|
|
Chances are your company has already received small, harsh reminders
of its techno-dependence. Have you witnessed how four little words-"the
network is down"-can plunge an entire office into a panic? If you think
that was frightening, just keep reading.
The "Year 2000 Millennium Bug," also known as Y2K, is rapidly gnawing
its way into your calendar, and could cause a lot more trouble than a
temperamental file server or mild satellite snafu. To protect themselves
from these potential problems, numerous firms are turning to outsourcing.
"Outsourcing" refers to the practice of contracting an outside firm to
perform an operation traditionally done in-house. U.S. businesses rely
on outsourcing for an expanding array of services, including production,
technical design, human resources and payroll administration. IT (information
technology) functions-such as computer installation, software integration,
telecommunications and network maintenance-are also frequently outsourced.
Y2K is forcing many firms to consider outsourcing to deal with this rapidly
approaching challenge. A bit of background information illustrates the
magnitude of the situation.
The Year 2000 Problem
The Year 2000 Millennium Bug is a worldwide problem involving many computers,
software packages and date-sensitive products. Affected products are unable
to accurately distinguish dates in the year 2000 and beyond.
The problem's roots go back to the earliest days of computing. In the
1940s and 1950s, computer memory capacity was extremely expensive, and
programmers used a two-digit shorthand: 1999 became "99." Unfortunately,
2000 represented by "00" is indistinguishable from 1900. Ooops.
Even though many subsequent programs have incorporated a four-digit date/year
format, the obsolete two-digit code still remains deeply embedded in hardware
and software currently in use. A large, unknown number of products may
soon succumb to this hidden flaw.
Awareness Is Crucial
U.S. businesses have already spent billions of dollars to modify problematic
products, and some experts estimate worldwide expenditures will eventually
exceed $500 billion.
The huge cost of Y2K compliance reflects the widespread nature of the
problem. Time-sensitive software and microchips are found in computers,
alarm systems, telecommunications networks, ATMs, cash registers, bar-code
scanners and numerous other products. Even relatively new products may
be susceptible to malfunction.
Here's the good news: Protective and preventative measures are available
to businesses that recognize the coming challenge and are committed to
addressing it in a timely fashion.
Unfortunately, some businesses are seriously unprepared for Y2K. "More
awareness is urgently needed," claims Filiberto "Fil" Pacheco, CEO of
P.B. Incorporated, an Albuquerque, New Mexico firm specializing in computer
sales, service and system integration. "Many small businesses have heard
about the problem, but don't realize its depth."
Carol P. Conway, president of Computer Rescue Squad based in Florida,
elaborates: "We try to educate businesses that this issue involves more
than just hardware and software. Other mission-critical resources-such
as telephones and security systems-are sensitive to problems with date-embedded
fields as well."
Companies may feel overwhelmed by the realization that Y2K can play havoc
with production schedules, inventory, shipping, customer service and profits.
However, it is imperative for them to take prompt action.
In-House vs. Outsourcing: Opportunities and Challenges
For many small firms, outsourcing their IT functions-either partially
or in full-is preferable to handling these procedures in-house. Given
the urgency of Y2K compliance, small businesses are even more likely to
rely on outsourcing in an effort to successfully upgrade before problems
arise. The potential costs and benefits of IT outsourcing mirror the traits
of outsourcing in general.
Potential advantages:
Time savings. This is particularly relevant for Y2K compliance,
because businesses are under a looming deadline. The obvious option is
to seek an expert who won't be delayed by a learning curve.
Increased capacity. Small, lean companies frequently have difficulty
keeping up with demand, especially during surges. Outsourcing may help
accommodate these fluctuations, resulting in increased capacity and revenue.
Higher quality. The goal is to receive higher quality and/or more
efficient service from a specialized outsource partner. Y2K specialists
may be better at rooting out ingrained problems and offering creative
solutions.
Enhanced focus on core operations. Freed from highly detailed
tasks that do not directly involve mission-specific goals (Y2K upgrading
is a beautiful example), a company can presumably focus energy on its
core operations.
Cost savings. The traditional Holy Grail of outsourcing, this
is an outgrowth of all the previously listed advantages. Cost savings
can be heavily influenced by the structure and terms of the outsourcing
contract.
Potential disadvantages:
Loss of control. The key potential downside of outsourcing. Delegating
a task without sufficient oversight can lead to negative results. To combat
the problem, firms must exercise vigilance and effective management throughout
the duration of the outsourcing arrangement.
Communication difficulties. Problems can arise from poor communication,
differences in company culture, and misaligned motives. The moral: choose
your partner carefully and strive for clarity.
Poor service. Outsourcing partners can be overwhelmed, just like
the company that has hired them. In some cases the partner may be incapable
of the rapid flexibility necessitated by changing business conditions.
In the worst of cases, a provider firm may slack off after the contract
is signed-but this is rare.
Unexpectedly high costs. This is often an area of disappointment.
Check contracts carefully for any hidden costs before formalizing the
agreement.
Loss of value-added core. The big bugaboo. As a rule of thumb,
do not outsource mission-critical processes. After all, if you can't do
them better than anyone else, why are you in business in the first place?
Outsourcing:
Tips For Making It Work
Kris Shah, president
and CEO of Litronic, has a few key suggestions based on extensive
experience. His Irvine, California company outsources a variety
of design and assembly functions in manufacturing its line of electronic
security products. In choosing an outsourcing partner he says "marketing
people are always optimistic, so you need to check deeper into a
firm's ability to deliver on its promises. Make sure you kick the
tires. Visit the facility and meet the staff members actually responsible
for delivering on those promises. And definitely check out their
credentials and customer references."
Several other considerations
can greatly improve the chances for a successful outsourcing partnership.
Understand your own
needs and requirements. The first step in a successful outsourcing
relationship, this affects all facets of the partnership. Aim for
clarity and specificity.
Find the best outsourcing
partner. The key word here is "partner." Make sure that your
partner knows the proper order of your priorities (e.g., speed,
cost, quality, flexibility, creativity) and shares a compatible
corporate culture. Verify credentials and references.
The contract is crucial.
Varying contract arrangements are used in outsourcing agreements.
Try to find out what works best for both you and your outsourcing
partner. If possible, before investing heavily in the relationship
try a short-term "trial basis" contract.
Beware of unreasonably
optimistic expectations for cost savings. This is a frequent
area of disappointment. Carefully assess your expectations and look
for potential costs hidden-intentionally or unintentionally-in the
outsourcing contract.
Stay vigilant and
maintain oversight. Outsourcing is a means of delegating tasks,
not making them disappear. Successful outsourcing requires ongoing
management of the relationship.
Use benchmarks to
assess performance. Reviews should be scheduled at regular intervals
during the life of the contract. Agree beforehand on useful benchmarks
to measure performance. These strengthen a relationship by providing
concrete, positive goals, and inherently reinforce the needs and
priorities described above.
|
Y2K: Does outsourcing
make sense for your company?
Businesses employ one
of three general approaches for achieving compliance:
1. Rely solely
on in-house IT staff to make upgrades and test products
2. Outsource all
millennium compliance activities
3. Employ a hybrid
solution: Perform some activities in-house, and outsource the rest.
Numerous factors will
determine the optimal approach for your company. In general, the
best candidates for do-it-yourself projects are home-based businesses-basically,
any business so small that no LAN (local area network) is installed.
Usually, this means five or fewer free-standing computers, and a
highly simplified IT structure.
For these small businesses
information is readily available. The Internet contains dozens of
sites (including the U.S. Small Business Administration site at
www.sbaonline.sba.gov), and numerous books and pamphlets have been
published on the topic. Downloadable upgrades and testing software
can be obtained from the web sites of hardware (e.g. Gateway, Dell)
and software manufacturers (MicroSoft, Intuit). Many of these resources
are available free of charge, and are easily employed by small businesses.
Large companies frequently
prefer to keep Y2K compliance in-house, but for different reasons.
Although their IT infrastructure may be complex, their in-house
staff is often well-equipped-in terms of expertise and resources-to
effectively handle any necessary changes.
However, small and mid-sized
businesses are frequently caught in a bind: "Typically, when a small
business has more than five PCs hooked up in a network," says Conway,
"they're very busy and growing-and there's a good chance that they
can't devote the resources to adequately ensure Y2K compliance.
Remember: Once you start your Y2K analysis, that's just the beginning.
You then must act upon the analysis and be vigilant in maintaining
compliance. These companies often need help."
Various companies have
successfully employed hybrid approaches to Y2K compliance:
Some firms devote their
in-house IT staff to mission- critical Y2K issues, because their
staffers already have detailed familiarity with the company's individual
needs and existing systems. The firm then outsources more generalized
tasks such as maintenance, LAN and desktop support.
Other companies outsource
analysis and diagnostics, then use in-house staff to perform follow-up
testing. The flip side involves making Y2K modifications in-house,
then hiring another firm to perform extensive testing and evaluation.
If your firm decides
to outsource certain IT functions, make sure internal IT staff plays
an active role in shaping the process. They will be less likely
to view partial outsourcing as a threat, and instead see it as a
benefit. Liberated from mundane functions, in-house staffers will
be able to focus on more critical issues.
Outsourcing can sometimes
bring an added bonus. A partner specializing in information technology
may provide excellent, unexpected solutions and ideas. As Conway
describes it, "technology is our specialty, and we are exposed to
a broad range of business environments. As a result, we can alert
clients to new options and fresh technology that they wouldn't find
on their own or might not even realize they need."
|
Tips For Achieving
Millennium Compliance
Carol P. Conway offers
a few tips that are equally applicable whether your firm does its
Y2K upgrading in-house or via outsourcing.
Some software is more
vulnerable. Proprietary software written specifically for a
company or industry is particularly prone to Y2K complications.
This is especially true if the software was written prior to 1993.
In general, DOS-based systems are at higher risk than Windows environments.
Some software is less
vulnerable. Quickbooks, Office 97, and new versions of Netware
and Windows NT that run on Pentium computers are usually already
compliant or else are readily upgradeable. However, results can
vary widely and even new computers need to be tested.
Use a parallel system
for testing modifications, especially for proprietary software.
Avoid the risk of corrupting your current system. Copy all relevant
files and programs to a separate, parallel environment specifically
for testing. If bugs appear, they can be corrected without disrupting
your ongoing operations.
Recognize the relationship
between management and technology. "Every office environment
is unique in its configuration of hardware, software, business products
and telecommunications," notes Conway, "but management is the most
important factor here. Rather than being a technical issue, Y2K
is a business management issue-and a tedious one at that-which exposes
how management functions are affected by the technology they depend
on."
Use Y2K compliance
to your advantage. "You can turn a seemingly negative situation
into a positive step for your company," Conway says. "Y2K offers
a good opportunity to take inventory of your business. Eliminate
clutter by discarding products, software and components that are
not critical. Retain and upgrade products that are germane to your
business, and use Y2K as a catalyst to gain efficiency in operations.
This is also a terrific opportunity to renew relationships with
your suppliers, vendors, and clients."
Act now. "One
thing is for sure," emphasizes Conway. "Time is running out, and
a lot of businesses are going to be forced to do their Y2K upgrading
in-house because they won't have a choice. By waiting too long,
it will become increasingly difficult to find affordable outside
help."
|
Seven A's For Dealing
With Y2K
Whether addressing Y2K
issues with in-house staff or through outsourcing, experts suggest
this general procedure:
Awareness and addressing
the issue. First, your company needs to recognize and formally
address the issue by educating itself on the topic-fast. Seek information
that pertains to your specific industry. Information is usually
available on the Internet, through trade groups, and via software
and hardware manufacturers.
Audit, assess and
assign priorities. Investigate your computers, software, LAN
systems, telecommunications, security alarms-anything that might
contain a date-sensitive line of code or microchip-and identify
areas most likely to present problems. Assign each area a priority,
with mission-critical items receiving special attention. Industry-specific
and customized proprietary software can be particularly vulnerable.
Act in an organized,
decisive and timely fashion. Armed with the priority list from
the previous step, define a Y2K strategy and devote the resources
necessary for implementation. The plan should include specific upgrades
to both hardware and software, and allow for plenty of testing of
the modified systems. Experts agree that testing is a crucial and
frequently underestimated part of the process.
Alert your clients,
customers and vendors to this issue, and encourage their Y2K compliance
efforts. Remember: your company's well-being depends on their
company's health. Coordinate your efforts if you share interdependent
data communications systems (e.g., for purchase orders, billing,
inventory control and shipping).
|
Excerpted with permission from Small Business Success,
Volume XII, produced by Pacific Bell Directory in partnership with the
U.S. Small Business Administration.
|