Software Building… What’s Your Strategy? Pros & Cons Discussion By: Learning Team B By Tom Yost, Richard Woodham, Tam Truong, Gordon Heeres, Susan Kenney,

Slides:



Advertisements
Similar presentations
Metasearch Unbound: Corporate Library Perspectives Utilizing Unbundled Software Probing Pros & Cons Canvassing Capabilities Reserving Resources Customizing.
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
1. 2 RE Case Study What was the Project Objective? When did it all Start? What was the Plan? How did Negotiations take place? What were the Benefits of.
Software as a Service Tradeoff Considerations Cost Effective or Liability? Authored and Presented By: Gordon F. Jones
Acquiring Information Systems and Applications
Enterprise Integration Architecture IPMA Professional Development Seminar June 29, 2006 Scott Came Director, Enterprise Architecture Program Washington.
The Outsourcing Process
OAUG Northeastern Oracle Applications & Technology Symposium (OATS) Leveraging Technology for ROI Joint Presentation with Yale University & Rutgers University.
IT Project Management Office
CHAPTER 10 & 13 IS within the Organization & Acquiring IS and Applications.
Costs of Security in a COTS-Based Software System True Program Success TM Costs of Security in a COTS-Based Software System Arlene Minkiewicz, Chief Scientist.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
Outsourcing and transaction cost analysis MBA-ProMa Industrial Marketing Staffan Brege, Professor.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Systems Analysis and Design Chapter 12.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Management Information Systems, 4 th Edition 1 Chapter 16 Alternative Avenues for Systems Acquisitions.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
Acquiring Information Systems and Applications
Acquiring Information Systems and Applications
Chapter 13 Sourcing Materials and Services Learning Objectives After reading this chapter, you should be able to do the following:  Understand the role.
PMSS Final SOW May 22 nd, Statement of Work 2 GLENN RESEARCH CENTER PROJECT MANAGEMENT SUPPORT SERVICES (PMSS) The Contractor shall provide expert.
November 2009 Network Disaster Recovery October 2014.
“Here’s why you need the new wheels, too…” Shawn and Steve Image from
Development of a Hydro/Meteorological Data Management System For improved water management Objectives Establish a hydrological Data Management System (DMS)
Using Microsoft ACCESS to develop small to medium applications on campus.
SYS364 Evaluating Alternatives. Objectives of the Systems Analysis Phase determine, analyze, organize and document the requirements of a new information.
1 IS 8950 Managing and Leading a Networked IT Organization.
Strategy #5. IT Architecture and IT Infrastructure are Metaphors Architecture - the relationship between planning and building Infrastructure - examples.
Moving into Design SYSTEMS ANALYSIS AND DESIGN, 6 TH EDITION DENNIS, WIXOM, AND ROTH © 2015 JOHN WILEY & SONS. ALL RIGHTS RESERVED. 1 Roberta M. Roth.
Industry specific cover image Oracle Insight & How To Drive Value From Your ERP Investment Simon Threlfall Senior Director, Industry Strategy & Insight.
Chapter 16 Alternative Avenues for Systems Acquisitions
Chapter 13: Developing and Implementing Effective Accounting Information Systems
Installation and Maintenance of Health IT Systems
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Chapter 4 of the Executive Guide manual
IT Staffing Solutions Presented by MicroAge May 22, 2008.
Hampshire Constabulary IT Sourcing Strategy Steve Vercella (Head of IT) & Martin Nel (IT Vendor Manager)
Improved Operational Performance Through Strategic Outsourcing of Voice and Data Services BackgroundBackground The client, a large healthcare provider.
Acquiring Information Systems and Applications
1 IGT – Confidential IGT Cloud Caryn Cleereman Cloud Business Development & Sales Director.
Supply Chain Doctors SCM Fundamentals Introduction Planning Sourcing Making Warehousing Transporting Sharpening the Saw.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
ITIL Drivers for Government Scott Spencer Vice President, Program Management, GTSI.
CHAPTER 13 Acquiring Information Systems and Applications.
Business Acuity Inc. Gersis Software - Custom Software Development.
Service Supply Relationships MD254 Service Operations Professor Joy Field.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Testing and Software Quality Assurance Process.
| #ActOnSW. To The Point Marketing is a full-service, digital marketing agency specializing in the architecture, design,
Outsourcing Medical Technology John D. Cacciamani MD., MBA. Temple University Health System Concurrent Session I March 7, 2005.
1 INVESTMENT PORTFOLIO MANAGEMENT SERVICES. 2 INVESTMENT PORTFOLIO City’s portfolio totals - $270,351,000 (as of May 31, 2007) Until Purchasing Agent.
New ERP Vendor Hosting vs. In-House. Not Rocket Science, but… Managing contracts for services provided by vendors is different than managing services.
Application Outsourcing: Achieving Success & Avoiding Risk
Quality and reliability management in projects
Systems analysis and design, 6th edition Dennis, wixom, and roth
Systems analysis and design, 6th edition Dennis, wixom, and roth
Introduction to Requirements Management
Projects and procurement
Best Practices Consortium
IT Staff and the End User
Projects and procurement
Acquisition of Information Technology. Need to acquire technology A manager must be prepared to make what are sometimes risky acquisitions to fashion.
Quality and reliability management in projects
Strategies for Information Management
SOURCING MATERIALS AND SERVICES
Presentation transcript:

Software Building… What’s Your Strategy? Pros & Cons Discussion By: Learning Team B By Tom Yost, Richard Woodham, Tam Truong, Gordon Heeres, Susan Kenney, John Leonard

In-House Built (Pros) Satisfies proprietary requirements Software built to accommodate established procedures and policies Internal resources and capabilities increased and improved Easily integrates with existing systems and technologies

In-House Built (Cons) New competencies and resources may be acquired High long term costs Information sharing could be problematic Adding hardware to an in-house system could require development of proprietary device drivers

Contract Built (Pros) Improve service and performance Leverage expert resources and staffing Shorter systems development cycles Improve management control Stabilize and reduce costs Facilitates business focus

Contract Built (Cons) Potentially high cost Introduces contractual issues Builds no in-house expertise Possible conflict of interest

Purchasing Turnkey Software (Pros) Vendor experience and expertise No additional staffing Vendor-Customer relationship drives higher quality Improved Customer support Improved Customer training

Purchasing Turnkey Software (Cons) High cost No control over project management No control on project delivery High vendor dependence – expertise, personnel, etc.

Customizing Pre-built Software (Pros) No internal IT development Provides all business functions Quality systems Stability Fast delivery of system Service agreement

Customizing Pre-built Software (Cons) Expensive High Risk Possible loose of upgrades Main system can be impacted with bugs

So, to decide which strategy to adopt … Calculate ROI Research vendor – expertise, contract, etc… Analyze potential costs-vs-savings Decide on core competencies Investigate security risks/concerns