Business of Information Technology  >   Business Processes  >  

Outsourcing

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Strategic Sourcing
DEFINITION:  Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house. Insourcing often involves bringing in specialists to fill temporary needs or training existing personnel to perform tasks that would otherwise have been outsourced. An example is the use of in-house engineers to write technical manuals for equipment they have designed, rather than sending  … 
Definition continues below.
OutsourcingReports
1 - 25 of 191 Matches Previous Page  | Next Page
Records Management Solutions That Keep You HIPAA-Compliant
sponsored by Iron Mountain
WHITE PAPER: This white paper features a HIPAA-compliant healthcare partner that offers you the benefits of outsourcing while ensuring data protection across your organization.
Posted: 14 Apr 2014 | Published: 22 Oct 2013

Iron Mountain

4 Reasons to Outsource Your DNS
sponsored by Dyn
WHITE PAPER: Minimizing network downtime is a top priority for all IT departments and this informative whitepaper explores 4 top reasons to outsource your DNS.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Dyn

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

The Virtue of Virtual Infrastructure
sponsored by SearchHealthIT.com
EBOOK: Read this handbook from searchHealthIT.com to see how some healthcare facilities have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance. Additionally, gain in-depth insight about the challenges to outsourcing healthcare IT operations.
Posted: 21 Mar 2014 | Published: 26 Mar 2014

SearchHealthIT.com

Six Synergy Truths When Sourcing WFO & CCI From One Vendor
sponsored by Genesys
EBOOK: Many organizations are looking to outsource their contact center infrastructure or workforce optimization (WFO) in order to reduce costs and increase efficiency. However, some forward-thinking companies are outsourcing both from the same vendor, in an interconnected environment.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Genesys

In-House or Outsource? Six Business Advantages of Owning an In-House 3D Printer
sponsored by Stratasys Singapore Pte Ltd
WHITE PAPER: Recent advancements in 3D printing technology make this tool not only affordable, but a business differentiator – yet many organizations still continue to outsource 3D printing. This resource counts down six critical benefits of owning a 3D printer in-house.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Stratasys Singapore Pte Ltd

An Introduction to HP's Site Visit Program
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

HP's Industrialised Delivery System
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

HP's Industry Leading Offshore Capability
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast introduces an industry-leading offshore capability designed with a new age of people and applications in mind.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Application Testing Survey Results
sponsored by AdvizeX Technologies
WHITE PAPER: Software testing is a critical component of application delivery -- no matter what industry you're in -- in order to ensure applications meet your business needs. Unfortunately, software testing is often underfunded -- so how are successful organizations balancing budgets with testing strategies?
Posted: 10 Mar 2014 | Published: 10 Mar 2014

AdvizeX Technologies

East Sussex County Council Re-define IT Delivery to Schools with CentraStage
sponsored by CentraStage
CASE STUDY: This informative case study explores one company's success with a pay-as-you-grow model of IT services and how it allowed them to resolve most of their IT problems remotely and automatically.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CentraStage

Unified Communications as a Service: Moving UC to the Cloud
sponsored by NextPlane
EGUIDE: This expert guide from SearchNetworking.com discusses the motivations behind using UCaaS along with what kinds of services are currently available and how they're being utilized.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

NextPlane

The North and East London Commissioning Support Unit (CSU) transforms IT support for GPs’ with CentraStage
sponsored by CentraStage
CASE STUDY: This case study explores one company's success in implementing effective managed services solutions and how it greatly improved visibility of the IT estate, control over what the organization supports, and task automation.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

CentraStage

Utilizing Next Generation MSP Automation to Gain a Competitive Advantage in the Managed Services Marketplace
sponsored by N-able Technologies
WHITE PAPER: This guide takes a look at market forces which are converging and affecting the way MSP must utilize their technology.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

N-able Technologies

Computer Weekly – 25 February 2014: Banking with dinosaurs – the legacy IT crisis in financial services
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the IT problems at high-street banks, and learn how outsourcing led to the loss of key legacy IT skills. We ask what role wearable technology could have in enterprise IT. And we take an in-depth look at the tools for using Microsoft Azure for building hybrid clouds. Read the issue now.
Posted: 24 Feb 2014 | Published: 25 Feb 2014

ComputerWeekly.com

Solitaire Interglobal: System z and Managed Service Providers
sponsored by IBM
WHITE PAPER: This white paper showcases the real-world impact for MSP businesses that deploy IBM's System z to host customer IT operations. Inside, you'll discover how this platform stacks up in areas such as costs, run times, resource utilization, and more. Read on to determine if you should consider this platform for an MSP infrastructure deployment.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

IBM

Making The Most of Data Center Outsourcing
sponsored by Rackspace
WHITE PAPER: Take a look at this expert e-guide to find how you can gain outsourcing benefits without breaking the bank, as well as best practices for data center outsourcing.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

Rackspace

Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?
sponsored by Dimension Data
WHITE PAPER: This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Dimension Data

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

The 7 Biggest Mistakes You Can Make in Web Conferences
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix Online Go To Meeting

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

Accelerate your Managed Services with the MSP Playbook and get an exclusive look at our new MSP Playbook
sponsored by N-able Technologies
WEBCAST: Tune in now to access a helpful how-to playbook for understanding best business practices for your organization as a managed services provider (MSP).
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Mitigating the Risks of Outsourcing
sponsored by Hewlett-Packard Company
WHITE PAPER: When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.
Posted: 06 Nov 2013 | Published: 06 Nov 2013

Hewlett-Packard Company

Data Protection and Disaster Recovery: How to look after your critical data
sponsored by Iron Mountain
EBOOK: Check out this informative paper to explore an off-site data protection solution that guarantees your data's longevity, even in the face of a disaster. Read on to learn more.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Iron Mountain

Is Your Outsourcing Strategy Under Your Control?
sponsored by SearchDataCenter.com
WHITE PAPER: Proactive planning and evaluation can prevent common problems with IT outsourcing providers, keeping your data safe and ensuring your outsourcing venture is cost-effective.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

SearchDataCenter.com
1 - 25 of 191 Matches Previous Page    1 2 3 4    Next Page
 
OUTSOURCING DEFINITION (continued): …  the work to an outside technical writing firm. In this example, the engineers might have to take technical writing courses at a local college, university, or trade school before being able to complete the task successfully. Other challenges of insourcing include the possible purchase of additional hardware and/or software that is scalable and energy-efficient enough to deliver an adequate return on investment (ROI).Insourcing can be viewed as outsourcing as seen from the opposite side. For example, a company based in Japan might open a plant in the United States for the purpose of employing American … 
Outsourcing definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement