Close

Sourcing Speak

Updated:

Are You Protected When Your Suppliers Lose Your Data?

Suppliers of IT outsourcing services limit their responsibility for paying damages arising from the loss of customers’ sensitive data (whether or not intentionally lost by the supplier). Only a few years ago, it was commonplace in an IT outsourcing agreement for a supplier to agree to be responsible for any…

Updated:

Two In a Box Transition Management

Once the ink is dry on a signed outsourcing contract, the real work begins for the customer and the service provider. Before the customer can start to realize any savings, efficiencies or service improvements, the parties must first complete the critical task of transitioning from the customer to the service…

Updated:

Outsourcing Your Tweets and Walls

A recent survey conducted by Duke University’s Fuqua School of Business and the American Marketing Association yielded some interesting findings, including: Social marketing budgets are anticipated to increase significantly over the next few years, possibly reaching 18% of total marketing budgets by 2015; and 72% of companies had outsourced some…

Updated:

Sourcing Enterprise Projects – Understanding and Meeting the Challenges (part 2 of 2)

In part 1 of this discussion we described two front end challenges that, if not properly anticipated and addressed, can (and very often do) derail successful completion of enterprise projects. We’ll now turn to the downstream transactional considerations that can help position a project for success. The Right Contract Architecture…

Updated:

“Whole Brain” Outsourcing

There is an inherent “right brain / left brain” tension in procuring outsourced services. The right side of the brain seeks innovative service delivery solutions and emphasizes relationship building with the supplier. The left brain seeks a high level of supplier accountability for performance, competitive pricing and favorable contractual terms.…

Updated:

Sourcing Enterprise Projects – Understanding and Meeting the Challenges (part 1 of 2)

In last two decades, much of the attention of customers and advisors has focused on outsourcing under the managed services model. The outsourcing era began with infrastructure outsourcing, which evolved from time sharing and facilities management. This was followed by outsourcing of applications maintenance and support and, on a parallel…

Updated:

Pillsbury Hosts Cloud Security Alliance Federal Cloud Security Summit

On June 22, Pillsbury hosted the first annual Federal Cloud Security Summit, organized by the Washington, DC, chapter of the Cloud Security Alliance (CSA-DC). The keynote address was presented by Sonny Bhagowalia, former Deputy Associate Administrator with the GSA’s Office of Citizen Services and Innovative Technologies and current CIO of…

Contact Us