Feeds

Let's all go to India

Offshore IT: bowing to the inevitable?

  • alert
  • submit to reddit

High performance access to file storage

Offshoring, which has been popular in the financial services industry for years, is arguably the biggest threat to indigenous IT careers in North America and Europe. IT workers will want to try to prevent the mass exodus of jobs to cheaper labor markets, but such protests are likely to have minimal effect in the end.

Hardly a week goes by without one of the big IT players like Microsoft, Intel, IBM, Dell, Sun Microsystems, or Hewlett-Packard announcing plans to set up a hardware or software engineering center in a popular offshoring region. Tech support and call center functions have also been moved offshore in an effort to cut costs.

The Washington Alliance of Technology Workers, an IT union, has posted a presentation purportedly made by Brian Valentine, senior vice president of the Microsoft Windows division. He explained that offshoring means a company can extend its workday across several time zones to work virtually around the clock in all parts of the globe. This can shorten time to market, particularly if offshored programmers are checking code that is written in the home market. Code is written one day and validated before the start of the next day.

But the real issue with offshoring is the cost savings it can bring to all types and sizes of companies. IT organizations can tap into the vast engineering resources in India - Mr Valentine said that there are 450,000 software engineers in India, with another 70,000 added every year. He also said that Indian programmers can deliver quality work for 50% to 60% of the cost of a programmer back in the US. Because of the lack of indigenous jobs in their own countries, those working in offshoring operations in India, China, and so forth are happy to take short-term jobs. What choice do they have?

And what choice will IT organizations have to fight the temptation to offshore? The availability of cheap, deep IT talent is something that they will all want to take advantage of. Workers in the IT industry will want to organize to try to stop this, but the pursuit of the almighty profit will probably prevail in the end.

© datamonitor logo

Datamonitor is offering Reg readers some of its technology research FOC. Check it out here.

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.