Feeds

Firms should beware e-business ‘black hole’

Outsource instead, suggests outsourcing firm

  • alert
  • submit to reddit

The essential guide to IT transformation

Firms which choose to run and manage their e-business systems and infrastructure in house are throwing resources down an IT "black hole", according to new research out today.

E-business specialist PSINet Europe found a staggering 115 million person hours of working time would be wasted across Europe dealing with an activity related to internal hosting - 23 times more hours than were needed to organise and run the Sydney Olympics in 2000.

According to the research, UK firms alone would lose an incredible 31 million man hours in 2003 because they were underestimating the amount of time, capital, equipment, services, planning and management required to keep their infrastructure on track.

The research found, rather than being a costly undertaking for companies, targeted investment in outsourcing of infrastructure could have considerable benefit and firms did not need to make a stark choice between e-business based competitiveness and cost-cutting.

Author of the study, Scott Smith, said the days of running your e-business infrastructure on a shoe string were long gone along with the ability of businesses to survive by cobbling together systems with minimal staff, equipment and know-how.

"Even if a single company believes it is technically feasible to do it themselves, in almost every case the 'hidden costs' mean it does not make economic sense.

"Outsourcing is not in itself a silver bullet - but now more than ever it represents a cost-effective way of getting additional value from a company's human and technology assets while extending reach and capabilities," he said.

And Stephen Scott, UK Managing Director for PSINet Europe, said the black hole the research had identified should act as a warning shot across the bows of every business looking to save money or cut costs through bringing their IT infrastructure in house.

"Firms are rightly looking for ways to unlock value from their ICT spend, but too often the management and complexity of in-sourcing is ignored in the decision-making process, only to rise up and hit them later on," he warned. ®

Copyright © 2003,

Next gen security for virtualised datacentres

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.