Menu
outsourcing

outsourcing - News, Features, and Slideshows

News about outsourcing
Tutorials about outsourcing
Features about outsourcing
  • IT customers slow to embrace outsourced DevOps

    IT organizations are increasingly interested in adopting DevOps models to deliver applications faster, better and cheaper to the business, but they're not inclined to look to their IT service providers for help with these efforts.

    Written by Stephanie Overby08 Aug. 15 00:26
  • Why CIOs can't wait to renegotiate their outsourcing contracts

    As business needs--and the new technologies required to support them--evolve ever more rapidly, outsourcing contracts signed just a year or two ago are already getting stale. That's why Mayer Brown business and sourcing technology partner Dan Masur is advising companies to revamp their outsourcing deals right now to not only access new options, but also to cut significant costs.

    Written by Stephanie Overby27 July 15 23:47
  • Steering through change and growth

    Three days after Nigel Prince joined the Ministry of Agriculture and Forestry as CIO, his ambitions were reined in.
    “The chief financial officer told me about all the money I didn’t have to spend on all the whizzy stuff I thought I could do in the MAF environment,” he told a recent CIO Insights luncheon.

    Written by Stephen Bell15 Aug. 10 22:00
  • Outsourcing information security

    The need to keep information secure is not a recent development. To satisfy this need, most organisations construct a list of security requirements based on common sense. This has proven fairly effective with simple and well understood media such as pen and paper. As information management (and its security) has become more complex in nature, the likelihood of a gap in that common sense list of requirements has increased.

    Written by Simon Burson28 Jan. 10 07:24

Whitepapers about outsourcing

  • Contractor access: Mitigating security and risk issues

    Today’s workforce is expanding to include a growing number of contractors, despite high-profile security incidents. This paper identifies how to mitigate risks in what’s often a necessary business decision. · Many businesses don’t really have the luxury of asking, “can we afford the risk of a contractor?” · Companies like Target, Cogent Healthcare, Stanford Hospital, Beebe Healthcare and even the EPA have had breaches that were the result of “temporary” access · A substantial roadblock to productivity is granting them access to necessary systems, which in many cases house sensitive information

  • A blended future: The changing mix of IT service delivery and consumption

Market Place