Business of Information Technology  >   Business Processes  >  

Outsourcing

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Strategic Sourcing
DEFINITION:  Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house. Insourcing often involves bringing in specialists to fill temporary needs or training existing personnel to perform tasks that would otherwise have been outsourced. An example is the use of in-house engineers to write technical manuals for equipment they have designed, rather than sending  … 
Definition continues below.
OutsourcingReports
1 - 25 of 200 Matches Previous Page  | Next Page
IBM brings ROI to BYOD
sponsored by IBM
WHITE PAPER: Explore this resource to learn about how managed mobility and BYOD services brought return on investment to two enterprise organisations over the course of three years. Read on now to find out more.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

IBM

Building the business case for continuity and resiliency
sponsored by IBM
WHITE PAPER: In this resource, discover what IT professionals are saying about IT risk management strategies and how you can add depth and breadth to your own business.
Posted: 25 Aug 2014 | Published: 30 Jan 2014

IBM

Six steps to effective reputational and IT Risk Management
sponsored by IBM
WHITE PAPER: This resource highlights 6 tips to effectively manage reputational and IT risk in order to protect and enhance brand value and competitive standing.
Posted: 25 Aug 2014 | Published: 30 Sep 2013

IBM

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Orbitz For Business Delivers 300-500% ROI With Outsourced Lead Generation
sponsored by Invenio Marketing
CASE STUDY: This case study discusses the advantages of outsourcing lead generation and appointment setting, and the profitable results Orbitz saw from these services.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Invenio Marketing

BT Ireland Calls Acronis for Server Recovery
sponsored by Acronis
CASE STUDY: This exclusive case study covers a telecommunications data center provider that needed to improve its time for recovering failed servers.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

Acronis

Bechtle Remote Services Chooses Acronis® for High Availability
sponsored by Acronis
WHITE PAPER: This exclusive case study details a remote disaster recovery service that needed to improve its support to provide a better service to customers.
Posted: 16 Jul 2014 | Published: 16 Jul 2014

Acronis

Hold on Loosely: Data Center Outsourcing in the Modern Age
sponsored by SearchDataCenter.com
EBOOK: Prior to outsourcing your data center, make sure all of the loose ends are tied up and the intangibles are known.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

SearchDataCenter.com

How EDM Group Solves Automation Challenges of the Digital Mailroom
sponsored by Perceptive Software
VIDEO: Find out which industry-leading product helped an information management services provider gain a competitive edge over their peers, and solve the unique automation challenges of the digital mailroom.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

Perceptive Software

Lead Management Services Infographic: Client Results and Benefits
sponsored by Invenio Marketing
RESOURCE: Companies that specialize in lead generation and sales services can help you get the high number and high quality of leads that you require. View this infographic to explore the benefits that telecom clients are realizing from sales and lead generation services.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Invenio Marketing

Computer Weekly – 24 June 2014: Betting on World Cup success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to gambling site Betfair about the IT challenges of preparing for the football World Cup. We examine the strategy of cloud software pioneer Salesforce.com as it grows its role in the IT department. And we explain erasure coding – an emerging method for protecting storage hardware. Read the issue now.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

ComputerWeekly.com

Outsourcing Infrastructure: An Insightful TCO Analysis of On-Premise vs. Outsourced Workloads
sponsored by Rackspace
WEBCAST: This exclusive whitepaper will help you make an informed decision on whether or not you should outsource your IT services.
Posted: 18 Jun 2014 | Premiered: Jun 18, 2014

Rackspace

Dell ProSupport: Time is Money
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper details and IT management partner that will help you by catering its services to your organization's needs.
Posted: 17 Jun 2014 | Published: 23 May 2014

Dell, Inc. and Intel®

Outsourcing Mid-to-Back Office Processes: Where Should You Be Investing?
sponsored by OpenText GXS
WHITE PAPER: Find out how outsourcing non-core competencies allows security firms to focus on improving the overall client experience while managing processes to remain compliant.
Posted: 13 Jun 2014 | Published: 30 Apr 2014

OpenText GXS

Protecting Mission-Critical Manufacturing Data with an ERP Firewall
sponsored by OpenText GXS
WHITE PAPER: Find how an ERP Firewall can capture business process and data quality errors, so outsourcing data doesn't create mayhem within your company.
Posted: 02 Jun 2014 | Published: 31 Jul 2013

OpenText GXS

Maximizing the Benefit of B2B Integration
sponsored by OpenText GXS
WEBCAST: Integrating SAP and B2B systems can provide significant operational benefits and ROI, but it's a substantial investment and a complicated process. However, by using managed services for your SAP B2B integration project, you can eliminate the hassle.
Posted: 30 May 2014 | Premiered: May 30, 2014

OpenText GXS

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Site visit programs fuel outsourcing success
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Industrialised delivery: The next stage in outsourcing evolution
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

HP's Industry Leading Offshore Capability
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast introduces an industry-leading offshore capability designed with a new age of people and applications in mind.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Key Considerations for Choosing Colocation
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide will teach you what you should consider when selecting a colocation facility and find out the difference between colocation and cloud hosting.
Posted: 23 May 2014 | Published: 23 May 2014

CenturyLink Technology Solutions

Colocation Planning and Pitfalls to Avoid
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide will help you avoid the pitfalls of picking a data center colocation facility and teach you the importance of data center tiers.
Posted: 22 May 2014 | Published: 22 May 2014

CenturyLink Technology Solutions

Magic Quadrant for Worldwide Managed Print Services
sponsored by Insight and HP
RESOURCE: This resource hashes out the strengths and cautions of 10 different managed print services (MPS) providers, separating the leaders from the niche players and everyone in between.
Posted: 21 May 2014 | Published: 21 Oct 2013

Insight and HP

The Virtue of Virtual Infrastructure
sponsored by SearchHealthIT.com
EBOOK: Read this handbook from searchHealthIT.com to see how some healthcare facilities have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance. Additionally, gain in-depth insight about the challenges to outsourcing healthcare IT operations.
Posted: 21 Mar 2014 | Published: 26 Mar 2014

SearchHealthIT.com
1 - 25 of 200 Matches Previous Page    1 2 3 4    Next Page
 
OUTSOURCING DEFINITION (continued): …  the work to an outside technical writing firm. In this example, the engineers might have to take technical writing courses at a local college, university, or trade school before being able to complete the task successfully. Other challenges of insourcing include the possible purchase of additional hardware and/or software that is scalable and energy-efficient enough to deliver an adequate return on investment (ROI).Insourcing can be viewed as outsourcing as seen from the opposite side. For example, a company based in Japan might open a plant in the United States for the purpose of employing American … 
Outsourcing definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement