Chapter 12: Strategies for Managing the Technology Infrastructure

Download Report

Transcript Chapter 12: Strategies for Managing the Technology Infrastructure

Chapter 12
Strategies for Managing the
Technology Infrastructure
Agenda
•
•
•
•
•
•
Technology infrastructure
Objectives of IT infrastructure
Business issues in managing technology
Justify IS/IT investment
Management issues
Technology strategies
IT Infrastructure
• Physical infrastructure of hardware, software, &
network
• Architectures (plan) for information, process,
organization, & technology
• Management policies for service delivery,
capacity, security, privacy, sourcing, & audit
• Management processes & services for facilities,
training vendor management, & technical support
Objectives of IT Infrastructure
• Provide proper infrastructure to support business
IS needs
• Maximize the use of information and IS for
business
• Provide a high degree of IS/IT integration in terms
of cost, quality, & benefit
• Facilitate rapid application development
• Reduce complexity and non-standardization
• Build a global communication infrastructure
Business issues in Managing
Technology
• Link IT investment to business needs
• Identify technical opportunities
• Identify IS/IT investment by competitors &
partners
• Business and technical awareness
• Relate IT resources to business needs
• Appropriate user support
Justify IS/IT Investment
• Application specific cost/benefit analysis
• Replace obsolete technology
• Using more efficient technology for
reducing costs of existing applications
• An enable for the overall business strategy
• Embrace growth in business volumes
Management Issues
•
•
•
•
•
•
•
Information era
Location and control of technology
Integration challenges
Security & privacy
Contingency management
Vendor management
New technology
Information Era
• New geopolitical order in world
• New environment in the market place
• New environment with business
Location and Control of
Technology
• Centralization or decentralization
• Selection criteria
–
–
–
–
–
Economic
Enterprise style
Innovation
Resources
Multinational organization
Integration Challenges - I
• Environment
–
–
–
–
Various platforms of hardware & software
Decentralization
Global organization
Different policies & procedures
Integration Challenges - II
• Solutions
–
–
–
–
–
Common operating systems
Sharing databases
Common application development tools
Common or integrated hardware
Integration of legacy and new systems
(middleware)
– Integration of packages
Security & Privacy
• Security
– Protect data, information, IS/IT facilities
• Privacy
– Protect confidential information of individuals
Security & Privacy
•
•
•
•
•
•
Logical security
Physical security
Data security
Communication security
Administration security
Application security
Physical Security
•
•
•
•
•
Location (traffic)
Security (lock)
Environmental (air)
Fire
Power
Logical Security
•
•
•
•
•
•
Photo
Fingerprints
Voice
Eye
Signature
Password
Data Security
• Minimal privilege
• Minimal exposure
Communication Security
•
•
•
•
Firewall
Decryption
Encryption
Private & public key
Administrative Security
•
•
•
•
•
•
Policy
Procedure
Hardware
Software
Employee
Data
Application Security
• Input security
• Processing security
• Output security
Contingency Management - I
• Types
– Emergency plan (natural disaster)
– Backup plan
– Recovery plan
• Contents
–
–
–
–
Procedures
Testing
Practicing
Updating
Vendor Management
•
•
•
•
•
Reputation
Future growth
Product consideration
Good lawyer and contract
Others?
Contingency Management - II
• Disaster Recovery firm
– Outsource strategic function?
• Planning steps
– Discovering the important critical IT functions and
process
– Identifying the cost to have information unavailable
– Balancing the cost of unavailability with the cost of
recovery
Contingency Management - III
• Hardware backup
– Hot site
– Cold site
– Mobile facility
• Software and database backup
–
–
–
–
–
Selective backup
Incremental backup
Total backup
On site backup
Off site backup
Contingency Management - IV
• Telecommunication backup
– Fault-tolerant networks
• Personnel backup
– Name
– Phone no.
– Address
• Back-up power generators
• System
– Scaled-down manual system
– Parallel systems
New Technology
•
•
•
•
Identification & investment
Experimentation, learning, and adaptation
Rationalization and management control
Widespread technology transfer
Technology Strategies
•
•
•
•
High potential
Strategic
Key operational
Support
High Potential
•
•
•
•
•
•
•
Prototyping development
R&D control, separate actitivity
New technology or new use of technology
Application generator/ RAD tools
External skills, knowledge transfer
Application evaluation
Determine next stage of development
Strategic
•
•
•
•
•
•
•
•
•
•
Application generator
Incremental development
Relational or object oriented database
Ideal technology – new skills
Flexible architecture
Peak demand capacity
Tested contingency plan
External technology influence
Isolate risky systems
Tailor package to needs
Key Operational
•
•
•
•
•
•
•
•
•
•
Software engineering and SDLC
Integrated architectures
Quality/charge control
Peak capacity planning
Hierarchical or network database
Tested contingency plan
Incremental technology
Application packages- enhanced
Mandatory standards
Careful technology selection – IT veto
Support
•
•
•
•
•
•
•
•
Evolutionary technology
Capacity plan on average requirements
Disinvestment
End user support
Avoid obsolescence
Low priority contingency plan
General purpose application package/unmodified
Sustained quality and efficiency