Presentation is loading. Please wait.

Presentation is loading. Please wait.

1242.2219 Information System Economics IT ACQUISITION.

Similar presentations


Presentation on theme: "1242.2219 Information System Economics IT ACQUISITION."— Presentation transcript:

1 1242.2219 Information System Economics IT ACQUISITION

2 What is acquired?  Hardware:computers communications  Software:applications operating systems communications  Personnel:management development operating IT ACQUISITION

3 How is it acquired?  insourcing - DYI  outsourcing IT ACQUISITION

4 The growing importance of outsourcing IT ACQUISITION "ComNet 2000 Packed With Outsourcing Options"InfoWorld.com (01/25/00); Jones, Jennifer; Moore, Cathleen This week's ComNet 2000 show will feature a number of new products and services aimed at capitalizing on the growing corporate demand for network outsourcing. AT&T plans to announce outsourcing services for large clients that do not want to manage their own network operations.... Nortel plans to establish a group that will design and manage networking technology for large customers.... The rising interest in outsourcing stems from a lack of trained technical workers and the need for IS departments to devote time to mission-critical programs, experts say. http://www.networkworld.com/news/2000/0125comnetout.html

5 The Process IT ACQUISITION  determine needs  insource/outsource decision  collect information  evaluate  select  contract

6 Insourcing vs. Outsourcing: Hardware IT ACQUISITION Internal resources for capacity planning requirements analysis, selection etc. Vendor performs capacity planning, requirements analysis, selection, etc. Vendor performs installation & maintenance ACQUISITION RESOURCES Insource Outsource analysis & planning installation Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.

7 Insourcing vs. Outsourcing: Software IT ACQUISITION Internal resources for needs analysis, coding, etc. Vendor performs needs analysis, coding, etc. Internal resources for package selection, installation, etc. Vendor performs package selection, installation, etc. ACQUISITION RESOURCES Insource Outsource custom package ACQUISITION SOURCE Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.

8 Insourcing vs. Outsourcing: Operations IT ACQUISITION Own hardware, software, and personnel Own hardware, in- or outsource software & personnel Vendor’s hardware, own personnel, in- or outsource software Vendor’s hardware & personnel, in- or outsource software. RESOURCES Insource Outsource in-house at vendor’s location LOCATION Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.

9 Evaluation purposes  selection evaluation (system exists elsewhere)  new hardware  new software  performance projection (system does not exist elsewhere)  design new software  design new hardware  performance monitoring (system in operation)  reconfigure hardware  change software IT ACQUISITION Evaluation

10 Evaluation methods  kernel programs  analytic models  benchmarks  synthetic programs  simulation  performance monitoring IT ACQUISITION Evaluation

11 Evaluation methods – kernel programs A kernel program is a typical program that has been partially or completely coded and timed. The timings are based on the manufacturer’s stated execution times for the instructions that comprise the kernel program. IT ACQUISITION Evaluation Uses: for evaluating machines which do not yet exist; for time-critical procedures Disadvantages: require machine language code; cannot adequately represent I/O and operating system interactions

12 Evaluation methods – analytic models An analytic model is a mathematical representation of a computing system. These are frequently based on queueing theory. IT ACQUISITION Evaluation Uses: for evaluating machines which do not yet exist; for specific machine components (e.g. a disk drive) Disadvantages: cannot capture all aspects of a computer’s functions; are most effective for higher level analyses – e.g. CPUs or complete systems

13 Evaluation methods - benchmarks A benchmark is an existing program that is coded in a specific language and executed on the machine being evaluated. IT ACQUISITION Evaluation Uses: esp. for evaluating and comparing potential replacement machines; for comparing overall performance of different machines and architectures Disadvantages: expensive; interpretation problems

14 Evaluation methods – benchmark interpretation problems IT ACQUISITION Evaluation Job I Machine AJob II Job III Job I Machine B Job II Job III time  suboptimal machine setup  “tailing”

15 Evaluation methods – synthetic programs Synthetic programs are coded and executed, but differ from benchmarks in that they do not necessarily exist beforehand. Like kernel programs, they are not real applications, but they are coded and they do include I/O considerations and interactions with the OS environment. Thus, they combine some of the attributes of benchmarks and of kernel programs. IT ACQUISITION Evaluation

16 Evaluation methods – synthetic programs IT ACQUISITION Evaluation Uses: selection – can be designed to include any measurement parameter of interest; good for before and after tests before executing changes Disadvantages: expensive to prepare; interpretation problems as with benchmarks; difficult to develop for online, terminal-based systems

17 Evaluation methods - simulation A simulation is a program which computes the results of running a real system, based on the characteristics of that system. It provides insight into the functioning of the system simulated. IT ACQUISITION Evaluation

18 Evaluation methods - simulation IT ACQUISITION Evaluation Uses: projecting outcomes of new designs; selection – but cost frequently prohibitive for comparing overall performance of different machines and architectures Disadvantages: expensive; validation problems – unless real results available for a similar machine; need to be adapted for each machine simulated

19 Evaluation methods – performance monitoring Consists of collecting data on an existing machine in order to locate bottlenecks or to improve system performance.  hardware monitors  software monitors IT ACQUISITION Evaluation Uses: evaluating and analyzing performance of existing systems; Disadvantages: the measurement problem (Heisenberg’s Uncertainty Principle); quantities of data generated;

20 Evaluation methods – Summary IT ACQUISITION Selection evaluation Performance Evaluation Projected Design Synthetic Programs, Benchmarks Simulation, Analytic Models Monitors Evaluation Techniques Purpose of evaluation primary use pecondary use

21 Selection Selection problems:  multiple alternatives  “apples vs. oranges”  approximate measurements  intangible economics  human factors  time  subjectivity IT ACQUISITION

22 Selection Selection methods:  ad hoc  weights and scores  cost-value  efficient frontier  sensitivity analysis IT ACQUISITION

23 Selection Methods weights and scores 1. determine criteria (c i ) 2. assign a weight to each criterion (w i ) 3. assign score to each criterion (s i ) 4. total score =  s i  w i IT ACQUISITION

24 Selection Methods Weights and scores – major problems 1.criteria set to predetermine solution 2. manipulation of scores 3. meaning of the final result Partial solutions:  separate setting criteria and weights from evaluation  sensitivity analysis IT ACQUISITION

25 Selection Methods Weights and scores – an example IT ACQUISITION criterionweightscore S i W i H/W.258020.0 S/W.407530.0 Service.1085 8.5 Cost.3560 21.0 total 1.0079.5

26 Selection Methods Cost-value: cost is the sole basis for selection 1.determine and evaluate mandatory and desirable criteria 2.build value templates for “rewarding” or “fining” over and under performance 3. apply fines and bonuses 4. select lowest cost bid after corrections IT ACQUISITION

27 Selection Methods Cost-value: example of a value template Criterion: laptop computer weighs 2.5 kg IT ACQUISITION Over/under weightvalue 3.5 kg+$250 3.0 kg+$100 2.5 kg0 2.0 kg-$150 1.75 kg-$300

28 Selection Methods Efficient Frontier as a Winnowing Method IT ACQUISITION Criterion 1 Criterion 2 A B D E C G F

29 Selection Methods Importance of Sensitivity Analysis IT ACQUISITION


Download ppt "1242.2219 Information System Economics IT ACQUISITION."

Similar presentations


Ads by Google