Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

OUTSOURCING NEWS

The top 10 IT outsourcing service providers of the year

Feb. 9, 2016 | STEPHANIE OVERBY

Everest Group’s inaugural service provider awards name Cognizant, Accenture and IBM the top three outsourcing providers. In addition, Accenture is highlighted as ‘leader of the year’ for continuing to transform itself and HCL as ‘star performer’ of the year for its embrace of innovative service models.

Read more...

BLOGS AND OPINIONS

6 ways to help your employees work smarter, not harder

Given that Singapore is currently well on its way to becoming a Smart Nation - a nation empowered by the latest in technology - it seems senseless that our workplaces still rely so heavily on outdated tools like email, spreadsheets and phone calls to manage our day-to-day.

Read more...

Combating fraud and cyber risks: more management impetus needed

If the current regulatory enforcement environment and market reaction to instances of alleged fraud and cyber breaches are signs of greater accountability to come, it is time that organizations take a harder look at their risk preparedness – and this has to begin with a mindset change right from the top.

Read more...

OUTSOURCING WHITE PAPERS

Seven Things To Consider Before Migrating To NG9-1-1

Stratus

What happens when new technology introduces new challenges to industries such as Public Safety? Next generation 9-1-1 is on the horizon, while this overhaul of the nation’s 9-1-1 system, the transition for your PSAP does not have to be overwhelming.

Download

Global Connectivity Index 2015

Huawei

There's a world of opportunities out there, as the global economy is becoming more digitised. Our 2015 Global Connectivity Index will help you explore the endless possibilities of a Better Connected World.

Download

The State of Mobile Application Insecurity

IBM

Customer need and demand often affect mobile application security. The “rush to release” phenomenon challenges an organization’s ability to address the risks of data leakage and malware. What are other organizations doing to combat mobile security challenges?

Download

MULTIMEDIA