X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 outsourcing assessment


Why and How Outsourcing Management and Governance is Critical to Outsourcing Success
Organizations undertaking information technology and business process outsourcing typically are very focused on

outsourcing assessment  provider. When evaluating an outsourcing relationship, we often see organizations limiting their assessment to what is in the contract. More often, they need to perform a full relationship health assessment to test and measure continued effectiveness of the relationship. Top Tip: Don't wait until the ink is dry to evaluate the desired type of relationship with your service provider. Use these six relationship components as part of the evaluation process and openly communicate your expectations. OM/G

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Business Process Outsourcing (BPO)

Business process outsourcing (BPO) services manage critical front- and back-office processes that can include human resources and accounting as well as customer-related services such as contact center services. 

Evaluate Now

Documents related to » outsourcing assessment

Outsourcing Challenges: Avoid the Pitfalls


Outsourcing can provide management with a powerful tool to control cost and enhance product and service delivery. Yet so many outsourcing initiatives fall short of expectations—why? For one thing, you need to know what you’re getting into, by going through an intense request for proposal (RFP) process and many rounds of contract negotiations. Find out how to better manage negotiating your outsourcing contract, and more.

outsourcing assessment   Read More

The Impact of Technology on Cost in Business Process Outsourcing


Many different factors contribute to the cost of a business process outsourcing (BPO) engagement. Among them, IT, especially software, is a key cost determinant that is often underestimated. A diligent assessment of BPO needs to address several cost components that are not included in the provider’s total contract value (TCV)—components which are often overlooked by buyers.

outsourcing assessment   Read More

The Whys and Hows of a Security Vulnerability Assessment


TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?

outsourcing assessment   Read More

Selecting an Outsourcing Provider-Art or Science?


As there are many different categories of outsourcing services, there are also many outsourcing providers. With many different aspects to consider, how can a company ensure they have made the right choice in selecting one?

outsourcing assessment   Read More

Gaining Advantage through Early Case Assessment


Courts are issuing sanctions more frequently for inadequate search methodology, and recent opinions have highlighted the need for quality in search methodology. This article provides some helpful best practices for searching, and describes how those practices can be implemented with off-the-shelf tools that enable attorneys to perform the searches in a defensible manner while avoiding sanctions.

outsourcing assessment   Read More

Outsourcing, IT Infrastructure


The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical types of activities that these providers perform include data center operations; network operations; backup/recovery services, data storage management services; system administration services; end user support of desktop PCs, laptops, and handheld devices; web site, or application hosting, etc.

outsourcing assessment   Read More

Nova Outsourcing Services


Nova offers services in C#, VB.NET, .Net 3.0, DotNetNuke (DNN), ASP.Net, Windows Forms, Web Services, SQL Server, etc. As a provider of .Net technology, it provides service packages for information security, enterprise infrastructure, and management processes.  

outsourcing assessment   Read More

Outsourcing Security Part 3: Selecting a Managed Security Services Provider


As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security services provider.

outsourcing assessment   Read More

How to Ensure IT Outsourcing Value in the Public Sector


In the public sector, where it’s often more about process than the business case, recompeting a current outsourcing relationship doesn’t always make the most sense for ensuring continued value. Due to the cost and time investment in the recompete process, it can often cause more problems than solutions. In many cases, outsourcing agreements simply need to be updated to meet changing business requirements. Find out how.

outsourcing assessment   Read More

Outsourcing, Applications Software Software Evaluation Report


The outsourcing application software Software Evaluation Report criteria are appropriate for selecting outsource providers in the area of business software development. It includes all activities performed by outsource providers including software development; software maintenance; software reengineering or rearchitecting; porting software to a new platform; and more.

outsourcing assessment   Read More