Research & Insight

IT Applications

Explosive Growth Digital Transformation

Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc

A successful digitalization strategy is critical to insurance firms’ survival. This white paper examines effective strategies for overcoming internal obstacles to digital transformation and the crucial role data plays in any insurance carrier’s business. Additionally, it clarifies the foundational capabilities that are key to a successful digital transformation initiative. They include: Driving business transformation with …

Top Ten Reasons Why Outsourcing Fails | White Paper

Outsourcing Center, Karthik Nagendra, Business Writer

Here are our top 10 reasons why outsourcing fails. The rich and long history of outsourcing—now around 200 years if you consider outsourcing for agriculture, manufacturing, accounting, and now medical opinion—has evolved to be a more complex process over the years. Today’s outsourcing is for tasks that are mission-critical for enterprises worldwide. These include outsourcing …

The Key to IT Transformation

Outsourcing Center, Karthik Nagendra, Business Writer

Do you know the key to IT transformation? When a practicing physician and a Ph.D. in biochemistry/molecular genetics decided to co-found a new company, it wouldn’t be amiss to expect that it would operate in the healthcare industry. Jamison Feramisco, as co-founder of a secure web and mobile application that enabled remote diagnosis of dermatology …

Overcoming the Winner’s Curse

J Ben Trowbridge

Unlike most auctions, both buyers and service provicers in an IT outsourcing transaction pay if the winning service provider offered an irrational price to get the deal. Stephen Dunn offers tips to buyers on how to avoid the winner’s curse.

Top 9 Innovation Trends in Outsourcing for 2015

Outsourcing Center, Staff Writer

Robotics, Analytics or Multi-channel enagagement? This report explores the innovative practices businesses are implementing in their outsourcing agreements. It is based on 100 in-depth interviews with senior outsourcing buyers. More than four fifths (83%) of buyers say they have experienced innovation in their outsourcing relationships Nine in ten (92%) say their outsourcing partners want to …

Reducing Costs While Improving Patient Safety

GAVS Technologies

How healthcare providers are cutting costs and improving patient care by integrating IMS, Compliance, Business Intelligence and Mobility solutions According to Gartner, the pace and magnitude of IT-enabled changes in the healthcare sector will increase dramatically during this decade. Highly available, aware and responsive infrastructures are fast becoming the focus of CIOs, with attention shifting …

The Impact of Wearable Mobile on MDM Strategies

Outsourcing Center, Patti Putnicki, Business Writer

Move over, Rolex. Step aside, Armani. If the predictions hold true, tomorrow’s corporate climbers will all be ditching the designer accessories for the next big thing: namely, wearable computing devices. From smart watches to augmented reality glasses and contact lenses, today’s emerging tech toys have the potential to become tomorrow’s most valuable business tools. These …

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Here’s one sign that outsourcing has become an accepted global business strategy: the criminals have adopted it! Yes, friends, neighbors and countrymen, criminals are hiring IT experts to perform distributed denial-of-service (DDoS) attacks, which effectively bring down Websites. NSFOCUS, Inc., a company that provides enterprise-level network security solutions and services, tracked 168,459 individual DDoS attacks …

How Texting, Veterans and SEO Helped RPO Companies Fill High-Demand Jobs

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Even as the economy has improved worldwide, the unemployment figures are still stubbornly high. But talking to HR and recruitment process outsourcing (RPO) executives, they are working overtime to fill certain jobs. Sometimes the skill set is too much in demand or just rare. In other cases, it is near impossible to reach the right …

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

Outsourcing Center, Patti Putnicki, Business Writer

You’ve spent a lot of time securing your company’s data—with firewalls and intrusion detectors, passwords and policies. You’ve invested in vulnerability tests to identify your weakest links and conducted penetration testing to find out if these vulnerabilities could turn into liabilities. But, with all these security precautions in place, one guy, carrying two cups of …

Connect with a Sourcing Advisor

"*" indicates required fields

Let’s talk more

Consult Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.