News

04:51 PM
Connect Directly
Twitter
Facebook
Google+
RSS
E-Mail
50%
50%

Further Reflections on Outsourcing

Subsequent to my recent post and article about alternatives to offshore outsourcing, Ed Williams of EWA reached out with some of his thoughts

Subsequent to my recent Editor's Note and article about alternatives to offshore outsourcing, Ed Williams of EWA reached out via e-mail with some further thoughts.It's not clear that Williams meant to address the following comment left in response to the Note, but he might as well have:

A student out to "make a buck" or your average retiree does not have either the maturity or the skill set required to do the job in these areas. And getting them to the point of being able to do what India has been doing for years now will take a dedicated educational infrastructure to bring it about.

Of course retired IT professionals could very well have skills on par with anyone anywhere, but the commenter makes an excellent point. Here's what Mr. Williams had to say:

1. The federal Government allows the affected unit to bid and compete with outsourcing (on-shore). I am not aware of U.S. industry allowing the affected group to compete.

2. Greater involvement from internal and outside auditors on cost and savings, before and after the deal. Hold the management responsible for outsourcing to achieve savings.

3. Our best Universities are educating international students to compete against us. They should have a preference for U.S. student admissions. Federal and state govt. need to offer scholarships, tax benefits lower cost loans to encourage our young people to study technology.

4. Develop centers on American Indian territory.

5. Increase corporate internships for disadvantaged American students.

Mr. Williams' point might be synthesized as follows: To some extent offshore outsourcing might enjoy more advantages than it ought to owing to a lack of domestic interest in developing under-utilized talent at home (points 3 to 5), and also due to a lack of internal scrutiny at the businesses that use it (points 1 and 2).

I'd be interested to hear whether others (who may prefer to remain anonymous) agree that insufficient efforts are made by companies to seek alternatives and whether, as Ed suggests, management is often less than diligent in evaluating the success of outsourcing initiatives, placing CYA before ROI.

Other comments on the subject are welcome, provided the commentor doesn't misread me as saying that offshore outsourcing is an unmitigated good for everybody-and doesn't affect to have "obvious" arguments without being willing to expose them to scrutiny. Losing your job stinks, but outsourcing is simply part of the world we live in.

Posted by Anthony O'DonnellSubsequent to my recent post and article about alternatives to offshore outsourcing, Ed Williams of EWA reached out with some of his thoughts

Anthony O'Donnell has covered technology in the insurance industry since 2000, when he joined the editorial staff of Insurance & Technology. As an editor and reporter for I&T and the InformationWeek Financial Services of TechWeb he has written on all areas of information ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.