Texas state CIO bets big on controversial outsourcing deal
- 28 June, 2012 21:57
Wanted: Experienced CIO to take over struggling IT organization with flailing outsourcing relationships, data centers in disarray and a disheartened internal staff.
As Governor Rick Perry's director of administration and technology, Karen Robinson was charged with finding candidates capable of meeting that challenge. But the only one the chief of staff trusted to take over the Department of Information Resources (DIR) was Robinson herself.
"It was not one of the positions where you say, 'Ooh ooh, take me!'" Robinson, now Texas State CIO and Executive Director of DIR, admits. But through her work with policy analysts and others to assess what went wrong during a public battle between IBM and Texas over their $863 million data-center-consolidation contract, she knew as much as anyone could about how to fix IT outsourcing.
Robinson spoke to leaders of the agencies DIR serves, created an executive leadership committee to guide IT decision making, and launched an 18-month process of rebidding the IT work. "The DIR does so much more than data centers that outsourcing was the only way to go," says Robinson. "But I feared no [vendors] would apply."
Even the ugliest outsourcing efforts often succeed on the second attempt, but to be sure this one worked, Robinson embraced a different approach--the services integrator model. She signed a deal potentially worth more than $1 billion earlier this year, whereby Xerox and its outsourcing division (formerly ACS) will take over five towers of IT service, subcontract some of the work to vendors, including Unisys and Cisco, and Capgemini will be the master service integrator.
It's an unproven tactic--one outsourcing provider managing its real-world competitors' end-to-end delivery. But Robinson felt the potential rewards were worth the risk. "The other model--IBM telling IBM what to do--wasn't working," she says. "This is going to offer more flexibility and visibility. We have Capgemini there to oversee what's working."
There is pent-up IT demand from customers underserved by the previous five years of outsourcing. But "with the new contract, we opened the door to new secure, sustainable and cost-effective technologies like cloud computing, so customers don't have to wait for servers to be delivered," Robinson says. "We can have something built in 20 minutes."
Successful outsourcing relationships take longer than that. Many have their eyes on Texas to see how this model works, particularly Robinson's public-sector CIO peers, who have struggled with IT services deals. "It could be a landmark deal or it could be a disaster because so much is unknown," says Esteban Herrera, COO of sourcing analyst firm HfS Research.
"I've gotten lots of 'Good lucks,'" says Robinson. "I expect some hiccups. But I'm tired of having unhappy customers."
The biggest benefit Robinson is looking for is increased transparency of IT delivery and improved service. She'll know the new deal is working, she days, when her phone finally stops ringing.
Read more about outsourcing in CIO's Outsourcing Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.