Follow sourcingfocus on Twitter

Opinion Pieces for ITO

Firewalls: Defending against the covert, the complex and the continuous
by Daljit Paul, Head of Services, Networks First
As cyber security becomes recognised as a prominent issue in outsourcing that has been repeatedly overly ignored, Daljit explains the benefits of outsourcing online security operations to a third party specialist. Firewalls are the perfect example of challenges faced by today's in-house IT teams, often overlooked and frequently neglected.
more

Optimising ERP and BPM systems: “Process Templates”
by Nithya Ramkumar
Given the clear business benefits the right IT system can offer, businesses are keen to make technology investments to improve business process design and performance. Investments in expensive ERPs and latest BPM suites have been quick in driving innovation at a ‘process level'. But it has often sacrificed the effectiveness and agility required to adapt to changing business needs. Despite heavy technology spends, process limitations can hold back organisations from reaching their desired business outcomes.
more

Out with the new and in with the old?
by Robert Davies, Partner, and Laura Jamieson, Solicitor, at national law firm Dundas & Wilson
Cast your mind back to before 2006 and consider this question: when does TUPE apply upon a change of contractor in relation to outsourcing contracts, in other words before the service provision change (SPC) elements of the Transfer of Undertakings (Protection of Employment) Regulations 2006 (TUPE) were introduced?
more

Don’t Panic!
by Nick Patience, Director of Product Strategy at Recommind
Nick Patience, explains the issues surrounding the disposal of information and the consequences businesses will face if they do not have a comprehensive information governance policy in place
more

The product life cycle is in decline
by Karsten Horn, director of international sales at INFORM
One of the most profound changes in the last decade is the dramatic shrinkage of product life cycles which bear little resemblance to the world today which is defined by instant obsolescence.
more

The Potential of the Cloud to invent and reinvent business
by Dr. Anurag Srivastava, Chief Technology Officer & Senior Vice President for Wipro's Global IT Business
The Cloud is not just the new way to manage data and costs and promote greater internal and external collaboration but is also the opportunity to reinvent brands and business models, with huge potential benefits – upstream and downstream.
more

Tags replace barcodes to transform asset management
by Karen Conneely, Group Commercial Manager at Real Asset Management.
With growing pressure in the public and private sector for improved asset management, organisations undoubtedly need to improve the quality, accuracy and timeliness of asset information. Relying on an annual audit – at best – is simply not good enough.
more

C’mon Baby Hear The Noise –How to Assemble the Essential Components of Certificate Management
by Calum MacLeod, Venafi’s EMEA Director
In part 2 of How to Assemble the Essential Components of Certificate Management, Venafi’s EMEA Director Calum MacLeod continues to examines how users can ensure CA preparation and better defend against security risks.
more

C’mon Baby Hear The Noise
by Calum MacLeod, Venafi’s EMEA Director
In part 1 of How to Assemble the Essential Components of Certificate Management, Venafi’s EMEA Director Calum MacLeod examines why the Certification Authorities are still playing fast and loose with our safety and outlines the key steps to safeguard your business from disaster.
more

What return can video offer a business?
by Ian Brownhill, Managing Director and Senior Consultant, BergHind Joseph
The internet age has made information a commodity and bred a new, savvier type of consumer who has access to a wealth of material.
more

Proactive or Reactive – Should That Be The Question?
by Paul Kenyon, COO of Avecto
Avecto examines the difference between proactive and reactive digital forensics and explains their contribution in the fight against malware and malicious activity.
more

From Identity and Access Solutions to Access Governance
by Mike Small CEng, FBCS, CITP
Over the past decade, there has been a tsunami of identity and access management technology. However, many organizations have not realised the benefits because they have taken a technology-led approach rather than one based on governance.
more

Organised Chaos
by Nick Patience, Director of Product Strategy at Recommind.
Nick Patience, Director of Product Strategy at Recommind, looks at the hype surrounding Big Data at how businesses should be employing the information.
more

Seven Strategies to Protect Customer Identities in a Work-at-Home Environment
by Marc Robinson, global director of product management, Sitel
Marc Robinson of Sitel offers seven strategies to be protect customer identities and confidential information when agents work from home:
more

The need for Special Source
by Daniel Ball, Director, Wax Digital
According to the Deloitte CFO Survey of January 2012, 70% of the UK’s CFOs expect to see corporate profit margins decline sharply after a period of strength. Inevitably, the ability to reduce operating costs is cited in the report as the major priority for large corporations.
more

 1 2 3 >  Last »