Vol-XI Meet the Partners
Current Page
Promotions
Seminars
Resources
Site Map
HOME
Logo

Chances are your company has already received small, harsh reminders of its techno-dependence. Have you witnessed how four little words-"the network is down"-can plunge an entire office into a panic? If you think that was frightening, just keep reading.

The "Year 2000 Millennium Bug," also known as Y2K, is rapidly gnawing its way into your calendar, and could cause a lot more trouble than a temperamental file server or mild satellite snafu. To protect themselves from these potential problems, numerous firms are turning to outsourcing.

"Outsourcing" refers to the practice of contracting an outside firm to perform an operation traditionally done in-house. U.S. businesses rely on outsourcing for an expanding array of services, including production, technical design, human resources and payroll administration. IT (information technology) functions-such as computer installation, software integration, telecommunications and network maintenance-are also frequently outsourced.

Y2K is forcing many firms to consider outsourcing to deal with this rapidly approaching challenge. A bit of background information illustrates the magnitude of the situation.

The Year 2000 Problem

The Year 2000 Millennium Bug is a worldwide problem involving many computers, software packages and date-sensitive products. Affected products are unable to accurately distinguish dates in the year 2000 and beyond.

The problem's roots go back to the earliest days of computing. In the 1940s and 1950s, computer memory capacity was extremely expensive, and programmers used a two-digit shorthand: 1999 became "99." Unfortunately, 2000 represented by "00" is indistinguishable from 1900. Ooops.

Even though many subsequent programs have incorporated a four-digit date/year format, the obsolete two-digit code still remains deeply embedded in hardware and software currently in use. A large, unknown number of products may soon succumb to this hidden flaw.

Awareness Is Crucial

U.S. businesses have already spent billions of dollars to modify problematic products, and some experts estimate worldwide expenditures will eventually exceed $500 billion.

The huge cost of Y2K compliance reflects the widespread nature of the problem. Time-sensitive software and microchips are found in computers, alarm systems, telecommunications networks, ATMs, cash registers, bar-code scanners and numerous other products. Even relatively new products may be susceptible to malfunction.

Here's the good news: Protective and preventative measures are available to businesses that recognize the coming challenge and are committed to addressing it in a timely fashion.

Unfortunately, some businesses are seriously unprepared for Y2K. "More awareness is urgently needed," claims Filiberto "Fil" Pacheco, CEO of P.B. Incorporated, an Albuquerque, New Mexico firm specializing in computer sales, service and system integration. "Many small businesses have heard about the problem, but don't realize its depth."

Carol P. Conway, president of Computer Rescue Squad based in Florida, elaborates: "We try to educate businesses that this issue involves more than just hardware and software. Other mission-critical resources-such as telephones and security systems-are sensitive to problems with date-embedded fields as well."

Companies may feel overwhelmed by the realization that Y2K can play havoc with production schedules, inventory, shipping, customer service and profits. However, it is imperative for them to take prompt action.

In-House vs. Outsourcing: Opportunities and Challenges

For many small firms, outsourcing their IT functions-either partially or in full-is preferable to handling these procedures in-house. Given the urgency of Y2K compliance, small businesses are even more likely to rely on outsourcing in an effort to successfully upgrade before problems arise. The potential costs and benefits of IT outsourcing mirror the traits of outsourcing in general.

Potential advantages:

Time savings. This is particularly relevant for Y2K compliance, because businesses are under a looming deadline. The obvious option is to seek an expert who won't be delayed by a learning curve.

Increased capacity. Small, lean companies frequently have difficulty keeping up with demand, especially during surges. Outsourcing may help accommodate these fluctuations, resulting in increased capacity and revenue.

Higher quality. The goal is to receive higher quality and/or more efficient service from a specialized outsource partner. Y2K specialists may be better at rooting out ingrained problems and offering creative solutions.

Enhanced focus on core operations. Freed from highly detailed tasks that do not directly involve mission-specific goals (Y2K upgrading is a beautiful example), a company can presumably focus energy on its core operations.

Cost savings. The traditional Holy Grail of outsourcing, this is an outgrowth of all the previously listed advantages. Cost savings can be heavily influenced by the structure and terms of the outsourcing contract.

Potential disadvantages:

Loss of control. The key potential downside of outsourcing. Delegating a task without sufficient oversight can lead to negative results. To combat the problem, firms must exercise vigilance and effective management throughout the duration of the outsourcing arrangement.

Communication difficulties. Problems can arise from poor communication, differences in company culture, and misaligned motives. The moral: choose your partner carefully and strive for clarity.

Poor service. Outsourcing partners can be overwhelmed, just like the company that has hired them. In some cases the partner may be incapable of the rapid flexibility necessitated by changing business conditions. In the worst of cases, a provider firm may slack off after the contract is signed-but this is rare.

Unexpectedly high costs. This is often an area of disappointment. Check contracts carefully for any hidden costs before formalizing the agreement.

Loss of value-added core. The big bugaboo. As a rule of thumb, do not outsource mission-critical processes. After all, if you can't do them better than anyone else, why are you in business in the first place?

 

Outsourcing: Tips For Making It Work

Kris Shah, president and CEO of Litronic, has a few key suggestions based on extensive experience. His Irvine, California company outsources a variety of design and assembly functions in manufacturing its line of electronic security products. In choosing an outsourcing partner he says "marketing people are always optimistic, so you need to check deeper into a firm's ability to deliver on its promises. Make sure you kick the tires. Visit the facility and meet the staff members actually responsible for delivering on those promises. And definitely check out their credentials and customer references."

Several other considerations can greatly improve the chances for a successful outsourcing partnership.

Understand your own needs and requirements. The first step in a successful outsourcing relationship, this affects all facets of the partnership. Aim for clarity and specificity.

Find the best outsourcing partner. The key word here is "partner." Make sure that your partner knows the proper order of your priorities (e.g., speed, cost, quality, flexibility, creativity) and shares a compatible corporate culture. Verify credentials and references.

The contract is crucial. Varying contract arrangements are used in outsourcing agreements. Try to find out what works best for both you and your outsourcing partner. If possible, before investing heavily in the relationship try a short-term "trial basis" contract.

Beware of unreasonably optimistic expectations for cost savings. This is a frequent area of disappointment. Carefully assess your expectations and look for potential costs hidden-intentionally or unintentionally-in the outsourcing contract.

Stay vigilant and maintain oversight. Outsourcing is a means of delegating tasks, not making them disappear. Successful outsourcing requires ongoing management of the relationship.

Use benchmarks to assess performance. Reviews should be scheduled at regular intervals during the life of the contract. Agree beforehand on useful benchmarks to measure performance. These strengthen a relationship by providing concrete, positive goals, and inherently reinforce the needs and priorities described above.

 

Y2K: Does outsourcing make sense for your company?

Businesses employ one of three general approaches for achieving compliance:

1. Rely solely on in-house IT staff to make upgrades and test products

2. Outsource all millennium compliance activities

3. Employ a hybrid solution: Perform some activities in-house, and outsource the rest.

Numerous factors will determine the optimal approach for your company. In general, the best candidates for do-it-yourself projects are home-based businesses-basically, any business so small that no LAN (local area network) is installed. Usually, this means five or fewer free-standing computers, and a highly simplified IT structure.

For these small businesses information is readily available. The Internet contains dozens of sites (including the U.S. Small Business Administration site at www.sbaonline.sba.gov), and numerous books and pamphlets have been published on the topic. Downloadable upgrades and testing software can be obtained from the web sites of hardware (e.g. Gateway, Dell) and software manufacturers (MicroSoft, Intuit). Many of these resources are available free of charge, and are easily employed by small businesses.

Large companies frequently prefer to keep Y2K compliance in-house, but for different reasons. Although their IT infrastructure may be complex, their in-house staff is often well-equipped-in terms of expertise and resources-to effectively handle any necessary changes.

However, small and mid-sized businesses are frequently caught in a bind: "Typically, when a small business has more than five PCs hooked up in a network," says Conway, "they're very busy and growing-and there's a good chance that they can't devote the resources to adequately ensure Y2K compliance. Remember: Once you start your Y2K analysis, that's just the beginning. You then must act upon the analysis and be vigilant in maintaining compliance. These companies often need help."

Various companies have successfully employed hybrid approaches to Y2K compliance:

Some firms devote their in-house IT staff to mission- critical Y2K issues, because their staffers already have detailed familiarity with the company's individual needs and existing systems. The firm then outsources more generalized tasks such as maintenance, LAN and desktop support.

Other companies outsource analysis and diagnostics, then use in-house staff to perform follow-up testing. The flip side involves making Y2K modifications in-house, then hiring another firm to perform extensive testing and evaluation.

If your firm decides to outsource certain IT functions, make sure internal IT staff plays an active role in shaping the process. They will be less likely to view partial outsourcing as a threat, and instead see it as a benefit. Liberated from mundane functions, in-house staffers will be able to focus on more critical issues.

Outsourcing can sometimes bring an added bonus. A partner specializing in information technology may provide excellent, unexpected solutions and ideas. As Conway describes it, "technology is our specialty, and we are exposed to a broad range of business environments. As a result, we can alert clients to new options and fresh technology that they wouldn't find on their own or might not even realize they need."

 

Tips For Achieving Millennium Compliance

Carol P. Conway offers a few tips that are equally applicable whether your firm does its Y2K upgrading in-house or via outsourcing.

Some software is more vulnerable. Proprietary software written specifically for a company or industry is particularly prone to Y2K complications. This is especially true if the software was written prior to 1993. In general, DOS-based systems are at higher risk than Windows environments.

Some software is less vulnerable. Quickbooks, Office 97, and new versions of Netware and Windows NT that run on Pentium computers are usually already compliant or else are readily upgradeable. However, results can vary widely and even new computers need to be tested.

Use a parallel system for testing modifications, especially for proprietary software. Avoid the risk of corrupting your current system. Copy all relevant files and programs to a separate, parallel environment specifically for testing. If bugs appear, they can be corrected without disrupting your ongoing operations.

Recognize the relationship between management and technology. "Every office environment is unique in its configuration of hardware, software, business products and telecommunications," notes Conway, "but management is the most important factor here. Rather than being a technical issue, Y2K is a business management issue-and a tedious one at that-which exposes how management functions are affected by the technology they depend on."

Use Y2K compliance to your advantage. "You can turn a seemingly negative situation into a positive step for your company," Conway says. "Y2K offers a good opportunity to take inventory of your business. Eliminate clutter by discarding products, software and components that are not critical. Retain and upgrade products that are germane to your business, and use Y2K as a catalyst to gain efficiency in operations. This is also a terrific opportunity to renew relationships with your suppliers, vendors, and clients."

Act now. "One thing is for sure," emphasizes Conway. "Time is running out, and a lot of businesses are going to be forced to do their Y2K upgrading in-house because they won't have a choice. By waiting too long, it will become increasingly difficult to find affordable outside help."

 

Seven A's For Dealing With Y2K

Whether addressing Y2K issues with in-house staff or through outsourcing, experts suggest this general procedure:

Awareness and addressing the issue. First, your company needs to recognize and formally address the issue by educating itself on the topic-fast. Seek information that pertains to your specific industry. Information is usually available on the Internet, through trade groups, and via software and hardware manufacturers.

Audit, assess and assign priorities. Investigate your computers, software, LAN systems, telecommunications, security alarms-anything that might contain a date-sensitive line of code or microchip-and identify areas most likely to present problems. Assign each area a priority, with mission-critical items receiving special attention. Industry-specific and customized proprietary software can be particularly vulnerable.

Act in an organized, decisive and timely fashion. Armed with the priority list from the previous step, define a Y2K strategy and devote the resources necessary for implementation. The plan should include specific upgrades to both hardware and software, and allow for plenty of testing of the modified systems. Experts agree that testing is a crucial and frequently underestimated part of the process.

Alert your clients, customers and vendors to this issue, and encourage their Y2K compliance efforts. Remember: your company's well-being depends on their company's health. Coordinate your efforts if you share interdependent data communications systems (e.g., for purchase orders, billing, inventory control and shipping).

 


Excerpted with permission from Small Business Success, Volume XII, produced by Pacific Bell Directory in partnership with the U.S. Small Business Administration.