Sei sulla pagina 1di 82

Manual of Procedures for the Procurement of

Information and Communications Technology
























INFORMATION AND COMMUNICATION
TECHNOLOGY OFFICE

January 02, 2013


SECTION 1 ..................................................................................................... 1
INTRODUCTION ............................................................................................................... 1
SECTION 2 ..................................................................................................... 2
PREPARING FOR ICT PROCUREMENT PLANNING ................................................ 2
How do we prepare for ICT Procurement? .............................................................. 2
What is the value of Hiring ICT procurement consultants ................................. 3
What are the classifications of ICT Procurement? ................................................ 4
What are Technical Specifications? ........................................................................ 7
Drafting the Technical Specifications ........................................................................ 8
Reference to Benchmarks .......................................................................................... 12
Importance of Technology Neutrality .................................................................... 12
Use of Brand Names in ICT Procurement .............................................................. 13
Green considerations in making technical specifications ........................... 14
What is Total Cost of Ownership?......................................................................... 15
Relevance of TCO to Approved Budget for the Contract ............................... 16
PREPARING THE BIDDING DOCUMENTS ............................................................. 17
What are Bidding Documents? ................................................................................. 17
The Technical Responsiveness Checklist .............................................................. 17
The Bid Evaluation Template .................................................................................... 18
Who shall participate in the preparation of the Bidding Documents? ....... 18
Enhancing the BAC for ICT Projects ........................................................................ 19
What various types and sizes of contracts may be provided in the Bidding
Documents? ..................................................................................................................... 19
Use of Model Contracts ................................................................................................ 22
How should Pre-Procurement Conference be conducted? ............................. 22
SECTION 3 .................................................................................................. 23
INSTRUCTIONS ON THE PROCEDURAL STEPS FOR ICT PROCUREMENT .. 23
Competitive Bidding ..................................................................................................... 23
NCC Accreditation .......................................................................................................... 23
Bid Evaluation Process ................................................................................................ 23
Proof-of-Concept requirement at the post-qualification stage ..................... 24
SECTION 4 .................................................................................................. 25
GUIDELINES ON CONTRACT IMPLEMENTATION FOR ICT PROCUREMENT
OF GOODS ....................................................................................................................... 25
Dispute Resolution........................................................................................................ 25
ANNEX 1 ICT PROCUREMENT FLOWCHART ........................................ 26
ANNEX 2 NCC WEIGHTED SCORING METHOD ..................................... 27
ANNEX 2A - EVALUATION OF SYSTEMS INTEGRATIONPROJECTS .. 34
ANNEX 3 - LIST OF ICT EQUIPMENT, GOODS AND SERVICES ............ 41



Information and Communications Technology Office Page 1
Manual of Procedures for Procurement of ICT
SECTION 1

INTRODUCTION


This Manual seeks to provide its users with clear, concise and accurate information on the public
procurement of (a) information and communications technology (ICT) goods and services; (b)
ICT infrastructure; and, (c) ICT consulting services, by discussing the steps that need to be taken
to effect such procurement in the manner prescribed by R.A. 9184, otherwise known as the
Government Procurement Reform Act, and its IRR-A. It supplements the Generic
Procurement Manual Volumes 1-4 (the GPM) that governs the general procurement process
and also discusses important issues that may confront government officials in all stages of
procurement, from the preparation of bid documents, to the actual bidding activity, monitoring of
contract implementation and the final payment to the supplier. For all ICT public procurement,
the GPM will continue to apply in matters not specifically provided for in this Manual.

ICT is defined in Executive Order No. 269 as the totality of electronic means to collect, store,
process and present information to end-users in support of their activities. It consists, among
others, of computer systems, office systems and consumer electronics, as well as networked
information infrastructure, the components of which include the telephone system, the internet,
fax machines and computers. Accordingly, ICT procurement is simply any procurement of
goods or services, infrastructure, or consulting services in relation to ICT.

The typical ICT procurement will involve the acquisition and delivery of some combination of
the following:

1. Hardware (servers, PCs, notebooks, routers, switches, etc);
2. Software (Operating systems, database management systems, packaged software e.g.
office automation software, and customized applications, etc);
3. Technical services (systems integration, application systems design/development,
network design/installation, Internet and leased line service, web hosting, system
configuration, etc); and,
4. Ancillary services (training, warranty, repair and maintenance).

The myriad of ways in which the four basic components discussed above can be combined
makes ICT procurement complex, such that a given project may not fit into any of the three
procurement models specified in the GPRA (Goods, Consulting Services and Infrastructure). A
further complicating factor is that not all services are billed using time and materials, with some
services based on lump sum pricing while others are based on volume. While the acquisition of
hardware and packaged software (and to some extent the related ancillary services) can easily be
packaged as Procurement of Goods, and the acquisition of some technical services alone can be
packaged as Procurement of Consulting Services, the combination of all the four components
cannot easily be packaged into any of the defined models.


Information and Communications Technology Office Page 2
Manual of Procedures for Procurement of ICT
A common approach that is taken is to divide up the procurement into a number of lots, so that
each lot can be easily categorized as goods or consulting services. The Goods and Services
lots would be evaluated using the pass/fail criteria while the consulting lots would be evaluated
using the Quality-Based or the Quality-Cost Method where the maximum weight for the Quality
or Technical portion is 60 % and the minimum weight for the Cost component is 40%. The
Weighted Scoring Method is attached as Annex 2. While this has worked on many occasions, it
is quite simplistic and prevents the procuring entity from being able to impose over-all
responsibility and total warranty over the performance and functionality of systems to be
procured. It will not work, for example, on large turnkey projects where the winning supplier is
supposed to provide both the hardware and the application software, as well as various services
for the project. In this case, a stricter technical eligibility criteria needs to be imposed on the
prospective suppliers which is a good track record as a system integrator and access to expertise
in the knowledge domain of the application/information system being procured. A very good
example is the Election Automation System which calls for not only system management
experience but a very good logistical network backed up by a financial capability that will enable
it to carry out the automated elections with COMELEC simultaneously in all parts of the
country.

Further, while strictly speaking, given the definition provided in EO 269, the procurement of fax
machines and cell phones would also be covered within the realm of ICT procurement, such
commodity items are best procured through the PhilGEPS, without need for any special
procurement processes. In fact, even for the acquisition of regular PCs and notebooks, it is
recommended that the PhilGEPS be used. Only when there are special requirements imposed on
the PCs or their delivery and installation should government entities resort to Procurement using
these ICT guidelines.

The rest of this supplemental manual is intended to assist government entities in planning and
preparing for ICT procurement which necessarily includes understanding how to properly
package the items and services to be procured, in conducting the actual procurement, in
evaluating bids, in contracting with the winning bidder, and in contract implementation.


SECTION 2

PREPARING FOR ICT PROCUREMENT PLANNING


How do we prepare for ICT Procurement?

The GPM contains extensive discussions on Procurement Planning for the different types of
government procurement. In view of the complex nature of ICT procurement, the need for
careful procurement planning cannot be overemphasized.


Information and Communications Technology Office Page 3
Manual of Procedures for Procurement of ICT
Identifying the need. The procurement considerations described in the GPM apply to ICT
procurement as well. In addition, a thorough understanding of the agency needs that are to be
addressed by technological solutions is the most basic ICT procurement prerequisite. Thus, any
procurement exercise must be planned to address a demonstrated need.

Developing a business case. Once the procuring entity identifies a need to be addressed by ICT
procurement, as with any other procurement, a business case should be developed weighing
options, costs and benefits associated with the need. A cost-benefit analysis of the potential
procurement, especially for high-value purchases, would be ideal. The business case for
procurement should not be limited to consideration of initial costs but should consider the total
cost of ownership, as well as support and interoperability requirements.

Strategic Alignment. Cohesion between agency and ICT strategy ensures efficiency in ICT
spending. Cross-functional knowledge is essential to enable both management and ICT officials
to speak the same language. In developing plans for ICT procurement, functional alignment
between management and ICT facilitates project design that is truly responsive to agency needs.

Much like private sector ICT procurement, the business requirements must be clearly
expressed and translated into technical specifications that will constitute the framework for the
procurement of hardware, software, services or any combination thereof. ICT is a tool, the value
of which must be evaluated on the basis of the extent to which proposed solutions address the
agency requirements and the cost it entails throughout its lifetime, including the initial costs,
maintenance and support, and training costs.

Other Considerations. Also to be considered in planning ICT procurement are risk
management, supply market analysis and a review of existing ICT supply arrangements. In
addition, the ability of the solution to interoperate with other technologies utilized by the
procuring agency and other agencies, as may be necessary, is a key consideration. Furthermore,
procuring agencies must be able to grasp intellectual property and licensing issues in the use of
technology, and may need to build into procurement project requirements the necessary
mechanisms by which the impact of these issues can be quantified in the evaluation of qualified
bids.


What is the value of Hiring ICT procurement consultants

If the expertise required to plan for the ICT procurement (as described above) as well as to
prepare the bidding documents and technical specifications is not readily available within the
Agency, the Procuring Entity may opt to hire ICT procurement consultants before embarking on
the actual procurement of the ICT systems. This is akin to the hiring of engineering consultants
in the procurement of infrastructure projects to conduct the preliminary study and detailed
engineering for the project.

The ICT procurement consultants activities can include:


Information and Communications Technology Office Page 4
Manual of Procedures for Procurement of ICT
Procurement Planning

A. Reviewing/updating the Agencys Information Systems Strategic Plan (ISSP)
including prioritization of systems

B. Aligning the ICT Strategy with the Agencys strategic thrusts and directions
Procurement Process

C. Formulating ICT Standards and/or defining the Agencys Enterprise Architecture

D. Preparing the Bid Documents including the Technical Specifications and Terms of
Reference (refer to Annex 4)

E. Assisting the Procuring Entity through the procurement process (i.e. pre-bid
conference, bid submission, bid evaluation, post-qualification, contract negotiations)

Project Management

F. Performing or assisting in the contract and project management during the
implementation of the contract

It is entirely up to the Procuring Entity whether the assistance to be provided by the
ICT procurement consultants would be limited to just the procurement process itself
or would extend before and beyond the actual procurement exercise.

The procurement of the ICT procurement consultants should also follow the
guidelines for procurement of ICT Consulting Services. Furthermore, appropriate
mechanisms and guarantees should be put in place to ensure that there will be no
possible conflict of interest that would arise in case the ICT procurement consultants
would have an interest in the actual system to be procured.


What are the classifications of ICT Procurement?

ICT procurement may be straightforward, involving either goods (such as personal computers,
laptops, or off-the-shelf software, including operating systems) or purely consulting services.
Many, however, are quite complex, involving a combination of hardware, software and services
(hereinafter referred to as mixed procurement): for instance, building a network or simply
upgrading one would involve acquisition of hardware as well as services required for installation,
software development or customization (as may be necessary) and services for the actual
operation and maintenance thereafter. While the different components, in some cases, may be
procured separately, considerations such as practicality and risk management may demand
turnkey solutions that may, in turn, implicate classification issues. As the procedure and
requirements for, as well as the evaluation method of, each procurement depends upon its

Information and Communications Technology Office Page 5
Manual of Procedures for Procurement of ICT
classification as goods, infrastructure, or consulting services, the correctness of any such
classification is vital in any procurement (refer to Annex 3).

The primary purpose of the procurement is the determining factor in the classification of a mixed
procurement. Often, the primary purpose is evident from the cost of a component relative to the
other items procured. But cost is not necessarily indicative of the primacy of a component in a
mixed procurement, and the identification of the primary purpose is largely situational.

Four different procurement models are proposed to handle the different kinds of ICT
procurement. These are:

Procurement of ICT Goods and Ancillary Services

Procurement of ICT Consulting Services

Procurement of ICT Outsourced Services

Procurement of ICT Total Solutions

Following the ICT Procurement Flowchart (refer to Annex 1), if what is being procured consists
primarily of:

hardware (servers, PCs, notebooks, switches, routers, etc), and/or

off-the-shelf software (Operating Systems, RDBMS, packaged office automation
software, packaged applications software, etc) and

purely ancillary services (installation, related training, maintenance and warranty) then it
is suggested that the procuring entity either make use of PhilGEPS, or in the case of
special requirements, make use of the guidelines, SBDs and sample contracts for
Procurement of ICT Goods. The procedure to be followed under this scenario is the one
for Procurement of Goods under the GPRA IRR.

For procurement of technical services (e.g. procurement consulting, project management,
systems analysis and development, programming, training, network/database design or fine
tuning, specialist consulting services, etc), where the payment for these services is based on time
and materials (i.e. the total price for the Contract will be mostly computed using some kind of
rate(s) multiplied by a number of person-days or person-months), the procuring entity should
make use of the guidelines, SBDs and sample contracts for Procurement of ICT Consulting
Services. These kinds of projects typically involve having the services provided either under the
direct supervision or in close cooperation with the staff of the procuring entity. The procedures,
SBDs and sample contracts shall closely follow the guidelines for the Procurement of Consulting
Services under the GPRA IRR.

If, on the other hand, the services are being provided under a fixed price or volume-based
contract with Service Level Agreements, and/or a pre-defined set of output deliverables under an

Information and Communications Technology Office Page 6
Manual of Procedures for Procurement of ICT
outsourcing arrangement, then the guidelines, modified SBDs for Consulting Contracts and
sample contracts for Procurement of ICT Outsourced Services shall apply. This model is
applicable for the procurement of such services as (but not limited to):

Web hosting;
Server hosting;
Internet Service;
Data Conversion/Entry;
Application service or subscriptions; and,
Development, customization or revision of applications

This is a new category of procurement not envisioned under the GPRA IRR. Taking into account
the unique characteristics of ICT procurement, the SBDs for Consulting Services, including the
applicable General Conditions of Contract and Special Conditions of Contracts shall be
modified, for this type of ICT procurement. For example, delivery of goods is a one-time event
and correspondingly acceptance can also be done one-time. But delivery of some services would
be a continuing activity, so that acceptance will need to be continuous using SLAs.)

Finally, all other procurement projects that would normally involve some combination of
hardware, packaged software, custom software and services, both ancillary and otherwise, should
make use of the guidelines, SBDs and sample contracts for Procurement of Total ICT Solutions.
This is another new category of procurement not envisioned under the GPRA IRR and a
modified set of SBDs for Consulting Services would be used for this type of projects.

Of course there will continue to be some gray areas, particularly when what is being procured
appears to straddle two or more of the procurement models. Three examples follow:

Example 1: Procurement of Outsourced Network Management Service which includes the
delivery/installation of a network management system and server on site

Possible Solution: If the Network Management Service provider will charge for the network
management system and server, the procurement can be split up into two or three lots, as
appropriate one each for the Outsourced Service, the Server and possibly, the Software.

If, however, the system and server costs are bundled into the Service itself, either as a rental or as
a free item, then it can be considered under Procurement of Outsourced ICT Services.

Example 2: Procurement of a turnkey solution using the services of a Systems Integrator

Possible solution: If the Systems Integrator (SI) is responsible for delivering all components
of the ICT solution (e.g., the hardware, software and services required to complete the ICT
solution procured, regardless of the involvement of numerous vendors), then the model for
Procurement of Total ICT Solutions applies.

If the SI is only providing consulting services and is not delivering the actual solution
components, then the Procurement of ICT Consulting Services shall apply for the SI contract,

Information and Communications Technology Office Page 7
Manual of Procedures for Procurement of ICT
with the solution coming in separately as Goods, Consulting Services, Outsourced Services,
Total ICT Solutions or some combination thereof.

If the SI is delivering some of the components of the solution, then the Procurement of Total ICT
Solutions still applies but whatever the SI will not be supplying can be procured separately using
the appropriate model.

Example 3: Procurement of a web-based application with servers, network infrastructure
and PC workstations

Possible solution: There are three possible ways to package this procurement. First, the whole
system can be procured using the SBD and guidelines for Total ICT Solutions. This simplifies
procurement, on the one hand, as overall responsibility can be passed onto the single supplier.
However, costs can be higher due to limited competition (there will be fewer bidders capable of
delivering all components) and the fact that mark-ups will be made by the bidder for products
they are not directly providing.

Second, the system can be packaged as four separate procurements, one each for the web-based
application, the server (and associated licenses), the network infrastructure, and the PCs. The
first can be procured under either Consulting or Outsourced Services, while the latter three can
be procured using the guidelines for ICT Goods. This approach may yield the lowest
procurement costs based on the aggregate cost of the winning bids. However, it complicates
project management and shifts the burden of coordinating (e.g., managing deliver schedules,
determination of responsibility among suppliers in case of delay or other fault affecting the
completion, installation and operationg). Note, also, that in this case, suppliers will be reluctant
to provide guarantees on performance as they are only providing a part of the total system.

Finally, a compromise between the first two approaches is possible, whereby all generic
components that can be assumed to be off the shelf such as PCs and probably some network
equipment can be procured separately as ICT Goods while the application, licenses, server(s) and
server room network infrastructure would be procured using the modified SBD for Consulting in
Total ICT Solutions.

The decision of which approach to employ would have to depend primarily on the Procuring
Entitys assessment of its capability to manage multiple suppliers and quickly resolve technical
issues considering the complexity of the system to be procured.

In case of any doubt as to how its project should be categorized, the procuring entity is
encouraged to seek guidance from the National Computer Center (NCC).


What are Technical Specifications?

The GPM defines technical specifications as the physical description of the goods or services,
as well as the Procuring Entitys requirements in terms of the functional, performance,

Information and Communications Technology Office Page 8
Manual of Procedures for Procurement of ICT
environmental interface and design standard requirements to be met by the goods to be
manufactured or supplied, or the services to be rendered. The technical specifications must
include the testing parameters for goods, when such testing is required in the contract.

For ICT Procurement, the Procuring entity would ideally possess a thorough understanding of
the precise agency requirements as well as the range of technology solutions that are available in
the marketplace, the different business models that may be used to deliver the same, and cost and
legal implications of any option. In reality however, the procuring entity may only have a vague
idea of its functional requirements.


Drafting the Technical Specifications

The need for precision in drafting the technical specifications are particularly important for ICT
procurement. Prior to drafting the technical specifications, the procuring entity must be clear on
the following:

(i.) Purpose of procurement The actual objective of the procurement must be identified,
e.g., automating existing internal procedures or re-engineering the delivery of
government services.

(ii.) Procurement criteria The procuring entity must develop the criteria for evaluating
bids based upon accomplishment of the purpose of procurement, taking into account
technical and other factors such as ease of use, interoperability, security, costs through
the entire life of the solution (including acquisition, training costs, support and
maintenance costs), performance standards, customization, and reliability.

(iii.) Process The procuring entity shall adopt a process for developing the foregoing (e.g.
it may establish an intra-agency /inter-agency working group, possibly including
private sector participation, to undertake collaborative and voluntary development of
technical specifications; it may adopt specifications from a similar project in another
government agency; or, it may decide to hire consultants who shall prepare the
technical specifications and assist in the conduct of procurement and technical
evaluation of bids).

A set of precise and clear specifications is a prerequisite for Bidders to respond realistically and
competitively to the requirements of the Procuring Entity without qualifying their Bids. In the
context of Competitive Bidding, the specifications must be prepared to permit the widest
possible competition and, at the same time, present a clear statement of the required standards of
workmanship, materials, and performance of the goods and services to be procured. Broadly
stated specifications that do not set out such standards clearly may result in bids that are neither
comparable nor responsive to the needs of the Procuring Entity. Only by satisfying both
requirements will the objectives of transparency, equity, efficiency, fairness and economy in
procurement be realized, responsiveness of Bids be ensured, and the subsequent task of Bid
evaluation and post-qualification facilitated.

Information and Communications Technology Office Page 9
Manual of Procedures for Procurement of ICT

In drafting technical specifications for PCs and similar end user equipment, the procuring entity
is encouraged to access the NCC website where an updated set of specifications will be posted
for use by government agencies. For computing equipment such as servers, it is important to
consider and, if possible, specify the following:

Intended use and application

What software(s) will run on the server

How many users will simultaneously use the system

What existing infrastructure will the server need to interoperate with (e.g. existing
network, OS etc)

Minimum memory requirement (usually derivable from the software to be run and the
number of users)

Minimum disk storage capacity (derivable from the types and numbers of transactions to
be supported and retention periods)

Connectivity (how will the server connect to the procuring entitys network)

Backup storage(what kind of backup storage capability is required)

Performance (e.g. fault tolerance, availability, speed of processing, expansion capability)

Packaging (e.g. rack mounted vs. tower, etc)


In specifying software, it is usually necessary to provide the following:

mode of operation and general system architecture

functional requirements, preferably detailed enough to the point of identifying all inputs
and outputs (reports)

intended number of users

estimated number of transactions to be handled

interfacing and interoperability requirements with other systems

compatibility requirements


Information and Communications Technology Office Page 10
Manual of Procedures for Procurement of ICT
security and auditability requirements

other special requirements (e.g. use of bar codes,

In specifying consultancy services, the required expertise, the required minimum availability of
this expertise, and the expected outputs of the engagement should be clearly specified, preferably
with a tentative timetable of activities. Terms of Reference for Consulting Services would
normally contain the following sections: (a) Background; (b) Objectives; (c) Scope of the
Services; (d) Training (when appropriate); (e) Reports and Time Schedule; and (f) Data, Local
Services, Personnel, and Facilities to be provided by the PROCURING ENTITY.

For outsourced services, appropriate Service Levels (SL) will need to be specified together with
penalties for not meeting these Service Level Agreements (SLAs) in addition to what is found in
TORs for Consultancy Services. In its purest sense, SLAs are agreements between the supplier
of a service and the user of that service that define:

The availability of the service to the user

The minimum acceptable performance of the components of the service

The measurement and reporting mechanisms that allow the monitoring of the service

The cost of the service or additional services (where applicable)

Obviously, the kind of Service Levels or QoS will depend on the type of service being procured.
There are ITIL (Information Technology Infrastructure Library) specifications that can be
applied to IT services.

For procurement of data services, (e.g. web hosting, shared hosting, application services, data
center hosting etc) , Uptime Agreements are typically employed, including such QoS as system
uptime, network uptime, power uptime (typically expressed as percentages, or a maximum
amount of downtime within a period e.g. 99.9% uptime, or no more than 30 minutes downtime
per month). In addition, transaction turnaround times, system response times, data retention and
backup, the maximum amounts of service interruption, and scheduled maintenance windows can
also be specified.

For call centers or service desks, the SL metrics commonly employed include:

ABA (Abandonment Rate): Percentage of calls abandoned while waiting to be answered.

ASA (Average Speed to Answer): Average time (usually in seconds) it takes for a call to
be answered by the service desk.

TSF (Time Service Factor): Percentage of calls answered within a definite timeframe,
e.g., 80% in 20 seconds.


Information and Communications Technology Office Page 11
Manual of Procedures for Procurement of ICT
FCR (First Call Resolution): Percentage of incoming calls that can be resolved without
the use of a callback or without having the caller call back the helpdesk to finish
resolving the case.

TAT (Turn Around Time): Time taken to complete a certain task.

For systems development and maintenance, possible service levels will revolve around skill
levels (i.e. certified staff), productivity, response and turnaround times, limits on bugs per line
of code and length of full warranty against defects or bugs after deployment.

For data conversion services, the typical service levels would involve accuracy, turnaround time
and security/confidentiality of information.

For repair and maintenance services, typical service level metrics include the availability,
location (on-site/phone/walk-in) and response times of technical support, service/repair times,
and possibly service escalation clauses which may include provision of service units and/or
replacements.

It should be noted that proper use of SLAs in outsourced contracts should consider two well-
differentiated phases: the negotiation of the contract and the monitoring of its fulfillment in real-
time. Providing the Procuring Entitys required or desired Service Levels provides the SLA
contract definition (basic schema with the QoS [quality of service] parameters) for SLA
negotiation and finalization. SLA monitoring and SLA enforcement, according to defined
policies would constitute the second phase. However, since most service providers would
already have mechanisms in place for monitoring and reporting, Procuring Entities may leave it
up to the bidders to propose how to meet the SLA monitoring requirement.

While it is important to include all critical service levels metrics that would ensure acceptable
delivery of the service(s) required, procuring entities should realize that having too many
actually complicates tracking and monitoring, and that there are actually costs involved in
measuring and reporting on each SLA. Thus, Procuring Entities should strike a balance between
ensuring good service and paying more for the same service(s).

In writing specifications for Total ICT Solutions, one will have to take into account the
corresponding suggestions depending on the component of the solution that is being specified,
e.g. hardware, software, consultancy, services etc. In short, the specifications for Total ICT
Solutions will necessarily need to have all of the various types of specifications previously
discussed. In addition, the overall business objectives of the procurement, the context of the
project (in terms of the organizational structure in which the project will operate as well as
existing ICT resources and infrastructure), and the general requirements for the combined ICT
solutions project (i.e. Project Management, Systems Integration, Reporting and Documentation,
Warranties and Post-implementation support) will need to be clearly defined.

Care must be taken in drafting specifications to ensure that they are not restrictive. In the
specification of standards for equipment, materials, and workmanship, recognized Philippine and
international standards should be used as much as possible to ensure interoperability with present

Information and Communications Technology Office Page 12
Manual of Procedures for Procurement of ICT
systems or even those to be procured in the future. Where other particular standards are used,
whether national standards or other standards, the specifications should state that equipment,
materials, and workmanship that meet other authoritative standards, and which ensure at least a
substantially equal quality than the standards mentioned, will also be acceptable. The following
clause may be inserted in the Special Conditions of Contract or the Technical Specifications.


Sample Clause: Equivalency of Standards and Codes

Wherever reference is made in the Technical Specifications to specific standards and codes to be
met by the goods and materials to be furnished or tested, the provisions of the latest edition or
revision of the relevant standards and codes shall apply, unless otherwise expressly stated in the
Contract. Where such standards and codes are national or relate to a particular country or region,
other authoritative standards that ensure substantial equivalence to the standards and codes
specified will be acceptable.

Where appropriate, drawings, including site plans as required, may be furnished by the
PROCURING ENTITY with the Bidding Documents. Similarly, the Supplier may be requested
to provide drawings or samples either with its Bid or for prior review by the PROCURING
ENTITY during contract execution.


Reference to Benchmarks

In preparing the Technical Specifications, the Procuring Entity shall be guided by the
benchmarks set and updated by the NCC from time to time for certain types of ICT procurement.


Importance of Technology Neutrality

Among the principles governing procurement under the GPRA is competitiveness by extending
equal opportunity to enable private contracting parties who are eligible and qualified to
participate in public bidding.1 The preference for competitive bidding2 and the prohibition on
reference to brand names3, among other provisions, implement this policy, the underlying
purpose being to ensure that government procurement will be carried out within the context of
free competition to assure the best value for government.

The competitiveness principle requires technology neutrality in ICT procurement, and generally
prohibits preference for specific technologies, standards, or vendors. To maximize choice and
competition, ICT procurement should instead be based on objective standards, including
performance, cost, security and interoperability. For example, in software procurement, the
procuring entity should look at factors such as costs over the entire useful life of the technology,
ongoing maintenance, training, data migration and integration with other systems. It should not
focus on business models for software development and delivery (e.g. whether it is open source

Information and Communications Technology Office Page 13
Manual of Procedures for Procurement of ICT
software, commercial software, or mixed-source software), and instead should evaluate whether
the software fulfills the need intended to be addressed by the procurement.


Use of Brand Names in ICT Procurement

Sec. 18 of the GPRA prohibits the use of brand names for procurement. This prohibition was
designed to prevent undue preference for certain brands and to promote competition. For ICT
procurement, however, this prohibition renders the crafting of specifications that clearly and
sufficiently describe the procuring agencys business requirements very difficult. This may
result in failure to procure the correct type of technology solution for the procuring agencys
business requirements and ultimately defeat the purpose of the procurement or, at best, deprive
the government of the optimal and most cost-effective solution.

Sec. 3 of the GPRA lays down the governing principles on government procurement, one of
which is that the procurement process shall be simple and made adaptable to advances in
modern technology in order to ensure an effective and efficient method4. In view of this policy,
procuring agencies may justify the use of brand names in procurement, by way of strict
exception, only in the following instances:

(i.) it is required to ensure compatibility with legacy systems, or prior material investments,
when prior financial or staff training investments in a particular product or technology
are large in relation to the proposed new investments, and introducing a competing
product or technology would create unreasonable disruption or expense;

(ii.) it refers to the required hardware/software platform for the proposed application;

(iii.) the brand name is de facto industry standard where a vast majority of the relevant
constituency has adopted a particular product as a standard and there are no reasonable
substitutes (e.g., use of TCP/IP, Windows OS for work stations);

(iv.) it refers to an enterprise technology standard, where the agency or the country has
formally adopted a technology standard (e.g., Microsoft Office, Oracle Data Base
Management System) for the following reasons: (1) significant economies of scale are
achieved through standardization; (2) substantial simplification of technical
environment; (3) dominant customer base and technical support in the relevant market;
and (4) acceptable or manageable tradeoffs vis--vis risks of technological dependence
and monopoly abuse;

Furthermore, bidding documents may specify brand, product or standard names provided that it
allows functional equivalents through the addition of the words or substantially equivalent 5
where substantially equivalent means operationally and functionally interchangeable.
Obviously, there will be differences in interpretation depending on the extent of existing ICT
infrastructure in the procuring entity with which the items being procured will interoperate.


Information and Communications Technology Office Page 14
Manual of Procedures for Procurement of ICT

Green considerations in making technical specifications

Procuring the right ICT infrastructure, software or services can greatly reduce carbon emissions
through energy savings and more efficient operations. This is especially true of devices that are
regularly used or replenished such as PCs, printers and their components or supplies. In the
design of an appropriate ICT configuration for an organization, whether this covers a full system
or components thereof, it is important to achieve a balance of present and future technology
needs, performance, price and environmental m covers energy efficiencies and future disposal of
ICT hardware. Some green practices that can be considered in procurement of ICT systems or
products include the following:

Select computer systems that are upgradeable. This saves money and the carbon
footprint of a new system when performance needs to be increased or fixed as only
certain parts need to be replaced or upgraded rather than the whole system. Look for
systems with additional vacant memory slots, external graphic card slots and extra
internal power connectors. Also select systems whose replaceable components are
commonly available in the market.

Select power supplies with total wattage that meets current system needs with a
reasonable allowance for short term expansion or addition of components. Websites of
PC component manufactures and other dedicated hardware websites can provide
information on the power consumption of common computer components. Some
websites provide a convenient power calculator for computer systems.

Choose energy efficient power supplies, typically with ratings of 80plus, from reputable
manufacturers. The rating indicates how much of the total maximum power draw of a
power supply unit (PSU), expressed in watts, is actually used by the system. The balance
is wasted as heat. An 80% efficiency rating means that the PSU can convert around 80%
of its total power draw (for example 500 watts) into usable power for the system.

Select processors with energy efficient ratings (typically 45 watts in TDP or Thermal
Design Power) for systems that do not require heavy work load or work that stress
processing power. The TDP is the maximum power consumption of the processor under
significant work load. For typical office computer work such as word processing,
spreadsheets, emails and internet browsing, processors with TDP of 45 watts may be
sufficient. The two major microprocessors producers Intel and AMD, have information
on the power consumption of their products in the websites. Other hardware sites also
regularly do testing on new processors which usually include power consumption figures.

Choose computer motherboards with built in video, LAN. Sound and other functions and
motherboards with smaller form factors (i.e. micro ATX or mini ITX) where appropriate.
Having such functions integrated into the motherboards saves space and power usage
compared to a system that uses separate component parts for video, sound, etc. Smaller
board form factor also uses less energy due to its use of fewer electronic parts. The

Information and Communications Technology Office Page 15
Manual of Procedures for Procurement of ICT
various websites of computer motherboard manufacturers list their products with
integrated functions.

Choose energy efficient computer monitors, usually those that comply with EPA (US
Environmental Protection Agency) requirements and monitors that have less toxic
substances. Newer LCD monitors usually consume less power than older CRT monitors.
Monitors that comply with EPA standards are usually marked as such or may have the
EPA logo appear on their screen during the boot process. Websites of computer monitor
manufacturers include the power consumption figures for their various models. Other
sites may also test and list down the power usage for monitors available commercially.

Select green versions of components such as video cards, motherboards and hard drives,
where appropriate, that have low power usage during idle and peak load times.
Component with low power consumption at idle periods can save on energy cost
especially for computer units that are left open for extended periods. Green versions of
video cards have fewer power connectors while green hard drives usually have variable
platter speeds that help reduce power usage when drive work load is not large. Green
versions of such components can be used when speed in performance of the system is not
critical.

Choose motherboards, computer cases and other computer components that are free of or
have minimal content of lead and other toxic substances such as mercury and cadmium.
Since a few years ago, manufacturers of computer components have introduced lead free
products which help reduce the amount of toxic substances that pollute the environment
especially during the disposal of such products.

Choose toner or ink efficient printers that have low cost factors per page or have a low
total cost of ownership rating. More efficient printers use less toner or ink cartridges
which reduce the cycle of replacement of such items consequently decreasing the carbon
emissions in their manufacture.

Design physical layout of data centers or server rooms that have adequate ventilation, air
flow and reduced heat from external sources to maintain temperatures required for
optimum system performance. Carefully planned layouts of servers and data centers
reduce the level of ventilation system required to maintain desired operating condition
leading to lower power usage used to cool equipment while prolonging equipment life.
Proper design of green data centers covers server casings, cabinets, racks and room
configuration or location.


What is Total Cost of Ownership?

There have been many cases where vendors would offer their products at an initially low price
with the objective of reaping substantial or exorbitant future profits from sales of supplies or
parts, or of maintenance services from what would then be a captive buyer. This has frequently

Information and Communications Technology Office Page 16
Manual of Procedures for Procurement of ICT
been experienced with printers for example, where the prices of some replacement cartridges are
almost the same as the price of the printer.

In view of the above, in planning ICT procurement and in evaluating potential solutions, a
procuring entity must look at the Total Cost of Ownership (TCO) of solutions being proposed.
The TCO represents not just the acquisition cost of the system, but its expected operating and
maintenance costs over its lifetime or some reasonable subset thereof. Its use helps prevent
procurements that are the proverbial penny wise but dollar foolish.

In coming up with the TCO, the following costs have to be considered over the typical lifetime
of the system which would usually be between 3 to 5 years:

The original acquisition cost or purchase price
Required costs of necessary supplies (e.g. tapes, ink cartridges)
Additional costs to operate the system

.. New or additional equipment required
.. New or additional software required (e.g. need to upgrade OS)
.. Staff (re)training
.. Staff recruitment and retention (in case existing expertise is not available)

Required future maintenance costs

.. Recurring software licenses maintenance
.. Preventive maintenance and servicing for equipment

Other costs associated with using and operating the system

Until the GPPB makes a final ruling on whether TCO may be considered in lieu of the bid prices,
Procuring Entities may plug the loophole in the meantime by ensuring that their requirements
as defined in the technical specifications would already include maintenance costs, provision of
some supplies and spare parts, and include a provision that any additional costs necessary to
make the system fully operational (e.g. hardware, software, training, etc) should be included and
costed in the bid.


Relevance of TCO to Approved Budget for the Contract

The TCO in a way affects the ABC. The ABC is the ceiling for the contract price and is
determined at the planning stage wherein the TCO is factored into the ABC as an adjustment to
account for the future operating and maintaining costs for the system.



Information and Communications Technology Office Page 17
Manual of Procedures for Procurement of ICT
PREPARING THE BIDDING DOCUMENTS

What are Bidding Documents?

The GPM describes the bidding documents to be issued by the Procuring Entity, as well as the
contents thereof. This description, as well as the guidelines on the preparation of the bidding
documents, also applies to all ICT procurement. Additional Bidding documents for ICT
Procurement:

The Technical Responsiveness Checklist

The Bid Evaluation Template


The Technical Responsiveness Checklist

The Technical Responsiveness Checklist (TRC) is an electronic form provided as part of the
bidding documents. It requires the bidders to provide a detailed point-by-point comparison of
their proposed product or service against each detailed technical specification, demonstrating the
substantial responsiveness of the overall design of the System and the individual Information
Technologies, Goods, and Services being offered by the bidder to those Requirements.

Ample space should be provided for the bidders to fill up their response to each individual
technical requirement. Self-serving and vague statements such as comply or meets (or
exceeds) specification are not acceptable responses. Instead, specific and numerical (where
applicable), responses are required. Where the space provided is inadequate to provide the full
details of their response, bidders should refer specifically to the pages where the response can be
found.

The bidders response in the TRC shall be the primary basis for evaluation. This avoids the
problem of evaluators having to look for the appropriate response from the bidder to a particular
requirement.

When filled up, the TRC provides the first two columns (Technical Requirements and Bidders
Response) of the Bid Evaluation Template.

When utilized by the Procuring Entity, the TRC is deemed to be part of the Bidding Documents





Information and Communications Technology Office Page 18
Manual of Procedures for Procurement of ICT
The Bid Evaluation Template

For ICT Procurement, the Procuring Entity may utilize a Bid Evaluation Template to make the
Bid Evaluation process as straightforward and transparent as possible. In such cases, the Bid
Evaluation Template may be distributed to all bidders as part of the Bidding Documents.

The Bid Evaluation Template is a spreadsheet which clearly shows the following as columns (for
formatting purposes, more than 1 column may be assigned each item):

A. The detailed technical requirements being evaluated
B. The specific bidders response to each of the technical requirements
C. The evaluators assessment of whether the bidders offer meets the specific requirement

Column A should be filled up at the time of releasing the bid documents. Column B
should be filled up by copying the contents of the Technical Responsiveness Checklist
filled up by the bidders themselves, and submitted as their Technical Bid Form. Column
C should be filled up by the evaluators.

The detailed technical requirements column should be filled up according to the technical
specifications defined in the bid documents. For brevity, only the summary technical
requirements which can be verified or otherwise evaluated and scored are provided.
Clarifications, background information and other discussion points which are not
measurable/verifiable should not find their way into the evaluation template.

When utilized by the Procuring Entity, the Bid Evaluation Template is deemed to be part of the
Bidding Documents.


Who shall participate in the preparation of the Bidding Documents?

The following must participate in the preparation of the bidding documents:

1. The BAC;
2. The TWG;
3. The end-user unit/PMO;
4. Consultants, if any; and
5. The BAC Secretariat / Procurement Unit.

In view of the complexity of many types of ICT procurement, it is advisable to enhance the
capacity of the BAC in the manner described below.




Information and Communications Technology Office Page 19
Manual of Procedures for Procurement of ICT
Enhancing the BAC for ICT Projects

For ICT projects, to ensure that the BAC will be capable of addressing issues that may arise in
connection with the procurement, the head of the procuring entity may either

(i.) create a separate BAC specifically for ICT projects; or
(ii.) expand the membership of the BAC with the inclusion of two additional members.

Sec. 11 of the GPRA authorizes the head of the procurement to establish separate BACS where
the number and complexity of the items to be procured shall so warrant. It also allows the
appointment of up to 7 members to the BAC.

The complex nature of ICT procurement often raises issues that require specialized knowledge to
properly address. Many of the criticisms of ICT procurement in the past were directed at
perceived inability of the BAC to deal with such issues.

Accordingly, the head of the procuring entity is well-advised to take either of the aforementioned
options for enhancing the capacity of the BAC to address ICT procurement issues. For either
option, the BAC would benefit from the inclusion as members of the following: (i) an ICT
knowledgeable official of the agency; and, (ii) an external resource who could be a CIO from
another government agency, a representative from the NCC, or a private sector consultant duly
accredited by the NCC. However, the appointment of a private sector consultant must be
accompanied by a certification that the consultant does not have a direct or indirect interest in the
contract to be bid out.

What various types and sizes of contracts may be provided in the Bidding
Documents?

The bidding documents should clearly state the type of contract to be entered into and contain the
proposed contract provisions as appropriate. There is a wide range of ICT contracts, depending
on the type of transaction. The following are some examples of ICT contracts:

1. Acquisition of off-the-shelf products (e.g., anti-virus software, flash drives, printers);
2. Software development and license agreements, including software as a service
agreements;
3. Maintenance and Support Agreements;
4. Outsourced Services Agreement; and,
5. Systems Integration Agreements.

Preparation of ICT contracts are challenging because of the difficulty in capturing the technical,
business and support requirements in terms of outcome expressed in a contract. Furthermore,
outcome is heavily influenced by institutional objectives, politics and capacity of the procuring
entity. Anticipation of all requirements for proper project implementation through its life-cycle
is imperative and must be dealt within the contracts.


Information and Communications Technology Office Page 20
Manual of Procedures for Procurement of ICT
The following areas may be the subject of dispute and must be specifically governed by
appropriate contractual language:

1. Costs Contracts may require up-front and fixed payments, periodic payments, recurring
payments, payments on time-and-materials basis, or balloon payments, among other
arrangements. Some may even require no initial payment but require payment for
maintenance, support or related services. Depending on the business model of the
software developer, the continuing use of the software, as well as maintenance and
support, may involve additional cost, all of which must be clearly indicated in the
contract.

2. Intellectual Property Ownership of intellectual property is relevant to cost, liabilities
and remedies and should be adequately covered in the contract. Customized software
development and licensing agreements must contain a provision dealing with source code
ownership or access. It is not essential that the procuring entity acquires ownership of the
source code, but it is recommended that the contract at least include mechanism to obtain
access to source code in certain situations (e.g., as required for maintenance when the
software developer is unable or unwilling to render additional services, or when the
software developer has gone bankrupt or has ceased to exist). The procuring entity may
negotiate for the inclusion of a source code escrow arrangement in the contract. In all
cases, the contractor must warrant that it has full intellectual property rights or legal
authority to provide to the procuring entity, for its use under the terms of the relevant
contract, the hardware, software and services that is the subject of the procurement. If the
use of open source software is contemplated, it is suggested the professional legal advice
is sought to ensure that the appropriate licensing terms are adopted in the contract.

3. Scope/Change Management During the course of project implementation, and for
various reasons, changes may be required by the procuring entity or requested by the
contractor. The impact of such changes upon cost, liabilities and remedies depend
largely upon the applicable contract. It is important for the contract to allow price/cost
variation only in accordance with the agreed procedure and in exceptional circumstances
as may be appropriate given the nature of the procurement.

4. Timetable The contract must clearly establish the timetable for delivery of goods or
services procured. The contract must emphasize the obligation of the contractor to timely
notify the procuring entity for anticipated delay, to take reasonable steps to minimize
delay, and to refer to the dispute resolution process in case of disputes relating to the
delay.

5. Warranties and Liabilities The contract must explicitly provide for the scope of the
contractors warranties and liabilities. Among other things, the contractor must warrant
that it has full capacity to enter into the contract; that it has and will continue to have all
the necessary rights in the software (including third party software) and all relevant
intellectual property rights to perform the contractors obligations under the contract; that
all software provided shall perform in all material respects in accordance with its

Information and Communications Technology Office Page 21
Manual of Procedures for Procurement of ICT
specification; and that the system, products and assets provided under the contract shall
be free of all encumbrances.

6. Security and data protection The contract must include appropriate provisions
warranting security of software/systems procured. Where a contractor shall be
responsible for the handling of information on behalf of the procuring entity, the contract
must require the implementation of reasonable security practices and procedures
appropriate to the complexity of the task and proportional to the likelihood and severity
of the potential harm that may arise due to unauthorized access.

7. Testing, Evaluation and Acceptance The contract must include an evaluation and
acceptance mechanism consistent with the project goals and the scope defined in the
contract. Where appropriate, the contract should provide for acceptance as a precondition
to payment, although large IT contracts may provide for milestone achievements within
the contract term that may be accepted as a basis for progress payments.

8. Remedies and Dispute resolution Depending on the complexity of the project, the
contract must specifically provide for remedies in case of breach and dispute resolution
options. For complex projects, the procuring entity may consider including in the
contract a provision on referral to mediation, prior to arbitration. Mediation is a process
whereby a neutral third-party is selected by the parties to assist in the settlement of the
dispute. The mediator has no power to render a decision binding on the parties and only
helps the parties identify settlement options that would satisfy their interests. Arbitration
is a process whereby a dispute is submitted to a neutral third party (e.g., a sole arbitrator
or a panel of three arbitrators), who shall receive evidence from the parties and thereafter
render a decision. It is suggested that the contract provides for referral of disputes to
binding arbitration before the Philippine Dispute Resolution Center.

9. Termination and Consequences of termination. The contract must provide for the
specific grounds for termination and its consequences, which will include the payment of
liquidated damages based on a pre-estimate of damages to be suffered, exit management,
transfer of data, and assignment of all rights to the procuring entity. In appropriate cases,
a remedial plan process and a cure period for breaches may be specifically provided in
the agreement. The contract should also allow termination by the procuring entity by
convenience.

10. Risk Distribution Who is responsible for insuring the system from delivery to final
acceptance should be clearly defined. Especially for ongoing services, the risk should be
upon contractor, being the one in the best position to manage risk. Thus, the contractor
should be responsible for evaluating environmental factors that may affect risk and ought
not to be able to invoke the same in order to be released from any contractual
responsibility For combined ICT solutions projects, system integration projects, or any
project when some contractual responsibilities are passed on to subcontractors, it is
important to ensure that all obligations may be enforced against the primary contractor,
without prejudice to a the right of the procuring entity, at its sole option, to take action to
enforce its rights directly against the subcontractor. It is also advisable to require prior

Information and Communications Technology Office Page 22
Manual of Procedures for Procurement of ICT
consent of the procuring entity to any subcontracting arrangement. Furthermore, any
subcontracting agreement must fully pass on, as appropriate, all contractor obligations
contained in the contract with the procuring entity.

11. Governing Law The governing law shall be the laws of the Republic of the
Philippines.

12. Contract Governance. The Procuring entity should consider have a contract governance
structure in place, typically providing for named representatives of the contractor and the
Procuring Entity, and an escalation process to higher levels of management to oversee
proper implementation of the contract and settlement of issues, prior to recourse to the
formal dispute resolution process. For contracts involving outsourced services, this
structure would include monitoring of the pre-agreed service levels that the contractor
must maintain.


Use of Model Contracts

Unfortunately, no single model contract can apply to all types of ICT procurement transaction.
The GPPB may include model contracts with the standard bidding documents. The model
contracts are intended to be starting points to assist the procuring entity in properly drafting the
relevant ICT contract. Model contracts must still be carefully adapted to the particular
circumstances, with some provisions to be added or removed. Without a thorough understanding
of the planned ICT procurement, as well as the other factors that will thereafter come into play,
there is a danger that the appropriate contractual model may not be utilized, or that the contract
will not comprehensively deal with all issues implicated by the proposed transaction.
Accordingly, it is recommended that the governing contract be based on GPPBs model
contracts, but further developed with appropriate professional advice.


How should Pre-Procurement Conference be conducted?

As explained in the GPM, the pre-procurement conference is the forum where all officials of the
Procuring Entity involved in the project meet to discuss all aspects of the said project to
determine the readiness of the Procuring Entity to undertake the procurement. The conference
focuses on the technical specifications, the ABC, the appropriateness and applicability of the
recommended method of procurement, and the availability of pertinent budget releases.

For projects involving an ABC amounting to more than Two Million Pesos (Php 2 Million), a
pre-procurement conference is conducted to determine the readiness of the Procuring Entity to
procure goods and services in terms of the legal, technical and financial requirements of the
project. More specifically, it ensures that the procurement will proceed in accordance with the
PPMP and APP, confirms the availability of appropriations and programmed budget for the

Information and Communications Technology Office Page 23
Manual of Procedures for Procurement of ICT
contract, and reviews all relevant documents in relation to their adherence to the law. (IRR-
Section 20).

As ICT procurement is often complex, even if cases where the ABC amounts to P 2 Million and
below, or a separate BAC is created for ICT projects or the membership of the BAC is expanded
to include members with specialized knowledge on ICT, the BAC is strongly encouraged to
conduct a pre-procurement conference, as circumstances warrant, before the Procuring Entity
proceeds with the procurement.

The timing of and procedure for holding a pre-procurement conference for ICT procurement, and
the participants thereto, are as indicated in the GPM. The Procuring Entity may request the
ICTO to send a representative to help address pre-procurement issues.


SECTION 3

INSTRUCTIONS ON THE PROCEDURAL STEPS FOR ICT PROCUREMENT


Competitive Bidding

The procedural steps for ICT procurement are as detailed in the GPM. However, the following
guidelines apply to facilitate smooth, fair and transparent ICT procurement.


NCC Accreditation

The NCC shall maintain a central registry of entities qualified to bid for ICT procurement. At
the beginning of every calendar year, the NCC shall require the submission of basic documentary
requirements as it deems necessary to establish the legitimacy of prospective bidders.
Prospective bidders who are found by the NCC to be compliant with its procedure and
requirements shall be issued a Certificate of Compliance which effectively pre-qualifies them.
Documents already submitted to the NCC as a requirement for the issuance of such certificate do
not have to be re-submitted to the Procuring Entity to establish eligibility to bid.


Bid Evaluation Process

Bid evaluation shall follow the process specified in the GPM Volume 2 which shall include:


Information and Communications Technology Office Page 24
Manual of Procedures for Procurement of ICT
Preliminary evaluation during bid opening
Detailed technical evaluation
Detailed price evaluation for completeness and arithmetic errors

Detailed Evaluation against the technical specifications is greatly simplified if the Procuring
entity adopts the Bid Evaluation Template discussed in an earlier section (reference).

At the point of bid evaluation, Columns A and B should be filled up with the following
information respectively:

The Technical Requirements
The Bidders detailed response

The designated evaluators will simply need to fill in Column C. They would need to fill in
Column C with an assessment of whether the bidders meet the specific requirement. Financial
evaluation, and if applicable, the merging of technical and financial scores are as defined in the
General Procurement Manual.


Proof-of-Concept requirement at the post-qualification stage

For ICT procurement involving applications development, customization of software packages,
or interfacing of/to existing applications, where the deliverables are still to be built, buyers
usually have to rely on track record, methodologies and similar relatively intangible criteria
which is sometimes tantamount to evaluating promises made in the bids. Frequently, a buyer
finds that quite a number of these promises are not kept e.g. very nicely structured
methodologies are not followed, etc.

Accordingly, in order to reduce the risk of contracting with bidders who promise a lot but cannot
deliver, the Procuring Entity may require a Proof of Concept (POC), whereby the winning bidder
is first asked to come up with and demonstrate a working prototype of a critical component of
the system to be built BEFORE the actual contract is signed. Through this exercise, the
Procuring Entity will be reasonably assured that he will be contracting with a party that has the
capability to deliver on its promises.

The POC will be conducted at the cost of the bidder the bidder shall be responsible for
providing all the hardware, software and services needed for the systems development and
subsequent demonstration. The Procuring Entitys responsibility is limited to providing
requirements and perhaps test data.

Because of the cost to be borne by the bidder doing the POC, it should be required only as a post
qualification step, that is, only the lowest evaluated bidder will be asked to do the POC as a pre-
requisite to contracting. In this way, bidders with no chance of getting the contract will not need
to spend time and effort for a POC. Similarly the buyer will need to conduct hopefully only one
POC exercise.

Information and Communications Technology Office Page 25
Manual of Procedures for Procurement of ICT

In the event that the POC for the lowest evaluated bidder fails, the Procuring Entity can proceed
to the second lowest evaluated bidder, just like in any other case of failed post qualification.

Should Procuring Entity decided include a POC requirement in their post qualification, this must
be clearly stated in the Instruction to Bidders, and the bid documents should clearly define the
scope and specifications for the POC exercise, as well as the minimum criteria (in pass/fail
language) for successful POC. The procurement schedule should also provide ample time (at
least one month) for the conduct of the POC before contracting. The scope of the POC should be
commensurate with the amount of time being given the bidder to come up with the system.


SECTION 4

GUIDELINES ON CONTRACT IMPLEMENTATION FOR ICT PROCUREMENT OF
GOODS


Dispute Resolution

In addition to the provisions in the GPM on Contract Implementation, the contract governing all
ICT procurement shall contain a clause providing that any and all disputes arising from the
implementation of any government procurement contract shall be submitted to arbitration in the
Philippines according to the provisions of Republic Act No. 876, otherwise known as the
Arbitration Law. Arbitration is similar to court litigation but the case is tried before a private
panel appointed by the parties. The following clause is suggested:

Any and all disputes arising out of, or in connection with, the interpretation,
implementation, expiration or termination of this contract shall be submitted to
arbitration before the Philippine Dispute Resolution Center, according to the
provisions of Republic Act No. 876, otherwise known as the Arbitration Law
and the rules in force in said institution.


Information and Communications Technology Office Page 26
Manual of Procedures for Procurement of ICT
ANNEX 1 ICT PROCUREMENT FLOWCHART



ICT PROCUREMENT FLOWCHART 1

















Procurement of
Hardware, Off-the-Shelf
Software and Ancillary
Services (e.g. installation,
maintenance, warranty,
etc.)?
B
Use PhilGEPS or guidelines and
SBDs for Procurement of ICT
Goods
YES
NO
Procurement of
Consulting Services on
time and materials basis?
A
Use PhilGEPS or guidelines and
SBDs for Procurement of ICT ICT
Consulting Services YES
NO

Information and Communications Technology Office Page 27
Manual of Procedures for Procurement of ICT
ANNEX 2 NCC WEIGHTED SCORING METHOD



EVALUATION METHODOLOGY GUIDE ANNEX D


I. Introduction

The recommended approach in the evaluation of system integration projects is the Multi-
level Weighted Scoring Technique using Relative Rating. Associated with this approach is
the use of the two-envelope system. This method assumes that the criteria and corresponding
weights distribution have been predetermined and published with the bid documents issued.

The weight distribution between the technical and the cost aspects should advisably be on a
50%-50% ratio. However, if the agency feels that emphasis should be given to either
technical or cost aspect, the most it should consider is a 60%-40% ratio.

This guideline is focused on the process undertaken by the Technical Evaluation Committee
(TEC), a sub-committee created by the Bids and Awards Committee (BAC-ICT) to assist in
the detailed technical evaluation of bids.

Weighted scoring is promoted to allow agencies to discriminate on the importance of the bid
features to their specific requirements especially with respect to their Information Systems
Development Plan (ISDP).

The Relative Rating Technique is adopted to promote maximum objectivity in scoring. The
judgmental way of rating spawns controversies which should be minimized as much as
possible.

This methodology is also most convenient in the case of complex bids where hardware,
software, communications, applications development, training, change management, site
engineering and preparation, facilities management and financing are packaged as one bid.






Information and Communications Technology Office Page 28
Manual of Procedures for Procurement of ICT




II. Evaluation of Technical Aspect (1
st
Envelope)

1. Establishment of Technical Responsiveness Checklist (TRC)

All technical envelopes are opened and a thorough review of all proposals are conducted
to establish the TRC sheets. The TRC sheets are item by item tables or listings
presenting the abstract of the technical features of all the proposals. The document is
prepared by extracting essential information, primarily the features to be rated, from the
bid proposals documents.

The TRC sheets facilitate case of comparison and rating of the proposals in as much as
proposals are not usually presented in a uniform manner notwithstanding the prescribed
proposal format instructions. This document must be written in sufficient detail as it also
serves as a quick reference to every question that may arise regarding a technical feature
of a bid.

At the Agencys option, the Agency may require the vendor to fill-up the TRC sheets in
the prescribed format and attach it as an integral part of the proposal. Any discrepancy
with the actual contents of the proposal must be clarified with the bidder and if the latter
is proven to have willfully provided wrong information in the TRC sheets to mislead the
evaluators, this will constitute a sufficient ground for rejecting the proposal.

2. Validation of Features in the TRC Sheets

Validation of features in the TRC sheets is an integral part of the evaluation process,
especially when the preparation of the TRC sheets is divided among the members of the
TEC because of the tediousness of the work involved. Every feature entered in the TRC
sheets must be verified as true and correct as the integrity of the result of the technical
evaluation depends heavily on the accuracy of the entries in the TRC sheets. The
evaluators must see to it that data entered in the TRC sheets are denominated in the same
units and are comparable across various bids.




Information and Communications Technology Office Page 29
Manual of Procedures for Procurement of ICT


3. Preparation of Score Sheets and Entry of Responses

The next step is to set up the score sheets. The criteria and weight cells are filled up with
the criteria and corresponding weight distribution announced to bidders. Then, using the
TRC sheets as reference, the features cells are filled with the actual features of each
proposal. To maintain the security of data in the worksheets, codes maybe substituted for
bidders name so that data will not fall in the wrong hands even if the worksheets are
accidentally leaked out.

4. Relative Scoring of the Basic Features

A. For features measured quantitatively, where direct measurement and quantification is
not possible, a rating scale may be adopted as follows:

Nonexistent = 0
Poor = 20
Fair = 40
Average = 50
Good = 60
Very Good = 80
Excellent = 100

In this case, each evaluator assesses the feature by the qualitative description above
and the corresponding score is used for averaging the rating of all the evaluators.

A variation of the methodology can be adopted whereby the two scores voted on by
the most number of evaluators are used as choices for the next iteration of voting
done by the evaluators. This is done until the voters agree en banc on the final score.

To minimize the bias in scoring or undue influence from other members, the TEC
Chairman shall announce each criteria and the corresponding scoring guidelines for
evaluators prior to secret voting. The advantages/disadvantages of each feature for
consideration are tabulated on the board and explained to the body before the actual
scoring. Each evaluator would then take turns in defending his score before the other
members. Only those who have read the bids being scored must participate in the
voting.

5. Computation of the Weighted Score

Weighted score is simply the raw score times the weight allocated to a criterion. For
multi-level scoring, start computing the weighted score at the lowest level, then roll them
upwards.



Information and Communications Technology Office Page 30
Manual of Procedures for Procurement of ICT




It is advisable to use a spreadsheet software in the preparation of the score sheets as
formulae could be embedded in the tables to attain a fast and accurate computation of
scores.

6. Establishment of Relative Technical Score

Finally, the total bidders are normalized so that the positioning of a certain bidder in a
given range of the values is determined. The relative technical score of a specific bidder
is computed as follows:


RTS =


Where: = feature value being scored
= highest feature value

III. Evaluation of Cost Aspect (2nd Envelope)

The methodology continues with the evaluation of the cost aspect of the bids. Levelled costs
are established and relative cost scores are computed for each bidder/proponent:

1. Establishment of Levelled Cost figures

Levelled cost figures are established by adding to the raw cost quotation the cost of the
products/services bidded on but were not included by the bidders/proponents in their cost
proposals. If the costs are not provided by the bidder/proponent, the highest cost
provided for by the other bidders/proponents in this category shall be added to the cost.
This may include costs for warranties, add-in system components, and all other aspects
not reflected in the products/services bidded on.

Cost evaluation of proposals could be done by computing for the net present value of the
levelled costs of the proposed equipment (hardware, software, maintenance) over the
useful life of the proposed systems.






h

k

x 100
h

k


Information and Communications Technology Office Page 31
Manual of Procedures for Procurement of ICT




Using a zero interest rate, the cost of the proposed system will be taken per se for each
projected year of use. The first year cost will be the same for the second year cost and so
forth. The yearly cost will be summed up and added to the initial cost or one-time-
charges to get the total system cost for a specified number of years. However, if a
discounting rate other than zero is used, say 20%, the following formula is used:



DC
n
=


Where DC
n
is the discounted cost for the year n
PC
n
is the actual cost for the year n
i is the interest
n is the year number (0 for initial year, 1 for year 1, )


After computing for the yearly discounted cost (DC
n
) of each item (rental/lease,
maintenance, software, etc.), the yearly cost is summed up and added to the one-time
charges for the initial year to get the total equipment cost for a specified number of years
(n = 1, 2, , k, where there are k years in the proposal for each vendor).

In formula form,

Total Present Value Cost = DC
n


Where there are K years being considered in the comparative table of costs for all the
bidder/proponent proposals.









(l + i)
n

PC
n

K
n = l

Information and Communications Technology Office Page 32
Manual of Procedures for Procurement of ICT




It is recommended that twenty percent (20%) interest rate be adopted when evaluating the
present value cost of proposals. However, this may change depending on the discounting
rate of money thru k years considered. With this option, the agency would be in a better
position to see how much the equipment would presently cost if paid one time.

2. Taking the Relative Cost Scores

The Relative Cost Score (RCS) of the resulting net present value costs are then
computed. The RCS for a specific proposal is computed using the following formula:


RCS =


Where C
h
= the highest net present value cost proposal
C
k
= the net present value cost proposal of a specified bidder k
C
l
= the lowest net present value cost proposal

IV. Integration of Relative Technical and Cost Scores and Ranking of the Bidders

After the evaluation of the costs, the relative technical scores are integrated with the relative
cost scores to derive the final score and the overall ranking of the bidders/proponents.

The final score for a bidder/proponent is made by taking a weighted relative scores for both
technical and cost aspects. This is done by applying weights W
t
for technical and W
c
for cost
and adding up the products.

In terms of formula,

Final Score = (RTS x Wt) + (RCS x Wc)

Where RTS is the relative technical score,
RCS is the relative cost, and
W
t
and W
c
are the weights distribution between the
Technical and cost aspects




C
h

C
h
C
k
+ C
l

x 100

Information and Communications Technology Office Page 33
Manual of Procedures for Procurement of ICT



The overall ranking is then made on the basis of the final score. The bidder with the highest
final score is ranked as number 1 and the rest of the bidders in descending order. Equal totals
are given the same rank.



V. Submission of the Evaluation Results to the BAC-ICT

The TEC at this point presents the results of the evaluation to the BAC-ICT. A summary
report containing the overall ranking of the bidders from highest to lowest, the evaluation
criteria and methodology used, and the final copies of the TRC sheets and score sheets are
prepared and signed on every page by the members of the TEC for submission to the BAC-
ICT.



















Information and Communications Technology Office Page 34
Manual of Procedures for Procurement of ICT
ANNEX 2A - EVALUATION OF SYSTEMS INTEGRATION PROJECTS
TECHNICAL RESPONSIVENESS CHECKLIST
(Additional Requirement for Technical Specifications-
Section VI. Technical Specifications)
Sample TRC

Name of Bidder:
Item Description Minimum Specifications Bidders Offer
1
GENERAL SPECIFICATIONS

(Insert general technical requirements
here such as power requirements,
language support, safety and
Environmental standards, specific
locations of delivery, etc.)

2
PRODUCT SPECIFICATIONS

Product Please Specify
Model Name Please Specify
Copier Machine Price shall include the
following units or options

with Auto Reverse Document Feeder for
back-to-back copying
40-50 sheets capacity
with built-in duplex unit or equivalent
feature
250-300 sheets capacity
with two (2) paper feeder unit 50-100 sheets, Size: A3-A5
with multi-purpose or bypass tray
with pedestal
Copy/Engine Speed: 21-26 pages per minute, Size: A4
(8 " x 11")

Resolution: 600 x 600 dpi (scan/copy)
Time to first copy: 10 seconds or less
Multiple copy: up to 999 copies
Warm up time 45 seconds or less
Zoom 25-400 % (1 step increment/step)
Memory: Standard: 32 MB, Please specify
Paper Input Capacity Standard tray: 2 -250-300 sheets
universal paper cassette
(A3,A4,A5,ledger, legal,etc.)
By-pass tray: 50-100 sheets (size:
A3-A5)

Paper Size: Universal Size
(A3,A4.A5,ledger,legal, etc.)

Dimension (WxDxH) Please specify manufacturer
standard

Weight: Please specify manufacturer
standard

Power Source: 220-240V, 50/60 Hz
Power Consumption Please specify manufacturer
standard

Please specify other feature of your
product:

Warranty and After-Sales Services: Please specify your offer.


Information and Communications Technology Office Page 35
Manual of Procedures for Procurement of ICT

Technical Responsiveness Checklist
(Additional Requirement for Technical Specifications- Section VI. Technical Specifications)


Evaluation of TRC (Goods)

Name of Bidder: ECOPY CORPORATION PHILCOPY CORPORATION
OTUS COPY SYSTEMS,
INC.

Specification
Offered
REMARKS
Specification
Offered
REMARKS
Specification
Offered
REMARKS
Item Description Minimum Specifications Bidder's Offer
1 GENERAL SPECIFICATIONS

(Insert general technical requirements here
such as power requirements, language
support, safety and Environmental
standards, specific locations of delivery,
etc.)

2 PRODUCT SPECIFICATIONS

Product Please Specify
SHARP Digital Passed Digital Copier Passed Fuji Xerox Passed

Model Name Please Specify
AR 5726/RP10 Passed
KYOCERA
Taskalfa 220
Passed
DocuCentre-
III 2007
Passed

Copier Machine Price shall include the
following units or options



with Auto Reverse Document Feeder for
back-to-back copying
40-50 sheets capacity
100 Sheets cap. Passed
50-sheets cap.
(DP-420)
Passed
75-sheets cap.

Passed

with built-in duplex unit or equivalent
feature

with built in
duplex unit
Passed
with DU-420
Duplex Unit
Passed
Duplex
module
equipped
Passed

with two (2) paper feeder unit 250-300 sheets capacity
2-500 sheets
paper tray
Passed
2-300 sheets
paper feeder
Passed
4-500 sheets
feeder unit
Passed

with multi-purpose or bypass tray 50-100 sheets, Size: A3-A5
100 Sheets cap. Passed 100 sheets cap. Passed 95 sheets cap. Passed

with pedestal w/ wooden
pedestal
Passed with pedestal Passed with pedestal Passed

Copy/Engine Speed: 21-26 pages per minute, Size:
A4 (8 " x 11") 26 cpm/ppm Passed 22 cpm Passed 25 ppm Passed

Information and Communications Technology Office Page 36
Manual of Procedures for Procurement of ICT

Resolution: 600 x 600 dpi (scan/copy)
600 x 600 dpi Passed 600 x 600 dpi Passed 600 x 600 dpi Passed

Time to first copy: 10 seconds or less
4.8 secs Passed 5.7 secs Passed 4.3 secs Passed

Multiple copy: up to 999 copies
999 copies Passed 999 copies Passed 999 copies Passed

Warm up time 45 seconds or less
23 secs. Passed 17.2 secs Passed 18 secs Passed

Zoom 25-400 % (1 step
increment/step) 25-400 % ( 1%
increment)
Passed
25-400 % (1
step
increment/step)
Passed
25-400 % (1
step
increment/step
)
Passed

Memory: Standard: 32 MB, Please
specify 32 MB Passed 32 MB Passed 512 MB Passed

Paper Input Capacity Standard tray: 2 -250-300
sheets universal paper cassette
(A3,A4,A5,ledger, legal,etc.)
By-pass tray: 50-100 sheets
(size: A3-A5)
2-500 sheets
paper tray
1-100 sheets
bypass tray
Passed
2-300-sheets
paper cassette
100-sheets
bypass tray
Passed
4-500-sheets
paper cassette
95-sheets
bypass tray
Passed

Paper Size: Universal Size
(A3,A4.A5,ledger,legal, etc.) A3, A4, A5,
Ledger, legal
Passed
A3, A4, A5,
Ledger, legal
Passed
A3, A4, A5,
Ledger, legal
Passed

Dimension (WxDxH) Please specify manufacturer
standard
623x628x
653mm
Passed

568x546x607m
m
Passed

640x652x111
2 mm
Passed

Weight: Please specify manufacturer
standard 46 Kgs. Passed 33 Kgs. Passed 77 Kg Passed

Power Source: 220-240V, 50/60 Hz
220-240V, 50/60
Hz
Passed
220-240V,
50/60 Hz
Passed
220-240V, 60
Hz, 8A
Passed

Power Consumption Please specify manufacturer
standard
1.45 KW Passed
437w copying,
60w standby
Passed

1.920W(Max.)
, 686W
(Running),
Passed

Please specify other feature of your product:
Please refer to
Annex "2"
Passed
As stated in the
statement of
compliance
Passed
As stated in
the statement
of compliance
Passed

Warranty and After-Sales Services: Please specify your offer.
One year
warranty &
Lifetime free
service
Passed
Parts warranty:
One (1) year or
150,000 copies
Service
Warranty: Two
(2) years
Passed
Three (3)
years parts
replacement
warranty;
lifetime on
service
Passed
REMARKS COMPLY COMPLY COMPLY

Information and Communications Technology Office Page 37
Manual of Procedures for Procurement of ICT


Name of Bidder:
BIDDER 1 Bidder 2

Specification
Offered
POINTS
Specification
Offered
POINTS
Item Description
Approved Budget for
Contract
Minimum Specifications Bidder's Offer
GENERAL WORK SPECIFICATIONS:

I. Project Management PhP 200,000 Quality Based evaluation 20% 20%
Service Set-up
System Installation three weeks


Quality Assurance and Testing four weeks

Agents System Testing classroom instruction

Supervisors Systems Testing classroom instruction


Documentation Loose leaf


II. Manpower and Facilities (1-yr
Subscription)
PhP 11,700,000 Least Cost

Annual Manpower salaries/benefits
and facilities for 15 seats with the
agents (generalists, team leaders and
supervisor)





A. Customer Relationship Management
Software
Quality Based evaluation 25% 25%
Application Development Tools
Workflow Management

IVR Scripts

Call Tracking Capability

Call Handling Capability


B. ISP for the 6 participating agencies -
1 yr
PhP 12,000,000 Least Cost

Information and Communications Technology Office Page 38
Manual of Procedures for Procurement of ICT
Leased Line and Subscription to an
ISP provider for each of the 6 agencies
with 3 mbps bandwidth (CIR)





C. Call Charges PhP 11,000,000 Least Cost

III. Build-up of Knowledge Databases PhP 986,384 Quality- Based eval. 15% 15%

Policies and Procedures Manual

Complilation of Generalized and
Specialist Information from FAQ Book




IV. Capability Building of CCB Team PhP 3,132,000 Quality-Based evaluation 20% 20%


Group Competency Development
Plan



Training Modules for Supervisors,
Generalists and Specialists



Conduct of Training (30 people)



V. Assessment of Networking
Facilities
Quality-Based evaluation
20% 20%


100% 100%



Cost Passing Score (CSP) = 75 Technical Passing Score (TSP) = 75 lowest passing technical score
RCS1 * 0.4 (TS1 / TSP) * 0.6
Where RCS1 is Financial Score Bidder1
and computed as shown in III.2 above
Where TS1 is TechScore - Bidder1
and computed as shown in II.6 above



Information and Communications Technology Office Page 39
Manual of Procedures for Procurement of ICT
Computation of TCO (in the planning phase)
The hurdle TCO must be specified in the technical specifications.

B. Computation of Consumable items using the Maximum Reference Useful Life as validated.
Ref.
No.
List of Consumable Items QTY
TENDERING
OFFICES/FIRM
Computation of Consumable Items
using Maximum Reference Life
R
A
N
K
Remarks
OTUS COPY SYSTEMS, INC.
Unit Price Copy Life Cost/page Copy Life Total Cost
Copylife was
based on the
actual price
offered.
1 Toner 1.0 3,754.00 25,000.00 0.15 25,000.00 3,754.00
2 Drum 1.0 7,908.00 55,000.00 0.14 150,000.00 21,567.27
3 Developer 1.0 N/A - 100,000.00 0
Total Cost of Consumable Items (Pesos)
25,321.27 2

Ref.
No.
List of Consumable Items QTY
TENDERING
OFFICES/FIRM
Computation of Consumable Items
using Maximum Reference Life
R
A
N
K
Remarks
ECOPY CORPORATION
Unit Price Copy Life Cost/page Copy Life Total Cost
Copy life was
based on the
validated
price and its
estimated
useful life.
1 Toner 1.0 8,278.00 25,000.00 0.33 25,000.00 8,278.00
2 Drum 1.0 2,219.00 75,000.00 0.03 150,000.00 4,438.00
3 Developer 1.0 1,684.00 75,000.00 0.02 150,000.00 3,368.00
Total Cost of Consumable Items (Pesos)
16,084.00
1

Ref.
No.
List of Consumable Items QTY
TENDERING
OFFICES/FIRM
Computation of Consumable Items
using Maximum Reference Life
R
A
N
K
Remarks
PHILCOPY CORPORATION
Unit Price Copy Life Cost/page Copy Life Total Cost
Copy life was
based on the
actual price
offered.
1 Toner 1.0 6,944.00 15,000.00 0.46 25,000.00 11,573.33
2 Drum 1.0 16,800.00 150,000.00 0.11 150,000.00 16,800.00
3 Developer 1.0 - 100,000.00 - 100,000.00 -
Total Cost of Consumable Items (Pesos)
28,373.33
3


Information and Communications Technology Office Page 40
Manual of Procedures for Procurement of ICT

COMPUTATION OF TOTAL COST OF OWNERSHIP (TCO)


A. Suppliers Offered for Consumable Items

Ref.
No.
List of Consumable Items QTY
TENDERING OFFICES/FIRM
REMARKS
OTUS COPY SYSTEMS, INC. ECOPY CORPORATION
PHILCOPY
CORPORATION
Unit Price Copy Life Unit Price Copy Life Unit Price Copy Life ICT GOODS GOODS
1 Total Cost of the Unit 10.0 120,000.00 1,200,000.00 120,900.00 1,209,000.00 119,000.00 1,190,000.00 PhilCopy
2
Total Cost of Consumable
Item 1.0 25,321.27 25,321.27 16,084.00 16,084.00 28,373.33 150,000.00
ECOPY
(LERB)
Total Cost of Ownership 1,225,321.27 1,225,084.00 1,340,000.00

Information and Communications Technology Office Page 41
Manual of Procedures for Procurement of ICT
ANNEX 3 - LIST OF ICT EQUIPMENT, GOODS AND SERVICES


1. Computer Systems

1.1. Central Processing Unit

The Central Processing Unit (CPU), also known as CPU, is the main processing chip
of a computer. This chip processes the information that the various components in the
computer pass to it. In current times the speed of the CPU is rated in Mhz or Ghz.
(Source: bleepingcomputer.com)
http://www.bleepingcomputer.com/glossary/definition79.html

1.2. Desktop PCs

A desktop computer is a type of personal computer used in a stationary location.
Desktop computers come in a variety of sizes, colors and styles and have widely
shaped the technology world and the way people communicate, document and
create. (Source:eHowTech)
http://www.ehow.com/about_5070744_definition-desktop-pcs.html

1.3. Portable/Laptop Computer

Portable/Laptop computer is a portable personal computer light and small enough to
sit on a person's lap. A laptop computer can be powered by battery or plugged into the
wall. (Source: About.com Operations/Technolgy)
http://operationstech.about.com/od/glossary/g/Definition-Of-Laptop- Computer.htm

1.4. Tablet/Pocket PC/Personal Digital Assistant/Smart Phone

Tablet computers, commonly referred to as tablet PCs, are wireless portable
personal computers that utilize a touchscreen or a stylus pen to access or process
information. (Source: eHowTech)
http://www.ehow.com/facts_6898001_definition-tablet-computer.html

A Pocket PC (P/PC, PPC) an operating environment for handheld computers from
Microsoft, based on the Windows CE operating system. In 2000, Microsoft
introduced the Pocket PC, which included Pocket Office applications (Internet
Explorer, Word and Excel), handwriting recognition, an e-book reader and
wireless Internet. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=Pocket+PC&i=49428,00.asp

PDA (personal digital assistant) is a term for any small mobile hand-held device
that provides computing and information storage and retrieval capabilities for
personal or business use, often for keeping schedule calendars and address book

Information and Communications Technology Office Page 42
Manual of Procedures for Procurement of ICT
information handy. These include Hewlett-Packard's Palmtop and 3Com's Palm
Pilot. (Source: SearchMobileComputing)
http://searchmobilecomputing.techtarget.com/definition/personal-digital-assistant

Smart Phone - A cellular telephone with built-in applications and Internet access.
In addition to digital voice service, modern smartphones provide text messaging,
e-mail, Web browsing, still and video cameras, MP3 player and video playback
and calling. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,2542,t=Smartphone&i=51537,00.asp

1.5. Server

Server is a software program, or the computer on which that program runs, that
provides a specific kind of service to client software running on the same computer or
other computers on a network. (Source: The Linux Information Project)
http://www.linfo.org/server.html

1.6. Workstation

A workstation is a computer dedicated to a user or group of users engaged in business
or professional work. It includes one or more high resolution displays and a faster
processor than a personal computer (PC). (Source: Technopedia)
http://www.techopedia.com/definition/5140/workstation-ws

1.7. Minicomputer

A minicomputer is a type of computer that possesses most of the features and
capabilities of a large computer but is smaller in physical size. A minicomputer may
also be called a mid-range computer. (Source: Technopedia)
http://www.techopedia.com/definition/4615/minicomputer

1.8. Mainframe

A mainframe (also known as "big iron") is a high-performance computer used for
large-scale computing purposes that require greater availability and security than a
smaller-scale machine can offer. (Source: SearchDataCenter)
http://searchdatacenter.techtarget.com/definition/mainframe


2. Input/Output Device

2.1. Barcode Reader

Electronic device that scans a barcode by shining a laser beam on it. Barcode readers
(unlike magnetic-stripe readers) are 'non-contact' automatic data capture devices,
operate only at short distances (a few inches), and (unlike in radio frequency

Information and Communications Technology Office Page 43
Manual of Procedures for Procurement of ICT
identification) do not provide 'out of line of sight' reading. (Source:
BusinessDictionary.com)
http://www.businessdictionary.com/definition/barcode-reader.html

2.2. CCTV/Video Camera

(Closed Circuit TV) A surveillance system comprised of cameras, recorders and
displays that is used to monitor activities in a store or company.

A private television system involving one or more cameras connected to one or more
monitors for security, surveillance, law enforcement, and general purpose monitoring
applications. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=CCTV&i=59748,00.asp

2.3. Digital Camera

Digital camera records and stores photographic images in digital form. Many current
models are also able to capture sound or video, in addition to still images. (Source:
SearchMobileComputing)
http://searchmobilecomputing.techtarget.com/definition/digital-camera

2.4. Digital Copier

Copying system that converts reflected light off an original into an electronic digital
pattern (pixels) via a CCD and system controller for storage in memory or for
imaging the photoconductor with a laser beam, LED array, or ink jet. (Source:
Precision Roller)
http://www.precisionroller.com/definition/digital-copier/

2.5. Digitizer

Digitizers convert analog or physical input into digital images. This makes them
related to both scanners and mice, although current digitizers serve completely
different roles. (Source: eHowTech)
http://www.ehow.com/facts_5070215_digitizer.html

2.6. Facial Scanner

Facial recognition software is an application that can be used to automatically identify
or verify individuals from video frame or digital images. (Source: Technopedia)
http://www.techopedia.com/definition/26948/facial-recognition-software

2.7. Fingerprint Scanner

A scanner used to identify a person's fingerprint for security purposes. After a sample
is taken, access to a computer or other system is granted if the fingerprint matches the
stored sample. (Source: PCMAG.COM)

Information and Communications Technology Office Page 44
Manual of Procedures for Procurement of ICT
http://www.pcmag.com/encyclopedia_term/0,1237,t=fingerprint+reader&i=43211,00.
asp

2.8. Image Scanner

An image scanner is a digital device used to scan images, pictures, printed text and
objects and then convert them to digital images. Image scanners are used in a variety
of domestic and industrial applications like design, reverse engineering, orthotics,
gaming and testing. (Source: Technopedia)
http://www.techopedia.com/definition/25331/image-scanner

2.9. Iris Scanner

Iris cameras perform recognition detection of a persons identity by mathematical
analysis of the random patterns that are visible within the iris of an eye from some
distance. It combines computer vision, pattern recognition, statistical inference and
optics. (Source: findbiometrics)
http://www.findbiometrics.com/iris-recognition/

2.10. RFID Reader

A transmitter/receiver that reads the contents of RFID tags in the vicinity. Also called
a "Radio Frequency Identification interrogator." (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=RFID+reader&i=56953,00.asp

2.11. Keyboard

External input device used to type data into some sort of computer system whether it
be a mobile device, a personal computer, or another electronic machine. Source:
BusinessDictionary.com)
http://www.businessdictionary.com/definition/keyboard.html

2.12. Light Pen

A light-sensitive stylus wired to a video terminal used to draw pictures or select menu
options. The user brings the pen to the desired point on screen and presses the pen
button to make contact. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=light+pen&i=46079,00.asp

2.13. Microphone

An instrument that converts sound waves into an electric current, usually fed into an
amplifier, a recorder, or a broadcast transmitter. (Source: Answers)
http://www.answers.com/topic/microphone




Information and Communications Technology Office Page 45
Manual of Procedures for Procurement of ICT
2.14. MIDI Keyboard/Other Digital Musical Instruments

MIDI (Musical Instrument Digital Interface) is a protocol designed for recording and
playing back music on digital synthesizers that is supported by many makes of
personal computer sound cards. (Source: SocioCIO-Midmarket
http://searchcio-midmarket.techtarget.com/definition/MIDI

2.15. Motion Sensor

A device used to detect motion by receiving infrared radiation. (Source:
PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=PIR+sensor&i=60092,00.asp

2.16. Mouse

A mouse is a small device a computer user pushes across a desk surface in order to
point to a place on a display screen and to select one or more actions to take from that
position. (Source: SearchExchage)
http://searchexchange.techtarget.com/definition/mouse

2.17. Palm Scanner

A scanner that is moved across the image to be scanned by hand. (Source: Your
Dictionary)
http://computer.yourdictionary.com/handheld-scanner

2.18. Touch Screen

A touch screen is a computer display screen that is also an input device. The screens
are sensitive to pressure; a user interacts with the computer by touching pictures or
words on the screen. (Source: SocioCIO-Midmarket)
http://searchcio-midmarket.techtarget.com/definition/touch-screen

2.19. Web Camera

A video camera that attaches to a computer typically via USB or that is built into a
laptop or desktop screen. (Source: Your Dictionary)
http://computer.yourdictionary.com/webcam

2.20. 3D Scanner

3D scanning is the process of capturing digital information about the shape of an
object with equipment that uses a laser or light to measure the distance between the
scanner and the object. (Source: Absolute Geometrics)
http://www.absolutegeometries.com/3D-Scanning.html



Information and Communications Technology Office Page 46
Manual of Procedures for Procurement of ICT
2.21. Software

Software is a set of instructions that cause a computer to perform one or more tasks.
The set of instructions is often called a program or, if the set is particularly large and
complex, a system. Computers cannot do any useful work without instructions from
software; thus, a combination of software and hardware (the computer) is necessary
to do any computerized work. (Source: European Information Technology
Observatory)
http://www.eito.eu/WebRoot/Store15/Shops/63182014/MediaGallery/Categories/Rep
orts/EITO2012_Definitions_and_Methodology.pdf

2.22. Other IT equipment

IT equipment is defined as technological hardware used in the processing of
information in the form of data (input, process, output, communication, and storage).
It includes computer systems (client and server devices), system peripherals (printers
and MFPs), media tablets, storage hardware and other hardware. (Source: European
Information Technology Observatory)
http://www.eito.eu/WebRoot/Store15/Shops/63182014/MediaGallery/Categories/Rep
orts/EITO2012_Definitions_and_Methodology.pdf

2.23. ICT equipment

ICT equipment means desktop computers, laptops, servers, monitors, printers, audio-
visual (AV) equipment, software and network equipment, but excludes IT
consumables such as printer cartridges.
(Source: Organisation for Economic Co-operation and Development 10-Jun-2009)

2.24. ICT goods must either be intended to fulfill the function of information processing
and communication by electronic means, including transmission and display, use
electronic processing to detect, measure and/or record physical phenomena, or to
control a physical process. (Source: Organisation for Economic Co-operation and
Development 10-Jun-2009,
www.oecd.org/dataoecd/16/46/42978297.pdf)

3. Storage Devices

3.1. CD-ROM/RW

(Compact Disc Read Only Memory) A compact disc format used to store programs
and data files. (Source: Your Dictionary)
http://computer.yourdictionary.com/cd-rom





Information and Communications Technology Office Page 47
Manual of Procedures for Procurement of ICT
3.2. Compact Flash Card

CompactFlash (CF) is a removable storage device used for mass storage in portable
electronic machines, such as PCs. (Source: Technopedia)
http://www.techopedia.com/definition/25275/compactflash-cf

3.3. Computer Tape/Cartridge

A cartridge containing an endless loop of magnetic tape and designed for automatic
use on insertion into a compatible sound or video recorder or computer system.
(Source: Your Dictionary)
http://www.yourdictionary.com/tape-cartridge

3.4. Floppy Disk

A floppy disk drive (FDD), or floppy drive, is a hardware device that reads data
storage information. It was invented in 1967 by a team at IBM and was one of the
first types of hardware storage that could read/write a portable device. (Source:
Technopedia)
http://www.techopedia.com/definition/24861/floppy-disk-drive-fdd

3.5. Hard Disk (Internal/External/Portable)

A hard disk is part of a unit, often called a "disk drive," "hard drive," or "hard disk
drive," that stores and provides relatively quick access to large amounts of data on an
electromagnetically charged surface or set of surfaces. (Source: SearchStorage
http://searchstorage.techtarget.com/definition/hard-disk

3.6. Memory Stick (Standard, PRO, Duo, PRO Duo, PRO-HG Duo, Micro (M2)

The Memory Stick is a digital data storage technology with up to 10 times the storage
capacity of a 3.5 diskette. (Source: SearchStorage)
http://searchstorage.techtarget.com/definition/Memory-Stick

3.7. Multimedia Card (MMC)

A MultiMediaCard (MMC) is a tiny memory card that uses flash memory to make
storage portable among various devices, such as car navigation systems, cellular
phones, eBooks, PDAs, smartphones, and digital cameras, music players, and video
camcorders, and personal computers. (Source: SearchCIO-MidMarket)
http://searchcio-midmarket.techtarget.com/definition/MultiMediaCard

3.8. Secure Digital Card (SD, miniSD, microSD, SDHC, miniSDHC, microSDHC SDXC,
microSDXC)

A Secure Digital (SD) card is a tiny memory card used to make storage portable
among various devices, such as car navigation systems, cellular phones, eBooks,

Information and Communications Technology Office Page 48
Manual of Procedures for Procurement of ICT
PDAs, smartphones, digital cameras, music players, camcorders, and personal
computers. (Source: SearchStorage)
http://searchstorage.techtarget.com/definition/Secure-Digital-card

3.9. SmartMedia Card

A smart card is a plastic card about the size of a credit card, with an embedded
microchip that can be loaded with data, used for telephone calling, electronic cash
payments, and other applications, and then periodically refreshed for additional
use. (Source: BitPipe.com)
http://www.bitpipe.com/tlist/Smart-Cards.html

3.10. Solid State Drive (SSD)

An SSD (solid-state drive or solid-state disk) is a storage device that stores
persistent data on solid-state flash memory. SSDs actually aren't hard drives at all, in
the traditional sense of the term, as there are no moving parts involved. (Source:
SearchStorage)
http://searchstorage.techtarget.com/definition/solid-state-drive

3.11. Storage Area Network (SAN)/Network Attached Storage (NAS)

A storage area network (SAN) is a type of local area network (LAN) designed to
handle large data transfers. A SAN typically supports data storage, retrieval and
replication on business networks using high-end servers, multiple disk arrays
and Fibre Channel interconnection technology. (Source: About.com)
http://compnetworking.about.com/od/networkstorage/g/storage_san.htm

3.12. USB Flash Drive

USB flash drives are compact file storage devices to save your information
externally. Flash drives are about the size of a disposable lighter and can be
conveniently worn around your neck or attached to your keychain. (Source:
About.com)
http://presentationsoft.about.com/od/uvw/g/usb_flash.htm


4. Printers

4.1. Barcode Printer

A barcode printer is a printer designed to produce barcode labels which can be
attached to other objects. (Source: BusinessDictionary.com)
http://www.businessdictionary.com/definition/bar-code-printer.html

4.2. Digital Copy Printer


Information and Communications Technology Office Page 49
Manual of Procedures for Procurement of ICT
A copy machine that duplicates the image to be copied by scanning the original into a
digital memory and printing from the memory. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=digital+copy+machine&i=4131
7,00.asp

4.3. Dot Matrix Printer

A printer that uses hammers and a ribbon to form images out of dots. It is widely used
to print multipart forms and address labels. Also known as a "serial dot matrix
printer," the tractor and sprocket mechanism in these devices handles thicker media
better than laser and inkjet printers. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=serial+matrix+printer&i=41904,
00.asp

4.4. Impact Printer

An impact printer uses a mechanism called a "head" to strike an ink ribbon that places
a character on a piece of paper. (Source: eHow Tech)
http://www.ehow.com/about_5125377_definition-impact-printers.html

4.5. Ink Jet/Bubble Jet Printer

A type of ink-jet printer developed by Canon. The principal difference between
bubble-jet printers and other ink-jet printers is that bubble-jet printers use special
heating elements to prepare the ink whereas ink-jet printers use piezoelectric crystals.
(Source: Webopedia)
http://www.webopedia.com/TERM/B/bubble_jet_printer.html

4.6. Large Format Printer

A printer that prints on large paper, which can range from two to more than 15 feet in
width. Such printers typically use inkjet technology to print on a variety of output,
including premium glossy-coated paper for signs and posters. (Source:
PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=wide-
format+printer&i=54454,00.asp

4.7. Laser Printer

A laser printer is a popular type of personal computer printer that uses a non-impact
(keys don't strike the paper), photocopier technology. (Source: Whatls.com)
http://whatis.techtarget.com/definition/laser-printer


4.8. Line Printer


Information and Communications Technology Office Page 50
Manual of Procedures for Procurement of ICT
A high-speed printing device, primarily used in data processing, that prints an entire
line of type as a unit instead of printing each character individually. (Source:
Answer.com)
http://www.answers.com/topic/lineprinter

4.9. Passbook Printer

As the name says passbook printers are used to print passbooks, cheques, demand
drafts printing in banks. Nowadays all the banks use Passbook Printers. (Source:
IndiaStudyChannel.Com)
http://www.indiastudychannel.com/resources/144486-Introduction-Printers-An-
overview.aspx

4.10. Plotter

A graphics printer that draws images with ink pens. It actually draws point-to-point
lines directly from vector graphics files. The plotter was the first computer output
device that could print graphics as well as accommodate full-size engineering and
architectural drawings. Using different colored pens, it was also able to print in color
long before inkjet printers became an alternative. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=xy+plotter&i=49385,00.asp

4.11. POS Printer

A point of sale/service (POS) machine is used to conduct retail transactions. It can
provide many services, including credit card processing, check reading and cash
transactions, depending on the model. (Source:eHow.com)
http://www.ehow.com/about_5076476_definition-pos-machine.html

4.12. Serial Printer

A printer that uses a serial connection to the computer. A printer that prints a row of
characters, one character at a time. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=serial+printer&i=51138,00.asp

4.13. Sticker Maker Printer

Barcode Label Maker is known to be making of multiple labels by application in
different formats. Barcode Software can do several works to modify your generation
of bar code to make products identity also customizes in number of features. Barcode
tags is important for every products used in todays life in every sectors. As we know
it used to implement data or identification related that particular within simple code in
form of alpha numeric values within it. Each code define the certain identification for
bar codes. (Source: Barcode Level Surface)
http://www.barcodelabelsoftware.biz/barcodelabels/barcode-label-maker.html
4.14. Thermal Printer


Information and Communications Technology Office Page 51
Manual of Procedures for Procurement of ICT
A thermal transfer printer is a non-impact printer that uses heat to register an
impression on paper. (Source: Whatls.com)
http://whatis.techtarget.com/definition/thermal-transfer-printer

5. Cards

5.1. Controller Card

A controller card is a hardware component that works as an interface between the
motherboard and other computer components. (Source: Technopedia)
http://www.techopedia.com/definition/5275/controller-card

5.2. Expansion Card

An expansion card is an electronic card/board that is used to add extra functionality to
a computer. It is inserted into an expansion slot on the motherboard of a computer.
(Source: Technopedia)
http://www.techopedia.com/definition/5281/expansion-card

5.3. Video/Graphics Card

A graphics card is a mechanical device built into a computer that enables the user to
see graphics and video faster and clearer. (Source: eHowTech)
http://www.ehow.com/video_4973940_definition-graphics-card_.html


6. Multimedia

6.1. Headphone/Earphone

Headphones combined with a microphone. Used in call centers and by people in
telephone-intensive jobs, headsets provide the equivalent functionality of a telephone
handset with hands-free operation. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=headset&i=44185,00.asp

6.2. Multimedia Kit

A package of hardware and software that adds multimedia capabilities to acomputer.
Typically a multimedia kit includes a CD-ROM or DVD player, a sound card,
speakers, and a bundle of CD-ROMs. (Source:Webopedia)
http://www.webopedia.com/TERM/M/multimedia_kit.html

6.3. Multimedia Projector System

A multimedia projector is a compact, high resolution, full-color projector capable of
projecting text, images, video and audio content. (Source: eHowTech
http://www.ehow.com/facts_6858260_definition-multimedia-projector.html

Information and Communications Technology Office Page 52
Manual of Procedures for Procurement of ICT

6.4. Multimedia Speaker System

A multimedia speaker system delivers multi-channel sound that seems to surround
you. It has been specifically designed for computer listening - just right for music,
games and movies. (Source: Bose)
http://www.boseindia.com/retail/bose-product-detail.aspx?Prd_Id=68


7. Power Protection System

7.1. Automatic Voltage Regulator

A voltage regulator is an electrical regulator designed to automatically maintain a
constant voltage level. (Source: Wikipedia Dictionaries)
http://test-dictionary.babylon.com/automatic_voltage_regulator/

7.2. Battery Charger

A rectifier unit used to change alternating to direct power for charging a storage
battery. (Source: Answer.com)
http://www.answers.com/topic/battery-charger-1

7.3. Emergency Power unit

Any source of hydraulic or electric power that permits controlled flight in glide
subsequent to engine failure. (Source: Answer.com)
http://www.answers.com/topic/emergency-power-unit

7.4. Surge Protector/Suppressor

A surge protector (or surge suppressor) is an appliance designed to protect electrical
devices. (Source: Answer.com)
http://www.answers.com/search?q=Surge+Protector%2FSuppressor

7.5. Uninterruptible Power Supply

A device that provides battery backup when the electrical power fails or drops to an
unacceptable voltage level. Small UPS systems provide power for a few minutes;
enough to power down the computer in an orderly manner, while larger systems have
enough battery for several hours. (Source: Answer.com)
http://www.answers.com/topic/uninterruptible-power-supply


8. System Memory Boards

8.1. Math co-processor

Information and Communications Technology Office Page 53
Manual of Procedures for Procurement of ICT
A coprocessor is a computer processor used to supplement the functions of the
primary processor (the CPU). (Source: Answer.com)
http://www.answers.com/topic/memory-card

8.2. Memory Card

A small card, typically with dimensions of about 2 3 inches (5 8 centimeters),
that can store information, usually in integrated circuits or magnetic strips. (Source:
Answer.com)
http://www.answers.com/search?q=Memory+Upgrade

8.3. Memory Module

Memory module is a broad term used to refer to a series of dynamic random access
memory integrated circuits modules mounted on a printed circuit board and designed
for use in personal computers, workstations and servers. (Source: Answer.com)

8.4. Memory Upgrades

An upgrade (UPG) is an updated version of existing hardware, software or firmware
and is usually sold at a reduced price with a full version. (Source: Technopedia)
http://www.techopedia.com/definition/4380/upgrade-upg

8.5. SIMM/DIMM RAM

A dual inline memory module (DIMM) is a small-scale circuit board that holds
memory chips on the motherboard. DIMM incorporates a series of memory called
dynamic random access memory (DRAM), which provides primary storage, the main
memory that continually reads and executes stored instructions or data directly to the
CPU. (Source: Technopedia)
http://www.techopedia.com/definition/2768/dual-inline-memory-module-dimm

8.6. SDRAM/RDRAM/DDR3/DDR SDRAM stands for Double Data Rate Synchronous
Dynamic Random Access Memory. Random Access means that the data stored on
the chip does not need to be accessed sequentially, as opposed to data on a cassette
tape, for example. (Source: eHowTech)
http://www.ehow.com/about_6693094_difference-rdram-_amp_-ddr-sdram_.html


9. Data Communications and Networking Equipment

9.1. Adapters

A device that allows one system to connect to and work with another. An adapter is
often a simple circuit that converts one set of signals to another; however, the term
often refers to devices which are more accurately called "controllers. (Source:
PCMAG.COM)

Information and Communications Technology Office Page 54
Manual of Procedures for Procurement of ICT
http://www.pcmag.com/encyclopedia_term/0,1237,t=adapter&i=37499,00.asp

9.2. Bridges

A bridge device filters data traffic at a network boundary. Bridges reduce the amount
of traffic on a LAN by dividing it into two segments. (Source: About.com)
http://compnetworking.about.com/cs/internetworking/g/bldef_bridge.htm

9.3. Echo Canceller

Transmission equipment designed to suppress echo in a two-way circuit by
attenuating the signals propagating in one direction caused by reflected (i.e., echoed)
signal currents in the other direction. (Source:Your Dictionary)
http://computer.yourdictionary.com/echo-canceller

9.4. Fax Machines

A facsimile (fax) machine uses public switched telephone networks (PSTN) and the
Internet for the electronic fax transmission of text and images. (Source: Technopedia)
http://www.techopedia.com/definition/3590/facsimile-machine-fax-machine

9.5. Fax Modem/Card

A fax modem is an electronic device that transmits documentation to a fax machine or
modem. Like data modems, fax modems are installed via motherboard, external
Universal Serial Bus (USB) or parallel port. (Source: Technopedia)
http://www.techopedia.com/definition/3003/fax-modem

9.6. Microwave Repeater System

A tower equipped with a receiver and transmitter for picking up, amplifying, and
passing on in either direction the signals sent over a microwave network by highly
directional microwave beams. Also known as microwave link; microwave relay.
(Source: Answer.com)
http://www.answers.com/topic/integrated-services-digital-network

9.7. Modem

A modem is a network device that both modulates and demodulates analog carrier
signals (called sine waves) for encoding and decoding digital information for
processing. Modems accomplish both of these tasks simultaneously and, for this
reason, the term modem is a combination of "modulate" and "demodulate." (Source:
Technopedia)
http://www.techopedia.com/definition/24118/modem

9.8. Multimedia Messaging System


Information and Communications Technology Office Page 55
Manual of Procedures for Procurement of ICT
Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging
System - is a communications technology developed by 3GPP (Third Generation
Partnership Project) that allows users to exchange multimedia communications
between capable mobile phones and other devices. (Source:
SearchMobileComputing)
http://searchmobilecomputing.techtarget.com/definition/Multimedia-Messaging-
Service

9.9. Multiplexers

A multiplexer (MUX) is a device allowing one or more low-speed analog or digital
input signals to be selected, combined and transmitted at a higher speed on a single
shared medium or within a single shared device. (Source: Technopedia)
http://www.techopedia.com/definition/24124/multiplexer-mux

9.10. Network Desktop

A remote desktop is a separate program or feature found on most operating systems
that allows a user to access an operating computer system's desktop. (Source:
Technopedia)
http://www.techopedia.com/definition/3421/remote-desktop

9.11. Network Interface Cards

A network interface card (NIC) is a computer circuit board or card that is installed in
a computer so that it can be connected to a network. (Source: SearchNetworking)
http://searchnetworking.techtarget.com/definition/network-interface-card

9.12. Network PC Cards

An expansion interface developed by the Personal Computer Memory Card
International Association (PCMCIA) that was popular on laptops in the 1990s and
early 2000s. Also known as "PCMCIA cards," PC Cards are plug-in modules that
contain devices such as a modem, network adapter, sound card, solid state drive or
hard disk. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=PC+Card&i=48924,00.asp

9.13. Network Server

A network server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet. (Source: Answer.com)
http://compnetworking.about.com/od/basicnetworkingconcepts/g/network_servers.ht
m

9.14. Network Tools


Information and Communications Technology Office Page 56
Manual of Procedures for Procurement of ICT
A network tracking tool, also called a network device management program, is a
program that helps a network administrator keep track of moves, additions, and
changes (known as MACs) to the hardware infrastructure of a network. (Source:
SearchNetworking)
http://searchnetworking.techtarget.com/definition/network-tracking-tool

9.15. PABX/Telephone System/Cellular Phones

A PBX (private branch exchange) is a telephone system within an enterprise that
switches calls between enterprise users on local lines while allowing all users to share
a certain number of external phone lines. The main purpose of a PBX is to save the
cost of requiring a line for each user to the telephone company's central office. While
Cellular telephone, sometimes called mobile telephone, is a type of short-wave analog
or digital telecommunication. (Source: Whatls.com)
http://whatis.techtarget.com/search/query?q=Cellular+phone&techTermButton=Look
+It+Up

9.16. Paging Systems

A pager is a small telecommunications device that receives (and, in some cases,
transmits) alert signals and/or short messages. (Source: SearchMobileComputing)
http://searchmobilecomputing.techtarget.com/definition/pager

9.17. PC Telex Interface Cards

PC telex adapter is PC telegraphic interface that provides communication between PC
and public telex networks. In that manner, PC substitutes a stand-alone telex machine
and provides a variety of possibilities, such as: text processing transfer, automatic
dialing, message timing transmission, telegraph processing control etc. (Source:
Decode)
http://www.decode.rs/index.php/en/pc-telex/76-pc-telex-adapter

9.18. Remote Access Server

Remote access is the ability to get access to a computer or a network from a remote
distance. In corporations, people at branch offices, telecommuters, and people who
are travelling may need access to the corporation's network. (Source:
SearchMidMarketSecurity)
http://searchmidmarketsecurity.techtarget.com/definition/remote-access

9.19. Routers

Routers are small physical devices that join multiple networks together. Technically,
a router is a Layer 3 gateway device, meaning that it connects two or more networks
and that the router operates at the network layer of the OSI model. (Source:
About.com)
http://compnetworking.about.com/cs/routers/g/bldef_router.htm

Information and Communications Technology Office Page 57
Manual of Procedures for Procurement of ICT

9.20. Repeater

Network repeaters regenerate incoming electrical, wireless or optical signals. With
physical media like Ethernet or Wi-Fi, data transmissions can only span a limited
distance before the quality of the signal degrades. (Source: About.com)
http://compnetworking.about.com/cs/internetworking/g/bldef_repeater.htm

9.21. Signaling Converter

A device that changes the electrical or light characteristics of a signal. (Source:
YourDictinary)
http://computer.yourdictionary.com/signal-converter

9.22. Switches and Hubs

A network switch is a small hardware device that joins multiple computers together
within one local area network (LAN). Technically, network switches operate at layer
two (Data Link Layer) of the OSI model. (Source: About.com)
http://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htm

9.23. Switching System

An assembly of switching and control devices provided so that any station in a
communications system may be connected as desired with any other station. (Source:
About.com)
http://www.answers.com/topic/switching-system

9.24. Telephone Adaptor

A device that connects regular telephones to a broadband cable or DSL network for
voice over IP (VoIP) service. The analog telephone adapter (ATA) provides the
conversion between analog voice signals and IP packets, delivers dial tone and
manages the call setup. (Source: From Free Dictionary)
http://encyclopedia2.thefreedictionary.com/phone+adapter

9.25. Telephone Remote Control Power Controller

A computer system is configured to be powered up by a hand-held controller. The
hand-held controller is in wireless communication with a computer. One or more
buttons on the hand-held controller may be used to automatically launch a particular
application program which has been pre-selected by a computer user after completing
the power up process. (Source: Patent number: 7005966)
http://www.google.com/patents/US7005966

9.26. Test and Measurement System


Information and Communications Technology Office Page 58
Manual of Procedures for Procurement of ICT
These are tools used to analyze, validate, and verify measurements of electronic and mechanical
systems. Due to the increasing need for greater accuracy and higher definition measurement, the
tools involved in this industry are constantly developing to accommodate technological
advancements in the industries they cater to. The test and measurement industry creates both general
use and highly specialized tools and caters primarily to high-tech industrial, automotive,
communications, and medical electronics industries.

http://www.wisegeek.com/what-is-test-and-measurement.htm

9.27. Transceiver

An electronic device or circuit that transmits and receives analog or digital signals. It
comes in many forms; for example, a transponder on a satellite, a network adapter in
the computer or the voice circuits in a cellphone. (Source: PCMAG.COM)
http://www.pcmag.com/encyclopedia_term/0,1237,t=transceiver&i=53081,00.asp

9.28. Trunked Mobile Radio

Trunking refers to the automatic and dynamic sharing of a small number of radio
channels among a large number of radio users. Trunked Mobile Radio promises
greater airtime efficiency, ease of use and higher availability, compared to other
technologies. (Source: IntelliGrid)
http://xanthus-
consulting.com/IntelliGrid_Architecture/New_Technologies/Tech_Trunked_Mobile_
Radio_(TMR,_TETRA,_Project25).htm

9.29. Video Conferencing System/Kit

A videoconference is a live connection between people in separate locations for the
purpose of communication, usually involving audio and often text as well as video.
At its simplest, videoconferencing provides transmission of static images and text
between two locations. At its most sophisticated, it provides transmission of full-
motion video images and high-quality audio between multiple locations. (Source:
SearchMobileComputing)
http://searchmobilecomputing.techtarget.com/definition/videoconference

9.30. Voice Mail/Voice Messaging System

An electronic system that uses telephones and a computer to store and then deliver
recorded voice messages or message or messages sent or stored in such a system.
(Source: Your Dictionary)
http://www.yourdictionary.com/voice-mail

9.31. Structured cabling

Structured cabling refers to a standardized way of connecting the wires that allow
computers and other electronics to communicate and network. Structured cabling is

Information and Communications Technology Office Page 59
Manual of Procedures for Procurement of ICT
widely used in data centers, campuses, offices, apartment buildings, hospitals,
warehouses, manufacturing facilities, etc. and is based on two types of cables: copper
and fiber optics. (Source: NU TEK Assemblies)
http://www.cfsalesinc.com/what_is_structured_cabling.html


10. Other Data Communications Equipment

Data communications equipment (DCE) refers to computer hardware devices used to
establish, maintain and terminate communication network sessions between a data source and
its destination. DCE is connected to the data terminal equipment (DTE) and data
transmission circuit (DTC) to convert transmission signals. (Source: Technopedia)
http://www.techopedia.com/definition/1296/data-communications-equipment-dce

10.1. Portable/Laptop Computer

Portable/Laptop computer is a portable personal computer light and small enough to
sit on a person's lap. A laptop computer can be powered by battery or plugged into the
wall. (Source: About.com Operations/Technolgy)

10.2. Tablet/Pocket PC/Personal Digital Assistant/Smart Phone

Tablet computers, commonly referred to as tablet PCs, are wireless portable
personal computers that utilize a touchscreen or a stylus pen to access or process
information. (Source: eHowTech)

A Pocket PC (P/PC, PPC) an operating environment for handheld computers from
Microsoft, based on the Windows CE operating system. In 2000, Microsoft
introduced the Pocket PC, which included Pocket Office applications (Internet
Explorer, Word and Excel), handwriting recognition, an e-book reader and
wireless Internet. (Source: PCMAG.COM)

PDA (personal digital assistant) is a term for any small mobile hand-held device
that provides computing and information storage and retrieval capabilities for
personal or business use, often for keeping schedule calendars and address book
information handy. These include Hewlett-Packard's Palmtop and 3Com's Palm
Pilot. (Source: SearchMobileComputing)

Smart Phone - A cellular telephone with built-in applications and Internet access.
In addition to digital voice service, modern smartphones provide text messaging,
e-mail, Web browsing, still and video cameras, MP3 player and video playback
and calling. (Source: PCMAG.COM)

10.3. Server


Information and Communications Technology Office Page 60
Manual of Procedures for Procurement of ICT
Server is a software program, or the computer on which that program runs, that
provides a specific kind of service to client software running on the same computer or
other computers on a network. (Source: The Linux Information Project)

10.4. Workstation
A workstation is a computer dedicated to a user or group of users engaged in business
or professional work. It includes one or more high resolution displays and a faster
processor than a personal computer (PC). (Source: Technopedia)

10.5. Minicomputer

A minicomputer is a type of computer that possesses most of the features and
capabilities of a large computer but is smaller in physical size. A minicomputer may
also be called a mid-range computer. (Source: Technopedia)

10.6. Mainframe

A mainframe (also known as "big iron") is a high-performance computer used for
large-scale computing purposes that require greater availability and security than a
smaller-scale machine can offer. (Source: SearchDataCenter)


11. ICT Consulting Services

11.1. ICT Project Management

This service consists of the discipline of planning, organizing, securing, managing,
leading, and controlling resources to achieve specific goals of an ICT project.
A project is a temporary endeavor with a defined beginning and end (usually time-
constrained, and often constrained by funding or deliverables), undertaken to meet
unique goals and objectives, typically to bring about beneficial change or added
value.
http://en.wikipedia.org/wiki/Project_management

The art and discipline of completing and delivering project requirements on time and
on budget. It includes project initiation, implementation planning, execution,
monitoring and control, and closure. A project is a temporary endeavor undertaken
to create a unique product, service or result for which costs and related information
must be segregated and monitored.
http://www.pmi.org

11.2. Information System Auditing

This service consists of an examination of the system controls within an IT
architecture - which means the process of evaluating the suitability and validity of an
organization's IT configurations, practices and operations. The evaluation of obtained

Information and Communications Technology Office Page 61
Manual of Procedures for Procurement of ICT
evidence determines if the information systems are safeguarding assets,
maintaining data integrity, and operating effectively to achieve the organization's
goals or objectives.
http://www.webpix.in/services/consultancy/information-system-auditing.html

11.3. ICT Management Auditing

This service consists of a systematic assessment of methods and policies of an
organization's management in the administration and the use of resources, tactical and
strategic planning, and employee and organizational improvement. The objectives of
a management audit are to (1) establish the current level of effectiveness, (2) suggest
improvements, and (3) lay down standards for future performance. Management
auditors (employees of the company or independent consultants) do not appraise
individual performance, but may critically evaluate the senior executives as a
management team. See also performance audit.
http://www.businessdictionary.com/definition/management-audit.html

It also covers an analysis and assessment of competencies and capabilities of a
company's management in order to evaluate their effectiveness, especially with regard
to the strategic objectives and policies of the business. The objective of a
management audit is not to appraise individual executive performance, but to evaluate
the management team in relation to their competition.
http://www.investopedia.com/terms/m/management-audit.asp#axzz26Oqf9t4L

11.4. Risk Assessment and Evaluation

The service consists mainly of a scientific and quantitative exercise out coming from
analysis of field and-or experimental data (e.g. modeled tsunami wave height) and
from an overall understanding of the nature of the hazard and of vulnerable
parameters (UNDP, 1994). Risk evaluation joins perceived risk to a more enlarged
qualitative analysis including, for example, Cost benefits trade off and socio
economic impact.
http://www.un.org/Depts/oios/pages/risk_management.html

A step in a risk management procedure. Risk assessment is the determination of
quantitative or qualitative value of risk related to a concrete situation and a
recognized threat (also called hazard). Quantitative risk assessment requires
calculations of two components of risk (R):, the magnitude of the potential loss (L),
and the probability (p) that the loss will occur.
http://en.wikipedia.org/wiki/Risk_assessment

11.5. ICT Project Feasibility Study

This service aims to objectively and rationally uncover the strengths and weaknesses
of an existing business or proposed venture, opportunities and threats as presented by

Information and Communications Technology Office Page 62
Manual of Procedures for Procurement of ICT
the environment, the resources required to carry through, and ultimately the prospects
for success.
http://en.wikipedia.org/wiki/Feasibility_study

11.6. ICT Policy and Standards Design

This service covers the design of policy, procedures and standards as a process, the
goal of which is to implement a policy infrastructure that allows IT to manage risk
appropriately, yet meet business needs.
http://www.disaster-resource.com/articles/07p_106.shtml

11.7. ICT Capacity Planning

Capacity planning is the science and art of estimating the space, computer hardware,
software and connection infrastructure resources that will be needed over some future
period of time. A typical capacity concern of many enterprises is whether resources
will be in place to handle an increasing number of requests as the number of users or
interactions increase. The aim of the capacity planner is to plan so well that new
capacity is added just in time to meet the anticipated need but not so early that
resources go unused for a long period. The successful capacity planner is one that
makes the trade-offs between the present and the future that overall prove to be the
most cost-efficient.
http://searchenterprisewan.techtarget.com/definition/capacity-planning

11.8. Business Process Reengineering (BPR)

A business management strategy originally pioneered in the early 1990s, focusing on
the analysis and design of workflows and processes within an organization. BPR
aimed to help organizations fundamentally rethink how they do their work in order to
dramatically improve customer service, cut operational, and become world-
class competitors.
http://en.wikipedia.org/wiki/Business_process_reengineering

11.9. Enterprise Architecture Formulation

The process of translating business vision and strategy into effective enterprise
change by creating, communicating and improving the key requirements, principles
and models that describe the enterprise's future state and enable its evolution.
http://en.wikipedia.org/wiki/Enterprise_architecture

11.10. Information Systems Strategic Plan Formulation

The continuous review of computer technology, applications and management
structure to ensure that the current and anticipated information and process needs of
the organization are met in a way that provides an acceptable return on investment, is

Information and Communications Technology Office Page 63
Manual of Procedures for Procurement of ICT
sensitive to the dynamic politics and culture of the organization and is aware of the
sociological environment within which the organization exists.
http://www.cse.dmu.ac.uk/~nkm/sisp/WHATIS.html

11.11. Information Systems Strategic Plan Evaluation

Executive Order No. 265 mandates all government agencies and instrumentalities,
including local government units, to align their respective computerization projects
with the priorities identified in the GISP. The National Computer Center, being the
technical arm of the ITECC (now ICTO) is tasked to review and evaluate the agency
Information Systems Strategic Plan (ISSP) to ensure that computerization projects in
government are consistent with the priorities identified in the GISP. The ISSP serves
as the building blocks for the GISP.
http://www.ncc.gov.ph/default.php?a1=2&a2=4&a3=1

11.12. Formulation of Terms of Reference

The Terms of Reference (ToR) is the document that serves as the basis of a
contractual relationship between the commissioner of an evaluation and the team
responsible for carrying out the work. Devising the Terms of Reference is a vital step
when an evaluation has to be performed by outside consultants. This work is equally
important when part of the evaluation is performed in-house. The ToR may concern
either the evaluation operation as a whole (when it is entrusted to a single team) or a
part of the research work programmed in the evaluation project (in-depth analysis of
an evaluative question).
http://ec.europa.eu/regional_policy/sources/docgener/evaluation/evalsed/guide/design
ing implementing/designing_planning/terms_ref_en.htm

11.13. Request for Proposal Formulation (RFP)

The service covers the formulation of a document utilized by many organizations to
receive offers of services or goods from potential vendors. The exact structure for an
RFP will vary from one situation to another. This means that the formula for how to
write a request for proposal will depend a great deal on the culture of the entity that is
issuing the request and what they hope to learn from the responses. Here are some
examples of elements that are found in many requests for proposal regardless of the
industry or organization involved.
http://www.wisegeek.com/what-is-a-request-for-proposal-rfp.htm

11.14. ICT Procurement Management

Procurement Management includes the processes necessary to purchase or acquire
products and services, or results needed from outside the project team. The
organization can be either the buyer or seller of the products, services, or results.
Project procurement management includes the contract management and change

Information and Communications Technology Office Page 64
Manual of Procedures for Procurement of ICT
control processes required to develop and administer contracts or purchase orders
issued by authorized project team members
http://www.pmi.org

Procurement refers to the acquisition of Goods, Consulting Services, and the
contracting for Infrastructure Projects by the Procuring Entity. Procurement shall also
include the lease of goods and real estate. With respect to real property, its
procurement shall be governed by the provisions of Republic Act No.8974, entitled
"An Act to Facilitate the Acquisition of Right-of -Way Site or Location of National
Government Infrastructure Projects and for Other Purposes" and other applicable
laws, rules and regulations.
http://www.coa.gov.ph/Bid/RA9184.asp

The process companies use to purchase economic resources and business input
from suppliers or vendors. This process helps companies negotiate prices and get the
best quality resources for production processes. Smaller businesses do not usually
have a department dedicated to procurement since they have much smaller business
operations. Usually, small business owners or entrepreneurs are responsible for
working with vendors and suppliers to obtain the necessary goods for business
operations. Larger companies are able to purchase resources and inputs in large
volume quantities; high volume purchases usually require a procurement management
process.
http://www.wisegeek.com/what-is-procurement-management.htm

11.14.1. Bid Administration

Bid administration and tender administration are particular skills which
are designed to create expert documentation and procedure, with a see to
specifying a companys buying requirement precisely making certain that
quality, appropriate suppliers are engaged, and on the other aspect of the
fence, assisting these possible suppliers to construct a successful bid.
http://inthreeeasysteps.com/78/bid-administration-and-tender-
administration-are-particular-skills-which-are-designed-to-create-expert-
documentation-and-procedure-with-a-see-to-specifying-a-companys-
buying-requirement-precisely-m

11.14.2. Bid Engineering Services

"Engineering services" means any service or creative work, the adequate
performance of which requires engineering education, training and
experience in the application of special knowledge of the mathematical,
physical and engineering sciences to such services or creative work as
consultation, investigation, evaluation, planning and design of engineering
works and systems, engineering studies and the review of construction for
the purpose of assuring substantial compliance with drawings and
specifications; any of which embrace such services or work, either public

Information and Communications Technology Office Page 65
Manual of Procedures for Procurement of ICT
or private, in connection with any utilities, structures, buildings, machines,
equipment, processes, work systems, projects and industrial or consumer
products or equipment of a mechanical, electrical, hydraulic, chemical,
pneumatic or thermal nature, insofar as they involve safeguarding life,
health or property, and including such other professional services as may
be necessary to the planning, progress and completion of any engineering
services. Such practice includes the performance of architectural work
incidental to the practice of engineering. "Engineering services" does not
include responsibility for the superintendence of construction, site
conditions, operations, equipment, personnel or the maintenance of safety
in the work place.
http://law.justia.com/codes/new-
mexico/2011/chapter13/article1/section13-1-55/

11.14.3. Bid Evaluation Management

After the submission deadline, the process of opening, examining, and
evaluating bids to determine the bidders' responsibility, responsiveness,
and other factors associated with selection of a bid for contract award.
http://www.businessdictionary.com/definition/bid-
evaluation.html#ixzz294WnVNLJ

11.15. ICT Contract Management

This service consists of the management of contracts made with customers, vendors,
partners, or employees. Contract management includes negotiating the terms and
conditions in contracts and ensuring compliance with the terms and conditions, as
well as documenting and agreeing on any changes or amendments that may arise
during its implementation or execution. It can be summarized as the process of
systematically and efficiently managing contract creation, execution, and analysis for
the purpose of maximizing financial and operational performance and minimizing
risk.
http://en.wikipedia.org/wiki/Contract_management

11.16. ICT Security Audit

Systematic evaluation of the security of a company's information system by
measuring how well it conforms to a set of established criteria. A thorough audit
typically assesses the security of the system's physical configuration and
environment, software, information handling processes, and user practices. Security
audits are often used to determine regulatory compliance, in the wake of legislation
(such as HIPAA, the Sarbanes, and the California Security Breach Information Act)
that specifies how organizations must deal with information.
http://searchcio.techtarget.com/definition/security-audit

11.17. ICT Organizational Design

Information and Communications Technology Office Page 66
Manual of Procedures for Procurement of ICT

The manner in which management achieves the right combination of differentiation
and integration of the organization's operations, in response to the level of uncertainty
in its external environment. Differentiation refers to the subdivision of functional or
departmental units, each concentrating on a particular aspect of the organization's
operations. Integration refers to the linking of differentiated units to achieve unity of
effort in working toward organization's goals. In times of high uncertainty, greater
organizational is achieved through high differentiation coupled with high integration.
In times of low uncertainty, low differentiation and low integration are more
effective. See also organizational structure.
http://www.businessdictionary.com/definition/organizational-
design.html#ixzz26QYY8t9y

A systematization and generalization of procedures on how to design an ICT
organization. Identify and explore the strength and weaknesses of particular
organizational designs.
http://desrist2009.ist.psu.edu/Papers/desrist2009_submission_5.pdf;
http://www.doiserbia.nb.rs/img/doi/1820-0214/2009/1820-02140901093C.pdf;


11.18. E-Governance Audit

E-Governance projects involve huge investments which require Business Process
Reengineering in the government. Security concerns confidentiality, integrity and
availability of data are of paramount importance. The extent to which these projects
achieve their objectives needs to be evaluated by an independent audit. While IT
specialists are engaged to comment on technical security weaknesses, academic and
research agencies are employed to conduct citizen surveys to gauze satisfaction of
services. These are piece-meal efforts and there is a need for taking a comprehensive
look of all technical, safety, cost and performance parameters through IT Audit to
present an overall perspective and suggest organization level improvements.
http://www.ipaiindia.org/files/16_G.%20Srinivas.pdf

11.19. ICT Training Needs Analysis

This service covers an assessment of the training requirements of
a target group in terms of (1) number of trainees, (2) their educational
and professional background, (3) their present level of competence, and (4) the
desired behavior or skill level acquired at the completion of training.
http://www.businessdictionary.com/definition/training-needs-analysis.html

Building a competent ICT workforce to meet the industrys challenging opportunities.
Training Needs Assessment provides decision making information on the competency
gaps of the training audiences, training providers and courses available, training gaps,
appropriate delivery methods, training strategies, recommendations and strategic
vision as a way forward for the ICT industry. Training, education and development

Information and Communications Technology Office Page 67
Manual of Procedures for Procurement of ICT
areas are focused with a Competency Based Training approach in the skill
development of the ICT industry workforce. The nature of a never-ending cycle in
training and the role of HR managers in planning, monitoring, reviewing and
evaluating the training outcomes for enhanced and effective work performance
emphasize the need for a continuous strategic training process for the industry. The
horizontal and vertical career movements in search of higher exposure in gaining
strong profiles and the transitory trend of keep learning keep moving of the
workforce identifies the need for faster learning techniques and acknowledging IT
worker as an industry resource rather than an organization resource. The multiple
professional expertises required in terms of the industry specific technical nature of
the ICT capabilities for effective discharge functions is identified.
http://www.icta.lk/pdf/Final_Report_v15.pdf

11.20. ICT Course Design and Development

Process of selecting, organizing, executing and evaluating IT learning experiences on
the basis of the needs, abilities and interests of the trainees and the nature of the
society or community.
NCI IT Curriculum Design and Development Training Manual 200

A technical course designed to enable IT trainers to develop the competencies and
effectiveness of ICT Course development. This course teaches course design
methodologies, and communication and presentation skills.
National Computer Institute Bulletin Board

11.21. ICT Competency Plan Development

Defines the knowledge and skills an individual must possess at a recognized level of
competence in specific ICT fields/areas. Knowledge and skills in competency areas
are presented generally with specifics on essential areas of learning and performance
indicators, but avoid reference to specific vendors, versions or equipment. Thus, it
allows flexibility in the adoption of the standard while preserving the general
requirements for competence.
http://www.ncc.gov.ph/nics/index.htm

Develop competence in using ICT for tasks associated with information access and
management, problem solving, decision making, communicating, creative expression,
and empirical reasoning. It is also essential that students develop knowledge, skills
and understanding around the fundamental logic and conventions underpinning ICT
use and the ability to transfer these from one ICT environment to another (such as
from school to workplace and to other social contexts). Equally important is the
manner in which ICT is used, based on an understanding of the technologys
limitations and its impact on individuals, groups, communities and organizations.
http://consultation.australiancurriculum.edu.au/GeneralCapabilities/ICT/ConceptualSt
atement


Information and Communications Technology Office Page 68
Manual of Procedures for Procurement of ICT

11.22. ICT Recruitment and Placement

Refers to any act of canvassing, enlisting, contracting, transporting, utilizing, hiring
or procuring workers, and includes referrals, contract services, promising or
advertising for employment, locally or abroad, whether for profit or not: Provided,
That any person or entity which, in any manner, offers or promises for a fee,
employment to two or more persons shall be deemed engaged in recruitment and
placement.
http://www.atty.ws/labor_law/?p=246

Process of searching for and obtaining sufficient number and quality of potential job
seekers or applicants to enable the organizaton to select the most appropriate people
to fill its job needs in ICT. It is pertinent to note that the process of recruitment must
begin with a clear specification or understanding of ICT manpower needs. It should
consider the time that the manpower requirement must be met.
http://wikieducator.org/Lesson_2.Recruitment_,Selection,and_Placement

11.23. Organizational Knowledge Design And Development

Describing the structure of an organization in a particular field; provides decision-
making agents with appropriate knowledge for problem solving tasks
http://www.imamu.edu.sa/Data/abstract/management/Modularity%20,%20
flexibility%20,%20and%20Knowledge%20Management%20in%20Product%20and%
20Organization%20Design.pdf

11.24. ICT Solutions Engineering

Designs and builds information systems to meet the individual requirements of our
government and commercial clients. These systems include the client/server (web
client and desktop client) applications, data warehouses, data marts, web systems, on-
line reporting, analyses, decision support, and automated actions or events.
http://www.soleng.com


11.25. ICT Infrastructure Library Management

A comprehensive set of documents, which defines best practices and accepted
techniques in the Information Technology community. This set of guidelines is
widely used in both the public and private sector, essentially providing companies
with a blueprint on how to organize and manage information technology operations at
the company. The library is constantly updated to ensure accuracy and to include
emerging technological advances.
http://www.businessdictionary.com/definition/Information-Technology-
Infrastructure-Library-ITIL.html#ixzz26QbgFAGl


Information and Communications Technology Office Page 69
Manual of Procedures for Procurement of ICT

11.26. ICT Quality Management System Assessment

A subset of project management that includes the processes required to ensure that
the project will satisfy the needs for which it was undertaken Project Quality
Management is a critical aspect of the performing organization, and integral to project
management. It includes the processes and activities that determine the quality
policies, objectives, and responsibilities necessary to assure that project requirements
are met.
http://pmguide.ncc.gov.ph/index.php?id1=20&id2=2&id3=1

A total quality management (TQM) and continuous improvements in the pursuit of
excellence in the field of ICT. There is a need to foster TQM/PM integration with
feasible means of self-assessment.
http://www.tandfonline.com/doi/abs/10.1080/0954412022000010127

Fundamental principles necessary for developing usable metrics in practice that can
help organizations develop usable data quality metrics
http://dl.acm.org/citation.cfm?id=506010

11.27. Communication Plan Design

This service encompasses the design of the appropriate marketing strategies to reach
out to the intended beneficiaries of the project. It includes the design of the promotion
materials and the choice of the communication media to convey the message to the
intended audience.


11.28. Change Management Plan Design

This is the total design package of services needed to evoke a positive response and
buy in of the entire organization on the new system or methods being introduced and
prepare them for the new automated processing environment by enhancing the
present capacities and capabilities of the present workforce to meet the challenge.


12. ICT Services

12.1. Application Programming

This service covers the full cycle software programming services which includes
requirements management , product design and architecture, programming and
development, quality assurance, documentation preparation, technical support and
software maintenance
en.wikipedia.org/.../Generic_Security_Services_Application_Program


Information and Communications Technology Office Page 70
Manual of Procedures for Procurement of ICT
12.2. Application Service Subscription

A business model where a customer must pay a subscription price to have access to
the ICT service.
www.peoplecube.com/products-hosting.htm

12.3. Application Source Code review

This service complements application penetration testing with an internal view of the
applications code quality and potential security issues relating to its design. This
include internal/external penetration testing, forensic and incident response services,
vulnerability assessment, network architecture and design review, database
penetration testing, VOIP and host build review.
www.dmxtechnologies.com/en/services/source-code-review.html
www.stachliu.com/brochures/appcodereview.pdf

12.4. Application Systems Customization and Maintenance

Specialized maintenance assistance for hardware, firmware and software systems
aiming at increasing systems productive life, provide comprehensive maintenance
and customization service i.e., mid life upgrade services for hardware platforms,
hardware customization for component obsolescence and enterprise application
system and customization.
www.powersoft19.com/MaintenanceAndCust.aspx

12.5. Applications Systems Design and Development

It is a broad-based system architecture design, development, deployment, support,
field service and educating venture capitalists in the concepts underlying object
models and artificial intelligence
https://www.fbo.gov/?s=opportunity&mode=form&id

12.6. Business Continuity Planning

This service covers the formulation of a plan that will keep the company up and
running through interruptions of any kind: power failures, IT system crashes, natural
disasters, supply chain problems and more. Their involvement in the process can
range from overseeing the plan, providing input and output, to putting the plain into
action during an emergency.
www.ibm.com/services/...services/business-continuity-and-resiliency-.

12.7. Business Process Management (BPM)

This service includes a process-based governance and assets enabling the right focus,
helping decide where to innovate and what not to change.
www.hcltech.com/...services/...services/business-process-management

Information and Communications Technology Office Page 71
Manual of Procedures for Procurement of ICT

12.8. Cloud computing Services

A packaged set of ICT services whereby businesses could increase their ICT capacity
or functionality without having to add infrastructure, personnel and software. There
are six types of cloud computing (1) Web-based cloud services (2) SaaS (Software
as a Service) (3) Platform as a Service (4) Managed services, (5) (Service Commerce
and (6) Utility cloud services
www.networkworld.com/supp/2009/.../051809-cloud-buy-services.ht...

12.9. Computer Facilities Management

This service includes all support activities (i.e., troubleshooting, configuration,
parameter settings) necessary to ensure continued operation of all covered resources.
Key components of this service is timely monitoring of vendors security
notifications, system advisories on problems to address potential problems before
they impact day to day operations
www.census.gov/econ/census02/naics/sector54/541513.htmwww.bbb.org/connecticut
/.../computer-facilities-management-service

12.10. Computer Hardware Servicing, Repair and Maintenance

This includes the following services: PC troubleshooting and repair,
hardware/software upgrades, PC tune up/ PC Health Check up and Preventive
Maintenance
www.engineering.uodiyala.edu.iq/.../computer%20dep/.../


12.11. Contact Center Services

Makes customer satisfaction more affordable by aligning the right resources,
technology and processes with client needs and end customers expectations
www.mpccallcenters.com/

12.12. Contingency Planning and Disaster Recovery Support Services

This service covers the provision of a comprehensive disaster recovery plan to
recover from an unplanned event in a minimal amount of time. In creating the plan,
the following elements are considered: loss of information loss of personnel , loss of
equipment, loss of access to information and facilities and the design of a
contingency program around all main activities the business performs.
www.contingency-planning-disaster-recovery-guide.co.uk/

12.13. Data Conversion/Encoding


Information and Communications Technology Office Page 72
Manual of Procedures for Procurement of ICT
This service covers the conversion of data from paper format to digital form. It is
divided into two main groups: (1) encoding and (2) transcription through a digital
dictation system
www.data-processing.hk/
www.outsource2india.com/services/data_conversion.asp

12.14. Data Processing Services

This service covers subjecting digital data input into a programmed set of instructions
to transform data into user readable information to support human decisions /
activities.
data-entry.outsourcing-services-india.com/data-processing.php

12.15. Hardware, Software and Network Evaluation

Activities covered in the Software and Hardware Evaluation procedures:

IT Asset Assessment Plan
IT Asset Scan
Documentation and Distribution
Nonconformance handling
IT Asset Records Update
Ref.: ISO 17788:2005 Code of Practice for Information Security Management,
clause 5 (Asset Classification and Control) Sarbanes -Oxley Act of 2002

www.bsmdevelopment.com/Services/SystemEval.html
www.kincaidns.com/IT-Consulting-Professional-IT-Services-c1.html


12.16. Hosting and ICT Infrastructure Provisioning Services (IaaS)

Offers Utility Hosting- to provide immediate access to virtual servers and storage
based on a hardware platform shared with other customers

Dedicated Hosting A range of highly secured server platforms that are dedicated to
customer usage

Hosted Security Services with Dedicated Hosting, you can choose cost effective
24/7 managed protection to proactively prevent threats against your network and
infrastructure from the internet,

Backup as a Service (BaaS) a flexible and secure method to store data to ensure
business continuity or comply with industry regulations.

www.kincaidns.com/IT-Consulting-Professional-IT-Services-c1.html


Information and Communications Technology Office Page 73
Manual of Procedures for Procurement of ICT
12.17. ICT Backup Storage Services

Provides a choice of both Shared and Dedicated Managed Storage platforms that
offers a wide range of storage tiers to suit various performance, capacity and budget
requirements from ultra high performance SSD to cost effective SATA storage
technologies for increased reliability and storage efficiency
http://www.interoute.com/unified-ict/computing/

Storing backed-up data with an off-site data storage facility. In case of a data loss,
data can be returned quickly and efficiently
http://www.backupstorage.co.za/

Technical Evaluation Criteria:

Create a low cost, highly scalable storage tier
http://www.riverbed.com/us/products/

Cost-savings
Considerable storage demands
Part of new service design and improvement of existing services.
Expertise in this area to maintain relevancy.
The solution must be scalable: The overhead associated with security auditing of
the external system and the new body of operations must be dramatically
outweighed by the benefits.
It must be secure: Storing data off-premises must not put the information at risk.
It must be integrated: Cloud storage is only relevant if it is tightly coupled with
the application or service that leverages the data to deliver value.

http://itservices.stanford.edu/strategy/storage/cloud

12.18. ICT Infrastructure and Network Management Services

Activities, methods, procedures, and tools that pertain to the operation,
administration, maintenance, and provisioning of networked systems
http://en.wikipedia.org/wiki/Network_management

12.19. Internet Service Provider

Access provider to the Internet. Can be either community-owned and non-profit, or
privately owned and for-profit. Employ a range of technologies to enable consumers
to connect to their network. If users and small businesses, traditional options include:
dial-up, DSL (typically Asymmetric Digital Subscriber Line, ADSL), broadband
wireless, cable modem, fiber to the premises (FTTH), and Integrated Services Digital
Network (ISDN) (typically basic rate interface). For customers with more demanding
requirements, such as medium-to-large businesses, or other ISPs, DSL (often Single-
Pair High-speed Digital Subscriber Line or ADSL), Ethernet, Metropolitan Ethernet,

Information and Communications Technology Office Page 74
Manual of Procedures for Procurement of ICT
Gigabit Ethernet, Frame Relay, ISDN (B.R.I. or P.R.I.), ATM (Asynchronous
Transfer Mode) and upload satellite Internet access. Sync-optical cabling (SONET) is
more likely to be used. Many access providers also provide hosting and email
services.
http://en.wikipedia.org/wiki/Internet_service_provider

12.20. Multimedia and Graphics Design

Multimedia designer is a specialized graphic designer, they may do collaborative
work with senior print graphic designers, web designers. Multimedia and web
designers are often doing very similar production and technical work. Multimedia
designer, needs more in depth understanding of audio, video, animation, motion,
along with interactivity, presentation. Multimedia designers work on dynamic web
sites, kiosk, computer based training, high end presentations. larger corporate clients
or museum installations are clients, higher budget can be required, but some amazing
innovation occurs on difficult budget. Common traits of graphic designer and
multimedia designer: passion for project, ability to sketch ideas, thumbnails, roughs,
tights, and final sketch, story-boards, indicating type, color (transmissive vs
reflective), and color profiles and color sync, file formats for images, sound, video.
http://www.indeed.com/forum/job/Graphics-Designer/Multimedia-Designer-VS-
Graphic-Designer/t76384

12.21. Network Penetration Testing

ICT Service that prevents networks to be compromised and the systems within to
obtain access to confidential data and critical resources. This includes complete
details on the systems and network identified, exploitation results, and both tactical
and strategic recommendations.

External Network Penetration Testing

The core ideal around the Network Penetration Testing methodology is to organize
and to iteratively test the target environment from the most general components to the
most specific. In this way one can effectively model attack scenarios that highlight
risk from the largest, most complex environments down to the most simple, and
anywhere in between. The entire testing process is primarily manual to limit generic
results from scanners and checklist methods used in general vulnerability
assessments. It can focus the engagement on directed attack logic based testing
against systems and networks.

Internal Network Penetration Testing

Internal threats comprise the greatest risk facing many organizations today. Internal
corporate LAN/WAN environments are structured to allow users greater amounts of
access with fewer security controls. As layers of security between a would-be attacker
and sensitive data are removed the risk of compromise greatly increases. It structures

Information and Communications Technology Office Page 75
Manual of Procedures for Procurement of ICT
an internal penetration test in a way that meets your business needs, and creates
minimal business impact.

https://www.trustwave.com/network-penetration-testing.php

12.22. Network Systems Design, Development, Installation and Testing

This service provides the preparation and design work to configure and plan the
network migration, upgrade or deployment. Surveys network capacity measurements
to enable the business to proactively manage existing network capacity and to plan
for future network requirements while ensuring customer satisfaction.

IT ensures a timely and project-driven network installation and integration. Provide
flexible engineering solutions for the transition, deployment, and migration of Voice,
Data, or Wireless network.

It manages and maintains every part of the network environment and allows the user
to choose from simple network monitoring and reporting, to event management, fault
management, performance and capacity monitoring as well as analysis. It places
maintenance and support responsibility. It monitors the network 24/7 and have field
technician dispatched to arrive along with the replacement at the premises to perform
the physical component exchange.
http://www.intellispring.com/networking/Main.aspx

12.23. Platform-as-a-Service (PaaS)

Cloud providers deliver a computing platform typically including operating system,
programming language execution environment, database, and web server. Application
developers can develop and run their software solutions on a cloud platform without
the cost and complexity of buying and managing the underlying hardware and
software layers. With some PaaS offers, the underlying computer and storage
resources scale automatically to match application demand such that cloud user does
not have to allocate resources manually.
http://en.wikipedia.org/wiki/Infrastructure_as_a_service#Service_models

Category of cloud computing services that provide a computing platform and a
solution stack as a service. Along with SaaS and IaaS, it is a service model of cloud
computing. In this model, the consumer creates the software using tools and/or
libraries from the provider. The consumer also controls software deployment and
configuration settings. The provider provides the networks, servers, storage and other
services. PaaS offerings facilitate the deployment of applications without the cost
and complexity of buying and managing the underlying hardware and software and
provisioning hosting capabilities. There are various types of PaaS vendor; however,
all offer application hosting and a deployment environment, along with various
integrated services. Services offer varying levels of scalability and maintenance.


Information and Communications Technology Office Page 76
Manual of Procedures for Procurement of ICT
PaaS offerings may also include facilities for application design, application
development, testing and deployment as well as services such as team collaboration,
web service integration and marshalling, database integration, security, scalability,
storage, persistence, state management, application versioning, application
instrumentation and developer community facilitation. These services are generally
provisioned as an integrated solution over the web.
http://en.wikipedia.org/wiki/Platform_as_a_service

12.24. PKI Subscription Services

The PKI infrastructure is the standard for public-key cryptographic security, which is
used to ensure the security of digital certificates. With the PKI infrastructure, digital
certificates can provide the trusted infrastructure for security-rich transactions over
the Internet.

PKI Services allows the user to establish a PKI infrastructure and serve as a
certificate authority for its internal and external users, issuing and administering
digital certificates in accordance with its own organizations policies.

The public key infrastructure (PKI) provides applications with a framework for
performing the following types of security-related activities:
Authenticate all parties that engage in electronic transactions
Authorize access to sensitive systems and repositories
Verify the author of each message through its digital signature
Encrypt the content of all communications
http://www-03.ibm.com/systems/z/os/zos/features/pki/

12.25. Risk/Vulnerability Assessment

Process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in
a system. Examples of systems for which vulnerability assessments are performed
include, but are not limited to, information technology systems, energy supply
systems, water supply systems, transportation systems, and communication systems.
Such assessments may be conducted on behalf of a range of different organizations,
from small businesses up to large regional infrastructures. Vulnerability from the
perspective of disaster management means assessing the threats from potential
hazards to the population and to infrastructure. It may be conducted in the political,
social, economic or environmental fields. Vulnerability assessment has many things
in common with risk assessment.

Assessments are typically performed according to the following steps:
1. Cataloging assets and capabilities (resources) in a system.

Information and Communications Technology Office Page 77
Manual of Procedures for Procurement of ICT
2. Assigning quantifiable value (or at least rank order) and importance to those
resources
3. Identifying the vulnerabilities or potential threats to each resource
4. Mitigating or eliminating the most serious vulnerabilities for the most valuable
resources
http://en.wikipedia.org/wiki/Vulnerability_assessment

12.26. Software-as-a-Service (SaaS)

"on-demand software", is a software delivery model in which software and associated
data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin
client via a web browser. SaaS has become a common delivery model for many
business applications, including accounting, collaboration, customer relationship
management (CRM), management information systems (MIS), enterprise resource
planning (ERP), invoicing, human resource management (HRM), content
management (CM) and service desk management. SaaS has been incorporated into
the strategy of all leading enterprise software companies. One of the biggest selling
points for these companies is the potential to reduce IT support costs by outsourcing
hardware and software maintenance and support to the SaaS provider.
http://en.wikipedia.org/wiki/Software_as_a_Service

In this model, cloud providers install and operate application software in the cloud
and cloud users access the software from cloud clients. The cloud users do not
manage the cloud infrastructure and platform on which the application is running.
This eliminates the need to install and run the application on the cloud user's own
computers simplifying maintenance and support. What makes a cloud application
different from other applications is its elasticity. This can be achieved by cloning
tasks onto multiple virtual machines at run-time to meet the changing work demand.
Load balancers distribute the work over the set of virtual machines. This process is
inconspicuous to the cloud user who sees only a single access point. To accommodate
a large number of cloud users, cloud applications can be multitenant, that is, any
machine serves more than one cloud user organization. It is common to refer to
special types of cloud based application software with a similar naming convention:
desktop as a service, business process as a service, test environment as a service,
communication as a service. The pricing model for SaaS applications is typically a
monthly or yearly flat fee per user, so price is scalable and adjustable if users are
added or removed at any point.
http://en.wikipedia.org/wiki/Infrastructure_as_a_Service#Infrastructure_as_a_service
_.28IaaS.29

12.27. Telecommunication Infrastructure Design, Installation and Testing

Telecommunications infrastructure services provide setup, maintenance and
consulting for data and voice communications technologies. Examples of
telecommunications infrastructure services include optical fiber installation, cell

Information and Communications Technology Office Page 78
Manual of Procedures for Procurement of ICT
tower site location, radio antenna testing, and the installation standard phone
equipment and data networks. Telecommunications infrastructure service providers
include satellite companies, phone companies and the Internet service providers
(ISP). Most telecommunications infrastructure services can help customers determine
their telecommunications infrastructure requirements. The cost of
telecommunications infrastructure design varies widely and depends upon the scope
of the service provided.

Types of Telecommunications Infrastructure Services:

There are many types of telecommunications infrastructure services. For example, a
traditional telecommunications infrastructure service helps to build, manage, and
operate voice networks. A telecommunications cabling infrastructure service or
telecommunications fiber optics infrastructure installs standard cables or fiber optics
in large office buildings or factories. Telecommunications infrastructure services that
specialize in telecommunications infrastructure development or telecommunications
infrastructure design may offer a variety of planning, implementation and testing
services. Telecommunications infrastructure development helps in the growth of IT
software and various technologies like global system for mobile communication
(GSM) and code division multiple access (CDMA). Telecommunications
infrastructure design considerations help to design long optical fiber cabling that is
done at various locations and buildings. Telecommunications infrastructure design
converge the voice and data with voice over IP and they are used in telephone lines,
connecting internet, call recording, and for call management.
http://beta.globalspec.com/learnmore/engineering_services/telecommunications_infra
structure_services/telecommunications_infrastructure_services

12.28. Total ICT Systems Solution Integration

Provides a comprehensive range of ICT Technologies, including design, management
and deployment relevant to a business needs to reduce costs and increase
competitiveness in today's global economy and position the business on an efficient
and productive edge.
http://www.allict.com.my/

A full system integrator providing solutions for complex information systems as well
as designing and developing standard application software for finance, distribution,
manufacturing and equipment maintenance management. We offer a full spectrum of
services including strategic consulting, communication and network services, system
design and development, Internet/intranet services, implementation and customer
education.
http://www.allict.com.my/sysintegration.html

12.29. Website Design


Information and Communications Technology Office Page 79
Manual of Procedures for Procurement of ICT
A broad term covering many different skills and disciplines that are used in the
production and maintenance of websites. The different areas of web design include;
web graphic design, interface design, authoring; including standardized code and
proprietary software, user experience design and search engine optimization. Often
many individuals will work in teams covering different aspects of the design process,
although some designers will cover them all. The term web design is normally used to
describe the design process relating to the front-end (client side) design of a website
including writing mark up, but this is a grey area as this is also covered by web
development. Web designers are expected to have an awareness of usability and if
their role involves creating mark up then they are also expected to be up to date with
web accessibility guidelines.
http://en.wikipedia.org/wiki/Web_design

12.30. Web Hosting

A type of Internet hosting service that allows individuals and organizations to make
their website accessible via the World Wide Web. Web hosts are companies that
provide space on a server owned or leased for use by clients, as well as providing
Internet connectivity, typically in a data center. Web hosts can also provide data
center space and connectivity to the Internet for other servers located in their data
center, called co-location.

The scope of web hosting services varies greatly. The most basic is web page and
small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP)
or a Web interface. The files are usually delivered to the Web "as is" or with minimal
processing. Many Internet service providers (ISPs) offer this service free to
subscribers. Individuals and organizations may also obtain Web page hosting from
alternative service providers. Personal web site hosting is typically free,
advertisement-sponsored, or inexpensive. Business web site hosting often has a
higher expense.

Single page hosting is generally sufficient for personal web pages. A complex site
calls for a more comprehensive package that provides database support and
application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, or
ASP.NET). These facilities allow customers to write or install scripts for applications
like forums and content management. Also, Secure Sockets Layer (SSL) is typically
used for e-commerce.

The host may also provide an interface or control panel for managing the Web server
and installing scripts, as well as other modules and service applications like e-mail.
Some hosts specialize in certain software or services (e.g. e-commerce), which are
commonly used by larger companies that outsource network infrastructure.

http://en.wikipedia.org/wiki/Web_hosting_service

12.31. WebBased Programming

Information and Communications Technology Office Page 80
Manual of Procedures for Procurement of ICT

Web Site Programming is the practice of writing applications that run on a web server
and can be used by many different people. Many applications work really well as a
web application. Some examples of popular web applications include Flickr, Gmail,
and Google Maps. The user is able to upload and view pictures, send email and
lookup directions using these web applications and they are all made possible through
web site programming.
http://www.host-shopper.com/what-is-web-programming.html

Technical Evaluation Parameters:

Deploy security mechanism, caching, style sheets, distributed indexing, and other
technologies. And on the horizion, there are mobil agents, realtime interaction, and
virtual reality.
http://www.w3.org/People/Connolly/technologies



12.32. Infrastructure as a service (IaaS)

In this most basic cloud service model, cloud providers offer computers, as physical
or more often as virtual machines, and other resources. The virtual machines are run
as guests by a hypervisor, such as Xen or KVM. Management of pools of hypervisors
by the cloud operational support system leads to the ability to scale to support a large
number of virtual machines. Other resources in IaaS clouds include images in a
virtual machine image library, raw (block) and file-based storage, firewalls, load
balancers, IP addresses, virtual local area networks (VLANs), and software bundles.
Amies, Alex; Sluiman, Harm; Tong IaaS cloud providers supply these resources on
demand from their large pools installed in data centers. For wide area connectivity,
the Internet can be used orin carrier clouds -- dedicated virtual private networks
can be configured.
http://en.wikipedia.org/wiki/Infrastructure_as_a_service#Service_models

Potrebbero piacerti anche