Feeds

Why did your outsourced IT fall over? Cos you weren't on Twitter

Gartner: Get on social networks to monitor contractors

Eight steps to building an HP BladeSystem

The days of signing off an IT contract then kicking back and scoffing peanuts for the next three years are over.

Executives will have to constantly monitor their outsourcers - even if it means using social networks - if they want to get value for money, according to Gartner analysts in a startling report for 2013.

Companies should constantly keep in touch with contractors to ensure their IT services remain up to date and responsive, we're informed.

Sourcing managers, who were ordered to cut costs in 2012 as top brass squeezed spending, had to continually monitor the performance of contractors via tools including social networks to keep a grip on things.

The use of social websites - presumably Twitter, Facebook, Google+ and others - is one of the big four trends that will affect how business IT contracts will be commissioned and supervised in 2013, said Linda Cohen, an analyst and vice-president at Gartner. The other three are mobile - linked to employees bringing their own devices into work - and cloud computing and how information is managed.

IT bosses will have to consider all of this at once when commissioning contracts if they want their computer systems to work properly in 2013, said the report.

Gartner Analytics predict trends for 2013, credit Gartner

Wondering what the Nexus of Forces looks like? This is what it looks like. Credit: Gartner

Data management can't be separated from mobile strategy which can't be separated from how frequently the CIO is in contact with the contract provider, Gartner warned.

The move towards employees using their own devices for work, aka Bring Your Own Device (BYOD), will require new broader contracts, we're told. Cloud computing will require more flexible contracts as information and data streams are prone to change, and social will change how outsourcers deal with contractors.

A compartmentalised view of trends will only end in a mess, said Cohen: "Social, information, mobile and cloud shouldn't be considered in isolation."

For those still confused, she went on in more detail:

The convergence of these forces, which Gartner calls the Nexus of Forces, is what drives real business value. The Nexus of Forces converge in several ways: cloud, mobile and social solutions enable the distribution of information, social media usage and behavior drive mobile and information solutions, and cloud can be a foundation for information, social and mobile solutions.

Based on research, Gartner made several recommendations: first, IT execs constantly refresh their sourcing strategies. Second, commissioners constantly assess all the data streams and information sources in a business and choose cloud services that allow them to adapt on the go. Third, they have a flexible but secure service that can be extended to new devices as employees bring different ones in.

It all means more work landing on the sourcing manager's desk. You can find Gartner's report here and comment over here. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.