Research & Insight

IT Applications

Explosive Growth Digital Transformation

Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc

A successful digitalization strategy is critical to insurance firms’ survival. This white paper examines effective strategies for overcoming internal obstacles to digital transformation and the crucial role data plays in any insurance carrier’s business. Additionally, it clarifies the foundational capabilities that are key to a successful digital transformation initiative. They include: Driving business transformation with …

Top Ten Reasons Why Outsourcing Fails | White Paper

Outsourcing Center, Karthik Nagendra, Business Writer

The rich and long history of outsourcing—now around 200 years if you consider outsourcing for agriculture, manufacturing, accounting and now medical opinion—has evolved to be a more complex process over the years. Today’s outsourcing is for tasks that are mission critical for enterprises worldwide. These include outsourcing for high-end tasks such as product design and …

The Key to IT Transformation | Article

Outsourcing Center, Karthik Nagendra, Business Writer

When a practicing physician and a Ph.D. in biochemistry/molecular genetics decided to co-found a new company, it wouldn’t be amiss to expect that it would operate in the healthcare industry. Jamison Feramisco, as co-founder of a secure web and mobile application that enabled remote diagnosis of dermatology cases, dramatically reduced wait times for patients while …

Top 9 Innovation Trends in Outsourcing for 2015

Outsourcing Center, Staff Writer

Robotics, Analytics or Multi-channel enagagement? This report explores the innovative practices businesses are implementing in their outsourcing agreements. It is based on 100 in-depth interviews with senior outsourcing buyers. More than four fifths (83%) of buyers say they have experienced innovation in their outsourcing relationships Nine in ten (92%) say their outsourcing partners want to …

Reducing Costs While Improving Patient Safety

GAVS Technologies

How healthcare providers are cutting costs and improving patient care by integrating IMS, Compliance, Business Intelligence and Mobility solutions According to Gartner, the pace and magnitude of IT-enabled changes in the healthcare sector will increase dramatically during this decade. Highly available, aware and responsive infrastructures are fast becoming the focus of CIOs, with attention shifting …

The Impact of Wearable Mobile on MDM Strategies

Outsourcing Center, Patti Putnicki, Business Writer

Move over, Rolex. Step aside, Armani. If the predictions hold true, tomorrow’s corporate climbers will all be ditching the designer accessories for the next big thing: namely, wearable computing devices. From smart watches to augmented reality glasses and contact lenses, today’s emerging tech toys have the potential to become tomorrow’s most valuable business tools. You …

Criminals Turn to Outsourcing to Launch Distributed Denial of Service Attacks

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Here’s one sign that outsourcing has become an accepted global business strategy: the criminals have adopted it! Yes, friends, neighbors and countrymen, criminals are hiring IT experts to perform distributed denial-of-service (DDoS) attacks, which effectively bring down Websites. NSFOCUS, Inc., a company that provides enterprise-level network security solutions and services, tracked 168,459 individual DDoS attacks …

How Texting, Veterans and SEO Helped RPO Companies Fill High-Demand Jobs

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Even as the economy has improved worldwide, the unemployment figures are still stubbornly high. But talking to HR and recruitment process outsourcing (RPO) executives, they are working overtime to fill certain jobs. Sometimes the skill set is too much in demand or just rare. In other cases, it is near impossible to reach the right …

The Two Cups of Coffee Attack and Other Data Security Breaches You May Never Suspect

Outsourcing Center, Patti Putnicki, Business Writer

You’ve spent a lot of time securing your company’s data—with firewalls and intrusion detectors, passwords and policies. You’ve invested in vulnerability tests to identify your weakest links and conducted penetration testing to find out if these vulnerabilities could turn into liabilities. But, with all these security precautions in place, one guy, carrying two cups of …

Open Hybrid Clouds: The Best of Both Worlds

Outsourcing Center, Karthik Nagendra, Business Writer

Everyone loves hybrid models. Who doesn’t want the best of both worlds? IT organizations everywhere crave “a little bit of this and a little bit of that” approach to spread their risk. They want to keep control over infrastructure, business critical apps, data and processes that help preserve IP or enable a competitive edge while …

Let’s talk more

Consult Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.