SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Company / Client mistakes in Outsourcing
Company / Client mistakes in Outsourcing




According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering
market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years.

Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to
innovate faster than its competition and deliver their products to market first, supplement their
development teams and re-balance their development priorities in order to accelerate revenue
generation. Management and investors want to lower total cost of ownership and increase shareholder
value. Due to the standardization of software engineering processes, pricing pressure and margin
compression, evolving enterprise customer expectations, software companies are forced with the task of
delivering more complex product development with limited and decreasingly time frames.

Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven
by fundamental changes in customers' purchasing behavior.

To overcome all or some of the above problems more and more software companies turn to Product
Outsourcing i.e. hiring external vendors to develop a product for the company.




Software companies often make decisions on what and how to outsource too quickly without detailed
expert assessment of their current state, desired future state and required path on how to get there. It is
critical to plan outsourcing strategy considering company’s current software engineering processes
maturity, in-house team size, available documentation, and experience with distributed software
development, cultural fit and executive and staff support. It is recommended to access applications,
source code base and business processes and lay out a matrix of how and in what sequence applications
and processes can and/or should be outsourced, kept in-house or retired.



Cost Expectations determining savings that organization can leverage as a result of outsourcing often can
be overestimated. Although they can be based on ROI projections, software vendors should consider
learning curve for offshore team to become productive. For several years now, the business press has
been claiming that IT work costing $40-$80 an hour in the United States can be done for $15-$25 an hour
in India or Russia. If those figures sound too good to be true, that’s because often they’re not. An offshore
team often will not become productive (by onshore standards) for at least three to four months, or even
longer for more complex projects. IT executives should expect to pay an additional 5 percent to 15
percent on managing an offshore outsourcing program, at least during the first year. The transition phase
will add costs, too — planned expenses should cover due diligence, transfer of knowledge and extensive
program management.



Once a company has decided to outsource, usually hurry's up to get the outsourcing deal done and put
the transaction on a fast track. To do that, executives from the company and the outsourcer, meet, agree
and let the next level of management to sort out all the details of such a relationship. Since an
outsourcing process is a complicated one, it sis advisable that various elements of a company must be



                                                                                  © Altoros Systems    2
Company / Client mistakes in Outsourcing



involved in the original meetings and have a say to the agreement. Top-level executives are rarely
enough to review such a process.



The essence of outsourcing is that a company transfers the process of product making to the outsourcer
and then buys the results of that process. The quickest and most certain way to destroy an outsourcing
process is to let the company - client dictate how this process is done. When a company tells the
outsourcer what to do, removes from the outsourcer the ability to add value to the process and produce a
cheap product.



Many companies willingly do not transfer the ownership of the outsourcing process to the outsourcer and
keep the process under control. When the company assigns someone to look over the process this
person becomes overwhelmed and incompetent to manage something that has very little knowledge
about. As a result the outsourcing process fails.



The longer your contract terms, the more deep you get in it. Software companies should construct a
contract that will last a long time but will allow the service terms agreements to change during short
periods of time. it is preferable for a company to develop a close relationship with an outsourcing
company, but sign short term contracts that can be easily negotiated and if necessary renegotiated or
even broken.



Companies new to the outsourcing process often do not assign the right people to manage the process.
They often assume that since all the details of an outsourcing contract are discussed and the contract is
signed, that do not have to worry about the outsourcing process any longer. The right person for the job
should be someone that understands the process and be able to focus and interpret the results in terms
of the best interest of the company. He should have a different way of thinking in respect to most
business managers and the oversight to recognize any problems or mishaps before those are surfaced.



Far too often the company forgets that the outsourcer is a business asset and must be treated as such.
Team members across the globe are vital parts of a successful and prosperous business. If the
outsourcer is treated differently, for example like one of many suppliers or one of many customers, then
the one thing that the outsourcer adds to a company will be lost.




     One must outsource the "bottlenecks", the things that are really keeping the company from
      growing profitably.
     One must pick great partners, check them out and speak to their customers.
     Once outsourcing is done, the outsourcer must be regarded as part of the company and treated
      as such.
     One must demand excellence, since outsourcing is what the outsourcer does for a living.
     Outsourcing might scare employees. One must communicate honestly with them.


                                                                                © Altoros Systems     3
Company / Client mistakes in Outsourcing




     Fear of loss of control.
     Work viewed as too strategic.
     Сompany's unique culture.
     Measuring the value.

Source: Corbet M. F.

Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and
large software companies for many different reasons. Cost reduction is typically the basis for offshore
outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by
constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as
operational difficulties associated with global outsourcing are gradually removed.

Having the right strategic offshore roadmap and governance model is critical.




Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com




                                                                                © Altoros Systems   4

Contenu connexe

Plus de Altoros

Plus de Altoros (20)

Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 
What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?What's New in the Cloud Foundry Ecosystem?
What's New in the Cloud Foundry Ecosystem?
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Company / Client Mistakes in Outsourcing

  • 1. Company / Client mistakes in Outsourcing
  • 2. Company / Client mistakes in Outsourcing According to McKinsey research, in 2005 only 4-8% of worldwide large offshore software engineering market is related to packaged software R&D, and most of that has occurred only in the last 4-5 years. Independent Software Vendors (ISVs) and Application Service Providers (ASPs) are challenged to innovate faster than its competition and deliver their products to market first, supplement their development teams and re-balance their development priorities in order to accelerate revenue generation. Management and investors want to lower total cost of ownership and increase shareholder value. Due to the standardization of software engineering processes, pricing pressure and margin compression, evolving enterprise customer expectations, software companies are forced with the task of delivering more complex product development with limited and decreasingly time frames. Accelerating consolidation activity is a symptom of increasing competitive pressure, which is in turn driven by fundamental changes in customers' purchasing behavior. To overcome all or some of the above problems more and more software companies turn to Product Outsourcing i.e. hiring external vendors to develop a product for the company. Software companies often make decisions on what and how to outsource too quickly without detailed expert assessment of their current state, desired future state and required path on how to get there. It is critical to plan outsourcing strategy considering company’s current software engineering processes maturity, in-house team size, available documentation, and experience with distributed software development, cultural fit and executive and staff support. It is recommended to access applications, source code base and business processes and lay out a matrix of how and in what sequence applications and processes can and/or should be outsourced, kept in-house or retired. Cost Expectations determining savings that organization can leverage as a result of outsourcing often can be overestimated. Although they can be based on ROI projections, software vendors should consider learning curve for offshore team to become productive. For several years now, the business press has been claiming that IT work costing $40-$80 an hour in the United States can be done for $15-$25 an hour in India or Russia. If those figures sound too good to be true, that’s because often they’re not. An offshore team often will not become productive (by onshore standards) for at least three to four months, or even longer for more complex projects. IT executives should expect to pay an additional 5 percent to 15 percent on managing an offshore outsourcing program, at least during the first year. The transition phase will add costs, too — planned expenses should cover due diligence, transfer of knowledge and extensive program management. Once a company has decided to outsource, usually hurry's up to get the outsourcing deal done and put the transaction on a fast track. To do that, executives from the company and the outsourcer, meet, agree and let the next level of management to sort out all the details of such a relationship. Since an outsourcing process is a complicated one, it sis advisable that various elements of a company must be © Altoros Systems 2
  • 3. Company / Client mistakes in Outsourcing involved in the original meetings and have a say to the agreement. Top-level executives are rarely enough to review such a process. The essence of outsourcing is that a company transfers the process of product making to the outsourcer and then buys the results of that process. The quickest and most certain way to destroy an outsourcing process is to let the company - client dictate how this process is done. When a company tells the outsourcer what to do, removes from the outsourcer the ability to add value to the process and produce a cheap product. Many companies willingly do not transfer the ownership of the outsourcing process to the outsourcer and keep the process under control. When the company assigns someone to look over the process this person becomes overwhelmed and incompetent to manage something that has very little knowledge about. As a result the outsourcing process fails. The longer your contract terms, the more deep you get in it. Software companies should construct a contract that will last a long time but will allow the service terms agreements to change during short periods of time. it is preferable for a company to develop a close relationship with an outsourcing company, but sign short term contracts that can be easily negotiated and if necessary renegotiated or even broken. Companies new to the outsourcing process often do not assign the right people to manage the process. They often assume that since all the details of an outsourcing contract are discussed and the contract is signed, that do not have to worry about the outsourcing process any longer. The right person for the job should be someone that understands the process and be able to focus and interpret the results in terms of the best interest of the company. He should have a different way of thinking in respect to most business managers and the oversight to recognize any problems or mishaps before those are surfaced. Far too often the company forgets that the outsourcer is a business asset and must be treated as such. Team members across the globe are vital parts of a successful and prosperous business. If the outsourcer is treated differently, for example like one of many suppliers or one of many customers, then the one thing that the outsourcer adds to a company will be lost.  One must outsource the "bottlenecks", the things that are really keeping the company from growing profitably.  One must pick great partners, check them out and speak to their customers.  Once outsourcing is done, the outsourcer must be regarded as part of the company and treated as such.  One must demand excellence, since outsourcing is what the outsourcer does for a living.  Outsourcing might scare employees. One must communicate honestly with them. © Altoros Systems 3
  • 4. Company / Client mistakes in Outsourcing  Fear of loss of control.  Work viewed as too strategic.  Сompany's unique culture.  Measuring the value. Source: Corbet M. F. Regardless of size and maturity, offshore outsourcing is on the agenda of early staged, mid-sized and large software companies for many different reasons. Cost reduction is typically the basis for offshore outsourcing, but the big picture for ISVs and ASPs is to build, retain and maintain its customer base by constant innovation. Global outsourcing is an option vendors are exploring to remain cost competitive as operational difficulties associated with global outsourcing are gradually removed. Having the right strategic offshore roadmap and governance model is critical. Renat Khasanshyn is CEO of Altoros Systems, Inc. www.altoros.com © Altoros Systems 4