Feeds

IT outsourcing not catching on with small.biz

Why are they missing the boat?

High performance access to file storage

Small firms are falling behind in outsourcing IT functions, a new survey has revealed.

According to research by the Irish Computer Society (ICS), IT outsourcing has become common practice in Irish organisations, with some 72 per cent taking advantage of the services.

Smaller IT departments, however, appear to be holding on to their services inhouse, despite the traditional assumption that these firms would be more likely to farm out their IT applications.

"The fact that small organisations in Ireland are outsourcing IT services less than their larger counterparts perhaps suggests that outsourcing service providers do not focus their sales efforts on smaller firms," author of the study, Brian Kennedy of Lake Communications, said.

"However, a more worrying alternative explanation is that smaller organisations do not yet fully appreciate the relevance of IT in achieving strategic goals and sustainable competitive advantage over the long-term."

The study found that the most popular reason to outsource was to allow firms to offer extra IT services while concentrating on core competencies, rather than an attempt to reduce costs - although cost reduction is a consideration.

Less than four per cent of organisations outsource their IT functions completely. Some of the most outsourced services include hardware maintenance, application development, and application support.

"The complexity of managing information within organisations is increasing, requiring more resources to successfully administer," the study said. "Coupled with this fact is the information technology/information systems functions attempt to align itself closer to the organisation, grow its business value and subsequently move up the value chain. Outsourcing is seen as a method of achieving both of these outcomes."

The main reasons why 28 per cent of the Irish firms questioned haven't opted to outsource IT services are: uncertainty about the providers' ability to supply the required level of service, apprehension about gaining outsourcing benefits and goals, and concerns about the management of the outsourcing provider.

Copyright © 2007, ENN

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.