Outsourcing is more than just a fad now. It’s a strategic decision made by enterprises to realize business goals. During the initial days, outsourcing found its high in the obvious cost savings it delivered. But apparently this cost cutting turned out to be the nemesis of enterprises as they were left high and dry by their cheap service providers with no business results on hand. And the market realized that outsourcing was more than just cost containment. Today, outsourcing is powered by a new philosophy that stresses on quality, reliability, and dependability in addition to cost reduction.
Read More XII Commandments for Successful Outsourcing
In the past, I have contributed on topics like innovation management and open innovation. I have always been a big fan of innovation. But then recently I stumbled upon the term “fabrication”. I was talking to this friend of mine who works in the R&D department of an IT company. We were debating about product lines and how to expand or diversify them. As the debate heated up, he very passionately announced, “I would rather innovate than fabricate!”
Read More Product Development – Innovate or Fabricate?
Over the past decade, we have witnessed a number of breakthrough technologies emerge on the horizon. Ruby on Rails (RoR) is one such technology that has raised the bar for application development. Originally extracted by the Danish programmer David Heinemeier Hansson, RoR has matched wits with other popular programming languages. But RoR took the programming world by storm when Apple announced that it would ship RoR with Mac OS X v10.5 Leopard. Ever since that day, RoR has not looked back!
Read More Ruby on Rails & Its Key Aspects
When it comes to enterprise systems, the one common thread running through all of them is their intent to improve enterprise decision making. All of them support disparate processes and cycles. But at the end of the day the bottom line is to improve the quality and time of decision making. The same is true in case of enterprise content management system popularly known as ECM.
Read More Mobile ECM
In March 2011, RSA – EMC’s security division – sent shockwaves through the industry as it announced a sophisticated cyber-attack on its SecureID system. Theft of unspecified information from SecureID has left marring scars and lot of red faces. But at the same time it has raised a lot of questions for IT industry as a whole.
Prior to the attack, SecureID was a benchmark in two-factor authentication system. But the attack proves that just having a strong security mechanism is not enough. We cannot just deploy a security system and hang up our boots expecting it to take care of everything. We have to be vigilant at all times and keep testing the security of our IT setup. In other words, we need to regularly conduct an IT audit.
Read More Information Technology Audit