| Preface |
|
xiii | |
| Acknowledgments |
|
xv | |
| Section 1 The Offshore Imperative |
|
1 | (110) |
|
1 Crunching the Offshore Numbers: What the Financials Portend |
|
|
3 | (26) |
|
Welcome to the Definitive Guide on Offshore Outsourcing |
|
|
3 | (1) |
|
Setting the Stage: The Compelling Offshore Story |
|
|
3 | (3) |
|
Offshore Outsourcing versus Traditional IT Outsourcing |
|
|
6 | (9) |
|
Benefits of Offshore Outsourcing |
|
|
9 | (5) |
|
Impact on the Individual Worker: The Hurdle of Offshore Outsourcing Is Not All Bad News |
|
|
14 | (1) |
|
Challenges of Offshore Outsourcing |
|
|
15 | (11) |
|
Critical Success Factors for Offshore Outsourcing |
|
|
16 | (7) |
|
|
|
20 | (3) |
|
Offshore in Microcosm: A Look at the Payback of a "Typical" Offshore Program |
|
|
23 | (2) |
|
Risk and Offshore: A Final Word |
|
|
25 | (1) |
|
|
|
26 | (1) |
|
|
|
26 | (3) |
|
2 Getting Started in Offshore |
|
|
29 | (52) |
|
Executive Support and Communications: The Key to Success |
|
|
30 | (3) |
|
A Look at an Example of Enlightened Leadership: Handling Employee Impact at a Northeast Utilities Company |
|
|
33 | (1) |
|
Well-Planned and Executed Communications: A Critical Success Factor for Offshore Program Initiation |
|
|
34 | (3) |
|
Establishing the Offshore Program Office for Executive Oversight |
|
|
37 | (6) |
|
What Are the Steps and Factors Involved in Choosing an Initial Successful Suite of Applications to Offshore? |
|
|
40 | (2) |
|
What Are the Characteristics of a Good Pilot for Offshore? |
|
|
42 | (1) |
|
Hiring Outside Expertise: An Initial Look at Getting the Right Kind of Help for Offshore |
|
|
43 | (9) |
|
Getting the Most out of Expert Consultative Help in Initiating an Offshore Program: A Deeper Look |
|
|
50 | (2) |
|
Negotiating with Offshore Vendors for the First Time |
|
|
52 | (3) |
|
Approaching the Measurement of ROI (Return on Investment) When Initiating Offshore |
|
|
55 | (3) |
|
Defining the Parameters of That All-Important Initial Pilot: A Deeper Look at the Pros and Cons |
|
|
58 | (2) |
|
Establishing an Initial Timetable for an Upgraded Network Security Infrastructure |
|
|
60 | (1) |
|
|
|
61 | (1) |
|
Business Case: A Look at Citigroup (Citi), 17 Years and Counting in Offshore |
|
|
62 | (5) |
|
Appendix: A Look at Ethics in the Workplace |
|
|
67 | (13) |
|
Ethics Management Programs: An Overview |
|
|
67 | (1) |
|
About Ethics Management Programs |
|
|
67 | (1) |
|
Benefits of Managing Ethics as a Program |
|
|
68 | (1) |
|
Eight Guidelines for Managing Ethics in the Workplace |
|
|
68 | (1) |
|
Six Key Roles and Responsibilities in Ethics Management |
|
|
69 | (1) |
|
Ethics Tools: Codes of Ethics |
|
|
70 | (3) |
|
|
|
70 | (1) |
|
Developing Codes of Ethics |
|
|
71 | (2) |
|
Ethics Tools: Codes of Conduct |
|
|
73 | (2) |
|
|
|
73 | (1) |
|
Developing a Code of Conduct |
|
|
74 | (1) |
|
Ethics Tools: Policies and Procedures |
|
|
75 | (1) |
|
Ethics Tools: Resolving Ethical Dilemmas (with Real-to-Life Examples) |
|
|
76 | (1) |
|
Definition of an Ethical Dilemma |
|
|
76 | (1) |
|
Real-to-Life Examples of Complex Ethical Dilemmas |
|
|
76 | (1) |
|
Three Methods to Resolve Ethical Dilemmas |
|
|
76 | (1) |
|
Method One: Ethical Checklist |
|
|
77 | (1) |
|
Method Two: Ten-Step Method of Decision Making |
|
|
77 | (1) |
|
Method Three: Questions to Address Ethical Dilemmas |
|
|
77 | (1) |
|
|
|
77 | (3) |
|
|
|
80 | (1) |
|
3 Choosing an Offshore Vendor: A Look at the Offshore Maturity Model |
|
|
81 | (30) |
|
Ground Rules: A Snapshot of the Current Vendor Management Culture of the Fortune 100 |
|
|
82 | (5) |
|
What Are the Differences between Offshore and Other IT Consultant Resource Management? |
|
|
83 | (4) |
|
Organizational Structure and Span of Control |
|
|
87 | (3) |
|
Where Does Offshore Vendor Management Belong? Or, to Mandate or Not to Mandate, Offshore Outsourcing? |
|
|
87 | (3) |
|
What to Look for in an Offshore Vendor |
|
|
90 | (3) |
|
Automated RFP Tools: Do They Work? |
|
|
93 | (2) |
|
Negotiating the Offshore Vendor Contract: Do's and Don'ts |
|
|
95 | (7) |
|
The Offshore Maturity Model: Anticipating Vendor Management for the Organization Mature in Offshore |
|
|
102 | (3) |
|
Strategic View: Integrating the Offshore Vendor within an Overall Context of Resource Management |
|
|
105 | (2) |
|
Summary: Keys to Success in Offshore Vendor Management |
|
|
107 | (1) |
|
Appendix: The View from Gartner |
|
|
108 | (1) |
|
A Look at India for Offshore Sourcing Options |
|
|
108 | (1) |
|
Bigger Is Not Necessarily Better |
|
|
109 | (1) |
|
|
|
109 | (2) |
| Section 2 A Hands-On Offshore Program Management Toolkit |
|
111 | (138) |
|
4 Choosing Locations for Offshore: Country Pros and Cons |
|
|
113 | (20) |
|
Country Strengths and Weaknesses: A Look outside India |
|
|
114 | (9) |
|
Why Offshore Services Leadership in India, and Why Now? |
|
|
123 | (5) |
|
What Is the Current State and View of Offshore? |
|
|
128 | (4) |
|
|
|
132 | (1) |
|
|
|
132 | (1) |
|
5 The Offshore Program Checklist: What's Really Different? |
|
|
133 | (72) |
|
The Offshore Program Checklist: Laying the Groundwork for a Successful Offshore Program |
|
|
135 | (14) |
|
Step 1. Program Manager: Establish Offshore Program Strategic Objectives |
|
|
136 | (1) |
|
Step 2: Establish Vendor Interface Guidelines |
|
|
137 | (2) |
|
Step 3: Create Communications Plan |
|
|
139 | (1) |
|
Step 4: Initiate a Systemwide Review of Vendor Consents |
|
|
139 | (3) |
|
Step 5: Establish a Programwide Risk Management Program |
|
|
142 | (1) |
|
Step 6: Establish Program Documentation Guidelines |
|
|
143 | (1) |
|
Step 7: Define Offshore Methodology |
|
|
144 | (5) |
|
The Offshore Project Manager Checklist |
|
|
149 | (27) |
|
Pre-Work: Validate Application Risk Level for Offshore |
|
|
149 | (2) |
|
Pre-Work: Validate Software License Vendor Consents |
|
|
151 | (1) |
|
Month 1: Establish SOW for Offshore Application |
|
|
151 | (5) |
|
Month 1: Validate Operational Requirements |
|
|
156 | (1) |
|
Month 1: Application Risk and Compliance |
|
|
156 | (1) |
|
Month 2: Support Redeployment of Affected Employees |
|
|
157 | (1) |
|
Month 2: Form the Stage One Onshore and Offshore Team |
|
|
158 | (2) |
|
Months 1 and 2: Create Detailed Project Plan |
|
|
160 | (1) |
|
Month 2: Create Offshore Project Issues List |
|
|
160 | (2) |
|
Month 2: Create Offshore Functional Specifications |
|
|
162 | (1) |
|
Month 2 to 3: Complete Offshore Application Handbook |
|
|
162 | (3) |
|
Month 2 to 3: Proceed with Offshore Resource Hiring Process |
|
|
165 | (1) |
|
Months 3 to 6: Proceed with Structuring of Knowledge Transfer |
|
|
165 | (1) |
|
Months 3 to 6: Proceed with Execution of Knowledge Transfer |
|
|
166 | (4) |
|
Month 2 to 3: Complete Offshore Operations Guide |
|
|
170 | (1) |
|
|
|
171 | (3) |
|
Phase 1: Validation via Go/No Go |
|
|
171 | (3) |
|
Phase 2: Offshore Team Returns |
|
|
174 | (1) |
|
Phase 3: Final Acceptance |
|
|
174 | (1) |
|
Post-Launch: Monitor SLAs |
|
|
174 | (1) |
|
Post-Launch: Monitor Offshore Application Performance |
|
|
175 | (1) |
|
Program and Project Checklist - Final Thoughts |
|
|
176 | (5) |
|
Section 3 The Offshore Program Challenge |
|
|
181 | (2) |
|
6 Managing Employee Impact: Villain or Savior? |
|
|
183 | (1) |
|
The Case for Ethics as Good Business: Strategic Resource Management for Offshore |
|
|
183 | (1) |
|
Looking Beyond the Popular Press Sound Bite: What Is the Threat of Offshore to Today's IT Workers? |
|
|
184 | (4) |
|
Strategic Resource Management: Challenge of the Decade? |
|
|
188 | (5) |
|
Affected Workers: Recommendations and Logistics for Offshore |
|
|
193 | (3) |
|
The Employee Placement Program: Recommendations and Logistics |
|
|
196 | (3) |
|
Offshore: Impact on the Future of IT |
|
|
199 | (2) |
|
Appendix: The Inherent Value of jobs |
|
|
201 | (2) |
|
An Article from Business Respect |
|
|
201 | (2) |
|
|
|
203 | (2) |
|
7 Managing Risk through an Offshore Network Security Architecture |
|
|
205 | (30) |
|
Macro-Level Program Risks: A Baseline |
|
|
212 | (8) |
|
Macro Risk I: Lack of Clear Communications Handoff between Offshore and Onshore Team (Low) |
|
|
213 | (1) |
|
Macro Risk II: Offshore and Onshore Team Turnover Negatively Affects Performance or Program Costs Due to Additional Knowledge Transfer, Visa, and Other Training Delays or Costs (Medium) |
|
|
213 | (1) |
|
Macro Risk III: Regulatory, Privacy, or Legal Compliance Violation(s) (Medium) |
|
|
214 | (2) |
|
Macro Risk IV: Negative Employee Perception of Offshore Program Due to Perceptions of Job Instability (High) |
|
|
216 | (1) |
|
Macro Risk V: Operations Schedules Could Affect Offshore Program Requirements (Low) |
|
|
216 | (1) |
|
Macro Risk VI: Security Breach of Offshore Facilities (Low) |
|
|
217 | (1) |
|
Macro Risk VII: Offshore Vendor Financially Insolvent (Low for Large Vendors) |
|
|
218 | (1) |
|
Macro Risk VIII: Threat of War; Geopolitical Concerns (Medium) |
|
|
218 | (1) |
|
Macro Risk IX: Vendor Does Not Meet Performance Criteria (Low) |
|
|
218 | (1) |
|
Macro Risk X: Regulatory Changes in the Offshore Country That Negatively Affect Ability of Vendor to Fulfill Contract (Low) |
|
|
219 | (1) |
|
Macro Risk XI: Negative Customer Perception Due to Bad Press Related to Offshore (Low) |
|
|
219 | (1) |
|
Macro Risk XII: Network Failures Make Offshore Personnel Hard to Reach for Critical Communications (Low) |
|
|
219 | (1) |
|
Macro Risk XIII: Ineffective Disaster or Application Recovery Planning (Low) |
|
|
220 | (1) |
|
Application-Specific Program Risks |
|
|
220 | (1) |
|
|
|
221 | (6) |
|
A Veteran's View of Network Design for Offshore Outsourcing |
|
|
221 | (6) |
|
Introduction: Profile of a Successful Network Architect |
|
|
221 | (2) |
|
Successful Network Security Architecture Design Principles for Offshore Outsourcing |
|
|
223 | (1) |
|
Executing a Successful Network Security Architecture for Offshore Outsourcing |
|
|
224 | (3) |
|
|
|
227 | (2) |
|
For Geeks Only: More Detail on Offshore Network Architecture - A Step-by-Step Guide |
|
|
227 | (2) |
|
Step (1) Define Remote Access Needs |
|
|
227 | (1) |
|
Step (2) Evaluate Policy and Regulatory Compliance |
|
|
228 | (1) |
|
Step (3) Document and Assign Costs to Each Solution Level |
|
|
228 | (1) |
|
|
|
228 | (1) |
|
|
|
229 | (4) |
|
|
|
229 | (2) |
|
|
|
229 | (2) |
|
H-1B Visas Drop, L-1 Abuses Come to Light |
|
|
231 | (1) |
|
Note from U.S. Department of State Web Site |
|
|
232 | (1) |
|
|
|
233 | (2) |
|
8 Pulling It All Together: Top 10 Do's and Don'ts of Offshore |
|
|
235 | (14) |
|
The Top 10 "Do's and Don'ts" of Offshore |
|
|
236 | (10) |
|
|
|
246 | (1) |
|
A Final Word from Some Members of the Offshore Interest Group |
|
|
246 | (1) |
|
Offshore Considerations for the IT Executive |
|
|
247 | (1) |
|
Challenges of [Offshore] Leadership |
|
|
247 | (1) |
|
|
|
247 | (2) |
| Index |
|
249 | |