Download presentation
Presentation is loading. Please wait.
Published byZack Brien Modified over 9 years ago
1
1242.2219 Information System Economics IT ACQUISITION
2
What is acquired? Hardware:computers communications Software:applications operating systems communications Personnel:management development operating IT ACQUISITION
3
How is it acquired? insourcing - DYI outsourcing IT ACQUISITION
4
The growing importance of outsourcing IT ACQUISITION "ComNet 2000 Packed With Outsourcing Options"InfoWorld.com (01/25/00); Jones, Jennifer; Moore, Cathleen This week's ComNet 2000 show will feature a number of new products and services aimed at capitalizing on the growing corporate demand for network outsourcing. AT&T plans to announce outsourcing services for large clients that do not want to manage their own network operations.... Nortel plans to establish a group that will design and manage networking technology for large customers.... The rising interest in outsourcing stems from a lack of trained technical workers and the need for IS departments to devote time to mission-critical programs, experts say. http://www.networkworld.com/news/2000/0125comnetout.html
5
The Process IT ACQUISITION determine needs insource/outsource decision collect information evaluate select contract
6
Insourcing vs. Outsourcing: Hardware IT ACQUISITION Internal resources for capacity planning requirements analysis, selection etc. Vendor performs capacity planning, requirements analysis, selection, etc. Vendor performs installation & maintenance ACQUISITION RESOURCES Insource Outsource analysis & planning installation Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.
7
Insourcing vs. Outsourcing: Software IT ACQUISITION Internal resources for needs analysis, coding, etc. Vendor performs needs analysis, coding, etc. Internal resources for package selection, installation, etc. Vendor performs package selection, installation, etc. ACQUISITION RESOURCES Insource Outsource custom package ACQUISITION SOURCE Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.
8
Insourcing vs. Outsourcing: Operations IT ACQUISITION Own hardware, software, and personnel Own hardware, in- or outsource software & personnel Vendor’s hardware, own personnel, in- or outsource software Vendor’s hardware & personnel, in- or outsource software. RESOURCES Insource Outsource in-house at vendor’s location LOCATION Adapted from: Nelson, Paul, William Richmond, & Abraham Seidmann. “Two Dimensions of Software Acquisition.” Communications of The ACM 39, 7 (July 1996):29-44.
9
Evaluation purposes selection evaluation (system exists elsewhere) new hardware new software performance projection (system does not exist elsewhere) design new software design new hardware performance monitoring (system in operation) reconfigure hardware change software IT ACQUISITION Evaluation
10
Evaluation methods kernel programs analytic models benchmarks synthetic programs simulation performance monitoring IT ACQUISITION Evaluation
11
Evaluation methods – kernel programs A kernel program is a typical program that has been partially or completely coded and timed. The timings are based on the manufacturer’s stated execution times for the instructions that comprise the kernel program. IT ACQUISITION Evaluation Uses: for evaluating machines which do not yet exist; for time-critical procedures Disadvantages: require machine language code; cannot adequately represent I/O and operating system interactions
12
Evaluation methods – analytic models An analytic model is a mathematical representation of a computing system. These are frequently based on queueing theory. IT ACQUISITION Evaluation Uses: for evaluating machines which do not yet exist; for specific machine components (e.g. a disk drive) Disadvantages: cannot capture all aspects of a computer’s functions; are most effective for higher level analyses – e.g. CPUs or complete systems
13
Evaluation methods - benchmarks A benchmark is an existing program that is coded in a specific language and executed on the machine being evaluated. IT ACQUISITION Evaluation Uses: esp. for evaluating and comparing potential replacement machines; for comparing overall performance of different machines and architectures Disadvantages: expensive; interpretation problems
14
Evaluation methods – benchmark interpretation problems IT ACQUISITION Evaluation Job I Machine AJob II Job III Job I Machine B Job II Job III time suboptimal machine setup “tailing”
15
Evaluation methods – synthetic programs Synthetic programs are coded and executed, but differ from benchmarks in that they do not necessarily exist beforehand. Like kernel programs, they are not real applications, but they are coded and they do include I/O considerations and interactions with the OS environment. Thus, they combine some of the attributes of benchmarks and of kernel programs. IT ACQUISITION Evaluation
16
Evaluation methods – synthetic programs IT ACQUISITION Evaluation Uses: selection – can be designed to include any measurement parameter of interest; good for before and after tests before executing changes Disadvantages: expensive to prepare; interpretation problems as with benchmarks; difficult to develop for online, terminal-based systems
17
Evaluation methods - simulation A simulation is a program which computes the results of running a real system, based on the characteristics of that system. It provides insight into the functioning of the system simulated. IT ACQUISITION Evaluation
18
Evaluation methods - simulation IT ACQUISITION Evaluation Uses: projecting outcomes of new designs; selection – but cost frequently prohibitive for comparing overall performance of different machines and architectures Disadvantages: expensive; validation problems – unless real results available for a similar machine; need to be adapted for each machine simulated
19
Evaluation methods – performance monitoring Consists of collecting data on an existing machine in order to locate bottlenecks or to improve system performance. hardware monitors software monitors IT ACQUISITION Evaluation Uses: evaluating and analyzing performance of existing systems; Disadvantages: the measurement problem (Heisenberg’s Uncertainty Principle); quantities of data generated;
20
Evaluation methods – Summary IT ACQUISITION Selection evaluation Performance Evaluation Projected Design Synthetic Programs, Benchmarks Simulation, Analytic Models Monitors Evaluation Techniques Purpose of evaluation primary use pecondary use
21
Selection Selection problems: multiple alternatives “apples vs. oranges” approximate measurements intangible economics human factors time subjectivity IT ACQUISITION
22
Selection Selection methods: ad hoc weights and scores cost-value efficient frontier sensitivity analysis IT ACQUISITION
23
Selection Methods weights and scores 1. determine criteria (c i ) 2. assign a weight to each criterion (w i ) 3. assign score to each criterion (s i ) 4. total score = s i w i IT ACQUISITION
24
Selection Methods Weights and scores – major problems 1.criteria set to predetermine solution 2. manipulation of scores 3. meaning of the final result Partial solutions: separate setting criteria and weights from evaluation sensitivity analysis IT ACQUISITION
25
Selection Methods Weights and scores – an example IT ACQUISITION criterionweightscore S i W i H/W.258020.0 S/W.407530.0 Service.1085 8.5 Cost.3560 21.0 total 1.0079.5
26
Selection Methods Cost-value: cost is the sole basis for selection 1.determine and evaluate mandatory and desirable criteria 2.build value templates for “rewarding” or “fining” over and under performance 3. apply fines and bonuses 4. select lowest cost bid after corrections IT ACQUISITION
27
Selection Methods Cost-value: example of a value template Criterion: laptop computer weighs 2.5 kg IT ACQUISITION Over/under weightvalue 3.5 kg+$250 3.0 kg+$100 2.5 kg0 2.0 kg-$150 1.75 kg-$300
28
Selection Methods Efficient Frontier as a Winnowing Method IT ACQUISITION Criterion 1 Criterion 2 A B D E C G F
29
Selection Methods Importance of Sensitivity Analysis IT ACQUISITION
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.