علوم مهندسی کامپیوتر و IT و اینترنت

Acquiring IT Applications and Infrastructure

karbord_haye_IT

در نمایش آنلاین پاورپوینت، ممکن است بعضی علائم، اعداد و حتی فونت‌ها به خوبی نمایش داده نشود. این مشکل در فایل اصلی پاورپوینت وجود ندارد.






  • جزئیات
  • امتیاز و نظرات
  • متن پاورپوینت

امتیاز

درحال ارسال
امتیاز کاربر [0 رای]

نقد و بررسی ها

هیچ نظری برای این پاورپوینت نوشته نشده است.

اولین کسی باشید که نظری می نویسد “Acquiring IT Applications and Infrastructure”

Acquiring IT Applications and Infrastructure

اسلاید 1: Chapter 151Chapter 15Information Technology For Management 6th EditionTurban, Leidner, McLean, WetherbeLecture Slides by L. Beaubien, Providence College John Wiley & Sons, Inc.Acquiring IT Applications and Infrastructure

اسلاید 2: Chapter 152Learning Objectives Describe the process of IT acquisition Describe IT project identification, justification, and planning. List the major IT acquisition options and the criteria for option selection. Discuss various IT outsourcing options Describe the criteria for selecting a vendor

اسلاید 3: Chapter 153Learning Objectives (Continued)Describe the criteria for selecting a vendor Describe the process of vendor and software selection. Understand some major implementation issues. Understand the issue of connecting IT applications to databases, other applications, networks, and business partners. Describe the need for business process redesign and the methodologies for doing it.

اسلاید 4: Chapter 154Strategies for Acquiring IT ApplicationsBuy the applications (off-the-shelf approach)Lease the applicationsDeveloping the applications in-house (Insourcing)

اسلاید 5: Chapter 155 The Five Major Steps of Acquisition

اسلاید 6: Chapter 156Constraints in Planning and Acquisition

اسلاید 7: Chapter 157 Acquiring IT Applications Option 1 - Buy

اسلاید 8: Chapter 158 Acquiring IT Applications Option 2- LeaseTYPES OF LEASING VENDORS Leasing can be done in one of two ways.The first way is to lease the application from an outsourcer and install it on the company’s premises. The vendor can help with the installation and frequently will offer to also contract for the operation and maintenance of the system. Many conventional applications are leased this way. The second way, using an application system provider (ASP), is becoming more popular.

اسلاید 9: Chapter 159 Acquiring IT Applications More Options ..

اسلاید 10: Chapter 1510Acquiring IT Applications More Options …IN-HOUSE DEVELOPMENT APPROACHES. There are two major approaches to in-house development: building from scratch or building from components.Build from scratch. This option should be considered only for specialized applications for which components are not available. It is an expensive and slow process, but it will provide the best fit.Build from components. Companies with experienced IT staff can use standard components (e.g., a secure Web server), some software languages (e.g., Java, Visual Basic, or Perl), and third-party subroutines to create and maintain applications on their own. (Or, companies can outsource the entire development process to an integrator that assembles the components.) From a software standpoint, using components offers the greatest flexibility and can be the least expensive option in the long run. However, it can also result in a number of false starts and wasted experimentations. For this reason, even those companies with experienced staff are frequently better off modifying and customizing one of the packaged solutions as part of the “buy” option.

اسلاید 11: Chapter 1511Traditional Systems Development Life CycleSoftware development life cycle is the traditional systems development method that organizations use for large-scale IT projects.SDLC processes are systems investigation, systems analysis, systems design, programming, testing, implementation, operation and maintenance.Waterfall approach is when tasks in one phase are completed before the work proceeds to the next stage.

اسلاید 12: Chapter 1512Applications and INFRASTRUCTURE

اسلاید 13: Chapter 1513Selection of Vendors

اسلاید 14: Chapter 1514Partner Connections

اسلاید 15: Chapter 1515System Development TeamsUsers are employees from all functional areas and levels of the organization who interact with the system, either directly or indirectly.System analysts are IS professionals who specializing in analyzing and designing ISs.Programmers are IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements.

اسلاید 16: Chapter 1516System Development Teams (Continued)Technical specialists are experts on a certain type of technology, such as databases or telecommunications.System stakeholders are all people affected by changes in the information systems.

اسلاید 17: Chapter 1517SDLCMajor advantagesControlAccountabilityError detectionMajor drawbacksRelatively inflexibleTime-consuming and expensiveDiscourages changes once user requirements are done

اسلاید 18: Chapter 1518SDLC – Systems InvestigationBegins with the business problem (or opportunity) followed by the feasibility analysis.Feasibility studyTechnicalEconomicBehavioralOrganizationalGo/No-Go Decision

اسلاید 19: Chapter 1519SDLC – Systems AnalysisIs the examination of the business problem that the organization plans to solve with an information system.Main purpose is to gather information about existing system to determine requirements for the new or improved system.Deliverable is a set of system requirements.

اسلاید 20: Chapter 1520SDLC – Systems DesignDescribes how the system will accomplish this task.Deliverable is the technical design that specifies:System outputs, inputs, user interfaces;Hardware, software, databases, telecommunications, personnel & procedures;Blueprint of how these components are integrated.

اسلاید 21: Chapter 1521SDLC – Systems Design (Continued)Logical system design states what the system will do, using abstract specifications.Physical system design states how the system will perform its functions, with actual physical specifications.Scope creep is caused by adding functions after the project has been initiated.

اسلاید 22: Chapter 1522SDLC – Programming & TestingProgramming involves the translation of a system’s design specification into computer code.Testing check to see if the computer code will produce the expected and desired results under certain conditions.Testing is designed to delete errors (bugs) in the computer code. These errors are of two types . Syntax errors ( e.g., misspelled word or a misplaced comma) and logic errors that permit the program to run but result in incorrect output.

اسلاید 23: Chapter 1523SDLC – Systems ImplementationImplementation or deployment is the process of converting from the old system to the new system. Organizations use four major conversion strategies ; parallel , direct , pilot and phased.Parallel conversion. Implementation process in which the old system and the new system operate simultaneously for a period of time.Direct conversion. Implementation process in which the old system is cut off and the new system turned on at a certain point in time.

اسلاید 24: Chapter 1524SDLC – Systems Implementation (Continued)Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis, when new system is working property, it is introduced in other parts of the organization.Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational.

اسلاید 25: Chapter 1525SDLC – Operation & MaintenanceAudits are performed to assess the system’s capabilities and to determine if it is being used correctly. Systems need several types of maintenance.Debugging: A process that continues throughout the life of the system.Updating: Updating the system to accommodate changes in business conditions.Maintenance: That adds new functionally to the system –adding new features to the existing system without disturbing its operation.

اسلاید 26: Chapter 1526Alternative Methods & Tools for Systems Development Prototyping. Approach that defines an initial list of user requirements, builds a prototype system and then improves the system in several iterations based on users’ feedback.Joint application design (JAD). A group –based tool for collecting user requirements and creating system designs.

اسلاید 27: Chapter 1527Business Process Redesign (BPR)Business process redesign was preceded by business process reengineering, a methodology in which an organization fundamentally and radically redesigned its business processes to achieve dramatic improvement. Today, BPR can focus on anything from the redesign of an individual process, to redesign of a group of processes, to redesign of the entire enterprise.A new method for restructuring, Business process management (BPM), combines workflow systems and redesign methods. This emerging methodology covers three process categories: people-to-people, systems-to-systems, and systems-to-people interactions. It is a blending of workflow, process management, and applications integration. BPRBPM

اسلاید 28: Chapter 1528Outsourcing & Application Service ProvidersOutsourcing is when an organization acquires IT applications or services from outside contractors or external organizations.Application service provider (ASP) is an agent or vendor who assembles the software needed by enterprises and packages the software with services such as development, operations and maintenance.ASP manages application servers from a centrally controlled location rather than at a customer’s site.

اسلاید 29: Chapter 1529Evaluating & Justifying IT Investment: Benefits, Costs & IssuesAssessing the costsFixed costs: are those costs that remain the same regardless of change in the activity level. For IT, fixed costs include infrastructure cost, cost of IT services, and IT management cost Total cost of ownership (TCO): Formula for calculating cost of acquiring, operating and controlling an IT system.Assessing the benefits (Values)Intangible benefits. Benefits from IT that may be very desirable but difficult to place an accurate monetary value on.Comparing the two

اسلاید 30: Chapter 1530Conducting the Cost-Benefit AnalysisUsing NPV in cost-benefit Analysis. Using the NPV method, analysts convert future values of benefits to their present-value equivalent by discounting them at the organization’s cost of funds.Return on investment. It measure the effectiveness of management in generating profits with its available assets.The business case approach. A business case is one or more specific applications or projects. Its major emphasis is the justification for a specific required investment, but it also provides the bridge between the initial plan and its execution.

اسلاید 31: Chapter 1531Cost-Benefit Analysis Methods

اسلاید 32: Chapter 1532Managerial IssuesGlobal and Cultural IssuesEthical and legal issues. User involvement.Change ManagementRisk Management

اسلاید 33: Chapter 1533Chapter 15Copyright © 2008 John Wiley & Sons, Inc.  All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful.  Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.  The purchaser may make back-up copies for his/her own use only and not for distribution or resale.  The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

18,000 تومان

خرید پاورپوینت توسط کلیه کارت‌های شتاب امکان‌پذیر است و بلافاصله پس از خرید، لینک دانلود پاورپوینت در اختیار شما قرار خواهد گرفت.

در صورت عدم رضایت سفارش برگشت و وجه به حساب شما برگشت داده خواهد شد.

در صورت نیاز با شماره 09353405883 در واتساپ، ایتا و روبیکا تماس بگیرید.

افزودن به سبد خرید