As you have learned throughout this book, organizational performance depends on the quality and responsiveness of its IT infrastructure and information systems. IT strategy shapes the direction of IT investments over the next one to five years to maximize business value and shareholder wealth. As all strategies, IT strategy defines priorities, a road map, budget, and investment plan—and must align with and support the business strategy. Deciding on a strategy entails making decisions about a future that can only be imagined. According to Roger L. Martin’s article in Harvard Business Review: “True strategy is about placing bets and making hard choices. The objective is not to eliminate risk but to increase the odds of success” (Martin, 2014). Strategy making is uncomfortable because it is about taking risks and facing the unknown. Economic and technical experts agree that the extent to which an organization can achieve business–IT alignment (BITA) heavily influences its chances of success and sustainability.
Creating an IT strategy takes into consideration the acquisition, implementation, maintenance, and disposal of all IT assets needed to meet current and future organizational objectives along with methods to monitor, measure, and control how well the IT plan is working. An IT strategic plan also includes an operating plan for acquiring or providing new technology and services. The operating plan defines how to execute the IT strategic plan: for example, deciding on in-house development or sourcing options such as managed services, cloud computing, or software as a service (SaaS). Strategies are measured and evaluated continuously and revised annually during the strategic planning process. Some of these measures are quantifiable, and others are not. A tool that is used to evaluate both financial and nonfinancial metrics of an IT strategy is the balanced scorecard (BSC). The BSC provides a much more comprehensive assessment of a company’s performance than solely relying on numbers on a profit/loss statement.
Another important component of the IT strategy is the acquisition of newly emerging strategic technologies. Strategic technologies can change the way that a business operates and are important differentiators in determining future directions of a company in the digital economy.
In this chapter, we will discuss the components of an IT strategy, the benefits an IT strategy offers, how a BSC helps evaluate the effectiveness of an IT strategy. You will also learn the advantages of discovering and implementing strategic technologies to ensure sustainability. But first, let’s take a look at a best-practice IT Strategic Planning Process that Intel developed.
IT strategy focuses on the technology needs of a business. Setting an IT strategy and creating an IT strategic plan is an important part of managing IT. Industry, sector, and specific competitive environments along with prevalent technology trends all shape IT strategy. IT strategy directs investments in social, mobile, analytics, cloud, and other digital technology resources. To create an effective IT strategy, a CIO must have a clear understanding of the business strategy and the environment in which the business exists to create, maintain, and sustain a competitive advantage and business value for the organization.
Strategy addresses fundamental issues such as the company’s position in its industry, its available resources and options, and future directions. A strategy addresses questions such as the following:
It’s important to remember that IT strategic planning is not just a one-time activity. It is an ongoing iterative process that focuses on the value drivers in core process areas in order to make targeted improvements.
Long-term strategic planning starts with a clear understanding of the factors that create significant value and that work together with other factors to drive future revenue and profit at or above their current rates. These factors are value drivers.
In order to create business value, you must identify value drivers and link them to daily activities. For example, it is not enough to identify cost as a key value drive. Cost is almost always a value driver, but for this factor to be useful, you need to drill down to the activities that impact cost. The general types of business value drivers are explained in Table 12.3. Drivers can have a limited life span. Their value can diminish due to chances in the economy or industry, at which time they are replaced with relevant ones.
TABLE 12.3 Three General Types of Business Value Drivers
Type of Business Value Drivers | Definitions | Examples |
Operational—Shorter-term factors | Factors that impact cash flow and the cash generation ability through increased efficiency or growth | Cost of raw materials, cost of providing service, cost per mile, sales volume, sales revenue |
Financial—Medium-term factors | Factors that minimize the cost of capital incurred by the company to finance operations | Debt level, working capital, capital expenditures, day’s receivables, bad debt expense |
Sustainability—Long-term factors | Survival factors; factors that enable a business to continue functioning consistently and optimally for a long time | Government regulations, industry standards, federal and state environmental laws, privacy and security regulations |
Value drivers are considered in the strategic planning process and the BSC methodology.
The four objectives of IT strategic plans are to:
Various functions in the organization—such as manufacturing, R&D (research and development), and IT—are the most successful when their strategies are forward looking. Forward looking means that they carry out strengths, weaknesses, opportunities, and threats (SWOT) analysis to create their future rather than react to challenges or crises. Additionally, IT implementations that require new infrastructure or the merging of disparate information systems can take years. Long lead times and lack of expertise have prompted companies to explore a variety of IT strategies.
According to a survey of business leaders by PwC Advisory, 87% of business leaders believe that IT is critical to their companies’ strategic success, but not all of them work with IT to achieve that success. Less than 50% of business leaders reported that the IT function was very involved in the strategic planning process. When the IT strategy was not aligned with the business strategies, there was a higher risk that the IT project would be abandoned before completion. About 75% of companies abandoned at least one IT project and 30% abandoned more than 10% of IT projects for this reason. There are several possible reasons why a high percentage of IT projects are abandoned—the business strategy changed, technology changed, the project was not going to be completed on time or budget, the project sponsors responsible did not work well together, or the IT strategy was changed to cloud or SaaS.
The fundamental principle to be learned is that when enterprise strategies change, the IT strategies need to change with them. Both strategies are dynamic—to adapt to opportunities and threats.
Business and IT strategies depend on shared IT ownership and shared IT governance among all senior managers. When an IT or any type of failure causes harm to customers, business partners, employees, or the environment, then regulatory agencies will hold the CEO accountable—and the public will as well. A high-profile example is BP CEO Tony Hayward, who was held accountable to Congress for “The Role of BP in the Deepwater Horizon Explosion and Oil Spill,” the rig explosion that killed 11 workers and caused the subsea oil gusher that released 60,000+ barrels per day into the Gulf of Mexico. Hayward’s attempts to claim ignorance of the risks and use the SODDI (“some other dude did it”) defense does not get him or any CEOs off the hook. A company can outsource the work, but not the responsibility for it.
Because of the interrelationship between IT and business strategies, IT and other business managers share responsibility in developing IT strategic plans. Therefore, a governance structure needs to be in place that crosses organizational lines and makes senior management responsible for the success of key IT initiatives.
Few companies today could realize their full potential business value without updated IT infrastructures and services. Yet many companies still struggle to make the right IT decisions and investments in order to leverage relatively new IT trends—cloud computing and SaaS, big data, analytics, social, and mobile. Making IT investments on the basis of an immediate need or threat—rather than according to IT strategy—might be necessary at times, but reactive approaches result in incompatible, redundant, expensive to maintain, or failed systems. These IT investments tend to be patches that rarely align with the business strategy.
Two of the biggest risks and concerns of top management are (1) failing to align IT to real business needs and, as a result, (2) failing to deliver value to the business. Since IT has a dramatic effect on business performance and competitiveness, the failure to manage IT effectively seriously impacts the business.
IT strategic planning is a systematic process for determining what a business should become and how it can best achieve that goal, as you read in Opening Case 12.1. Typically, an organization will evaluate its full potential using SWOT analysis (Tech Note 12.1) and then will decide how to allocate resources to develop critical capabilities. In practice, competing agendas, tight budgets, poor interdepartmental communication, and politics can turn strategic planning discussions into bar room brawls—if they are not well managed.
Generally speaking, during strategic analysis, an organization scans and reviews the political, social, economic, and technical environments of an organization. For example, any company looking to expand its business operations into a developing country has to investigate that country’s political and economic stability and critical infrastructure. In this case, strategic analysis would include reviewing the U.S. Central Intelligence Agency’s (CIA) World Factbook.
The World Factbook provides information on the history, people, government, economy, geography, communications, transportation, military, and transnational issues for 266 world entities. Then the company would need to investigate competitors and their potential reactions to a new entrant into their market.
Equally important, the company would need to assess its ability to compete profitably in the market and impacts of the expansion on other parts of the company. For example, having excess production capacity would require less capital than if a new factory needed to be built.
CIOs undertake IT strategic planning on a yearly, quarterly, or monthly basis. A good IT planning process helps ensure that IT aligns, and stays aligned, within an organization’s business strategy. Because organizational goals change over time, it is not sufficient to develop a long-term IT strategy and not re-examine the strategy on a regular basis. For this reason, IT planning is an ongoing process. The IT planning process results in a formal IT strategy or a reassessment each year or each quarter of the existing portfolio of IT resources.
Recall that the focus of an IT strategy is on how IT creates business value. Typically, annual planning cycles are established to identify potentially beneficial IT services, to perform cost–benefit analyses, and to subject the list of potential projects to resource allocation. Figure 12.3 illustrates the IT strategic planning process.
The planning process begins with the creation of a strategic business plan. The long-range IT plan, sometimes referred to as the strategic IT plan, is then based on the strategic business plan. The IT strategic plan starts with the IT vision and strategy, which defines the future concept of what IT should do to achieve the goals, objectives, and strategic position of the firm and how this will be achieved. The overall direction, requirements, and sourcing—either outsourcing or insourcing—of resources, such as infrastructure, application services, data services, security services, IT governance, and management architecture; budget; activities; and time frames are set for three to five years into the future. The planning process continues by addressing lower-level activities with a shorter time frame.
The next level down is a medium-term IT plan, which identifies general project plans in terms of the specific requirements and sourcing of resources as well as the project portfolio. The project portfolio lists major resource projects, including infrastructure, application services, data services, and security services, that are consistent with the long-range plan. Some companies may define their portfolio in terms of applications. The applications portfolio is a list of major, approved information system projects that are also consistent with the long-range plan. Expectations for sourcing of resources in the project or applications portfolio should be driven by the business strategy. Since some of these projects will take more than a year to complete and others will not start in the current year, this plan extends over several years.
The third level is a tactical plan, which details budgets and schedules for current-year projects and activities. In reality, because of the rapid pace of change in technology and the environment, short-term plans may include major items not anticipated in the other plans.
The planning process just described is currently practiced by many organizations. Specifics of the IT planning process, of course, vary among organizations. For example, not all organizations have a high-level IT steering committee. Project priorities may be determined by the IT director, by his or her superior, by company politics, or even on a first-come, first-served basis.
The deliverables from the IT planning process should include the following: an evaluation of the strategic goals and directions of the organization and how IT is aligned; a new or revised IT vision and assessment of the state of the IT division; a statement of the strategies, objectives, and policies for the IT division; and the overall direction, requirements, and sourcing of resources. The entire strategic planning process is often conducted by an IT steering committee.
The IT Steering Committee is a team of managers and staff that represents various business units that establish IT priorities and ensures that the IT department is meeting the needs of the enterprise. The steering committee major tasks are listed in Table 12.4.
TABLE 12.4 Tasks of Steering Committee
Task | Description |
Set the direction | In linking the corporate strategy with the IT strategy, planning is the key activity. |
Allocate scarce resources | The committee approves the allocation of resources for and within the information systems organization. This includes outsourcing policy. |
Make staffing decisions | Key IT personnel decisions involve a consultation-and-approval process made by the committee, including outsourcing decisions. |
Communicate and provide feedback | Information regarding IT activities should flow freely. |
Set and evaluate performance metrics | The committee should establish performance measures for the IT department and see that they are met. This includes the initiation of SLAs. |
The success of steering committees largely depends on the establishment of IT governance, formally established statements that direct the policies regarding IT alignment with organizational goals and allocation of resources.
The goal of a good IT strategy is to achieve business–IT alignment. IT strategy should be an integral part of business planning, otherwise strategic systems would be developed in a piecemeal manner and wouldn’t contribute to strategic vision or enable organizations to respond to market changes (Figure 12.4). Therefore, a primary focus of a firm’s IT strategy for its systems or business IT applications should be to align them with the business needs and use them to achieve strategic benefits.
Alignment allows a firm to make the most of its IT investments and increase profitability by attaining accord between its business strategies and plans. Even though firms instinctively expect benefits from IT alignment, many of them are resistant to achieving alignment.
Alignment is a complex management activity and calls for extensive communication and collaboration between IT and corporate leaders. Business–IT alignment can be improved by focusing on the following activities:
TABLE 12.5 CIO Skills to Improve Business–IT Alignment
|
The first step in achieving business–IT alignment is to understand business objectives and how IT capabilities can best support business requirements; this way strategic planning will ensure that maximum IT dollars are spent on creating business value for the organization. It’s important for IT to understand where the organization is headed and how technology can help it achieve its goals. Aligning technology with business processes is becoming increasingly important due to the pace of change in technology and the business. From business strategy planning to execution, digital technology has become the foundation for everything enterprises do.
A well-thought-out and executed IT strategy that aligns with the business to develop, source, and put in place technology that best supports business processes and goals can give an organization a competitive advantage in the marketplace.
In business, as in sports, companies want to win—customers, market share, position in the industry. Basically, this requires gaining an edge over competitors by being first to take advantage of market opportunities, providing great customer experiences, doing something well that others cannot easily imitate, or convincing customers why it is a more valuable alternative than the competition.
Competitiveness relies heavily on IT agility and responsiveness. The benefit of IT agility is that it enables organizations to take advantage of opportunities faster or more effectively.
Closely related to IT agility is flexibility. For example, mobile networks are flexible—able to be set up, moved, or removed easily, without dealing with cables and other physical requirements of wired networks. Mass migration to mobile devices from PCs has expanded the scope of IT beyond traditional organizational boundaries—making location practically irrelevant.
IT agility, flexibility, and mobility are tightly interrelated and fully dependent on an organization’s IT infrastructure and architecture, as discussed in Chapter 2.
Once an enterprise has developed a competitive edge, it can only be maintained and sustained by continually pursuing new and better ways to compete. Maintaining a competitive advantage requires forecasting trends and industry changes and figuring out what the company needs to do to stay ahead of the game. It demands continuously tracking competitors and their future plans and promptly taking corrective action. It’s important to remember that while IT plays a key role in competitive advantage, that advantage is short-lived if competitors quickly duplicate it.
Two of the most widely used methodologies associated with gaining, maintaining, and sustaining a competitive edge are the Competitive Forces Model and Value Chain Model. Both of these are discussed next.
Michael Porter’s competitive forces model, also called the five-forces model, is a simple but powerful strategic planning tool for understanding the strength of an organization’s competitive position in its current environment and in the environment into which it’s considering moving. Professor Porter discusses his model in detail in a 13-minute YouTube video from Harvard Business School.
The model assumes that there are five important forces that determine competitive power in a business situation and influence a company’s position within a given industry and the strategy that management chooses to pursue. Other forces, including new regulations, which affect all companies in the industry and have a rather uniform impact on each company in an industry, are not included in the model.
According to Porter, five major forces in an industry affect the degree of competition, which impact profit margins and ultimate profitability (Figure 12.5). While each of the five forces need to be assessed individually, it’s their overall interaction that determines potential competitive advantage. For example, while profit margins for pizzerias may be small, the ease of entering that industry draws many new entrants. Conversely, profit margins for delivery services may be large, but the cost of technology needed to support the service is a huge barrier to entry into the market.
The five industry (or market) forces are as follows:
This force also refers to the strength of the barriers to entry into an industry, which is how easy it is to enter an industry. The threat of entry is lower (less powerful) when existing companies have ITs that are difficult to duplicate or very expensive. Those ITs create barriers to entry that reduce the threat of entry.
The strength of each force is determined by the industry’s structure. Existing companies in an industry need to protect themselves against these forces. Alternatively, they can take advantage of the forces to improve their position or to challenge industry leaders or move into a new industry. The relationships between the forces are shown in Figure 12.5.
Companies can identify the forces that influence competitive advantage in their marketplace and then develop their strategy. Porter (1985) proposed three types of strategies—cost leadership, differentiation, and niche strategies. In Table 12.6, Porter’s three classical strategies are listed first, followed by a list of nine other general strategies for dealing with competitive advantage. Applying the right kinds of technology support can enhance each of these strategies.
TABLE 12.6 Strategies for Competitive Advantage
Strategy | Description |
Cost leadership | Produce product/service at the lowest cost in the industry. |
Differentiation | Offer different products, services, or product features. |
Niche | Select a narrow-scope segment (market niche) and be the best in quality, speed, or cost in that segment. |
Growth | Increase market share, acquire more customers, or sell more types of products. |
Alliance | Work with business partners in partnerships, alliances, joint ventures, or virtual companies. |
Innovation | Introduce new products/services; put new features in existing products/services; develop new ways to produce products/services. |
Operational effectiveness | Improve the manner in which internal business processes are executed so that the firm performs similar activities better than its rivals. |
Customer orientation | Concentrate on customer satisfaction. |
Time | Treat time as a resource, then manage it, and use it to the firm’s advantage. |
Entry barriers | Create barriers to entry. By introducing innovative products or using IT to provide exceptional service, companies can create entry barriers to discourage new entrants. |
Customer or supplier lock-in | Encourage customers or suppliers to stay with you rather than going to competitors. Reduce customers’ bargaining power by locking them in. |
Increase switching costs | Discourage customers or suppliers from going to competitors for economic reasons. |
Another useful strategic management tool is Porter’s Value Chain. The Value Chain Model identifies where the greatest value exists in an organization and how that value can be increased. Understanding how your company creates value and identifying ways to add even greater value are essential in developing a competitive strategy. Porter proposed a general-purpose value chain that any organization can use to examine all of its activities and their relationships to each other. These activities fall into two major categories: primary and support.
Primary activities are those business activities directly involved in the production of goods. Primary activities relate directly to the creation, sale, maintenance, and support of a product of services. The five primary activities are as follows:
Primary activities usually occur sequentially, from 1 to 5. As work progresses, value is added to the product in each activity. To be more specific, incoming materials (1) are processed (in receiving, storage, etc.) in activities called inbound logistics. Next, the materials are used in operations (2), where significant value is added by the process of turning raw materials into products. Products need to be prepared for delivery (packaging, storing, and shipping) in the outbound logistics activities (3). Then marketing and sales (4) attempt to sell the products to customers, increasing product value by creating demand for the company’s products. The value of a sold item is much larger than that of an unsold one. Finally, after-sales service (5), such as warranty service or upgrade notification, is performed for the customer, further adding value.
A variety of support activities feed into one or more of the primary activities. The four support activities are as follows:
Each support activity can be applied to any or all of the primary activities. Support activities may also support each other, as shown in Figure 12.6.
IT strategy guides the investment decisions and decisions on the development, acquisition, and/or implementation of information systems. These strategies fall into two broad categories:
When legacy systems could no longer provide the functionality needed to solve the businesses’ problems, companies migrated to the cloud or SaaS to connect core systems and apps. At most companies today, one or more types of outsourcing arrangements are part of their IT strategy, including cloud computing, SaaS, and other types of “as services” introduced in prior chapters. How these Xaas are sourced is a topic of high interest.
As you have read, in its simplest form, cloud computing is a way for companies to procure technology as a service (XaaS), including infrastructure (IaaS), applications (AaaS), platforms (PaaS), and business processes, via the Internet. IT resources no longer depend on capital investments and IT developers to own that resource. IT capabilities can be sourced, scaled on, and delivered on demand without physical location, labor, or capital restrictions. As a result, an enterprise’s cloud strategy plays a role in its sourcing strategy and business growth.
While the concept of cloud is simple, an enterprise’s cloud strategy tends to be quite complex. Cloud is being adopted across more of the enterprise, but mostly in addition to on-premises systems—not as full replacements for them. Hybrid solutions create integration challenges. Cloud services—also referred to as edge services—have to integrate back-to-core internal systems. That is, edge services have to connect and share data with enterprise systems such as order and inventory management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile and social platforms.
Deploying cloud services incrementally results in apps and services that are patched together to create end-to-end business processes. This is a short-sighted tactical adoption approach. While this approach may have been sufficient in the recent past, cloud services are increasingly more sophisticated and numerous. Tactical approaches will cause difficult integration problems—as occurred with adoption of ERP, mobile, social, and big data systems. Cloud adoption needs to occur according to a coordinated strategy. Given the ever-changing cloud services, it will be tough to know how to design a sustainable cloud strategy. For example, a new class of cloud offerings is being built around business outcomes instead of as point solutions. In effect, this would be business outcomes as a service.
Determining cloud strategies and lease agreements that best support business needs may require hiring cloud consultants, such as Accenture, Booz Allen, Deloitte, Gartner, HP, IBM, or others.
From the outset, the top challenges about migrating to the cloud revolved around cybersecurity, privacy, data availability, and the accessibility of the service. The newer challenges relate to cloud strategy, including integration of cloud with on-premises resources, extensibility, and reliability of the cloud service. Extensibility is the ability to get data into and out of the cloud service. These cloud service challenges need to be addressed before deciding on sourcing solutions.
For example, when Nestlé Nespresso S. A. transitioned from a traditional coffee shop to an online distributor in the single-serving coffee machine category, Nespresso needed to replace its complex ERP. By deploying a cloud integration platform, Nespresso has integrated its ERP, warehouse management systems, and ordering tool. Nespresso now leverages its cloud and traditional IT solutions.
In another case, social network LinkedIn migrated to cloud services to support sales and CRM; it began by using noncustomized, out-of-the-box capabilities (Main and Peto, 2013). As the company grew rapidly, the standard cloud services could no longer support the lines of business. Business processes increasingly needed to be integrated with ERP and proprietary systems to generate sales leads. LinkedIn switched to a cloud-based integration platform that is able to connect its lead generation, financial, and CRM systems and its proprietary apps and data warehouse. Integrating cloud and on-premises systems gives salespeople a single view of the data they need to do their jobs.
The migration was far from perfect at first, and hard lessons learned early helped achieve impressive results eventually. Six lessons that eBay learned were as follows:
Enterprises choose outsourcing for the reasons shown in Table 12.7.
TABLE 12.7 Reason Why Organizations Outsource IT functions
Generate revenue |
Increase efficiency |
Gain agility to respond to changes in the marketplace |
Allow enterprise to focus on core competencies |
Cut operational costs |
Greater acceptance of offshoring as an IT strategy |
Cloud computer and SaaS are proven effective IT strategies |
Differentiate themselves from competitors |
Reduce burden on internal IT department |
As companies find that their business strategy is increasingly tied to IT solutions, the concerns about outsourcing risks increase. Risks associated with outsourcing are as follows:
Depending on what is outsourced and to whom, an organization might end up spending 10% above the budgeted amount to set up the relationship and manage it over time. The budgeted amount may increase anywhere from 15 to 65% when outsourcing is sent offshore and the costs of travel and cultural differences are added in.
Another IT strategy is to offshore IT development and services. Offshoring of software development has become a common practice due to global markets, lower costs, and increased access to skilled labor. About one-third of Fortune 500 companies outsource software development to software companies in India. It is not only the cost and the technical capabilities that matter. Several other factors to consider are the business and political climates in the selected country, the quality of the infrastructure, and risks such as IT competency, human capital, the economy, the legal environment, and cultural differences.
Duke University’s Center for International Business Education and Research studied actual offshoring results. According to their study, Fortune 500 companies reduced costs by offshoring—63% of the companies achieved over 30% annual savings and 14% of them achieved savings over 50%. The respondents were overwhelmingly satisfied with their offshore operations. Three-quarters (72%) said their offshore implementations met or exceeded their expected cost savings. Almost one-third of the respondents (31%) achieved their service level goals within the first five months of their contracts while 75% did so within 12 months. The study concluded that “offshoring delivers faster results than average domestic improvement efforts.” Even though these are very general results, offshoring success stories ease the fears about the risks of offshoring.
Based on case studies, the types of work that are not readily offshored include the following:
Regardless of the services an organization wants to outsource, such as manufacturing, data center, applications management, call center, business process, or supply chain, there are multiple ways to approach outsourcing. As with any significant transformation of an organization’s business model, it is always best to follow an organized and methodical approach. The exact approach chosen will be determined by many things, including the following:
Jeff Richards of CIO Professional Services proposes a five-phase outsourcing life cycle, comprising a total of 12 distinct stages (Richards, 2016).
Depending on an organization’s maturity, changing business conditions, or recognition of new information, it can choose to enter or exit the outsourcing life cycle at any point in the process. Just be aware that each entry or exit point has associated risks, costs, and benefits.
Here is a “top level” description of each phase of the outsourcing life cycle shown in Figure 12.7:
Using this type of phased outsourcing strategy, organization can optimize what, where, and when they acquire IT assets and services.
Tech Note 12.2 discusses a sourcing challenge and solution.
Today, the critical question is no longer whether cloud computing will be a fundamental deployment model for enterprise systems, such as ERP and SCM. Rather, the question is “How can companies profit from the capabilities that cloud computing offers?”
Organizations use a combinations of IT Strategies:
When sourcing IT projects, the starting point in building a positive and strong vendor relationship is vendor selection. If a company makes a bad selection or enters into a vaguely worded service contract, most likely the software, app, or implementation will fail, and the vendor will not be able to resolve the problems fast enough, if at all. Failures are usually followed by lawsuits.
To minimize interpersonal or technical conflicts with IT vendors, businesses need to thoroughly research the vendor. It is very important to ask questions about the services and products the vendor will provide and get as many specifics as possible. Also take the time to verify the vendor’s claims about its products and check all references to make sure that the vendor has a proven track record of success. When selecting a vendor, two criteria to assess first are experience and stability:
Of course, for innovative IT implementations, vendors will not have experience and one major failure—and the lawsuit that follows—can create instability. If those criteria are not met, there is no reason to further consider the vendor.
Research by McKinsey indicates that a majority of technology executives want to have stronger relationships with their IT suppliers, but they often act in ways that undermine that goal. In fact, many corporate customers lose out on the potential benefit of close relationships by an overemphasis on costs instead of value. Ideally, a customer/vendor relationship is a mutually beneficial partnership, and both sides are best served by treating it as such.
Vendors often buy hardware or software from other vendors. In order to avoid problems with the primary IT vendor, check secondary suppliers as well. Ask the primary vendor how they will deliver on their promises if the secondary vendors go out of business or otherwise end their relationship.
A proof of concept (POC) is a vendor demonstration of a product to see how or how well it works. Requesting a “proof of concept” of a vendor product, puts the old adage “it worked in development” to the test in a production environment to ensure that the product under consideration prove can deliver as promised. The results of a POC need to be measurable for use in the decision-making process. For example, a certain performance level may be used as a threshold for acceptance of a product.
A trial run, or pilot, is a little different. In this scenario, a vendor may offer the option to let you test their products or services in a pilot study or a small portion of the business to verify that it fits the company’s needs.
In either case, if the vendor demo or test adds value on a small scale, then the system can be rolled out on a larger scale. If the vendor cannot meet the requirements, then the company avoids a failure.
SLAs are designed to protect the service provider, not the customer, unless the customer takes an informed and active role in the provisions and parameters.
By making both parties aware of their responsibilities and when they may be held liable for failing to live up to those responsibilities, a strong SLA can help prevent many of the disruptions and dangers that can come with sourcing or migrating to the cloud. The provisions and parameters of the contract are the only protections a company has when terms are not met or the arrangement is terminated. No contract should be signed without a thorough legal review.
There is no template SLA, and each cloud solution vendor is unique. Certainly, if a vendor’s SLA is light on details, that alone may be an indicator that the vendor is light on accountability. Additionally, if a sourcing or cloud vendor refuses to improve its SLAs or negotiate vital points, then that vendor should not be considered.
Traditionally, the typical business objective could be summed up simply as to make a profit. As a result, performance metrics have typically been based on quantitative measures such as the following:
These financial metrics are called lagging indicators because they quantify past performance. As such, they represent historical information and are not ideal tools for managing day-to-day operations and planning.
Today, many managers are frustrated by the inadequacies of traditional quantitative performance measures and have completely abandoned financial measures. However, the majority of managers do not want to have to choose between financial and operational measures. Instead, they want a balanced presentation of measures that allow them to view the company from several perspectives simultaneously.
During a year-long research project with 12 companies at the leading edge of performance measurement, Robert Kaplan and David Norton developed a “balanced scorecard,” a new performance measurement system that gives top managers a fast but comprehensive view of the business. The BSC includes financial measures that tell the results of actions already taken. And it complements those financial measures with three sets of operational measures that drive future financial performance: customer satisfaction, internal business processes, and the organization’s ability to learn and improve. With the help of a BSC, managers can take a 360° perspective of the performance of their organization by translating their company’s strategy and mission statements into specific goals and measures.
The balanced scorecard provides companies with a blueprint for selecting strategic measures to improve performance and facilitate strategy implementation by enhancing strategic awareness and closer business–IT alignment.
In 1992, Kaplan and Norton introduced the concept of a BSC in their Harvard Business Review (HBR) article, “The Balanced Scorecard – Measures that Drive Performance” (Kaplan and Norton 2008).
Kaplan and Norton compared the BSC to the screens and indicator displays in an airplane cockpit. They explained that during the complex task of flying an airplane, pilots need detailed information about fuel, air speed, altitude, bearing, and other indicators that summarize the current and predicted environment. Reliance on one instrument can be fatal. Similarly, the complexity of managing an organization requires that managers be able to view performance in several areas simultaneously. A BSC or a balanced set of measures provides that valuable information. What was novel about BSC in the 1990s was that it measured a company’s performance using a multidimensional approach of leading indicators as well as lagging indicators.
The BSC is typically used at the end of the strategic planning process to review performance on a regular basis. For example, in the opening case, Intel took a BSC approach to measure its business performance in the final step of its six-step IT strategic planning process.
The BSC can be used to translate strategic plans and mission statements into a set of business objectives and performance metrics that can be quantified and measured to evaluate how well objectives are being achieved.
Objectives set out what the business is trying to achieve. They are action-oriented statements that define the continuous improvement activities that must be done to be successful, that is, achieve a return on investments (ROI ) of at least 10% in 2017. Well-thought-out objectives should meet the five “SMART” criteria shown in Figure 12.8.
Select the caption to view an interactive version of this figure online.
The BSC is widely accepted as one of the most influential management ideas of the past 75 years. Using the balanced scorecard methodology, performance is measured and evaluated from four different perspectives to ensure that limited resources are invested to achieve the highest possible ROI. These perspectives are as follows:
The BSC method is “balanced” because it does not rely solely on traditional financial measures. Instead, it balances financial measures with three forward-looking nonfinancial measures, as shown in Figure 12.9.
Select the caption to view an interactive version of this figure online.
The BSC is not a template that can be applied to business in general or even to an entire industry. Different market situations, product strategies, and competitive environments require different scorecards. Business units need to devise customized scorecards to fit their mission, strategy, technology, and culture. Some examples of measurement criteria that can be used within each of these perspectives are shown in Table 12.8.
TABLE 12.8 Examples of Balanced Scorecard (BSC) Measurement Criteria
Perspective | Examples of Measurement Criteria |
Financial |
|
Customer |
|
Internal business processes |
|
Innovation, learning, and growth |
|
Companies use BSCs to improve their strategic planning process by the following:
BSC converts senior management priorities into visible, actionable objectives by identifying ways to measure progress against agreed-upon targets.
Assume that a low-cost airline bases its profitability on the following interrelated factors: lower costs, increased revenue, percent of flights departing and arriving on time, competitive pricing, maximum fly time or minimal time jets are on the ground, and the ability of the ground crew to learn to do their jobs faster. Objectives, measures, and targets are diagrammed and detailed in Figure 12.10.
Using the results of the BSC methodology, management teams have an agreed-upon set of objectives and measures that are used to identify and set targets and the actions to achieve them that are appropriate for the company’s business model.
Consider JetBlue and Southwest Airlines—both compete to a large extent on price. Yet JetBlue allows one free checked bag while Southwest allows two free checked bags. Now consider the value drivers—time the jet sits on the ground and on-time arrivals. The time it takes to board passengers impacts the ability to take off, which in turn impacts on-ground time and arrival time. Since JetBlue has assigned seats, the terminal crew can control boarding starting at the back of the plane to minimize bottlenecks in the aisle. In contrast, Southwest has open seating, which typically occurs from the front of the jet and can clog the aisle. Now the differing free-baggage policies make sense because the more baggage brought on board, the longer boarding tends to take. By allowing two free checked bags, Southwest attempts to reduce carry-on bags in order to offset the extra time needed for the open-seating boarding process.
By measuring how well targets for on-ground times and arrival times are achieved, both airlines can determine if their actions are optimal or need to be revised. Based on these examples, it is easier to understand the processes involved in the BSC methodology, which start with the business vision and strategy. The general steps include the following:
BSC is used to clarify and update the strategy, align the IT strategy with the business strategy, and link strategic objectives to long-term goals and annual budgets.
To gain the competitive advantage they need to flourish, companies need to strategically invest in emerging strategic technology to widen their set of core competencies and help them differentiate themselves in the market, expand their existing market, or move into different markets. This might include technologies with a high potential for disruption of the business, end-users, or IT; the need for a major investment; or the risk of being a late adopter of the technology.
Every year, Gartner, Inc. highlights top technology trends that will be strategic for most organizations at the Gartner Symposium/ITxpo. Gartner’s top 10 strategic technology trends for 2017 are described in Table 12.9. IT at Work 12.1 describes how ESSA Academy in England used strategic technologies to improve the student experience.
TABLE 12.9 Top 10 Strategic Technology Trends
Trend | Strategic Technology | Description/Examples |
1 | Artificial Intelligence and Machine Learning | Robots, autonomous vehicles, consumer electronics |
2 | Intelligent Apps | Virtual personal assistant (VPA), Virtual customer assistant (VCA) |
3 | Intelligent Things | Drones, smart appliances |
4 | Virtual and Augmented Reality | Immersive consumer and business content—mobile, wearables, Internet of Things, sensor-rich environments |
5 | Digital Twin | Dynamic software model of a physical thing of system that relies on sensor data. Used to proactively repair and plan for equipment service, mfg. processes, operate factories, predict equipment failure |
6 | Blockchain and Distributed Ledgers | Chains sequentially grouped value exchange transactions—in bitcoins or other tokens—and records them across a peer-to-peer network. Music distribution identity identification, title registry, supply chain. |
7 | Conversational System | Connection points will expand and greater cooperative interaction between devices will emerge creating foundation for a new continuous and ambient digital experience |
8 | Mesh App and Service Architecture (MASA) | Mobile apps, web apps, desktop apps, and IoT apps link to a broad mesh of backend services to create what users view as one “application.” |
9 | Digital Technology Platforms | Basic building blocks (IS, customer experience, analytics and intelligence, IoT, and business ecosystems) for a digital business. A critical enabler to become a digital business. |
10 | Adaptive Security Architecture | IoT creates new vulnerabilities that will require new remediation tools and processes. |
To achieve their corporate vision, organizations need to have a structured process in place to identify suitable strategic technologies. In an era of rapid technological change, technology scanning is a critical strategic activity for any organization. To enhance their IT strategy, every organization needs to continually scan for emerging technologies. Understanding the performance improvements provided by new technologies, such as cost savings or service improvements, can range from incremental to revolutionary. Certain strategic technologies can create a basis for significant improvements, while other technologies may address relatively narrow needs and opportunities.
To be most effective, it’s useful to establish a structured approach to strategic technology scanning. The five steps listed in Table 12.10 provide a framework to guide technology scanning activities.
TABLE 12.10 Five Steps to Technology Scanning
Step | Activity |
1. General Technology Search | Conduct a very broad review of new and emerging technologies that might be beneficial to the organization |
2. Technology Mapping | Conduct structured investigations into an organization’s performance capabilities and identify the points of leverage for technological developments related to cost, reliability, safety, or capacity (for all competing modes) |
3. Systems Modeling | Develop and maintain a set of models that can be used to evaluate technological improvements as they affect specific aspects of the organization |
4. Customer Requirements Analysis | Investigate the requirements of selected groups of customers and identify new ways of doing business; estimate resulting customer benefits in cost, speed, reliability, safety, and capacity |
5. Analysis of Specific Technologies | Examine specific technologies identified as having potential for enhancing performance |
One approach to finding possible strategic technologies is to look at what is going on at major research centers and technology industry conferences, such as COMDEX, IBM Inter-Connect, Google Next, Adobe Summit, and HIMSS. Another approach is to look for entirely new areas of technology that are emerging based on fundamental advances in the technology industry, such as Internet of Things (IoT), digital mesh, artificial intelligence, and cybersecurity.
Once appropriate new strategic technologies have been identified and assessed, companies need to strategically invest in emerging technologies. Although this might include technologies with a high potential for disruption of the business, end-users, or IT; the need for a major investment; or the risk of being a late adopter of the technology, it is money well spent. Through the purchase of emerging strategic technologies, organizations can gain the competitive advantage they need to flourish, widen their set of core competencies, expand their existing market, or move into different markets.
agility
applications portfolio
balanced scorecard
barriers to entry
business objectives
business–IT alignment
business strategy
cloud strategy
competitive advantage
competitive forces model
digital mesh
edge service
extensibility
five-forces model
flexibility
in-house development
IT strategic planning
IT strategy
lagging indicators
leading indicators
offshoring
onshore sourcing
operating plan
opportunities
outsourcing
outsource relationship management (ORM) company
primary activities
project portfolio
proof of concept (POC)
responsiveness
sourcing
strategic planning
strategic technology
strategy
strengths
support activities
tactical adoption approach
threats
trail run
value chain model
value driver
weaknesses