IT Outsourcing

IT Outsourcing is the use of external service providers to deliver IT services, such as application development & maintenance, as well as infrastructure solutions for businesses not generally in the tech business, allowing the customer organization to focus on their main business or cut costs and maintain their position in the marketplace. This can also include software-as-a-service (SaaS), Cloud & Mobile solutions, as well as cyber-security and other related IT managed services.

Image

Jeff Romano

Managing Principal, WGroup
Content Chairperson
Ask the expert

Jeff Romano brings over 30 years experience in outsourcing facilitation, transition, governance design and operations experience in addition to IT procurement, program management and general operations management to WGroup. He has held posi...

Digital Labor – Impact on Outsourcing

The past two years have seen tremendous technological advancements in robotic process automation (RPA), intelligent automation, cognitive computing and Artificial Intelligence (AI). These disruptive technologies have moved from hype to reality, as the benefits of “digital labor” eclipse the benefits of physical labor. Nowhere more acutely is this felt than by the outsourcing community. Read […]

By- Raheem Hasan

Want to Improve Business Outcomes in Outsourcing Deals?

Enhancing customer satisfaction and generating improved results from outsourcing programs requires good communication, shared responsibilities and clear objectives. But many deals often need even more. Outsourcers and their clients should consider service integration solutions as a way to improve business outcomes in their projects.

By- Outsourcing Institute

Cybersecurity Governance: Five Reasons Your Strategy May be Flawed –...

As threats to cyber security become increasingly ominous, sophisticated and unpredictable, CIOs must address risks ranging from denial of service attacks to natural disasters to disgruntled employees. Global organizations must also manage complex networks of service providers and scores of third-party suppliers, many of whom have access to customers, sensitive data and critical technology. In […]

By- Alsbridge

Advanced laaS Security and Operations Transparency

Beth Cohen, Senior Infrastructure Architect, Cloud Technology Partners and Pete Nicoletti, Director of Security and Solutions, Virtustream discuss data center security and validating security.

Agile Offshore Software Development Teams

Mike Sadowski, Software Development, Independent Consultant discusses software development outsourcing – a bit of history, typical pitfalls of offshore software development, agile dedicated teams – the modern approach and best practices.

Industry Leader Roundtable: Advice on the High Regulatory World of...

In part II of this two-part interview, Frank Casale, Founder and CEO of the Outsourcing Institute sits down with Peter Iannone of Alsbridge and Gene Chao of CSC to offer insight and advice for Service Providers in the high regulatory world of Financial Services.

Industry Leader Roundtable: The Barriers & Breakthroughs of Defining Digital...

In Part I of this two-part interview, Frank Casale, Founder and CEO of the Outsourcing Institute, sits down with Peter Iannone of Alsbridge and Gene Chao of CSC to discuss the Barriers and Breakthroughs of Defining Digital in the World of Banking

RevAmerica 2015 – Frank Casale, Founder and CEO of Institute...

WALNUT CREEK, CA, April 01, 2015 /24-7PressRelease/ — Ahilia Inc., a global services, outsourcing and technology marketing consultancy, today announced that Frank Casale, the founder and CEO of the Institute for Robotic Process Automation (IRPA), will lead an industry panel on one of the hottest subjects in the outsourcing marketplace – Robotic Process Automation. Ahilia […]

NEC Telecom Software Philippines Streamlines Internal Quality Initiatives with Parasoft...

NEC Telecom Software Philippines (NSP) is located in Manila and is a subsidiary of NEC Corporation of Japan. NSP develops technologies for broadband and mobile communications, as well as IT and network solutions that meet the highest level of customer satisfaction with their high-quality output.

How to Avoid Being Overrun by Shadow IT

When business users—and sometimes even IT personnel—“go rogue” and deploy unsanctioned equipment and applications, a lot of problems can occur. Here’s a guide to the causes, implications and solutions of shadow IT.