Industry news

  • 4 May 2012 12:00 AM | Anonymous

    IBM has announced an agreement to acquire analytics software firm Tealeaf Technology. The acquisition is subject to customary closing conditions and regulatory clearance, and is expected to close in the second quarter of 2012.

    With this agreement, IBM extends its Smarter Commerce initiative by adding qualitative analytics capabilities that provide chief marketing officers (CMOs), e-commerce and customer service professionals with real-time and automated insights into online customer buying experiences across online and mobile devices.

    “Tealeaf's patented technology can be deployed into a business’s current environment with no needed modifications so they begin capturing customer data and delivering optimal experiences immediately,” said Rebecca Ward, Chairman and Chief Executive Officer, Tealeaf. “IBM Smarter Commerce is the perfect fit for Tealeaf and further establishes IBM as the leading partner for businesses looking to succeed in today’s fast evolving environment.”

  • 3 May 2012 12:00 AM | Anonymous

    Google has successfully defeated Microsoft in competing for the US Department of the Interior (DOI) contract worth $35 million to supply email and cloud apps.

    The seven year contract which had originally placed Microsoft as the preferred vendor has been won by Google after a lawsuit claiming bias towards Microsoft. The Google proposal was $14 million less than the proposal offered by Microsoft according to the Wall Street Journal.

    Microsoft have said: “Although we are disappointed by this award, we will engage with our partners and DoI to review and understand the reasons for this decision.”

  • 3 May 2012 12:00 AM | Anonymous

    BSkyB extends there partnership with global BPO outsourcing company, Firstsource Solutions, in a three year contract to provide and increase customer service management support.

    The contract will cover Sky’s customers of more than 10 million across its TV and broadband services, and will include the expansion of customer service sites to Belfast and Cardiff which will together employ over 900 staff.

    Matthew Vallance, Firstsource’s CEO and Managing Director, said: “Our addition of new facilities to support the expansion of Sky’s business marks an exciting juncture in our relationship, and provides us with a platform for a wider and deeper partnership.”

  • 3 May 2012 12:00 AM | Anonymous

    arvato has won a contract to provide benefits assessment services for Derby City Council. The contract was won based on Arvato’s flexible approach and from the results of an initial contract set up in 2011.

    The contract was tendered in order to combat the rise in benefits application seen by Derby Council of 14 percent in the past four years.

    Kath Gruber, director of customer management, Derby City Council, said: “We were impressed with the close working relationship and best practice shared by arvato in our initial contract.”

  • 3 May 2012 12:00 AM | Anonymous

    The National Audit Office (NAO) has criticised Government transparency regarding work carried out by the Major Project Authority (MPA) worth £376 billion, while praising improvements carried out.

    Of 205 projects under the MPA only 39 had confidence ratings in the red of amber/red, yet the MPA reported this year that only half of the 205 projects had been delivered effectively within budget.

    Amyas Morse, head of the NAO, said: “If the new system is to be ‘built to last’, the Major Projects Authority needs to carry out the initial commitments to public reporting and be part of a more fully integrated assurance across government.”

  • 3 May 2012 12:00 AM | Anonymous

    German based SAP, the largest producer of enterprise software have tendered a contract to provide mobile marketing to Amazon.

    The mobile market software called Afaria will provide customers with an economic way of managing smartphone and tablet devices.

    SAP intends to double revenue from mobile products during the year from last year’s $145 million turnover. Yesterday the New York close saw Amazon fall stock fall by 0.1 percent while SAP fell 0.2 percent in Frankfurt.

  • 3 May 2012 12:00 AM | Anonymous

    Living in a day and age where technology is advancing so fast and companies are rapidly moving to the cloud, there is a growing importance to protect IT infrastructure and ensure that the security systems are in place to do this.

    The fact that data and networks can be accessed anywhere in the world through cloud raises a number of concerns and security issues for many companies but there are a series of protocols that should be adopted to reduce the likelihood of security being breached.

    The following steps can be implemented to protect your infrastructure when going to the cloud.

    - Assuming that a suitable firewall solution has been put in place to protect the perimeter, you should then look to your servers, ensuring that they are constantly patched and up to date with the latest versions of programs and software.

    There are processes that you can follow to ensure your server is kept up to date and has the necessary patches to keep it safe from known vulnerabilities. You should configure Automatic Updates to make sure you are getting the Critical updates as soon as possible. Things like feature changes and device driver updates won’t come automatically with Automatic Updates, but at least your infrastructure will be protected against the vulnerabilities most likely to compromise its security.

    - Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them so it is advisable to ensure that any servers are protected from all types of malware to include computer worms and Trojans.

    - An intrusion prevention system (IPS) should be used to monitor the network and/ or system activities to identify malicious activity, log information about said activity and attempt to block or stop, and report activity.

    Once all of the above is in place, the data needs to be made secure. Encryption is commonly used in protecting information within many companies, both ‘at rest’ and ‘in transit’, for example, data being transferred via networks or stored on a hard drive. Some different examples of this are Virtual Private Networks (VPN), Full Disk Encryption (FDE) and Transport Layer Security (TLS) commonly used for email encryption during transmission.

    As a business grows, it might expand to multiple sites across the country and around the world. To keep things running efficiently, the people working in those locations need a fast, secure and reliable way to share information across computer networks. In addition, travelling employees like salespeople need an equally secure and reliable way to connect to their business's computer network from remote locations.

    One popular technology to accomplish these goals is a Virtual Private Network (VPN). The VPN uses "virtual" connections routed through the Internet from the business's private network to the remote site or employee. By using a VPN, businesses ensure security - anyone intercepting the encrypted data can't read it.

    A strong authentication method is key to ensuring there is no unauthorised access to your network. Onyx recommends the use of Two Factor Authentication (2FA), which makes use of the principle “something you have (token), and something you know (PIN). There are other methods of authentication available today such as biometric data readers for fingerprint or even iris scanning.

    In addition to all of this, regular vulnerability assessments need to be performed to identify, quantify and prioritise the vulnerabilities in a system. Finally a penetration test will evaluate the security of a system by simulating an attack. Effective tests will provide an assessment of the potential impacts to the organisation and outline a range of technical and procedural countermeasures to reduce risks.

    When it comes to securing your data when moving into the Cloud, you can never be totally sure but you can take steps to reduce the risk of a security breach. Securing an IT infrastructure is an ongoing process that should always be reviewed.

  • 3 May 2012 12:00 AM | Anonymous

    Taking the Agile approach

    Agile. Look it up in a dictionary and you’ll find it means ‘able to move quickly and easily, able to think and understand quickly.’ Try a thesaurus, and you’ll see ‘alert, lively, and energetic’ as some alternative suggestions. When you’re implementing an IT programme or software update, you need a way of working that is all these things. You need the Agile approach.

    What is Agile? It’s an innovative, contemporary approach to IT solutions that brings speed and responsiveness, super productivity and rapid results. It makes traditional methods seem heavy and awkward, with their insistence on upfront schedules and predetermined outcomes. With Agile, small teams – a maximum of ten people – work in short bursts (sprints) on software projects. Small increments of the vertical capability and functionality are delivered at the end of each sprint, with the product owner fully involved at each stage and daily stand-ups keeping everyone posted.

    This fast-paced, exciting way of working is perfectly married to the concept of near shore outsourcing. Constant, close communication is key, so working with a team which is a short flight away, or with just an hour’s time difference for phone calls, is reassuring. Issues can be raised and resolved almost instantly. Complex projects can be dissected into manageable chunks. You can easily review software on screen – not feasible with the type of time differences associated with offshoring.

    Sprint periods offer a clarity of understanding that’s virtually impossible under traditional methods. Highly motivated team members work closely together to decide what they’ll deliver at the end of each sprint, guided by the scrum-master, who oversees the whole project.

    There are some other clear benefits to combining near shore outsourcing with Agile:

    • Projects are typically implemented in a third of the time and at half the cost of offshoring

    • You’ll be able to access highly experienced technical staff with 15+ years’ experience

    • The culture and education system in near shore locations like Barcelona are closely aligned to the UK, making it easier to adopt shared working practices.

    Don’t just take my word for it – a recent Forrester survey shows that Agile speeds time-to-market, yields better quality results and enables early detection and mid-course correction of issues.

    It’s a successful, interactive approach which keeps you informed and involved at all times. While offshoring makes the Agile approach impractical to say the least, near shoring makes it a pretty perfect way of working.

  • 2 May 2012 12:00 AM | Anonymous

    In my last post, I discussed the different levels of complexity associated with e-Invoicing using EDI and digital signatures. I concluded that while digital signatures are slightly less complex to set up than EDI, it’s important to decide which method is best for your company based on a variety of factors including your trading partners' preferred methods.

    In this blog, I will focus on how effective EDI and digital signatures are at keeping your data secure.

    E-Invoicing by nature involves transmitting sensitive data about your company. However, as VAT law doesn’t focus on information security, measures to protect sensitive data are left to trading partners themselves to manage. Invoices contain information such as pricing details, discounts or information relating to traded materials. These details are valuable competitive and commercial information so it is imperative that security is front of mind when an e-Invoice exchange takes place. With that in mind, how do the two e-Invoicing frameworks handle this challenge?

    European Directive 1994/820/EC guarantees that security is intrinsic in correctly implemented EDI. It states that EDI networks have to be secure to ensure the authenticity and integrity of the document and that it is received exactly as sent. The network is therefore secure by default and e-Invoices can be transferred between companies in a safe manner without risk of a breach in data confidentiality, and the processes within the EDI network guarantee that any errors are captured and dealt with appropriately.

    Digital signatures are flexible and less complex than EDI which means they can be sent through a variety of means, including over the internet or in an email. However, this simplicity comes at a price as these transfer methods are not necessarily secure and could lead to breaches in security. To ensure the protection of digitally signed invoices, businesses must send them over secure protocols, including a protected B2B portal.

    EDI as a standalone remains the most secure platform out of the two due to its compliance with 1994/820/EC and the secure processes that are inherent within such networks. When evaluating data confidentiality within an e-Invoicing solution, consider the diversity in the marketplace. If both EDI and digital signatures are used by your trading partners the solution should accommodate this variation.

    You can learn more about all aspects of e-Invoicing at www.einvoicingbasics.co.uk.

  • 2 May 2012 12:00 AM | Anonymous

    The vast majority of organisations across the globe heavily rely on software and applications to carry out their day-to-day operations. The smooth running of this software is something that cannot be taken for granted, especially when the consequences are considered. Not only can disruption heavily impact on a company’s ability to engage in its core activities, flawed or dysfunctional software can also lead to breaches in security.

    This is the enduring relationship between software testing and information security. Without stable, quality software, chances of a security breach markedly increase. In short, software testing is a crucial part of the software development and update cycle.

    Several different methods have been used by businesses to test their software – and there has been a gradual movement from one to the next.

    One approach is to carry out all software testing in-house. This has its benefits, as the company has complete control over the process, but from an economic perspective, many organisations cannot employ a complete team of dedicated software testers, particularly during periods of high demand. An alternative tactic used by many companies is to appoint an independent testing firm, or freelance contractors to perform the testing at the client organisation’s offices, either independently or alongside their own testers.

    This was followed by complete offshore outsourcing of the process, to firms with a dedicated workforce based overseas, where the process could be carried out using more cost-efficient labour. However, there are disadvantages associated with transferring such a sensitive process so far away, with regards to quality control and communication across what can be large time zone differences.

    This gradual trend from one method to the next was predominantly driven by a desire to reduce outlay, while still ensuring rigorous testing.

    It is the most recent technique, however, that has managed to combine the price reduction of international outsourcing, with the control and efficiency that comes with doing things a little closer to home. Software testing can now be undertaken by testing firms, remotely on their own site here in the UK. This ‘middle ground’ gives companies all the benefits of bringing contractors in-house, but without the cost of having them working on-site. Allowing assurance firms to work at their own offices significantly lowers costs, as work can be delegated to more testers meaning a more efficient and effective service.

    As with any outsourcing, it’s essential to strike the balance between quality and cost – and this is an ideal halfway house for software testing. Organisations can keep expenses down, but ensure a professional and thorough service, all the while maintaining an element of control that is normally only associated with an in-house approach. It’s a method that’s well suited to software testing, but can surely also provide lessons to other business sectors as to the advantages of successful outsourcing.

    ENDS

Powered by Wild Apricot Membership Software