• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Outsourcing, Offshoring on the Rise in North America, Evans Data Survey Says

    May 30, 2006 Timothy Prickett Morgan

    While the CEOs and CIOs of the world don’t like to talk about their outsourcing and offshoring practices, the people in the trenches–the developers–who are effected by the outsourcing and offshoring decisions that get made in the boardroom are happy to talk about it. And, if a survey of North American programmers done by Evans Data is any indicator, the practice of using outside programmers is on the rise.

    According to the Spring 2006 North American Development survey, which is based on polls of 450 developers, among those companies polled, companies have increased their use of contract programmers by 18 percent in the past year and have boosted their overall outsourcing budgets by 25 percent. In the corporate enterprise segment–by which Evans Data means mission-critical, data center applications–spending on outsourcing increased by 37 percent in the past year and accounted for 57 percent of the development effort. Of those companies polled, offshoring–meaning, sending the development to an overseas region–was now a practice in use at 37 percent of the companies polled, up 20 points from a year ago. The study also showed that small and medium businesses were increasingly interested in outsourcing and offshoring.

    “The focus has shifted away from outsourcing or offshoring simply to save costs toward strategic talent acquisition of more highly qualified workers who have been trained in the technology areas that are driving business process change and revenue generation,” explained John Andrews, president of Evans Data. “We see this trend continuing to play a critical role going forward as the pressure on IT to be ever more agile and innovative will only increase.”

    Some 69 percent of developers polled said that Linux was now a valid platform for mission-critical applications, and moreover that they expected their companies, in aggregate, to have a 50 percent Linux adoption rate in their data centers by the end of 2006. Significantly, Ajax, the mix of JavaScript and XML that has recently been given a shiny new name, has seen an 11 percent increase in adoption for application development. And, within the next 24 months, about 40 percent of companies expect to have rolled out wireless extensions to their applications.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 22 -- May 30, 2006

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware/

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Setting Up Unattended i5 Server IPLs The Inside Stories of the Innovation Award Winners

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 22

This Issue Sponsored By

    Table of Contents

    • Symantec Enterprise Software Has a Big Security Hole
    • IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning
    • Server Sales Decline for the Second Straight Quarter
    • Database Sales Grew in 2005, Say IDC and Gartner
    • IBM to Buy SAP? Why Not?
    • Outsourcing, Offshoring on the Rise in North America, Evans Data Survey Says
    • Business Continuity Planning Part 2: Disaster Without Warning
    • DataMirror’s Sales Decline in Its Fiscal First Quarter
    • As I See It: Net Reality
    • IBM Names Eight New IBM Fellows, But Forgets One

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • 2021 Predictions for IBM i: Part Two
    • Zend Server for IBM i Now 64-Bit, Available Via RPM
    • New IBM i Logo, Publication
    • Four Hundred Monitor, January 20
    • IBM i PTF Guide, Volume 23, Number 3
    • IBM i Software And Power Systems Upgrades Keep Rolling Forward
    • Preparing For What’s Next In A Thoughtful, Structured Way
    • Guru: Fall Brings New RPG Features, Part 3
    • ARCAD Plugs IBM i DevOps Suite Into Microsoft Azure
    • Park Place Buys Curvature To Become Maintenance Goliath

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2021 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.