• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The new era of Offshore IT Outsourcing.

Extracts from this document...

Introduction

Essay 4-101 Moushomi Sinha The new era of Offshore IT Outsourcing Information Technology outsourcing is the process of contracting out an organization's IT functions, eliminating the need to maintain on-site staff to perform those functions (Lieberman 7). These business functions are usually outsourced to companies in developing nations and have a very significant impact on the economic and social setup of both countries. For centuries the production of goods and materials has been outsourced to countries like China. However, outsourcing of IT is a relatively recent phenomenon that started as the technology landscape in the United States became more and more competitive. Over the last few years software corporations have looked for ways to keep their profit margins high by reducing the costs. That combined with the evolution of technology industry in lesser developed parts of the world has given rise to the phenomenon of outsourcing. Outsourcing software development, especially to India, has become extremely popular over the last few years, and picked up even more momentum lately. ...read more.

Middle

It gave him the opportunity to travel the world. His career was flourishing when suddenly his company started outsourcing work to India. Since then, his career has been on the downslide. He has been struggling to find a secure, well paying job. The only jobs that he seems to find are the ever diminishing contracting opportunities. (Worthen 1) Like many other Americans, he was strongly opposed to the H1 visa program that allowed software engineers from India, China and other countries to work in the US. Such opposition and the high unemployment rate led the US government to slash the visa limit for skilled foreign workers in the US (Lochhead 1). This was a positive step for US technology workers like Daniel but wasn't nearly enough to reduce the pace at which companies were sending jobs to countries like India and China. In India, the software industry is booming and the picture looks bright and rosy for the Indian software engineer. ...read more.

Conclusion

Having grown familiar with their offshore partners, corporations are now handing over more complex work (Lieberman 13). This means increased number of job losses for the service sector in the US. Some consider outsourcing as a threat to the national security of America because of the nature of jobs that are getting outsourced. As firms export critical business and technical knowledge, they risk losing core competencies, in-house expertise, and future talent. The future of America's competitive R&D prowess is being challenged because of outsourcing (Lieberman 23). Outsourcing is increasingly taking stronger roots in America and around the world. The demand for cheap labor coupled with availability of skilled workers in less developed parts of the world has led to this phenomenon. Even though it continues to meet with resistance in countries where jobs are lost everyday, it hasn't lost its momentum and is increasingly becoming an integral part of the way companies do business and stay competitive. This is changing the dynamics of the business industry and has a very strong impact on social and economic fabric of the countries around the world. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Peer reviewed

    William H. Gates.

    4 star(s)

    He sits on the board of the ICOS Corporation and is a shareholder in Chiroscience Group of the United Kingdom and its wholly owned subsidiary, Chiroscience R&D Inc. (formerly Darwin Molecular) of Bothell, Wash. He also founded Corbis Corporation, which is developing one of the largest resources of visual information

  2. Download services

    Programmers who release the freeware often want to "give something to the community", but also want credit for their software and to retain control of its in future development. Sometime when programmers decide to stop developing a freeware product, they might give the source code to another programmer or release the product's source code to the public.

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    potentially disaster would strike but there would be many ways in which they could protect specific fields such as data. The 3 examples of force majeure would be earthquakes, floods and storms nowadays terrorism would widely come into consideration. The same technique of backups would be the first idea to

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    my essay, I collected information from various types of materials for example: I used books, Journal Articles, Newspaper Articles, Government Publication, Law and media related websites e.g. Out-law , BBC and Lecture slides. The books that I used to get information from are Information Technology Law book edition third and fifth.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Type Maximum length 10BaseT Unshielded Twisted Pair 100 meters 100BaseT Unshielded Twisted Pair 100 meters Token Ring Computers are connected in circle so the signal travels around the network from one computer to another in a logical ring. It's called token ring because it involves token passing.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    for physical damage and the use of shielded cabling would make cables harder to tap. Line tapping cannot be detected at lower levels of the ISO OSI model (physical and link layers) thus detection and prevention must be carried out higher up in the model.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work