CenterBeam News Log
News You Can Use




Subscribe to "CenterBeam News Log" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Monday, January 27, 2003
 

Outsourcing

Infoworld, 1/24/03:  Big shift in IT jobs to outsourcing predicted, But effectiveness of farming out jobs is questioned

By THOMAS HOFFMAN

AS MANY AS 35 percent to 45 percent of U.S. and Canadian IT workers will find themselves replaced by contractors, consultants, offshore technicians and part-time workers by 2005, according to a report issued this week by New Canaan, Conn.-based Foote Partners.

And though some analysts and IT labor experts said those figures, while eye-popping, may not be far-fetched, four high-level IT managers said the predictions probably won't apply to their companies. For them, outsourcing hasn't proved to be a lower-cost alternative to keeping IT inside corporate walls.

[more]

Giga, 1/15/03:  Outsourcing Midrange Consolidation

Service Management Strategies

Dean Davison

Due to cost-reduction mandates and long-standing promises of emerging technology that can consolidate midrange servers, IT organizations are evaluating outsourcing to accelerate midrange server consolidation. However, outsourcer capabilities are still limited. Indeed, outsourcing vendors can provide various consolidation services (e.g., physical consolidation), but they are also awaiting mature technology to create midrange “LPARs” (i.e., partitioning) and the efficiency they promise.

[more]

IT Utilities

Meta, 1/17/03:  IT Utilities: Shifting Focus on IT Assets From Ownership to Usage

Service Management Strategies

Stratos Sarissamlis

The IT utility model promises to expedite sourcing transactions for always-on pay-for-use services. Users should assess utility caveats, ensuring paybacks compensate for transition costs and incurred risks.

Through one-to-one relationships, outsourcing transactions aim to reconcile the scope of undertakings users transfer with vendors’ capability to meet cost-reduction, service quality, and process maturity targets. Negotiations take 9-12+ months to complete, in which parties seek a common understanding of the specific context and operating environment to determine service baseline, contractual terms and conditions, pricing and service-level agreements, and transition of resources. Furthermore, relationships evolve during the contract term, because in-scope services are subject to diverse interpretations and technology/business changes often compel parties to modify some transactional aspects. Indeed, certain contract sections become obsolete soon after the transition completes and service scope digressions are tackled outside the contract, often widening the gap between service expectations and perceptions.

[more]

Giga, 1/23/03:  Outsourcing Options for Niche Businesses

Richard Peynot

Niche businesses are increasingly giving up on the idea of designing and developing their own solutions and prefer to seek sourcing partners to deliver such a service. Companies unfamiliar with the variant options of outsourcing need to be aware of the types of contracts that may be offered. Models differ on infrastructure hosting, software access and software property, and this may have an impact on the client company’s business. There are also different billing models. As these models may be unusual and even complex, companies should be cautious and are invited to evaluate scenarios for each billing mode. Also, Giga urges “beginner” companies to involve a specialized advisor for contract conditions and price negotiation.

[more]

IT Management

Giga, 1/23/03:  Selling IT Projects to the Business

Margo Visitacion

Convincing the management of autonomous business units that IS project investments are warranted is increasingly difficult as project failures have hurt IS credibility, infrastructure investments don’t yield highly visible results and consultants and the press have raised expectations too high. Those pushing IT projects should use the following tactics to overcome these obstacles.

[more]

Security

Computerworld,, 1/27/03: Update: 'Slammer' worm slugs Internet, slows Web traffic

By Stacy Cowley and Martyn Williams, IDG News Service

A new worm attacking a known vulnerability in Microsoft SQL 2000 Web servers that has been slowing down or halting Internet traffic worldwide could prove as tricky a nemesis as security foes "Code Red" and "Nimda," according to firms tracking the outbreak.

[more]


8:39:27 AM    


Click here to visit the Radio UserLand website. © Copyright 2005 Brian D. Johnson.
Last update: 4/20/2005; 2:53:35 PM.
This theme is based on the SoundWaves (blue) Manila theme.
January 2003
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  
Dec   Feb