Software Factory is specialized form of Business Process Outsourcing. The client outsources his Software or Information Technology Department in full or in part. We at Mann Technologies have tailored this Software Factory model to suit Latin and South American market. Under this umbrella of Software Factory we have assembled a range of business offerings and service models. To name a few of them:
Please get in touch with our sales representative who will be more than happy to guide you.
Mann Technologies’s service delivery model is based on the Software factory model of development. The Software factory model of development has the following key differentiates:
Advantages of such an approach:
Successful program management is achieved through careful planning, understanding of current requirements and future business environments, managing resources that meet the requirements and mitigating any perceived risk.
We follow the Enterprise Program Management model, which provides a corporate-level unit that consolidates project management across the enterprise, and helps track factors like business benefits, investment risk, portfolio analysis and prioritization, and organizational capacity planning. The Mann Technologies Program Manager monitors project status, business benefits, risks and other issues on a daily basis. He / She continuously monitors the team performance and provides additional resources and support as required. Off shore issues are primarily escalated to the Program Manager who also develops the resource plan and detailed process documents. The Program Manager is the customer’s single point of contact. Offshore Program Management takes responsibility for documentation that needs to be developed for the offshore team and handles all sign offs.
Mann Technologies ensures frequent communication between the customer and the offshore team. This is facilitated by conference calls initiated by the offshore team to discuss issues on a daily basis. A steering committee is set up with senior representatives from the customer and Mann Technologies to continually review the progress of the Software factory execution right through various stages of BOT commencing from KT.
Status reports are emailed to the customer on a weekly and monthly basis. Quarterly review meetings are conducted to apprise team members and address broad issues with senior management. Weekly status calls between key managers from both sides are also held, to address any issues that may need to be escalated, and plan for the following week. The status reports typically cover:
Mann Technologies has demonstrated delivery capabilities and robust processes to ensure that project execution moves like a well-oiled machine. This is primarily driven by effective project management skills possessed by our line managers. Mann Technologies has staffed its Overseas Development Centers with strong delivery managers experienced in processes and technologies, across the product lines to ensure that the culture of innovation and timely deliveries is sustained across the ODC.
Mann Technologies has a defined escalation mechanism, which focuses on three broad levels spanning across the organization structure enabling both robustness and scalability while providing transparency. There are three levels of escalation. Of these levels, the number of escalations would be more at the lowest level and this number would gradually decrease at higher levels as the nature of the issues change from operational to tactical and tactical to strategic level. The three levels are defined below:
Most companies neglect the ongoing governance and management of the service provider relationship and underestimate the time, money and people it takes to manage operations effectively. Ideally this includes establishing a dedicated team of people, on both ends, to ensure compliance and adherence to agreed-upon service levels.
The Mann Technologies Governance Model is highly segmented as it ensures high levels of transparency between the various entities involved. The entities include individuals’ right from the board of directors to operational staff members. The model has been developed keeping in mind the various processes and deep industry knowledge which Mann Technologies has leveraged over the years.
Mann Technologies currently uses the iplan enterprise management product for 100% project visibility with regard to project documentation, requirement management, effort management and defect tracking.
The Mann Technologies support and maintenance practice is highly skilled in the use of Remedy for SLA tracking functions.
With Remedy Service Level Agreements, our support staff can manage the entire range of service level agreement (SLA) processes, from defining SLAs and monitoring compliance, to collecting and analyzing performance data, addressing problem areas, and continually refining the services offered. Once implemented, Remedy Service Level Agreements also enables real-time, proactive SLA management to ensure that we meet or exceed expectations. As a result, we can keep IT service delivery closely aligned with business requirements and continually improve service quality.
Aggregated availability SLAs track the availability of all the assets and components tied to the individual SLA of a specific business service.
Mann Technologies has developed a very comprehensive six-step implementation methodology and a rigorous process model to ensure that maximum attention is given at this stage to ensure success. Mann Technologies’s migration competency, process knowledge and experience are major differentiating factors. A summary of generic migration process for transitioning development and support process to our Software factory is given below:
There are security risks that affect web servers, local area networks that host websites, and even innocent users of web browsers. There are basically three overlapping types of risk:
Bugs or misconfiguration problems in the web server that allow unauthorized remote users to:
Browser-side risks, including:
Interception of network data sent from the browser to server or vice-versa via network eavesdropping. Eavesdroppers can operate from any point on the pathway between browser and server including:
It's important to realize that "secure" browsers and servers are only designed to protect confidential information against network eavesdropping. Without system security on both, browser and server sides, confidential documents are vulnerable to interception.
Protecting against network eavesdropping and system security are the subjects of sections 1 to 5 of this document. Client-side security is covered in sections 6 and 7. Section 8 deals with security alerts for specific Web servers.