Follow sourcingfocus on Twitter

Opinion Pieces for ITO

Contracting for RPA – The opportunities and pitfalls
by partners Mike Pierides and Simon Lightman at global law firm, Morgan Lewis
Robotic process automation (RPA) is at a pivotal moment, firmly hitting the mainstream when it comes to digital transformation and more traditional BPO procurements.

Firewalls: Defending against the covert, the complex and the continuous
by Daljit Paul, Head of Services, Networks First
As cyber security becomes recognised as a prominent issue in outsourcing that has been repeatedly overly ignored, Daljit explains the benefits of outsourcing online security operations to a third party specialist. Firewalls are the perfect example of challenges faced by today's in-house IT teams, often overlooked and frequently neglected.

Optimising ERP and BPM systems: “Process Templates”
by Nithya Ramkumar
Given the clear business benefits the right IT system can offer, businesses are keen to make technology investments to improve business process design and performance. Investments in expensive ERPs and latest BPM suites have been quick in driving innovation at a ‘process level'. But it has often sacrificed the effectiveness and agility required to adapt to changing business needs. Despite heavy technology spends, process limitations can hold back organisations from reaching their desired business outcomes.

Out with the new and in with the old?
by Robert Davies, Partner, and Laura Jamieson, Solicitor, at national law firm Dundas & Wilson
Cast your mind back to before 2006 and consider this question: when does TUPE apply upon a change of contractor in relation to outsourcing contracts, in other words before the service provision change (SPC) elements of the Transfer of Undertakings (Protection of Employment) Regulations 2006 (TUPE) were introduced?

Don’t Panic!
by Nick Patience, Director of Product Strategy at Recommind
Nick Patience, explains the issues surrounding the disposal of information and the consequences businesses will face if they do not have a comprehensive information governance policy in place

The product life cycle is in decline
by Karsten Horn, director of international sales at INFORM
One of the most profound changes in the last decade is the dramatic shrinkage of product life cycles which bear little resemblance to the world today which is defined by instant obsolescence.

The Potential of the Cloud to invent and reinvent business
by Dr. Anurag Srivastava, Chief Technology Officer & Senior Vice President for Wipro's Global IT Business
The Cloud is not just the new way to manage data and costs and promote greater internal and external collaboration but is also the opportunity to reinvent brands and business models, with huge potential benefits – upstream and downstream.

Tags replace barcodes to transform asset management
by Karen Conneely, Group Commercial Manager at Real Asset Management.
With growing pressure in the public and private sector for improved asset management, organisations undoubtedly need to improve the quality, accuracy and timeliness of asset information. Relying on an annual audit – at best – is simply not good enough.

C’mon Baby Hear The Noise –How to Assemble the Essential Components of Certificate Management
by Calum MacLeod, Venafi’s EMEA Director
In part 2 of How to Assemble the Essential Components of Certificate Management, Venafi’s EMEA Director Calum MacLeod continues to examines how users can ensure CA preparation and better defend against security risks.

C’mon Baby Hear The Noise
by Calum MacLeod, Venafi’s EMEA Director
In part 1 of How to Assemble the Essential Components of Certificate Management, Venafi’s EMEA Director Calum MacLeod examines why the Certification Authorities are still playing fast and loose with our safety and outlines the key steps to safeguard your business from disaster.

What return can video offer a business?
by Ian Brownhill, Managing Director and Senior Consultant, BergHind Joseph
The internet age has made information a commodity and bred a new, savvier type of consumer who has access to a wealth of material.

Proactive or Reactive – Should That Be The Question?
by Paul Kenyon, COO of Avecto
Avecto examines the difference between proactive and reactive digital forensics and explains their contribution in the fight against malware and malicious activity.

From Identity and Access Solutions to Access Governance
by Mike Small CEng, FBCS, CITP
Over the past decade, there has been a tsunami of identity and access management technology. However, many organizations have not realised the benefits because they have taken a technology-led approach rather than one based on governance.

Organised Chaos
by Nick Patience, Director of Product Strategy at Recommind.
Nick Patience, Director of Product Strategy at Recommind, looks at the hype surrounding Big Data at how businesses should be employing the information.

Seven Strategies to Protect Customer Identities in a Work-at-Home Environment
by Marc Robinson, global director of product management, Sitel
Marc Robinson of Sitel offers seven strategies to be protect customer identities and confidential information when agents work from home:

 1 2 3 >  Last »