Outsourcing-weblog - outsourcing-weblog.com - The Outsourcing WeblogThe Outsourcing Weblog - Best Practices and Resources for smart outsourcing - outsourcing, bpo, offshoring, bpo outsourcing, outsource, outsourcing services, bpo services
General Information:
Latest News:
Outsource IT Trend Grows 1 Apr 2013 | 01:29 am
© ComputerMonger US federal agencies are spearheading a growing trend towards outsourcing IT services, and federal chief information officer Vivek Kundra expects that trend to accelerate over the nex...
EXLService BPO Outsources Work 22 Mar 2013 | 08:59 am
EXLService has recently made a decision to outsource their BPO services. BPO services worth $ 91 million are going to be outsourced. EXL will make use of existing funds and close the deal. The deal i...
Get a Business Credit Card of your Choice 8 Mar 2013 | 01:32 pm
When you are tired of hearing your employees whine about not getting reimbursements, you know it's time to get a business credit card. There are two types of such cards: small business and corporate c...
CFOs Still Refrain From Outsourcing Finance And Accounting Services 3 Mar 2013 | 12:13 pm
© zolierdos Businesses largely outsourcing cloud-computing strategies are still refraining from outsourcing their finance and accounting operations, reports Ovum a part of the Informa Group. Even th...
What Does It Mean To Outsource Your Sales Associates? 30 Nov -0001 | 12:00 am
In recent times, the word "outsourcing" has gained some negative connotations, often associated with American companies sending jobs overseas. Many contend that as a result, economic growth in the nat...
about me 30 Nov -0001 | 12:00 am
I write about offshore outsourcing based on first hand experience. Currently I own and manage an Internet development company with offices in Vancouver Canada and Makati City Philippines. During this...
IT Outsourcing in China 30 Nov -0001 | 12:00 am
© Global X China has often been criticized for lax data privacy protection by IT outsourcing companies, but the government's new proposal for data security guidelines may go too far in the opposite d...