Home > Store

Netsourcing: Renting Business Applications and Services Over a Network

Register your product to gain access to bonus material or receive a coupon.

Netsourcing: Renting Business Applications and Services Over a Network

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2002
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-092355-9
  • ISBN-13: 978-0-13-092355-4

In Netsourcing: Renting Business Applications and Services Over a Network, leading outsourcing researchers share new findings on the key success factors associated with outsourcing--offering practical advice for every aspect of the decision and every phase of the project lifecycle. Discover how to minimize technical, contractual, operational, and managerial risk; identify the right applications to outsource; manage and secure outsourced infrastructure; and realistically assess the next generation of outsourcers and outsourced services.

Sample Content

Online Sample Chapter

An Overview of Netsourcing

Table of Contents



Foreword.


Preface.


Acknowledgments.


1. An Overview of Netsourcing.

Netsourcing by Any Other Nameú. Netsourcing Viewed As A Service Stack. Customer Perspective: Who's Buying? Are Early Adopters Satisfied With Netsourcing? Summary. Endnotes.



2. Principles for Effective Sourcing Decisions.

Four General Sourcing Options. Three Paths of Outsourcing. Using External It Services: The Track Record. Case Illustration: United Airlines and Time to Market. Managing Successful Sourcing Decisions. Conclusions. Endnotes.



3. Management Principles: Core.

Capabilities and Contracting. Core It Capabilities. Provider Evaluation and Contracting. Detailed Contracts. Conclusions. Endnotes.



4. Netsourcing Technology Guide for Customers.

Technical Infrastructure. Evaluation of Options. Conclusions. Endnotes.



5. U.S.-Based Netsourcing Case Studies.

Introduction To The Case Studies. Corio. EDS. Host Analytics. Mainpass. Zland. Conclusions. Endnotes.



6. European-Based Netsourcing Case Studies.

Introduction To The Case Studies. Lodge. Marviq. Sap. Siennax. Vistorm. Summary of Case Evaluations. Endnotes.



7. Mitigating and Managing Risks.

In Netsourcing Deals. The Customer Perspective: Primary. Preliminary Risk-Profiling. Risky Asp Practice: Siennax and Abz Case. Risk Mitigation Across A Netsourcing Deal. Better Practices for Netsourcing Risk Mitigation and Management. Conclusions. Endnotes.



8. Netsourcing Drivers: Customer Decision Checklist.

Business Drivers. Technology Drivers. Economic Drivers. Economic Drivers: Checklist Questions. The It Services Market. Relational Drivers: Checklist Questions. Summary: Decision And Selection. Endnotes.



9. Past, Present, and Future Of Netsourcing.

Life-Cycle Stages. Trends Driven by the Tough Customer. Mass Customization. Conclusions. Endnotes.



Appendix A. International Survey of Netsourcing Customers.

Research Method. Research Respondents. Current Netsourcing Customers. Potential Netsourcing Customers. Summary of Findings From the International Survey. Endnotes.



Appendix B. Guide to Authors' Publications On Sourcing It and It-Enabled Business Systems, 1993-2001.

Books and Reports. Refereed Papers: Journals. Refereed Papers: Conference Proceedings. Reprints and Shorter Papers. Contributions to Books. Working Papers.



Index.

Preface

Preface

For most of the twentieth century, business managers were able to focus on their core business responsibilities while delegating the technology support to inside or outside experts. But in the new millennium, nearly every product, service, process, and function is enabled by, and embedded in, networked information technology (IT). Product design, purchasing, scheduling, manufacturing, logistics, recruiting, inventory, customer orders, delivery, customer service, finance, and accounting are all enabled by networked IT. This means that all business managers now have IT responsibilities—whether they want them or not.

Among the most important decisions business managers make is to determine the most effective way of sourcing IT solutions, and beyond those, IT-enabled business processes. They ask: What should we buy? What should we outsource? Should we find a technology partner? And most recently—what value does the explosion in the number of third-party suppliers offering business services over the Internet offer us? Is this netsourcing of my business services safe and reliable? Many business managers feel ill-equipped to answer these questions, particularly because they are intimidated by the vast amount of confusing supplier-driven hype.

We believe that every business manager will need to understand the principles of sound sourcing, with particular attention focused on the third wave of netsourcing. For managers within small to midsized enterprises, netsourcing will probably become a popular choice for sourcing business applications and services. For large enterprises, netsourcing will become part of an overall sourcing strategy, just one important option among many.

Indeed, netsourcing is already a growing phenomenon. The revenues generated in the netsourcing space—depending on which research firm's report you read—were between $1 billion and $2 billion in 2000. But research firms such as Gartner Group's Dataquest, InfoTech Trends, Phillips Group, International Data Corporation (IDC), and DataMonitor are predicting that the market will grow significantly over the next few years. Total netsourcing estimated spending ranges from a low of $7 billion to a high of $132 billion by 2006. Although nobody knows for sure how large this market will be, all research firms predict significant growth because the underlying value promise is too compelling for business managers to ignore.

The prediction for widespread adoption of netsourcing is also based on the history of information technology sourcing. Since the dawn of computing, customers have adopted the most economical, reliable, secure, and flexible sourcing options to meet their business objectives. Although customers are often slow to adopt new sourcing options, eventually they do so, provided that the underlying value proposition is compelling. Consider a snapshot of IT sourcing options over the past 40 years. During the early 1960s, many customers could not afford expensive mainframes and sourced business applications through the first wave of outsourcing, called time-sharing. In those days, visionaries such as Ross Perot actually picked up reels of data from customers, drove them to a data center for processing, then drove the results back to the customer site. During the late 1960s and 1970s, the advent of minicomputers drove hardware costs low enough to justify customer ownership and control of assets in centrally managed internal IT shops. The trend of insourcing business applications was also bolstered in the late 1980s and 1990s with the introduction of personal computers and client-server computing. Often, the underlying economics of these sourcing options still favored insourcing, but they also promised to dismantle central IT functions in favor of locally deployed IT. Other economic drivers during the 1990s drove the second wave of outsourcing, such as the increasing cost of software, the global IT skills shortage, and fear of Y2K. Often, external suppliers were better able to leverage IT resources in this environment, and outsourcing also served to free customers to focus on their core capabilities. So ballyhooed was this option that global IT outsourcing spend swelled to over $1 trillion by 2000. With the explosion of the Internet, the third wave of outsourcing washed ashore with netsourcing. What netsourcing enables is another dramatic shift in the underlying economics of sourcing—it's essentially the time-sharing concept of the 1960s, but instead of Ross Perot driving customer tapes to a data center, everything is delivered over a network.

Lest this snapshot of sourcing options seems like a technological utopia, we do note that every sourcing option has a life cycle of early supplier hype, naive customer expectations, initial discovery of pitfalls, then a maturing of the option with clearly defined best and worst practices. For example, client-server technology did reduce infrastructure costs but did not truly deliver on the promise of employee empowerment and completely decentralized IT management. (Most large organizations eventually centralized their servers to ensure backup, reliability, and security.) In another example—outsourcing IT to a third party was also fraught with problems until customers learned how to identify outsourcing options, negotiate better deals with suppliers, and manage relationships once contracts were signed. The same will be true for netsourcing: The value proposition is extremely compelling, but early adopters will help us discover the pitfalls and identify the best and worst ways to netsource. As all other sourcing innovations over the years, netsourcing will take its place among the other options rather than replacing them completely.

Although netsourcing services will mature, the suppliers in the netsourcing area will change radically. As of third quarter 2001, more than 1500 companies claimed to be netsourcing providers. To the present time, though, most media attention has focused on the fast-growing U.S. application service provider (ASP) startups such as Corio, Futurelink, and Interreliant. But the marketplace actually consists of a diverse range of service providers, including Internet service providers (ISPs), telecommunication infrastructure providers (telecos), data-center operators, independent software vendors (ISVs), computer manufacturers (CMs), online software companies, systems integrators (SIs) and established outsourcing service vendors.

Nearly every analyst, however, predicts that the industry is in the midst of a tremendous shakeout, characterized by failures, mergers, and acquisitions. The Gartner Group estimated that 60% of service providers failed by year end 2001. Service providers that closed shop include Agillion, Hotoffice, eBaseOne, Red Gorilla, Pandesic, and Utility.com. Survivors continue to scramble to find strategic partners to expand their products, markets, and services. Dot.com service providers also continue to face stiff competition not only from their immediate rivals but from the large independent software vendors, systems integrators, telecos, and consulting firms entering the market. For these established suppliers, buying or merging with an existing netsourcing startup may define a market entry strategy. These firms will then be able to offer those kinds of resource capabilities, expertise, technology, and geographical presence that will make the netsourcing business model an attractive option to global 2000 businesses. And, of course, the latter suppliers have deep pockets to survive the shakeout.

Many people suggest that the netsourcing shakeout will result in a handful of players, much like the shakeout in automotive manufacturing at the turn of the century. We believe, however, that more than a handful of players will survive because netsourcing is not about a specific product but an entire new delivery mechanism for business services. Small service providers will probably target a niche set of products and services for a niche set of customers. Large service providers such as Accenture, EDS, and IBM will offer total business solutions, with netsourcing as a delivery option.

Given the instability in the current netsourcing space, business managers need tools to evaluate if, when, and how to adopt netsourcing. In this book, business managers are given tools to identify core and noncore IT capabilities, assess their in-house versus market capabilities, assess the total value added of sourcing options, mitigate sourcing risks, and implement flexible sourcing arrangements that adapt to business and technology changes. Each chapter has extensive lessons for both suppliers and customers (see Table 1).

The target audience for this book is all stakeholders involved in IT-enabled business decisions and management. On the customer side, senior business executives, business unit managers, government officials, IT directors, internal lawyers, and end users will learn how to leverage netsourcing within their overall sourcing portfolio. On the supplier side, service providers will learn key insights as to what early customers are experiencing with netsourcing, and more important, what reticent customers expect from suppliers before they are willing to rely on them.

The tools in this book are based on over 10 years of research by two recent recipients of the PriceWaterhouseCoopers and Michael Corbett & Associates' Global Information Technology Outsourcing Achievement Award, along with a third author who has extensively studied, published on, and worked in traditional as well as netsourcing options. Our research access and expertise and extensive practical experiences give us, as a team, distinctive, and in some ways unrivaled, in-depth insights into the way that the outsourcing market has developed and where netsourcing is now taking that market.

TABLE 1 Summary of Lessons Learned
Chapter Customer Lessons Supplier Lessons
Chapter 1: An Overview of Netsourcing Understand what netsourcing promises you in terms of value, products, and services. Understand the actual experiences of early netsourcing adopters. Learn how to position your products and services within a service stack. Understand what reticent customers expect from netsourcing before they will adopt.
Chapter 2: Principles for Effective Sourcing Decisions Understand sourcing options (of which netsourcing is only one option). Learn to evaluate your IT portfolio in terms of business contribution, costs, and technical capability vis-a-vis supplier offerings. Understand how to market products and services based on the customer's view of the contribution of their IT-enabled systems.
Chapter 3: Management Principles: Core Capabilities and Contracting Learn one of the most valuable models for identifying core internal IT capabilities.Learn the principles of sound contracting. Help customers retain core capabilities to ensure that you can be a successful supplier. Prepare for the impending future where netsourcing contracts will hold suppliers much more accountable for performance.
Chapter 4: Netsourcing Technology Guide for Customers Deconstruct the technical terminology associated with netsourcing into simple concepts. Understand the business trade-offs between various netsourcing technical platforms such as using the Internet versus a virtual private network. Learn to approach customers by using simple explanations for the technical aspects of netsourcing.
Chapter 5: U.S.-Based Netsourcing Case Studies Learn how netsourcing suppliers are providing customers with various services ranging from simple application access through to total business solutions with netsourcing as an embedded delivery option; the first five cases are U.S.-based: Corio, Host Analytics, EDS, MainPass, and Zland. Learn how 10 suppliers are constantly adapting to changes in the emerging netsourcing space as customers become more savvy and demanding.
Chapter 6: European-Based Netsourcing Case Studies Learn about five European-based suppliers and their customers: Lodge, marviQ, SAP, Siennax, and Vistorm.
Chapter 7: Mitigating and Managing Risks in Netsourcing Deals Understand how to mitigate and manage 15 netsourcing risks, demonstrated through a customer case history. Understand the difference between actual risks experienced by netsourcing customers and the perceived risks of customers not ready to adopt netsourcing. The implication for suppliers is that educating the public continues to be a major requirement.
Chapter 8: Netsourcing Drivers: Customer Decision Checklist Based on all the learning of previous chapters, this chapter presents the business, economic, technical, market, and relational drivers of netsourcing to help customers fully evaluate netsourcing. Suppliers are given over 30 guidelines on how to deliver customer requirements.
Chapter 9: Past, Present, and Future of Netsourcing Understand how, like any other new industry, netsourcing will evolve, and how to determine the right time of adoption for your company. Understand how early "tough" customers are shaping the future of netsourcing. Their demands will require suppliers to alter their business models, including service offerings, pricing options, and contracting.

Thomas Kern has built a rich understanding of what makes relationships in outsourcing work in his five-year longitudinal study of major IT sourcing deals sponsored by Lloyd's of London, resulting in a D.Phil. at the University of Oxford. This research was published in late 2001 as The Relationship Advantage: Information Technologies, Sourcing and Management (Oxford University Press) and was coauthored with Leslie Willcocks. Thomas also draws upon three years of focused work on application service provision solutions and their strategic impact on customers, which led to a large-scale project on customer expectations sponsored by the European-based consultancy CMG Benelux. Thomas is currently CIO of KERN AG, an international company headquartered in Germany.

Mary Lacity and Leslie Willcocks are coauthors of some of the most referenced and widely read texts and papers in the IT outsourcing field. They are sought internationally for advisory work and speaker engagements. Before becoming an academic and professor, Mary worked in the IT industry as adviser and consultant, a role she actively continues with several major corporations and government institutions. In 2001, she and Leslie Willcocks published Global Information Technology Outsourcing: In Search of Business Advantage (Wiley), representing a state-of-the-art summation of IT outsourcing and their research study findings over 10 years. Leslie also has an international reputation for his work on IT outsourcing, e-business, and information management, having published 20 books and over 130 papers on these subjects. He also worked in management consulting for 12 years before taking up leading academic appointments, including Oxford University and most recently, Warwick University. Drawing on this expertise, all three of us are now busily engaged in advising client companies and supplier companies alike on their business, Internet, and outsourcing opportunities and options.

We have tested the many managerial tools, developed and refined in the heat of outsourcing developments over the last 10 years, against a new body of research in the netsourcing space, based on over a dozen detailed case studies (fully described in Chapters 5 and 6) and a major international survey of customers and potential customers (see Appendix A). This book represents the result of what has been an exhausting, but highly satisfying and rewarding year. Through our research, we have sought to make sense of the conflicting and confusing evidence being produced about an easily misunderstood, but on our evidence and analysis, highly important emerging market. It has been genuinely exciting to be in at the birth of some fundamental underlying changes in the marketplace and how technologies are going to be applied. These changes are as yet only just beginning to be understood, but their impact and significance are going to be truly considerable. Netsourcing is going to be a fundamental and lasting set of changes in the way in which business applications and services are delivered. Netsourcing alters the ways in which clients relate to IT service companies, the ways in which IT service companies will need to behave, and the sorts of offerings they will need to make to their customers. But if the idea is revolutionary in concept, we expect to see in practice a more evolutionary rollout than most forecasts have predicted.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020