Featured Documents related to
Outsourcing Supply Chain Planning Processes
Supply chain planning tools deliver potentially tremendous savings when well implemented, and wreak havoc when they fail. A company considering an outsourcing
of offshore business process outsourcing (BPO) and application development and maintenance (AD/M) providers, have convinced many companies to outsource their business process and software development activities (see Outsourcing 101—A Primer ). For a company considering an outsourcing strategy for their supply chain planning (SCP) processes, there are some unique aspects that should be addressed, since both BPO and AD/M may come into play. First, the quality and performance of SCP solutions are critical
Outsourcing--Applications Software RFI/RFP Template
Employees, Application Software Related Experience, Processes and Tools, Certifications and Accreditations, Industry Skills and Experience, Domain Skills and Experience, Application Softwar...
Get this template
Business Process Outsourcing (BPO)
Business process outsourcing (BPO) services manage critical front- and back-office processes that can include human resources and accounting as well as customer-related services such as contact cen...
Start evaluating software now
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
U.S. Minor Outlying Islands
United Arab Emirates
United States (USA)
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Enterprise Software Product Outsourcing: A Fresh Perspective for Mid-market Vendors
Creating outsourcing centers is a viable option for companies under pressure to develop quality products with tight time and budget restraints. Mid-market
outsourcing, and business process outsourcing has been big buzzwords for the past five years, and everyone seems to want to get on the outsourcing bandwagon . Some large vendors have even gone ahead to set up their own development centers in outsourcing countries such as India and Russia. But what about mid-sized vendors that currently develop their enterprise-level software products in US or other high cost countries and want to outsource their product development? They have limited resources and
Outsourcing Security Part 1: Noting the Benefits
Without effective security, companies risk losing money and customer trust. With good security, companies have the power to maintain stakeholder value, customer
notes the benefits of outsourcing security. Part 2 will evaluate the cost of such an outsourcing. Part 3 will provide guidelines for selecting a security services provider Open for Business E-commerce and e-business initiatives inspire companies to move toward an open, distributed network-computing environment. These environments are designed to enable employees, customers, partners, suppliers, and distributors to exchange and access information critical to conducting business. Unfortunately, these same
Outsourcing Security Part 2: Measuring the Cost
Evaluating the cost of outsourcing can be challenging because most organizations cannot fully estimate the financial impact of such a decision.
organizations of all sizes, outsourcing security is becoming an increasingly attractive method for maintaining a strong security posture. In fact, outsourced security is the fastest growing segment of the information security services market, according to a recent Gartner Dataquest study. Often, the decision to outsource security is based on cost: Can the company effectively outsource or co-source security management functions while still realizing a good return on investment? The following is part two
Selecting an Outsourcing Provider-Art or Science?
As there are many different categories of outsourcing services, there are also many outsourcing providers. With many different aspects to consider, how can a
an Outsourcing Provider-Art or Science? Introduction Many companies base their outsourcing provider selection on only one aspect of the outsourcing relationship. Some decide on a perception of cultural fit and on the rapport and relationship developed during the sales cycle between the company's senior management and the outsource provider's sales representative and executive team. A number of companies drive their selection process via a checklist-driven, skill-matching process that attempts to
VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone
Introduction VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice.
Nova Outsourcing Services
Nova offers services in C#, VB.NET, .Net 3.0, DotNetNuke (DNN), ASP.Net, Windows Forms, Web Services, SQL Server, etc. As a provider of .Net technology, it
Outsourcing Services Nova offers services in C#, VB.NET, .Net 3.0, DotNetNuke (DNN), ASP.Net, Windows Forms, Web Services, SQL Server, etc. As a provider of .Net technology, it provides service packages for information security, enterprise infrastructure, and management processes.
The Many Flavors of Application Software Outsourcing
Many companies are looking to outsource development and maintenance of their application software. Common reasons that companies outsource application software
Flavors of Application Software Outsourcing Defining the Problem In the 1990s many companies rushed to upgrade or replace their legacy software prior to January 1, 2000—affectionately known forevermore as Y2K. There was fear and concern that many legacy software applications would be unable to handle the requirements of a change in the first two digits of a four-digit year in date fields. A large number of companies chose to purchase and implement new software packages that handled most of their
Best Practices: Financial Due Diligence and the Outsourcing of Freight Bill Audit and Payment
There are significant advantages to outsourcing freight bill audit and payment (FBAP), not the least of which is the potential for reduced costs. And while
Due Diligence and the Outsourcing of Freight Bill Audit and Payment There are significant advantages to outsourcing freight bill audit and payment (FBAP), not the least of which is the potential for reduced costs. And while nothing can be outsourced without some risk, there are a number of steps that can be taken to ensure a successful relationship and minimize the financial risk to the outsourcer. Know what steps your company can take to ensure you get the most out of outsourcing FBAP.
Procurement Outsourcing: 10 Things Companies Really Want to Know
Procurement Outsourcing: The 10 Things Companies Really Want to Know draws upon recent discussions with dozens of companies that are exploring outsourcing
companies that are exploring outsourcing services. Jason Gilroy and colleagues draw upon their years of procurement expertise to provide answers to common questions surrounding the outsourcing of procurement services.
New Product Development and Introduction (NPDI)
New product development and introduction (NPDI) is probably the most important process for many companies, but also one of the least understood. While NPDI is
Product Development and Introduction (NPDI) New Product Development and Introduction (NPDI) If you receive errors when attempting to view this white paper, please install the latest version of Adobe Reader. New product development and introduction (NPDI) – SAP provides a comprehensive set of solutions for managing your end-to-end NPDI processes. Source : SAP Resources Related to New Product Development and Introduction (NPDI) : New Product Development (Wikipedia) New Product Development and
Outsourcing Management Software Tools: An Executive Point of View
Large-scale, complex outsourcing deals have produced equally complex management issues. Indeed, the leading cause of missed expectations in outsourcing is poor
of View Large-scale, complex outsourcing deals have produced equally complex management issues. Indeed, the leading cause of missed expectations in outsourcing is poor governance—after the deal is signed. For this reason, executives can benefit tremendously from outsourcing management tools, including third party vendors. Where and how do they work? And what is the cost in terms of time and money?
Application Software Services: Outsourcing, Applications Software Competitor Analysis Report
The outsourcing application software knowledge base criteria are appropriate for selecting outsource providers in the area of business software development. It
Competitor Analysis Report The outsourcing application software knowledge base criteria are appropriate for selecting outsource providers in the area of business software development. It includes all activities performed by outsource providers including software development; software maintenance; software reengineering or rearchitecting; porting software to a new platform; and more.
Retro-sourcing: A Safety Net for Outsourcing Engagements
Retro-sourcing refers to the processes involved in reversion control for outsource engagements. It allows proper care and protection to be related to a plan of
A Safety Net for Outsourcing Engagements Retro-sourcing refers to the processes involved in reversion control for outsource engagements. It allows proper care and protection to be related to a plan of return for development and service delivery. This can help you control unexpected and risk-laded initiatives, particularly in first-time outsourcing engagements. Learn about the six stages of retro-sourcing, and how they can help you make better-informed decisions.
The Truth about Data Mining
Who the Heck Needs ROI?
Justification of ERP Investments Part 1: Quantifiable Benefits from an ERP System
Vendor Spotlight: Agresso
A Traditional "Local Touch" Leader Espouses a More Global Vision
Who to Blame for Project Failure? Look Up-Not Down, Not Left, Not Right
Reaching the Peak of CMMI: How Fast Can You Climb?
Today's Discrete ERP Landscape: Trends, Challenges, and Solutions
Employee Training in a Recession
Factors Inhibiting the Widespread Adoption of Business Performance Management
Welcome to the CRM Showdown: Microsoft Dynamics CRM vs. NetSuite CRM+
Three Ways ERP Can Help Manage Risk and Prevent Fraud
A Road Map to Electronic Medical Record System Implementation
What's Holding Back Online Appointment Booking?
Business Intelligence: Its Ins and Outs
Business Performance Management Basics: An Overview of Business Performance Management and Its Benef
The Business Model for the 21st Century Is Project-centric
Weather the Recession with Project ERP
How to Measure Customer Satisfaction
Managing the Overflow of E-mails
The G-word: Do Businesses Touting Green Really Practice What They Preach?
Contemporary Business Intelligence and Its Main Components
Squeeze Play in the Supply Chain Management Market
"Evergreen"-Environmental Regulations for High-tech and Electronics, Chemical, and Oil and Gas Indus
Off-loading Some Green Compliance Burdens: Can Enterprise Applications Meet the Challenge?
University and Student Programs
Meet TEC's Experts
Software Evaluation Reports
Features and Functions
Interactive Case Studies
News and Press Releases
TEC Case Studies
Working at TEC
White Paper Newsletters