Business of Information Technology  >   Business Processes  >  

Outsourcing

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Strategic Sourcing
DEFINITION:  Insourcing is a business practice in which work that would otherwise have been contracted out is performed in house. Insourcing often involves bringing in specialists to fill temporary needs or training existing personnel to perform tasks that would otherwise have been outsourced. An example is the use of in-house engineers to write technical manuals for equipment they have designed, rather than sending  … 
Definition continues below.
OutsourcingReports
26 - 50 of 213 Matches Previous Page  | Next Page
Protecting Mission-Critical Manufacturing Data with an ERP Firewall
sponsored by OpenText GXS
WHITE PAPER: Find how an ERP Firewall can capture business process and data quality errors, so outsourcing data doesn't create mayhem within your company.
Posted: 02 Jun 2014 | Published: 31 Jul 2013

OpenText GXS

Maximizing the Benefit of B2B Integration
sponsored by OpenText GXS
WEBCAST: Integrating SAP and B2B systems can provide significant operational benefits and ROI, but it's a substantial investment and a complicated process. However, by using managed services for your SAP B2B integration project, you can eliminate the hassle.
Posted: 30 May 2014 | Premiered: May 30, 2014

OpenText GXS

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

4 Reasons to Outsource Your DNS
sponsored by Dyn
WHITE PAPER: Minimizing network downtime is a top priority for all IT departments and this informative whitepaper explores 4 top reasons to outsource your DNS.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Dyn

The Virtue of Virtual Infrastructure
sponsored by SearchHealthIT.com
EBOOK: Read this handbook from searchHealthIT.com to see how some healthcare facilities have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance. Additionally, gain in-depth insight about the challenges to outsourcing healthcare IT operations.
Posted: 21 Mar 2014 | Published: 26 Mar 2014

SearchHealthIT.com

6 Reasons to Use One Vendor for WFO and Contact Center Infrastructure
sponsored by Genesys
EBOOK: Many organizations are looking to outsource their contact center infrastructure or workforce optimization (WFO) in order to reduce costs and increase efficiency. However, some forward-thinking companies are outsourcing both from the same vendor, in an interconnected environment.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Genesys

Site visit programs fuel outsourcing success
sponsored by Hewlett-Packard Limited
WEBCAST: Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program.
Posted: 11 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Industrialised delivery: The next stage in outsourcing evolution
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

HP's Industry Leading Offshore Capability
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast introduces an industry-leading offshore capability designed with a new age of people and applications in mind.
Posted: 10 Mar 2014 | Premiered: Oct 25, 2013

Hewlett-Packard Limited

Why MSPs Trust IBM System z
sponsored by IBM
WHITE PAPER: This resource presents IBM System z architecture as a strong choice for deployment by MSPs based on its high ratings in customer satisfaction, profitability, quality of operational delivery, and more.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

IBM

Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?
sponsored by Dimension Data
WHITE PAPER: This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Dimension Data

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

Webinar: Accelerating Your Approach to Managed Services
sponsored by N-able Technologies
WEBCAST: Tune in now to access a helpful how-to playbook for understanding best business practices for your organization as a managed services provider (MSP).
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Key Considerations for Choosing Colocation
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide will teach you what you should consider when selecting a colocation facility and find out the difference between colocation and cloud hosting.
Posted: 23 May 2014 | Published: 23 May 2014

CenturyLink Technology Solutions

Colocation Planning and Pitfalls to Avoid
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide will help you avoid the pitfalls of picking a data center colocation facility and teach you the importance of data center tiers.
Posted: 22 May 2014 | Published: 22 May 2014

CenturyLink Technology Solutions

Magic Quadrant for Worldwide Managed Print Services
sponsored by Insight and HP
RESOURCE: This resource hashes out the strengths and cautions of 10 different managed print services (MPS) providers, separating the leaders from the niche players and everyone in between.
Posted: 21 May 2014 | Published: 21 Oct 2013

Insight and HP

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

Application Testing Survey Results
sponsored by AdvizeX Technologies
WHITE PAPER: Software testing is a critical component of application delivery -- no matter what industry you're in -- in order to ensure applications meet your business needs. Unfortunately, software testing is often underfunded -- so how are successful organizations balancing budgets with testing strategies?
Posted: 10 Mar 2014 | Published: 10 Mar 2014

AdvizeX Technologies

The 7 Biggest Mistakes You Can Make in Web Conferences
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix Online Go To Meeting

Mitigating the Risks of Outsourcing
sponsored by Hewlett-Packard Company
WHITE PAPER: When opting for an outsourcing program, CIOs should check the reliability, financial stability and reputation of service providers, advices Shailesh Joshi, head of corporate IT at Godrej Industries. Get further outsourcing insights in this resource.
Posted: 06 Nov 2013 | Published: 06 Nov 2013

Hewlett-Packard Company

Data Protection and Disaster Recovery: How to look after your critical data
sponsored by Iron Mountain
EBOOK: Check out this informative paper to explore an off-site data protection solution that guarantees your data's longevity, even in the face of a disaster. Read on to learn more.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Iron Mountain

Is Your Outsourcing Strategy Under Your Control?
sponsored by SearchDataCenter.com
WHITE PAPER: Proactive planning and evaluation can prevent common problems with IT outsourcing providers, keeping your data safe and ensuring your outsourcing venture is cost-effective.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

SearchDataCenter.com

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

Cloud & Outsourcing - Why Partnering Strategies Matter
sponsored by IBM
WHITE PAPER: Explore how outsourcing motivations have changed and why you should adapt your sourcing strategies to keep up.
Posted: 13 Sep 2013 | Published: 31 May 2013

IBM
26 - 50 of 213 Matches Previous Page    1 2 3 4 5    Next Page
 
OUTSOURCING DEFINITION (continued): …  the work to an outside technical writing firm. In this example, the engineers might have to take technical writing courses at a local college, university, or trade school before being able to complete the task successfully. Other challenges of insourcing include the possible purchase of additional hardware and/or software that is scalable and energy-efficient enough to deliver an adequate return on investment (ROI).Insourcing can be viewed as outsourcing as seen from the opposite side. For example, a company based in Japan might open a plant in the United States for the purpose of employing American … 
Outsourcing definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement