Documente Academic
Documente Profesional
Documente Cultură
“We should reengineer our [organizations]; use the power of modern information processing
technology to radically redesign our ... processes in order achieves dramatic improvements in
their performance.... We cannot achieve breakthroughs in performance merely by cutting fat or
automating existing processes. Rather we must challenge the old assumptions and shed old
rules.” – MichaelHammer
Principles of Reengineering
• Activities
• - Involve the impacted staff – Consult Users who are going to use the system
• - Re-allocate workforce
For BPR to succeed or achieve the intended benefits information technology has
In the second option of implementing ERP package with minimum deviation from the standard
settings i.e. “one size fits all”. All the processes in a company should conform to the ERP model
and the organisation has to amend its current work practices and switch over to what the ERP
system options offers. This option offers a world-class efficient and effective process with built
in measures and controls and is likely to be quickly installed (need not necessarily be quickly
implemented fully). But if the employees do not have clarity of existing processes and good
understanding of their internal customer needs or current processes are not well defined and
documented, it is quite possible that while selecting the standard process from the ERP package,
employees may not be able to perceive the difficulties likely to be encountered during
implementation stage. Employees would lack process ownership and orientation. Other than
technical issues like organisation structure, culture, lack of involvement of people can lead to
major implementation difficulties and full benefits of standard ERP package may not be
achieved. Situation may arise that after implementing ERP, organisation may have to reengineer
its processes. This could be a very costly mistake.
Theoretically the third option of reengineering business processes during implementation of ERP
also exists. It may sound to be the best option but being an ideal situation it does not seem to be
practical option and is likely to cause maximum disruption to existing working. It should not be
forgotten that during BPR & ERP initiatives, routine work is still to be carried out and customers
served.
Team Involved:
Infosys is one of technology partner for ICICI Bank which game the assistance to implement
Finacle for handling all the banking activities
Bill Desk for online payments
SYBASE
SAS
Project Design:
The shift
The basic network was set up for providing the e-mail facility, but none of the
applications were linked to the network. The network comprised of a mix of servers running
different applications at various branches of the bank. With growing business and rapidly
increasing accounts, the company found it extremely difficult to administer and manage the
system.This also resulted in duplication of backend services and procedures, as the systems were
not centralized for the core banking applications.
There was a lot of additional cost being incurred due to the duplication of the backend
procedures at the branch offices. The centralization procedure started around late 1999. ICICI
Infotech (a company promoted by ICICI) made the first network design for the group in 1999—it
was a hub and spoke architecture. Utmost care was taken to design a network with a strong
backbone. The key strength of a network is its back-bone. The group's various centers are
connected by 2 Mbps or 4 Mbps leased lines. The design considerations not only included high
bandwidth availability but also the fact that a single point of failure should not result in lines
going down.
The group realized that it had to enter into the retail space, have local regional presence,
and provide alternate channels to the customer. They needed a solution whereby they could offer
services across the country. Centralizing the operations was not the solution, but centralization of
data was. ICICI Bank had
already centralized some of the operations but still had some branch applications running
independently which were not centralized and had ATMs which were stand-alones. Two major
criteria considered before designing were not only the network, but also the infrastructure
available in our country
In the past, the infrastructure here was such that a company could not rely on leased lines
completely. So ICICI needed backups on ISDN and VSATs, along with the 64 Kbps leased lines.
The leased lines were too expensive then, now the lines are better, more stable and offer good
connectivity. The cost has also come down by around 15 percent.
It was really important was to have a world class data center and centralize everything in
one place, as that's where the network can be used at the maximum. To ensure 24x7 service
access and connectivity to customers one needs to have reliable backups and a robust network in
place. From a business perspective, the main reason to go in for a network was centralization of
data, provide all channels of communication and at the same time provide anytime, anywhere
banking. The problem ICICI Bank faced with our legacy systems was that they were stand-alone
systems and the data from one branch was not available with another branch.
These problems led us to the new design of the hub and spoke architecture.
What ICICI was looking for was a robust network, which would enable it to offer
services at the retail level throughout the country. The in-house ICICI Infotech was the obvious
choice for consultation. The ICICI Infotech team designed the initial network topology in 1999.
The team had put forward a series of designs, not radically different from each other.
Eventually, a design with a mix of VSATs, leased-lines, radio-links and ISDN was
selected. A mixed design was selected because of the disparate locations of the group across the
country. There were different technical problems in different locations and the next best available
solution had to be included. The advantage in a hub and spoke architecture is that multiple nodes
(spokes) are connected with a hub location through a ring of single-mode fiber. Each hub-node
connection can consist of single or multiple wavelengths (lambdas), each carrying a full Gigabit
Ethernet channel.
Protection from fiber cuts in the ring is achieved by connecting the hub and nodes through both
directions of the optical ring. Service provider Gigabit Ethernet metro access rings are the main
applications for this architecture. And another advantage is that nodes can be added to the
network more easily.
Methodology
The most important aspect to setting up a network is to have a good relation between the
technology consultant (network integrator), the vendor and the client. The vendors in the market
are more or less capable of giving the same results, like the same amount of redundancy or
strength of the network. What really matters is the relation between the three. If there is harmony
amongst the three, then better results will be achieved. The client plays the most important role
as he has very low time to market, and delivery is required at the earliest.
A series of products are available in the market. As the time to market is so short, ICICI
Infotech selects the products available in the market and integrates them. This takes care of 98
percent of 10 the solution requirement and then ICICI Infotech build the other two to three
percent around it nd deliver the perfect solution to the client.
The Network
The network follows a hub and spoke architecture—a mix of VSATs, leased lines, ISDN and
radio links. It has around 800 leased lines, about 600 VSATs, approximately 800 ISDN lines and
multiple 34 Mbps lines.
The network supports the ICICI group offices, banks, branches, and over 1000 ATMs. There is a
primary site from where spokes go out to the regional branches and the other offices. The
secondary site has the disaster recovery system.
There are around eight hub locations, which have 3, 4 or 8 Mbps lines as per the requirements for
connecting to the branch and regional offices.
High-end Cisco routers and switches have been deployed for connectivity. The network is
monitored using HP OpenView and CiscoWorks. Over 30 portals are operating using a highly
secure state-of-the-art security architecture, which consist of firewalls, intrusion detection
systems, virus protection and various other tools.
The main production site is at Mahalaxmi, Mumbai (the primary site), and has been built to
international standards. The disaster recovery site (the secondary site) is located at ICICI towers
in Bandra-Kurla complex, Mumbai and is used for replication of data. A distance of 25-30 kms
separates the two centers and they are linked with two 34 Mbps leased lines. To ensure reliability
and 24x7 availability, the leased lines pass through separate exchanges. Before the data moves on
to the leased lines, it passes through two CNT storage directors that convert this data into WAN-
related traffic before it is sent on the leased line to the other data center. The high-speed leased
lines make it possible to synchronize data in real-time between the two centers. Hardware at both
these sites varies from low-end NT servers to the high-end SUN E 10K along with 12 terabytes
of data storage at each end connected through a SAN. The group's facilities management team
manages over 9,500 desktops, 500 servers and works around the clock. CAUnicenter is used for
managing the helpdesk, desktops and servers, asset management, software delivery and remote
control. Unix is the preferred OS for most of the hardware while most of the databases use
Oracle with a few on Sybase and MS SQL. Over 200 databases are supported with 24x7
processing. The stateof-the-art technology architecture adopted by ICICI Bank needed robust
security, and this was designed by qualified experts from its Systems Security Cell. This security
design includes preparation, implementation and maintenance of the Systems Security policies
and procedures across all systems, ensuring general user awareness about these policies and
enforcing the policies through systems audits. The security cell has developed several tools,
which are the first of its kind to address several vulnerabilities on Unix, NT and MS-Exchange.
The system security is audited by KPMG.
ICICI Bank has grown immensely over a period of time. First time in history a private bank has
merged a public sector bank i.e. ICICI Bank announced merger with Bank of Rajasthan. On 23
May ICICI Bank announced merger with Bank of Rajasthan with it through share-swap in a
noncash
deal that values the Bank of Rajasthan at about Rs 3,000 crore. Each 118 shares of Bank of
Rajasthan will be converted into 25 shares of ICICI. It is said that this merger will also expand
ICICI Bank's branch network by 25%. ICICI Bank is also carrying out its activities in Rural
Areas by helping SHGs (Self Help Groups) and in other microfinance acitivities.
Certain recommendations are as follows:
The ICICI VSAT network is large, with almost a thousand nodes. Keeping it going
turned out to be an even bigger challenge for the group. The entire network is monitored
from one center. Any error in the network at any point is rectified in a short span of time
and the system is up and running with minimum downtime. ICICI must have a proper
control and look over this issue
ICICI Bank’s name comes in various controversies than any other bank mainly the
method of recovery. This may hinder the BPR process further in future if the bank gets
into any type of legal case. To avoid this ICICI Bank must follow the rules and
regulations.