Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing the Risks of IT Outsourcing (Computer Weekly Professional)

Buy
Buyers or suppliers of IT outsourcing services are constantly tormented
by the prospect of having to deal with the vicissitudes of
risks in their projects. In today’s business environment, the
precipitous rates of technological change have outpaced the ability
of many organizations to support the IT function. These organizations
are faced with the ‘usual’ challenge to maintain an IT
function and to simultaneously manage in an environment of
brisk change and perpetual uncertainty. All of this, however, in
addition to the vagaries of risk and its effects, makes managing the
IT function an exceptionally challenging task for many managers.
As a result, these managers and the organizations they represent
succumb by using outsourcing as an opportunity to de-focus from
the IT function, something that is, commonly, also not an activity
of core competence (Prahalad and Hamel, 1990). IT outsourcing
promises to lower operating costs, lower risk exposure and take
advantage of best practices that are introduced when working
with the supplier of IT services. These organizations plan to transfer
the IT function outside the organization and also to reap the
payback of the IT function, through the use of outsourcing.

The term outsourcing conjures up several different meanings
depending on how it is viewed. To potential and existing users of
this concept, it may contain a connotation of a loss of control; and
a fear that a third party would take over jobs, work and responsibility
for what used to be an internal function. To others, it carries
suggestions of a takeover; and to yet another group, outsourcing
implies additional work that will be required to supervise additional
personnel that are brought ‘on-board’. Many managers, it
seems, attempt to seek consolation by rejecting the concept of
outsourcing altogether. Further, ideas are devised and thoughts
rationalized to address this feeling of trepidation through commonly
heard reasons not to outsource. Common reasons that may
inadvertently or unintentionally be used to reinforce these concerns
include, for example, ‘IT outsourcing results in an unacceptable
loss of control’, ‘intolerable increases in security issues [e.g.
loss of corporate information]’ or just ‘undesirable increases in
operational risk’.
(HTML tags aren't allowed.)

Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to perform certain specific tasks. The microprocessor is embedded or hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny chips come out of factories like Freescale, Microchip, Philips, Texas Instruments, and Mitsubishi,...
CRC Handbook Chemistry and Physics, 85th Edition
CRC Handbook Chemistry and Physics, 85th Edition
"This famous handbook continues to provide current, critically evaluated chemical and physical data in a one-volume format. A goldmine of information … . " - JACS, Vol. 127, No. 12, 2005 " While I keep the massive recent editions in my study, I keep my original one, the 23rd edition, on my bedside table, for it is easy...
Intangible Management: Tools for Solving the Accounting and Management Crisis
Intangible Management: Tools for Solving the Accounting and Management Crisis

For the recorded history of management, the world has managed value creation according to what can be seen, touched and proven. In today's knowledge-based economy, value creation is derived primarily from how well firms manage intangibles (knowledge, service, expectations, response time, innovation, change management, etc). The large...


Oracle Exadata Survival Guide (Expert's Voice in Oracle)
Oracle Exadata Survival Guide (Expert's Voice in Oracle)

Oracle Exadata Survival Guide is a hands-on guide for busy Oracle database administrators who are migrating their skill sets to Oracle's Exadata database appliance. The book covers the concepts behind Exadata, and the available configurations for features such as smart scans, storage indexes, Smart Flash Cache, hybrid columnar...

Powering Office 2003 with XML (Power Pack Series)
Powering Office 2003 with XML (Power Pack Series)
Find out how to
  • Understand XML specification and schemas
  • Set up and complete InfoPathTMВ forms
  • Design new forms from XML data files
  • Debug InfoPath scripts
  • Tackle real-world problems with the help of case studies
  • ...
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy