur if the SLA is violated and how this enforcement would take place. One way to enforce these SLA’s is to have the requirements in XML so that tools can read the SLA for automated enforcement of the agreement. (Module 5, n.d.) SLA’s are the framework for which trust is built upon in an outsourcing relationship. 5 IT Strategy 4. OFFSHORING The Case Study The case study doesn’t specifically describe an offshoring situation but Flowserve could be using offshore IT to build out their planned global help desk capabilities. Since many help desks are offshored today we will assume that Flowserve will also offshore the operations of the help desk as well as the development. The global help desk would be a good candidate for offshoring because it would allow Flowserve’s IT to focus on solving the core issues which require IT solutions such as setting up a single ERP system. The help desk solution would also be a project that could be built without any IT intellectual property revealed to the offshoring group. Relationship Building in an Offshore Model Building strong trusting relationships is important with an offshore team. Management should create an environment where everyone is comfortable contributing positive as well as negative feedback. (Loza, 2008) Strong communication channels will help the offshore resources to contact the onshore resources and solve challenges quicker. For example, let’s assume Flowserve has Business Analysts (BA) who gathered the requirements so the offshore team could develop the software for the global help desk. It is highly important that the offshore resources who are building and testing the software have open lines of communication with the BA’s who gathered the requirements. (Campbell, n.d.) Resources on both sides of the model need to be able to have a strong communication plan for the offshore relationship FIGURE 5:RISKS AND STRATEGY to be productive and trusting. Each group of resources needs to be cognizant of the other groups’ cultural differences and training can help resources better understand their cultural differences. One way to improve the relationship and increase trust is to bring the offshore resources onshore for a training period. Bringing a resource onshore for a time period helps the offshore team member ramp up knowledge as well as establish trusting relationships with the onshore team members. (My Recipe For Successful Offshore Agile Team Management, 2015) Building a Successful Offshore Model Building a successful offshore model relies on managing the associated risks. From the onset it is important that the choice of an offshore partner is the best fit for the company. Companies need to find the best fit for their offshore partner based on political and regulatory issues in the area where the company wants to outsource. In the selection process it is important to examine the political, privacy regulations and trade secret laws of the countries which offshoring could occur. (Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks, 2004) The right partner would need to be located in a stable country that has laws and regulations which protect the company’s 6 IT Strategy interests. The second step is to choose projects for the offshore team that can have security controls placed around them so that intellectual property (IP) theft is not an issue. (Module 5, n.d.) Choosing the global help desk project should help Flowserve accomplish this task because we are assuming that this solution does not have any IP tied to its development. Another common risk is teams working in different time zones who may not be working during the same time of the day. This risk can be avoided by picking a partner whose workforce will be working overlap with the onshore team. (Overby, 7 Tips to Offshore Agile Development, 2012) If overlap is not possible the teams may have to accept the risk and it could be a productivity drain to lose time due to the delayed communication. Technology should also be able to play a big role in solving some of these communication and training challenges we encounter in offshoring. Using IT to Bring Teams Together Flowserve should bring the onshore and offshore teams together through the use of technology. Video conferencing software is one way to keep communications channels open. Video conferencing also reduces travel costs and increases training capabilities. (IT services firm uses communications solution to boost its competitive advantage, n.d.) Collaboration tools such as Skype for Business or Intercall can be essential to training by allowing screen share of virtual events and other collaboration tools. (The Power of Continuous Access, n.d.) Instant messenger is another tool that helps facilitate communications and makes sending textual conversations quicker than an email thread. (My Recipe For Successful Offshore Agile Team Management, 2015) Teams should also take advantage of Knowledge Management Systems(KMS) and tools such as SharePoint which allow document sharing/management. CONCLUSION Once the business has a goal defined, IT develops strategies to achieve the goal. Relationships and trust play a large role in the strategy chosen. In the end any strategy is only effective if the goal is met and it is up to the people involved to put the work in necessary to reach the goal. The strategy should give the people the tools necessary to implement the plan. Information technology is always a balancing act between innovation and risk management. Success depends on how well the IT strategy straddles that line between innovation and risk management while building the trusting relationships required to push the organization past their goal. 7 IT Strategy REFERENCES (n.d.). Retrieved from https://healmyscm.wordpress.com/2015/05/27/find-tfs-2013-kanban-boardcolumns/ 4 Ways IT Can Inspire Business Confidence. (2015, 5 6). Retrieved from informationweek.com: http://www.informationweek.com/big-data/big-data-analytics/4-ways-it-can-inspire-businessconfidence/a/d-id/1320292 AgileManifesto. (n.d.). Retrieved from AgileManifesto: http://agilemanifesto.org/ Batatt, S. (2013, 3). Team Foundation Server - Agile Project Management using TFS 2012. Retrieved from https://msdn.microsoft.com/en-us/magazine/dn189203.aspx Campbell, B. (n.d.). Real World Offshore Development Practices. Retrieved from web.mit.edu: http://web.mit.edu/outsourcing/class2/Real_World_Offshore_Development_Campbell.pdf Chakraborty, S. (2016, 4 17). Tata Consultancy to Appeal Verdict in Infringement Case. Retrieved from Bloomberg.com: http://www.bloomberg.com/news/articles/2016-04-17/tata-consultancy-toappeal-against-verdict-in-infringement-case Comparing Traditional Systems Analysis and Design with Agile Methodologies. (n.d.). Retrieved from http://www.umsl.edu/~hugheyd/is6840/waterfall.html Computer Services Inc. (2016). IT Outsourcing: The Reasons, Risks and Rewards. Retrieved from http://www.corpcomputerservices.com/articles/outsourcing-reasons Info Systems and Analysis - Module 2. (n.d.). IT services firm uses communications solution to boost its competitive advantage. (n.d.). Retrieved from Microsoft: https://customers.microsoft.com/Pages/CustomerStory.aspx?recid=21647 Loten, A. (2016, 2 11). Netflix Shifts All IT to Amazon's Public Cloud. Retrieved from wsj.com: http://blogs.wsj.com/cio/2016/02/11/netflix-shifts-all-it-to-amazons-public-cloud/?mg=id-wsj Loza, J. (2008, 8 12). 10 things you should know about working with an offshore team. Retrieved from techrepublic.com: http://www.techrepublic.com/blog/10-things/10-things-you-should-knowabout-working-with-an-offshore-team/ Modle 4. (n.d.). Retrieved from https://learn.bu.edu/bbcswebdav/pid-4078559-dt-content-rid13837535_1/courses/16sprgmetcs782_ol/module4/allpages.htm Module 5. (n.d.). Retrieved from https://learn.bu.edu/bbcswebdav/pid-4078560-dt-content-rid13837569_1/courses/16sprgmetcs782_ol/module5/allpages.htm My Recipe For Successful Offshore Agile Team Management. (2015, 3 19). Retrieved from intersog.com: http://intersog.com/blog/agility-team-management/my-recipe-for-successful-offshore-agileteam-management/ Netflix Case Study. (n.d.). Retrieved from Amazon Web Services: https://aws.amazon.com/solutions/casestudies/netflix/ 8 IT Strategy Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks. (2004, 7). Retrieved from FDIC: https://www.fdic.gov/regulations/examinations/offshore/ Olavsrud, T. (2016, 4 16). How risk management leads to increased profit margins. Retrieved from cio.com: http://www.cio.com/article/2910231/risk-management/how-risk-management-leads-toincreased-profit-margins.html Overby, S. (2012, 10 26). 5 Ways to Build Better IT Outsourcing Relationships. Retrieved from CIO.com: http://www.cio.com/article/2390857/outsourcing/5-ways-to-build-better-it-outsourcingrelationships.html Overby, S. (2012, 10 1). 7 Tips to Offshore Agile Development. Retrieved from cio.com: http://www.cio.com/article/2391721/outsourcing/7-tips-to-offshore-agile-development.html scrum methodology. (n.d.). Retrieved from http://scrummethodology.com/: http://scrummethodology.com/ The Power of Continuous Access. (n.d.). Retrieved from Westuc.com: https://www.westuc.com/whitepapers/power-continuous-access Why Companies Have Stopped Outsourcing IT. (2016, 10 14). Retrieved from http://blogs.wsj.com/experts/2015/10/14/why-companies-have-stopped-outsourcing-it/ 9 IT Strategy APPENDIX A Kanban Board Examples Waterfall Model FIGURE 6:WATERFALL (COMPARING TRADITIONAL SYSTEMS ANALYSIS AND DESIGN WITH AGILE METHODOLOGIES, N.D.) 10
© Copyright 2026 Paperzz