• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Application Maintenance Outsourcing Is On The Rise

    February 27, 2012 Dan Burger

    Like a horror movie sequel, the outsourcing of application maintenance work has brushed off the dirt of its would-be grave and is on the prowl again, thirsty for the blood of programmers here in the USA. Outsourcing never really died. It just fell off the pace that was being set prior to 2009, when the trend stumbled rather badly thanks to the Great Recession.

    According to a recently released study by Computer Economics, the number of organizations that are outsourcing application maintenance work has risen during the past two years to near pre-recession levels.

    After a peek at this report, titled Application Maintenance Outsourcing Trends and Customer Experience, I can toss out a few chilling statistics. To begin with, 37 percent of organizations surveyed outsourced some application maintenance work in 2011. That’s 10 percent higher than 2009, and just slightly below the 40 percent that outsourced application maintenance in 2007.

    CE noted that 2009 took its toll on application development in general, which led companies to assign programmers to maintenance work and partially wiped out the need to outsource maintenance.

    Although IT capital spending on an upward swing, it still lags behind the spending of just a few years ago. As spending increases, the demand to upgrade applications is expected to once again lead to more outsourcing of maintenance.

    Hiring of IT staff has been stifled because of the two-year steady increase in application maintenance outsourcing. CE doesn’t anticipate much increase in hiring until the economic recovery shows more signs of strength.

    Application maintenance is one of the most popular IT functions to turn over to outside service providers, according to the survey results CE has turned into a report. In addition to examining application maintenance outsourcing trends–the frequency of application maintenance and the average amount of work outsourced–this report includes the level of satisfaction and dissatisfaction that companies have experienced. To this point, the report examines costs compared to level of service. The entire report (19 pages and 14 figures) is available from Computer Economics for $195. It can be ordered on the company website.

    RELATED STORIES

    IT Salaries, Staff Counts Reflect Weak Economy

    Small Biz To Boost IT Spending In 2012, Says Computer Economics

    Post-Recession IT Jobs and Spending Lackluster, Surveys Say

    Freelancers Wanted: Outsourcing Opportunities for Job Seekers

    Computer Economics Sees Optimism in 2011 IT Budgets, Too



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    With COVID-19 wreaking havoc, cybercriminals are taking advantage of the global impact that it has had on our families, our businesses and our societies. It is more important now than ever to ensure that IT systems are protected, so that when all of this is behind us, we can get back to business as usual as quickly as possible.

    iSecurity Anti-Ransomware protects organizations against ransomware attacks and other kinds of malware that may access and change business-critical data on your IBM i. It even protects against zero-day attacks. Anti-Viruses can only report on the damage an attack has caused, but not stop it.

    iSecurity Anti-Ransomware has been recently enhanced with a Self-Test feature that allows you to simulate a ransomware attack on your IBM i. The simulated attack is limited to the test folder and cannot harm any other folders or files. This new feature lets organizations see how they are protected against known or unknown ransomware.

    Key Features:

    • Real-time scanning for known and unknown ransomware threats.
    • Blocks and disconnects the intruder.
    • Instantaneously sends alerts to SIEM as well as the offending computer.
    • Self-Test for attack simulation
    • Classification of the attack based on log.
    • Automatic updates with the most current ransomware definitions.

    Contact us at https://www.razlee.com/anti-ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Why Can’t I Access My Remote System’s AS/400 IFS? Tenable Adds IBM i Support to Security and Configuration Tool

    Leave a Reply Cancel reply

Volume 21, Number 8 -- February 27, 2012
THIS ISSUE SPONSORED BY:

ProData Computer Services
Maxava
Abacus Solutions
Micro Focus
RJS Software Systems

Table of Contents

  • IBM Winds Down Power7 Gen 1 Entry Servers
  • The Application RISC Machine System/500
  • Xerox Launches IAAS Cloud for Power Systems, Intel Servers
  • Thinking Strategically About IT As A Service
  • Mad Dog 21/21: Slim’s Simmering SIMs
  • Reader Feedback On: Big Blue Pulls The Plug And As I See It: Overrated
  • looksoftware Hosts
  • Nips And Tucks For IBM Power Systems Trade-In Rebate Deal
  • Magic Posts Mad Profit Surge, Declares FY11 ‘Best Ever’
  • Application Maintenance Outsourcing Is On The Rise

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Need An RPG Programmer? Nalashaa May Have You Covered
  • Every Day Has To Be Earth Day
  • Guru: Compare Pieces Of Source Members
  • As I See It: Ambivalence
  • IBM i PTF Guide, Volume 23, Number 16
  • Query Supervisor Gives Database Engineers New Power
  • IBM Unveils New and Improved IBM i Services
  • 3 Takeaways from the 2021 PowerTech Security Report
  • Four Hundred Monitor, April 14
  • IBM i PTF Guide, Volume 23, Number 15

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.