Home » 2009 » September (Page 6)

Outsourcing is definitely a familiar concept, however, to brush it up again, off shore outsourcing basically means the companies in US or other countries send work to countries like India, China, Philippines and so on.

Continue reading Continue reading

What is a ‘social innovation camp’? In a nutshell, Social Innovation Camp uses the web to solve real life problems.

Continue reading Continue reading

From September 2 to September 3, IBA organized a series of meetings between IBM EE/A, IBA, the Belarusian State University (BSU), the Belarusian State University of Informatics and Radioelectronics (BSUIR) and the Gomel State University (GSU) in Minsk, Belarus.

Continue reading Continue reading

Bianor will present innovative and award-winning enterprise mobile technologies during the international IT expo CeBIT Bilisim Eurasia.

Continue reading Continue reading

Offshore outsourcing providers are coming up with new pricing models in response to more demanding customers. Mid-tier provider MindTree is publicizing its hybrid pricing model, which it says combines the best of both time-and-materials and fixed-price models.

Continue reading Continue reading

The mobile parental control solution – Call Control will be presented for the first time during the international IT expo CeBIT Bilisim Eurasia. Call Control is a joint project of Bianor and WebGate.

Continue reading Continue reading

Troubled Outsourcing Arrangements: Strategies and Tips for Managing Difficult Issues, presented by Mayer Brown

Continue reading Continue reading

At Intalio we started looking at taking part of our software development work offshore in late 2004.

Continue reading Continue reading

Despite the downturn in the overall economy, budgets for IT dev projects are on the rise in 2009, according to the majority of senior business leaders and software development professionals surveyed by IDC.

Continue reading Continue reading

The certificate proves high level of BMS Consulting qualification in information security vulnerability management, allows to provide authorized network perimeter scanning services and determine information security vulnerabilities according to the ASV program and PCI DSS requirements.

Continue reading Continue reading