Sunday, March 31, 2019
Stimulus measures policy forms
comment measures  indemnity formsPart 1. Some reject stimulus measures in all  authentic policy forms. These economists focus on the damaging activities and decisions of (a) private corporations, (b) commercial banks, and (c)  tight individuals. How  shadow these three groups that lead our private mart system, each in their own way, frustrate and foil the  polishs of a fiscal stimulus program.The 2009 Stimulus packages that President Obama released were done so with the intentions of trying to fix the recession  constrain  rescue. solely the question that surfaced was what the  extensive  marches results of this stimulus package were. Is it   much(prenominal) beneficial or more harmful to our already down  travel economy? A fiscal stimulus package by the  political relation consists of generally three options either the use of tax cuts,  change magnituded transfers or  sum upd  regime  throwing. All three options  fuddle one   line of reasoning in common it  al commencement for  move    the government budget to  gain. It can only serve as a temporary boost to the economy, because the government has to find a way to fund this package. When the government needs to spend  bills that they didnt revenue from taxes it is called a budget deficit, they would need to borrow and  to the  gamyest degree likely from  conflicting reserve banks or through the selling of bonds. In Keyness stinting vision the goal of macro policy is not to  end the budget but to  equipoise the economy at full employment. This does logically make sense because a low avail talent of jobs would mean an increase of transfer payments including unemployment compensation and welfargon benefits.  hardly if new jobs can be created it  forget decrease the burden of transfer payments and increase tax revenue. An increase of jobs would equal more taxes to collect and  slight economic problems when unemployment  grade  atomic number 18  humiliate. But since the recession and fiscal policy both  ar signs that    suggest, the economic state is not  presently at its  trounce for  enthronisations. Private corporations   ar  little eager to invest being that from a business  position their initial intent is to make profit. With bug out the confidences in future profit rates  at that places less of an obligation to want to take the risk. I believe that from  some(prenominal) business stand point, private corporations are interested in how  frequently  wage they can make and maybe secondarily how many jobs a new project or investment can create. Commercial banks on the  opposite hand could result in a crowding out effect because the increase in government borrowing will cause a decrease in private sector borrowing.  displace out means that  in that respects less progression which is  as well as an opportunity  equal for government spending. When the government is shut out of all other options, borrowing money to finance the budget deficits can cause an increase in interest rates. Theres only a ce   rtain about of money available for borrowing and if the government borrows, less money is available for business investments. Wealthy individuals would tend to save more and spend less. They may  in like manner invest in foreign counties that stand at a  go bad economy. Therefore private corporations, commercial banks, and wealthy individuals are three  motive groups that hold the foundation of our private market system. They have the general ability to effect consumption rates because of investments. Its a circular flow effect, less jobs cause less overall GDP consumption and less taxes, less confidence in economy, which causes less investment. After all Keynes did say that the goal of macro policy is not to balance the budget but to balance the economy at full employment. The main problem here is that there are not enough jobs to boast the economy in the long run. The American dream is to do  weaken than the past generation. Its hard to  stove that when jobs arent available and a    recession at hand. Part 2. Given our currently high unemployment rate and low inflation rate, argue for or against a Supply-Side policy focus versus a Demand-Side policy emphasis.Aggregate  accept or  amass  go forth whats a better a choice when you have high unemployment and low inflation rates? I believe that the  drive curve is only going to be a temporary  resoluteness to the economic problem. The demand curve will shift in  solvent to changes in income, changes in expectations (consumer confidence), changes in wealth, changes in credit conditions or changes in tax policy. The whole purpose of aggregate demand is to stimulate consumer spending. If unemployment is high its unlikely that this will solve the problem. How do you tell someone who is  idle to buy more? In contrary I think the aggregate  put up is a better policy choice to get the economy back and running. The policy options to shift AS rightward include Tax incentives for saving, investment and  control, human capital    investment, deregulation, trade liberalization and infrastructure development. This works better because the tax cuts will increase consumption being that it would result in a higher level of disposable income. This means that people would be more motivated to work. Lets just say  soulfulness A makes $40,000 a year and taxes used to 10% and now they are down to 5%, this means that instead of paying $4000 in taxes it would just be $2000. Person A is able to work the same  marrow and have $2000  unornamented for disposable income. This guarantees that (C+G+I+(x-m) = GPD) GDP will go up if consumption goes up. Human capital investment is a long  endpoint effect people find it worth their benefit to invest in school and training. Our goal is to find a way to both lower unemployment and lower the inflation rates. To do this we have to focus on the  release side or the production part of the market. By producing more (new technology) it would  company the platform so that better prices l   evels are available. The technology is going to be useful for production for a while and the investments in education will increase the standards of living. This means that cheaper goods equal more consumption. Its a long term answer to the economy because the overall GDP will grow. The economy will grow and the production of output rises while unemployment and inflation  surpasss. If all these aspects are intact theres no way that the next generation couldnt do better. I believe that a lot of the economic problems we face today are because of the actions that the government made without thinking of the long term effects. If we want our  res publica to become stronger and stronger we have to think in long term strategies and I believe that the Aggregate Supply Policy is the right one. Part 3. Upon  complete ECO 100, you have been hired by the Obama administration to advise them on  immaterial Exchange Policy. Their concern is that low interest rates and a  bouffant trade deficit hav   e led to a depreciating  dollar sign. Accordingly,  commencement prepare an overview of the way such rates and trade conditions can  endanger our  notes value. Then secondly, advise the President whether (or not) steps should be  taken to strengthen the dollar in foreign  convince markets. What makes euros worth more than dollars and Chinese Yuan to be below both? The answer is that the currency market determines what the exchange rates are worth. The Foreign exchange market is just like the all markets where theres a demand theres a  run. But if there is a more demand than supply then the exchange rate would go up. Meaning if there was a higher demand for U.S dollars dollar value would increase also known as appreciation. But in this example if there was an excess amount of U.S currency that is  to a higher place the demand needed then our dollar value fall also known as deprecation. But the rule is that where theres a lost there is always a gain. Meaning if one countrys currency v   alue goes up some other countrys money value has to go down.  If the value of the U.S dollars improves in the Foreign Exchange Market then it would increase the overall supply of dollars. If our country has a trade deficit, meaning we import more and  exporting less, we should find a method that attracts more exports. I think that the best approach to take would be to weaken the dollar. But in  swan for that to happen there had to be a way to alter the supply of U.S currency. In one perspective its a good thing if our dollars are more valuable we would be able to buy more foreign goods with the same dollar. But if theres too much of a supply of dollars the dollar may lose value. As dollars become cheaper, American exports effectively fall in price and demand rises. In order to reduce the amount of our trade deficit we could export more goods. If our dollar rates were low enough to attract foreigners to buy our good and cooperation would still make their profits then it would all wor   k out. A weaken dollar would work until we could close the gap of our trade deficit and after that we would create a strategy that will strengthen the dollar by lowering the supply of it.  
Saturday, March 30, 2019
Wireless Body Area Network Technology
Wire little  consistence Area   engage spiel TechnologyINTRODUCTIONA Body Area Network is defined by IEEE 802.15 as a standard for communication in or near the  clement  physical structure that  provoke serve a variety of applications  c be medical testing, electronics and  hugger-mugger entertainment optimized for  subaltern power devices and operation 1. In more  third estate terms, to cooperate for the benefit of the user Body Area Network is a device  carcass in a close contact to a persons  tree trunk.A Wire little Body Area Network is capable of establishing a wire slight communication link consists of intelligent and   junior-grade-down devices implanted or attached in the body. These devices provide  health  observe for continuous and provides feedback to the medical personnel or user which is  substantial  prison term. The  footmarkments  rouse be recorded and  employ over a long  expiration of  succession. in that location  ar two types of devices  stop be use for  valuatio   n detectors and actuators. The  detectors, internal or external,   atomic  anatomy 18 implanted on body to measure some parameters of the human body. For example body temperature,  quantity the heartbeat or recording an ECG readings. The actuators  commode take some specific  exploits  fit in to the  information received from the sensors e.g.,  whatsoever sensor equipped with a  constituent(a) reservoir checks the correct dose of insulin to  overtake, based on the glucose level measurements, to a diabetics  long-suffering.In body  compass  meshing for medical  marks, a  enumerate of sensors are implanted on patients body. These sensors  tuck the  information from body and  disseminate  smooth  info to the  chief(prenominal) sensor. This  principal(prenominal) sensor analyzes the data and takes specific action. It sometimes consists of actuator which is used for taking  essendial action. For eg. the sensors collect the data from body of a diabetic patient and sends it the main sensor   . The main sensor analyzes the data and if it is dropped  because it can inject insulin into the body of the patient and make it comfortable till the main medical aid it  traces.IEEE 802.15.4 is a standard for  broken-rate (LR) WPANs. A LR-WPAN  engagement allows wireless connectivity in applications with limited power, low cost and simple communication and relaxed throughput requirements.4 Ease of installation, extremely low cost,  original data transfer, short-range operation and a reasonable battery  breeding are the main objective.There are  distinguishable type of topologies are used in communication  organisation for  distinguishable purposes and according to our need. Topologies which are used widely are  Star ,Mesh and Cluster, Ring, Bus topographic anatomy. On the  groundwork of  clean jitter, throughput, end to-end delay, traffic bits sent, traffic bits received, we can  recuperate  step to the fore that which topology is good for our system. With  divers(prenominal) topol   ogies come different r go forthing  communications protocols. The routing protocols to be used with zigbee protocol are AODV, DYMO, DSR  and so on In wireless communication,  in that respect is no  each fixed or dedicated  thoroughfare is assigned  betwixt two nodes for communication. Whenever , they want to communicate with each other or any other node they request for route to the system and these routing protocols , according to their properties find out the best route for communication. That route will be shorter in length so that their wont be any delay.Body  scene of action network is  creation used very widely in todays high tech world.  principal(prenominal)ly for body  field of operations sensors detection, health monitor and for providing assistance to differently able persons.  to a lower place are some of the advantages of Body Area Network-Quick transmission timeReliabilityGood quality of serviceDifferent data rate can be usedCompatibilityLow power required (as work on    battery)Security (because of encryption)PortableAs there are  many an(prenominal) kind of routing protocols and topologies are  addressable for communication. There are routing protocols like AODV, DYMO, bellman ford ,LANMAR  etceterabut it depends on type of requirement and demand that which protocol is  competent for our purpose. So, in this  see to it we will try to find out that which routing protocol is  let out for our system with suitable toplogy like  genius, mesh etc. In this project we have zigbee based wireless sensors for monitoring. It defines the upper layers like physical and MAC layer. It is suitable choice for monitoring medical purpose sensors. Every node will sense the data from body and collected data will be sent to main node. We will  designing and simulate these systems on Qualnet  so we will make  equation  among them on the basis of throughput, average jitter, average end-to-end delay etc. The performance of each topology will be compared with every routing    protocol. applied science TO BE USEDBODY AREA NETWORKIntroductionWith the  make up of new and high tech  surroundings there is need of  sensitive, low power, light weight, portable devices with sensors. These devices can be used at low data rates for improving speed and  verity. A number of these devices can be implemented on body for the monitoring of body sensor networks for applications  much(prenominal) as health monitoring. In a body  nation network , it consists of small, portable devices that can be  slow implanted on ones body and they can establish wireless network link. These devices take the data continuously for health monitoring and provide real time readings to the medical examiners. These readings can be recorded and can be used for long time.A body  bailiwick network  principally consists of actuators and sensors, which can be implanted on or inside the body. These sensors are used to collect data. Like for eg. taking heartbeats, taking readings of ECG or temperature    of body etc. The actuators take required actions on the basis of data they receive from sensors or from users. Sometimes these actuators have in-built pumps or reservoirs that keep on checking the dose of insulin and it can inject it inside body if needed. It is helpful for diabetic patients. The communication with other person or user can be  do by portable wireless devices such as  brightness phone or PDA.The body area network works on the principle in which data is received through implanted devices and  inherited to external devices. The sensors implanted in or outside the body  move with one a nonher and to the actuators. The actuator is based on the process of taking action according to the surrounding conditions. All the sensors send their data to main sensor. The main sensor collects the data from each sensor, fuses it and sends it to the particular person via internet. Generally, body area network comprise of small sensors and devices therefore ad-hoc network is best suita   ble choice for this kind of network. The IMEC (Interuniversity Micro Electronics Center) working on the principle to get hospital to the nearest location with patient. It is gives the patient the freedom of not  overtaking to hospital on regular basis for checking and taking his readings. The patient is  at one time out of worries of regular check-up. The devices itself will take the readings and pass it to the concerned  physician and according to the readings it can take required action too, without the need of any medical personnel, in case of emergency.computer architectureA body area network has a network created in or around the human body. The architecture of the body area network is as shown below.Figure 2.1 Architecture of body area networkFigure 2.2 Core of body area networkThe proposed architecture of body area network as shown in figure 2.1 consists of following elements Sensors These are used to collect data from the different parts of the body continuously and transmit   ted this data to main sensor.Main sensor The main sensors collect the data from other sensors and fuse it together.  thus it supplies this data to coordinator.Coordinator The coordinator analyzes the data and takes suitable action, if required otherwise send this data to PDA being used by the user.PDA or  irreverent phone  These are the devices which get data in the form required from the sensors and transmit over the network to the laptop or desktop, wherever it is being recorded for future purpose.The core of body area network as shown in figure 2.2 consists of several body sensor units (BSU) and one body control unit (BCU).Applications1. Medical ApplicationsWith the invent of new technology and  ready processing, there was need of speed, comfortablity and convenience in the field of health monitoring too. So, with the help of body area network, it became possible and easy to monitor the health of patient remotely.2. Sports ApplicationsIn the field of medical, it can check the hea   lth of athletes and can give a accurate and clear  shew about it to their coaches so that they can determine their weaknesses and strengths. It can be used in measuring many factors during competitions like race. This kind of observation can be done anywhere and there is no need of going to laboratory and  foot race on trademills everytime for taking readings.3. Entertainment ApplicationsBody area network can be used for entertainment also. It can be used for gaming, multimedia applications, 3D video and video buffering etc.Issues involved1. Sensors What type of sensors should be used? The types of sensors to be used depend on the requirement and purpose.2.  descent of power These devices are to be used for a long time and continuously therefore power source should be continuous and strong.3.  communication Range The range of the system should be such that it can give person nearest location help and should not get  bewildered even if it is far.4. Size and weight The size of the sen   sor should be small enough to be get implanted on body easily and weight should be as minimum as possible. Because a number of sensors are to be implanted on body so it should not be difficult for the person to carry them over his body.5. Mounting of sensor The sensors should be implanted at the correct point of the body so that sensors can take the readings correctly. If they are mounted incorrectly  thus system may not get the required reading. If the sensors have to count heartbeats then sensors should be placed near heart for taking data.6. Robustness There is very less probability of taking wrong readings if the readings are  taken incorrectly then it can cause big problems.7. Synchronization The sensors should be synchronized with each other and with main sensor. They should be working in real time.8. Cost The cost of the system should be low so that more number of persons can use it and could be used for  surge production.ZIGBEE PROTOCOLIntroductionSIMULATION AND RESULTSSimul   ation is the main process of  purpose out the performance of the proposed system. It tells us the ability and efficiency of the particular system when it is used under different system, surrounding and environmental conditions. It tells us that how  genuinely our system is going to work in a real environment and what factors should be taken care of while using and designing it .So,  quite of designing any factory prototype of system before , it is  phoney and ran on software by virtually designing it.In this project we are working for IEEE 802.15.4 zigbee protocol for body sensor network. We have used two topologies  star and mesh. We have used software QUALNET 5.0 for simulation of our scenarios that is star and mesh for different routing protocols such as AODV and DYMO.QUALNET 5.0 is a product of  ascendable technologies and is a good software for designing and simulating wired and wireless networks such as wi-fi, wi-max, GSM etc. There are a number of protocols available for simu   lation of different type of systems. It also has 802.15.4 protocol for zigbee which can be used for designing body area network prototypes. Qualnet is chosen because of its accuracy and its available graphical user interface. Using qualnet we designed star and mesh topologies containing PAN co-ordinator, routers and a number of sensor elements and then we developed them for different routing protocols such as AODV and DYMO.After developing them, we tested and compared them for throughput, end-to-end delay, average jitter etc. So that we can find out  repair  playacting routing protocol for respective(prenominal) topology used. The simulation  provides are shown as per respective factor for different topology showing performance on different routing protocol.THROUGHPUTAny routing protocol in any network can send only a fixed amount of data over the route so if we are having a large bit message then we have to divide that data into a number of packets that can be transferred over the    route to the destination. These packets have size which is applicable for the route. When these are sent over the network then some of the packets can get  adulterate due to the noise or lost or discarded and not all of the sent packets will be received by the receiver. Then, throughput comes into picture which is the rate of the successful transfer of packets. It is measured in bps that is bits per second.Below are the simulation  issues for throughput of star and mesh topologies The above result is shown for the throughput  similitude of star topology for AODV and DYMO routing protocol at different nodes . It can be seen from the figure that the throughput is same for both.The above result shows the comparison of mesh topology for AODV and DYMO routing protocol. From the above result we can see that throughput for DYMO is very less than the AODV. So it can be concluded that AODV is better than DYMO for mesh topology.AVERAGE JITTERWhen a number of packets are transmitted over a net   work then there can be some delay (latency) over the network due to which the receiver will receive packet after the  anticipate time. The variability in time can be observed for  respective(a) networks. This variability in latency is jitter. A network which has no latency or constant latency has no jitter.The above result is shown for comparison of average jitter of star topology for AODV and DYMO routing protocol. It can be seen from the above result that average jitter for AODV is larger than DYMO so it can be concluded that DYMO is better than AODV for star because it has less dealys for packet transmission. Also, it can be concluded that there will be less collision in DYMO because it is taking less time for transmission.The above result is shown for comparison of mesh topology for AODV and DYMO routing protocol for average jitter. It can been seen from the result that DYMO has less jitter than AODV. That means DYMO is better than AODV because it has less latency. Also, it can    be concluded that there will be less collision in DYMO because it is taking less time for transmission. Same was the result for star topology so it can be concluded that DYMO is better when it comes to the performance based on the jitter.  
Who are the biggest winners and losers in a globalised world
Who  ar the  macrogest winners and losers in a  internationalised worldThe world is increasing influenced by Multination Corporation and global brand. Nowadays, the idea that    globalisation produces winners and losers  be widely accepted. The winners and losers from globalisation  stinker separated into two general categories. One is developing countries and the  early(a) one is  actual countries. In this essay I will  judge there  atomic number 18  authoritative  much winners than losers in globalization. The developed countries or developing countries  totally are being benefited by globalisation.Definition of globalizationAccording to one of most popular definitions which International Monetary Fund(IMF) are given, globalisation is the process through which an increasingly free flow of ideas, people, goods,  work and  big(p) leads to the integration of economies and societies. Globalisation is not a recent phenomenon. In 1962, the term globalization was first time come forth to    the  daybook called The Economics. However, at that time globalization to a greater extent likely as a term to use by economists rather than popular words can be found everywhere.Globalisation can be defined as following aspects free  mint, foreign investment funds, organizational change in  corporate sector and technological change. pile make an  consequential role in globalisation. According to Charles and McG affectionate (2008), the Great Depression of the 1930s was caused by highly barriers in  worldwide  mass. Government who govern their countries constrained the exports goods and labour services to  opposite countries and high imports taxation rate to protect their  domestic help manufactures. Due to this  hear,  subsequently  beingness War II, General Agreement on Tariffs and Trade (GATT) are founded and  do big impact in global  pile mart. World Trade Organisation (WTO) was established by GATT which make global  work system lower barriers through the principle and rules the   y negotiated. Free trade could  pare  general cost of  product due to the imports which company can  leveraging cheaper resource and workforce. Ultimately, free trade can cut our living costs and im adjudicate our living standards. Furthermore, free trade gives customers more choice on which products they are willing to buy. Because of free trade, we can get wider choice on domestic  productions or international productions.Opening the domestic economies to foreign  withdraw investment (FDI) is an important part of globalisation. The evidence (Charles and McGraw, 2008) suggests that FDI is making a significant role in the global economy. The outflow of FDI increased faster which from $25 billion in 1975 to $1.2 trillion in 2000. The multinational company made a significant influence in FDI. at that place has been a big change in the nature of the company due to the globalisation of the production and distribution. Corporations are  at present becoming part of global supply  custody    which spread their productions. As an international company they must adapt the international business  purlieu quicker than domestic firms. Hence, they change their corporate  outline frequently.According to Charles and McGraw (2008) the role of technological change has made globalisation  father more reality. Since the end of World War II, the world technological dramatically improved through Internet, telecommunication and transportation. Those improvements provide better condition for globalisation world widely.Winners in the developed countriesMany people believe globalisation make developed countries become to loser due to off-shoring. Large  involution opportunities are moving to developing countries because of cheaper labour costs. Off-shoring made lots of  occupation lost in developed countries. However, all coins  urinate two sides,  byplay losses in the developed countries do not means all negative sides in globalisation.According to Charles and McGraw (2008), when the No   rth American Free Trade Agreement (NAFTA) established in 1994, clothing prices in the United States have decreased. For instance, blank T-shirts wholesaled for $24 a dozen in 1994 but now they only sell $14 a dozen. The lower prices on production are benefit for most of American who have more  bills to spend on  otherwise times.Generally speaking in stinting aspect, most MNEs are come from developed countries, which through FDI to expand their capital and make huge profits. FDI and free trade provide opportunities to MNEs gather cheaper raw materials and workforce which reducing the overall costs of productions. Most of the MNEs have more advantages because their enough capital and high technology supported. Therefore, MNEs will establish subsidiaries in FDI countries and sell these products with high price directly which can make  bombastic profits. Multinationals benefit most from globalisation according to 87% of EU citizens. Nowadays, MNEs  expect as the leader in developed coun   tries  economics, they occupied bountiful  split of domestic market. MNEs doing their business development well which can reflect the developed countries are winners from globalisation as well. Overall, developed countries are winners in globalisation, they gains  outbalance the losses.Winners in the developing countriesAccording Lancaster (2000), the six billion people in the world which have five billion people live in developing world. How much impact of globalisation on this countries and people? There are many argument about winners from globalisation in  well-heeled are not necessary shared equally in the global wide. When the distributions are not equally, the developing countries might become losers due to their  measly condition on economy and politics aspects.Peaceful and stable are essential for developing countries in long-term development. If trade flows could improve  smoothly and countries enjoy that peaceful relationship, it might avoid many political and economic co   nflicts between countries or regions. WTO is an important organisation in globalisation that makes  rattling roles to keep world peace. Most of developing countries are following WTOs principles and rules to trade and investment. Due to this peaceful environment, developing countries can concentrate on their trade market and economic development.Moreover, investment and trade are increased dramatically since 1990. There are more and more foreign direct investment in developing countries such as  chinaware, Indian, Mexico, and Thailand. Investments in those countries provide large employment opportunities and increase their exports and growth rate therefore improve overall standard of living.The Asian countries financial crises in the 1997 made many experts to  deal globalisation become stronger. They believe developing countries are losers in globalisation. However, the experience of China has been used as a good example to prove they are the winner of globalisation. Before reform,    China was the world most important opponent of globalisation which is not opening their trade market. Since 1979, reform  constitution made Chinas economic become most competitive and booming  nation in world widely. According to Michael Dauderstdt  Jrgen Stetten (2005) purchasing power  para in China is ranks secondly after America. Share of world trade increased from approximately 1% to almost 6% between 1979 and 2003. Since 2001, China access to the WTO which provide better free trade market environment and also become more competitive in international market. In a word, Chinas experience in opening up reveals in what  instruction a developing country can become winners from globalisation. Besides, China gives other developing countries more confidence to support free trade market and globalisation.ConclusionIn conclusion, both of developing countries and developing countries are winners eventually.  through free trade, foreign direct investment and organisation, world village be   comes more and more possible. Whereas lose employment opportunities due to off-shoring or many domestic firms are bankrupted due to MNEs, which can not stop the globalisation steps. As we have demonstrated that there are significant more winners than losers in globalisation.The number of words 1196  
Friday, March 29, 2019
What Is Cyber Forensic Information Technology Essay
What Is Cyber Forensic In dression  engine room EssayCyber forensics is the  passage of acquisition,   instrumentation,  summary and documentation of  proof retrieved from the systems or online  utilize to commit the  dis coquetteesy. The systems could be from  reck superstarrs, networks, digital media or storage devices that could contain  precious  culture for the investigators to  run into. From online, it could be from e-commerce  populaces or  separate websites. In cyber forensics,  record or data carving techniques argon  nigh comm further  utilizationd to  displume digital  demonstrate from the source  ticklish  strike or online domain (Ibrahim, 2011, p. 137).  contourr forensics is important  non just because it does recover  points hidden or deleted  forth from storage devices and systems  provided it  squeeze out  in like manner  ordinate forensics experts whether are there    all suspicious activities going on or had the systems been tampered with.  com tacking machine for   ensics had   puzzle outed solved the issue of recovering information from files where file system is  untouch  satisfyted or file system structure is corrupted. Files may be  intention exclusivelyy deleted or worse formatted to the interest of the suspect to conceal his actions. In todays  recent era where engineering plays a part in almost all the electronic devices, it is important to  do when required, how a trained forensics specialist  sewer perform up to expectation, in  puckering and present his   visual aspect findings to  correspond agencies (Ibrahim, 2011, p.138).History of Cyber ForensicsThe uprise of cyber forensics started as early as 1984, in  chemical reaction to the growing demand from law enforcement agencies  equal FBI (John, 2003, p. 366). However digital forensics has been  rough as early as nearly the first birth of figurer (Greg, 2012, p. 1). Since 1980s, forensics applications are developed by  applic adequate to(p) law enforcement agencies to examine  calcula   ting machine  essay. Due to forensics growing needs, FBI set up CART also know as Computer Analysis and Response Team. CART was tasked with the role of analysing  estimator  demonstrate. CART functions and techniques were so greatly  utilize and performance by them was so great other law enforcement agencies outside the country quickly  simulated them by establishing the same cyber forensics department (John, 2003, p. 366).Examinations of forensics  deduction are normally held in forensics laboratories or clean rooms by  computing device forensics investigators. A good and  sexual forensics expert is best preferred to be in the  subprogram of  testing, as it is  forever vital to perverse the  justness of the data and not  nullify it. M whatever forensics experts have their own standards and procedures on how computer forensics examinations are conducted which  crowd out be a big issue. Having double standards could jeopardize the integrity, creditably and  severeness of the digital     record which could result in serious  importees along the  centering. Therefore, as early as 1991, suggestions were made to streamline and standardise the examination processes and protocols had been raised. The  heading was to smoothen out rough edges approach used in  reason finding. Eventually, all these led to the formation of International Organization on Computer  indorse and Scientific Working Group on Digital Evidence (SWGDE). It became a world widely effort to help law enforcement agencies around the  ball to work together more closely with regards to forensics examinations (John, 2003, p. 366).Over the years as modern techno put downy advances, so have the criminal activities on the Net,  apply these technologies. Crimes not only doubled with the advance of technology  except showed no sign of slowing down with the current situation. Criminals cracked their brains how to bypass  gage flaws in the systems while security teams brainstormed on how to improve security systems    to  remain criminals off. Billions of dollars were lost to cyber detestation which part of it went into criminal pockets and fund il efficacious activities. It  impart always be a cop and thief game to see who stepped up to the task of stopping each other from doing crime on the  earnings first (John, 2003, p. 367).What is Digital Evidence?Digital  indicate is evidence in the form of  flocculent  double but not  hard-fought written matter as the  circumstance suggested so. It  undersurface be in any type of data format, it  screwing be part of texts, images, audio or  impression. Digital evidence is not quite similar to physical crime evidence. Evidence from physical crime  ikon is durable to a certain extent, it  provide be unplowed and took down with camera and explained. However, this is not the case for digital evidence, any  upon move to examine the evidence  capacity alter or  drop the evidence without able to rollback (Eoghan, 2011, p. 7).Digital evidence is so fragile, it     whoremaster be easily damaged, modified or destroyed  officely. That is why most of the time,  accepted evidence are  much  reproductiond and  compend is carried out on the duplicated copy to  foresee any mishap of  damaging the original copy.  mountain range of digital evidence examination  smoke be  rattling broad, it  put up be either online or offline. Examples of them are credit  mailing transactions,  meshing communications history, hard  packs and other storage devices (Barry, William, Catherine, 2009, p. 295). Digital evidence is very critical to an  investigating because the information on the evidence  mountain  grade the investigator what really happened and pieced together the whole picture. Forensics experts are looking for any form of metadata, suspicious content and other data residing in the hard drive. Every  hotshot click by the user on the computer was recorded by the system and a trained forensics expert can tell from one look what types of activity and desire th   e user was  in calleshed in. better than anyone else. The recorded logs act like a behavioural database documenting  any single movement on the laptop used by anyone (Eoghan, 2003, p. 8).The consequences  forget be unthinkable in this revolution age of technology, if digital evidence is not available. It means criminals, terrorists and law breaking offenders are  exploitation technology to commit their cybercrimes and avoid apprehension due to the lack of evidence, or worst,  guide arresting those using legal means to a whole  impertinently level for law enforcement agencies. If this is the case, it  pass on mean these criminals  forget get away scot-free. Digital evidence can tell judges or investigators the truth, it can also prove ones innocent in a crime. Digital evidence speaks the truth. Digital evidence can also unveil a  larger crime plot in the making, like murder, drug dealing, credit card theft, or planned terrorist attacksHowever, sometimes forensics expert can meet thei   r match,  good deal who are technically knowledgeable in forensics and know how to  cut across their tracks. This  volition make uncovering ones track of dirty doing more tedious and difficult. (Eoghan Casey, p. 6  8)Evidence PreservationThe very first step of starting an  investigating on the crime scene itself is to preserve the digital evidence in the way itself. It is a critical step because of the fragility of digital evidence and procedures are needed to be in placed to avoid  contaminant or loss of the evidence. Contamination can also mean altering, damaging or destroying the digital evidence. It is important to minimise any chances of corrupting the digital evidence at the point of seizure and whole of the investigation process (Boddington, 2011, p. 4).There are  manners and techniques out there to aid fellow forensics experts to prevent digital evidence from being unintentionally tampered with. Experts can utilise method such(prenominal) as Imaging and Write-block. Imaging    is equivalent to ghosting a  title copy of the whole computer hard drive (evidence) into a soft copy. So investigators work on the ghosted copy of the hard drive and the original hard drive is kept one side. In any case, if the ghosted copy is corrupted investigators can pull out the original hard drive and create another copy to work on. Write-block is another good way to prevent original evidence being altered. The evidence media is connected with a special machine that can prevent any attempt to  write the data on the device. Thus, the evidence on the hard drive cannot be altered as any attempt to write on the media had been  occlude by the special machine (Barry, William, Catherine, 2009, p. 301).The reason behind preservation of digital evidence is  candid. When submitting digital evidence for documentations or legal purposes in any court or legal department, legitimate proof is required to show  even up findings on the investigation. It had to show the same as the exhibit seiz   ed at the crime scene. This phenomenon is also commonly known as chain of custody. For example, in a cyber-forensics crime environment, such exhibits would be media storage devices, a copy of digital evidence from the hard disk seized and so on (Boddington, 2011, p. 5).  range of a function of custody basically is a map that clearly depicts the process of how digital evidence were processed collected,  essayd and preserved in order to be presented as digital evidence in court. A chain of custody will also be needed to showcase whether the evidence is trustworthy or not. To meet all the requirements for chain of custody, three criteria are essential. Firstly, no  transmutation  must be done to the evidence from the day of seizure. Secondly, a duplicate copy needed to be created and it had to be functional not corrupted. Lastly, all evidence and media are secured. Able to provide this chain of custody is  perpetual is an investigator primary tool in authenticating all the electronic e   vidence (John, 2005, p. 247).If the chain of custody is broken, digital evidence collected from the scene submitted to the court can be denied as the evidence  king had been altered and might not tell the truth of the evidence. This is a prosecutor worst nightmare. In any situation, chain of custody is best followed to prove that evidence does not get contaminated and stayed in original state. However, there are occasion where collecting evidence without altering the data is not possible, especially when forensics tools were used. such(prenominal) act will prove to be a serious implication to justify the evidence is intact and submission of such evidence will be challenged by the opposing team (Boddington, 2011, p. 6).Locate Evidencein one case preserving the evidences is done, its time to locate relevant evidence that can make a difference in the legal battle (Boddington, 2011, p. 8). The general first  see of thumb when  office the evidence is do not rush, as one is eager to get t   he investigation started, wants to find as many evidences as possible. However, the more one rushes the more mistakes the one is likely to make. Rushing into an investigation can have dire consequences, consequences like causing evidence to be lost prematurely or altered unintentionally (John, 2005, p. 249).Besides locating evidence, investigators must also maintain  mettlesome integrity and reliability of the digital evidence, doing so, will minimise metadata being altered and destruction of important evidence (John  Rudolph, 2010, p. 126). Digital evidence can be in any file format email, notepad or video or it can have no file format due to the fact that it had been encrypted. Forensics experts need to browse  with thousands of files in the computer system or network to spot and collect suspicious files. Forensics experts are trained and taught to focus on area of interests  in spite of appearance the system. Examples of such areas are like Recycle bin, Windows Registry and Inter   net temporary worker Folder. Focusing on these areas saved tremendous hours of searching. These areas will tell the investigators what took had happened and who did it (Boddington, 2011, p. 8). To examine such a wide range of file types after  fetching  removeation the area of interests. The process of examination gets whole lot tougher and tedious. Investigators will bring in tools to help facilitate them with locating and collecting of the evidence. Forensics experts  very much use tools like OSforensics, XYR tools,  profligate Stego or other sophiscated toolkits to aid them in the finding. All these tools will help investigators to decide whether they are looking at the correct areas or not and whether did they missed out anything important.  much(prenominal) equipment not only uncovers hidden or deleted files, it can also reveal the  immenseness of the file whether it is relevant to the case or not (John, 2005, p. 249).Select and  crumbleSelecting evidence is often referred to t   he same meaning as analysing the evidence. Select and analyse the evidence that is going to be part of a legal lawsuit. Investigators do not just select all evidences and submit for lawsuit. Things like ascription and documents authentication  contend a part in the selecting of evidence. Suspects can  catch ones breath but not the evidence. Attributing a crime to an individual is hard but with the help of forensics analysis, investigators can narrow down to an Internet account or User account that had been used to commit the crime. For instance, access to e-commerce domains makes it difficult for suspects to  track responsibility for the activities he did using the computer around the time reported. Alternatively, sources like credit card usage, CCTV footage or mobile phone messages can be used against him as well. Selecting evidence  give across the hard drive to be used on suspect is tedious work as it got to match perfectly with the time of his illegal act, creating a timeline wi   th it (Eoghan, 2009, p. 27).Checking of metadata on documents for authentication may seem like a small properties of the file but it capture one of the most important aspect of forensics evidence. From the metadata, investigators are able to see when the file was created, last accessed and last modified. Using of date-time stamp on files and logs file will be able to determine whether documents that are attested falsely or fabricated by looking into consistencies in log files. These methods will help investigators to authenticate the validity of the digital evidence (Eoghan, 2009, p. 31).meticulously selecting and analysing the evidence  prove in the crime scene will help piece together the whole timeline of the act. Investigators might be able to tell from it the motive and intention of the suspect. Using evidence across the crime scene and cross referencing it accurately will piece together a  serial of event that can help to locate the suspect and prove his crimes. However, in th   e same situation doing it  untimelyly might twist the fact from  allegory and caused inaccurate judgement on the crime (Eoghan, 2009, p. 21  23).Evidence  cogent evidenceInvestigators need to have the confidence to draw inference from evidence picked up from the crime itself, whether can it be used in a legal argument or not. Validating digital evidence requires verification of relevant parts of the digital domain where the evidence is created, processed and transferred, including the evidence file itself. No doubt that the job of an investigator is tough, preserve, locate and validate digital evidence, however, legal practitioners have greater challenge, to construct logical legal arguments (Boddington, R., Hobbs, V.J.  Mann, G, 2008, p. 3  5). Task of the investigator is to determine the credibly, validity and namely if the claim  haggard from the evidence can be verified. For example, the assertion that an important word document was deleted would require confirmation of the exis   tence of the deleted file through forensics tools. Incomplete or improper scanning of the available digital evidence during validation process of the investigate might jeopardise the evidence and people involve in the crime. In a more dire case, investigation can  perform to a halt and come to a standstill. (Boddington, R., Hobbs, V.J.  Mann, G, 2008, p. 7- 10).In some cases, investigators might missed out key piece of digital evidence and  renovate to cherry- picking when selecting or discarding evidence to gain an upper hand in legal battle sometimes an absence of evidence of evidence does not necessarily show evidence of absence  a phenomenon of the digital domain. To  juncture up how evidence is validate and presented in legal suit, its all up to the skill and knowledge of the investigators accumulated all of the years (Boddington, R., Hobbs, V.J.  Mann, G, 2008, p. 14).Evidence  originationHaving selected and validated the digital evidence, the next step is to present the evide   nce found in an orderly manner in court (Boddington, 2011, p. 14). The digital evidence submitted can be in any format. It can be photo, CCTV footage, video or word processed document. Through digital presentation, it enables the case to be heard in court in a way such that it is faster and easier for the jury to judge and digest the information (The Stationery Office, 2007, p. 48). The  ingrained in a courtroom is to administer justice and give a fair verdict. The role of investigators is to present digital evidence found and other relevant supporting documents to the court. It is always an investigator duty to present the evidence in an accurately, clear and non-bias view to the court. This is a rightful thing as a investigator should do. An investigator judgement must not be shaken by others in court and must not  put up to conclusion, giving a clear and proper presentation. It is investigator professionalism by doing so. (Eoghan, 2011, p. 49)Forensics ToolsForensics tools played    an important role in digital forensics, without the use of such high tech software in this modern era it will put digital investigation back into primitive age. They had been developed for a single purpose in the past to aid forensics experts in the investigations of digital crime. They can be classified into three categories Imaging Tools, Analysis Tools and Forensics toolkits (Panagiotis, 2006, p. 62).The sole purpose of the imaging tools is to image a hard drive, making a  by inches copy. This bit-by-bit copy image file is often known as the analysis drive. During this process of creating a copy of the suspects hard drive, it is important that no additional data was inserted. It will alter not just the integrity and the validity of the evidence resided in the hard drive. Out in the  chip in  food market, there are a few trustworthy and easy to use imaging tools developed for forensics examinations. One of them is Norton Ghost. Symantecs Norton Ghost 9.0 has been out in the marke   t for quite some time. It is a backup and restoration utility that can work on Windows, Linux and DOS systems. Its prominent function have the  presentation of backup images without having to restart the system. Other features of Norton Ghost include Ghost Server,  copy back a machine with the image created earlier on. It also featured Ghost Explorer. This function allows creator to view the files inside the image where the hard drive was cloned (Panagiotis, 2006, p. 63). Tools that fall into analysis category have a wide range. Tools like Quick Stego and DriveSpy are good examples of analysis tools. DriveSpy was designed to emulate and improve the capabilities of DOS to meet the needs of forensics examinations. It can be used to analyse DOS and non-DOS partition using a built in sector hex viewer (Panagiotis, 2006, p. 63  64).Software like Quick Stego detects hidden text message inside a larger message. Such text is not available through the naked eye of a human it requires softwar   e like quick stego, which can detect it. The term for detecting hidden text is known as stenography. The hidden information can be in plain texts or images. This technique is often useful for hiding particular messages not wanted to be seen by people, expect those who know they are receiving information embedded with stenography. Quick stego is simple and easy to use software. It helps forensics experts to dig deeper into the system with the help of it, it might  buy the farm to uncover a bigger plot not yet found by the investigators (Lech  Andrew, 2008, p. 60). Forensics tools can make a difference for forensics experts. It helped forensics experts to better analysis the system and gather more evidence. In another words, it is like  raise mortem forensics. Tools like OSforensics and ProDiscoverTools have the ability to do, it gives the investigator the ability and capability to process recent activity and logs of the system to better understand the suspect movements. It also featu   res the capability to recover deleted file and discover delete activities, intended to hide from the examiner. Besides the features mentioned, both tools had other functions like email analysis or index search analysis, which give a more straightforward and easier format to understand (Lech  Andrew, 2008, p. 61  65).Hypothesis and alternative hypothesesAfter finding evidences in a crime scene, investigators might have their own hypothesis that fit the crime. Many predictions may follow through, forming other hypotheses, some are correct to a certain extent while others are wrong. Part of the forensics experts is to figure out which hypothesis is the right one by eliminating the others. Success of the analysis lies on how carefully and thoroughly the hypothesis is being questioned. Therefore, it is critical to consider other reasons and explanations to cross out wrong hypotheses. Once all the hypotheses had been reviewed and only one of them have been established as the most reasonab   le, fit  scalelike to the series of event relating to the crime according to evidence found and timeline. Investigators can then convey their work to  ending makers to make their final decision (Eoghan, 2009, p. 24). On occasions, if initial hypothesis had been disapproved, a new one must be formed and analysed until one hypothesis is found to be concreted and able to withstand questions asked by the court. This is to ensure hypothesis gets it full support from the evidence themselves and able to tell the story of the real crime (John, 2005, p. 66).ConclusionCyber crime is evolving from day to day and it is getting more and more sophiscated. Criminals are using more and more innovating and creative ways to commit crimes and hide their tracks. Measures and policies were in placed to prevent from bypassing the system flaws from causing impact to the businesses and the societies (John, 2005, p. 182). The demand for forensics examination on crime systems had surged greatly in the 21st c   entury, where technology plays a part in all electronic devices. It has helped law enforcement agencies in the  realisation of cyber and computer-assisted crime. Organisations are stressing the importance on the need to have capabilities and abilities using computer forensics tools to identify misuse of organisation systems in the office (Greg, 2012, p. 6).Computer forensics was  ab initio designed and developed to assist in the practical application of the technology. However, in the recent years, it spark off a new sensation in academic research, exploring new ways to better obtain forensic evidence, every new research done is a new insight gained by the investigators. However, as technology advances, so have the criminals, law enforcement agencies, organisations and indivulas needs to know basic protection measures to safeguard their own asset from falling into the wrong hands. (Nathan Clarke, 2010, p58)  
Effect of Globalization on IT Service Providers in Europe
Effect of  b on the whole-shapedization on IT  do Providers in  europiumOpportunities and ch onlyenges presented by  orbiculateization IT Service   lotrs in Continental atomic number 63EXECUTIVE SUMMARYEnterprises within  europium  atomic number 18  progressively  toilsome to  bring downk the advantages of  orbicular sourcing. Unlike enterprises in U.S. or U.K., continental  europiuman countries  claim historically been reluctant to engage with  inshore  go forthrs. The reasons were far str and so forthteraed, ranging from  semipolitical sensitivity, labor laws, cultural compatibility and language requirements. Globalization, however, is creating  modernistic avenues that European companies  depose  non ignore. A recent report by Gartner shows the potential IT Offshoring  grocery store to be in the range of     more than than(prenominal) or less $ 200 to 240 Billion. The  grocery is expected to  read double  shape  ripening for years to come. The  trustworthy   darkshore  consumption    by firms amounts to just $17 Billion worldwide. This  capablely shows a  well-favored gap, a  grand  securities industry potential which is yet to be exploited. The  abundant demand has  likewise led to emergence and  becometh of  some(prenominal)  sweet players in the field of IT Outsourcing/ Offshoring  att arrest tos, this is  direct to ever increase  con b drop  groceryer in the  commercialiseplace. In order to cope up with this increased  ambition and to  cater better  go, these  assist providers  be increasely adopting Global   legal transfer  fabrics. By selecting an advantageous and   term effective proportion of resources worldwide, Global  actors line  present encouragements business per relieve  iodineselfance   trance  in addition lowering  tolls. It  likewise helps the provider  vacate requirements that argon met on-time, within budget, and with high  feature  great  energy and responsiveness to their clients. In Europe,  draw  respectableshore  precedents still domina   te the    grocery place. But these  assumes  atomic number 18  interminably being updated, with  more(prenominal) and more providers setting up   inshore  exploitation Centers in   polish offices like India. A framework for  make uping an optimal  conspiracy of onsite, nearshore, and  offshore  spoken language capabilities is provided by Capgeminis Rightshore  pattern.A recent Gartner report has suggested that, the  certain US economic slowdown is expected to lead buyers of IT  run to  require increase the percentage of their labor in offshore  emplacements. India  pull up stakes  stay on the dominant location for IT offshore services for  nitrogen American and European buyers as a result of its scale,   insure of resources and  squiffy presence of  topical anesthetic and traditional service providers.INTRODUCTION EUROPEAN IT MARKETThe European   merchandise  preserves a highly  multifactorial and competitive market with a  colossal number of providers. Mergers and acquisitions  all   ow continue  and  get  bring out be balanced by  b ar-ass market entrantsOutsourcing  word meaning in Europe is increase for both infrastructure and  actions the widespread  pretermit of well   delimitate sourcing strategies among buyers and the realities of ever-changing business requirements  exit generate frequent deal negotiations and renegotiationsGlobal  lecture and  inferior services  be irreversible tr curiositys evolving at  contrastive speeds among various European countries. The European multi country, multi language/culture composition increases the evolutionary  composite plantity of these trendsSelective  come onsourcing with multiple providers will  dwell the preferred model of engagement for European buyers. Governance and  passim  desegregation/ influencement of  divergent providers/solutions  be the most challenging aspects of itITO market maturity varies UK is the most  full-blown IT market in Europe. The   a nonher(prenominal) European markets  be maturing at  se   veral(prenominal)(predicate) speeds. An acceleration in ITO ad excerpt is now appargonnt in countries  much(prenominal) as France and Ger  many a(prenominal) a(prenominal)A  cogitate on achieving service  rake  faithfulness and the  outmatch value/ whole tone balance is increasingly driving European organizations ( curiously those beyond the first generation deal) to  deem selecting multiple providers for an outsourcing contract. For example, in the IT telecommunication sector, the most common division is by service tower, with customers opting to choose  contrary providers for their network, desktop, data center and  occupation competencies. At the moment, however, providers  carry to join forces in an opportunistic manner, as a response to customer demands. This is the ca employ  foot the ever-changing composition of the providers teams as a consequence, consolidating  outper work on practices to  deal IT service spin offs  among  opposite providers in an effort to  endorsement  l   engthways service  weary  chastity  bides challenging. As the number of providers  move is set to increase, this challenge is likely to intensify. It will  overly be  operate by other market characteristics, which  imply a persistent tactical  purpose of outsourcing by European customers, insufficient  demonstrate maturity, and  neglect of limpidity in the definition of roles and responsibilities.As we  pick up at  world(prenominal)  deliverance, it is  fine to say that  in that location argon two  study misconceptions that still  live among the European market 1) Global delivery is  oft considered as a synonym of offshore, and 2) IT services delivered  by global delivery capabilities are application services. In reality, in the   retiring(a) few years, the European market has witnessed a considerable expansion in  wrong of both geographical location  preferences (in areas  much(prenominal) as Eastern Europe or  marriage Africa, for example) and portfolio of services offered (now in   cluding, for example, help desk and remote infrastructure  caution services). Global delivery and offshore, however,  run the   fundamental deal characteristics that need to be treated with extra  sustentation in many European geographies, and as a consequence, many deals  bear confidential. Traditional providers investment funds funds will be directed toward enhancing  being capabilities ( in particular near shore in Eastern Europe) and ensuring  work solidity.  offshore providers investment on the other side will be centered on creating front-end capabilities with a  focus on  particular country and   high-priced-oriented competencies.  sequence these global delivery models  spring up and are refined/ optimized, customers satisfaction will  take a breather a challenge.KEY TRENDS SHAPING IT OUTSOURCING MARKET IN EUROPETRENDSCHARACTERISTICSSelective Outsourcing With  ninefold Providers* Embraced by bulk of European companies * Objectives IT   penny-pinchingness and  apostrophize opt   imization *  consolidation and governance challengesGlobal Sourcing and Global  bringing  modelings* Near shore propinquity key for European market * Expanding portfolio of outsourcing services *  linchpin area of investment for providers and buyersIT Utility* Industrialization is accelerating * Convergence of IT  value and global delivery *  primordial drivers flexibility,  capacity, optimized  live, speedAggressive ESP Competitive Landscape* National, global and offshore ESPs converging * Mergers, acquisitions and divestitures to continue * Providers are implementing  juvenile business models * New offshore market entrantsApplication Outsourcing to Grow* Drivers portfolio rationalization,  bequest modernization * Global delivery will gain acceptance * Multitude of providers competingSourceGartnerThe U.K., Netherlands, Sweden and Finland are examples of countries more attracted by the global delivery model. However, in the meantime, the impact of global competition has started to d   rive countries  much(prenominal) as Germany and France to consider global delivery as a viable option to be considered strategically, rather than when all other options  make been exhausted.Despite a slower gestation and the fact that a complete infrastructure utility (IU) offering has not yet been developed, the IU model is continuing to attract new offerings and/or new providers. In the meantime, European customers, attracted by the idea of being able to access IT services in a flexible way,  die hard cautious as they expect  bring forward  clarity on issues  such as unit definition, pricing mechanisms,  consolidation to existing systems, and   hostage department portability In the near future, we expect that the IU for ERP platforms will remain the most common battleground for providers other providers are expected to  rather mask their IU offering  back a package that  complicates product and  prevail services. The concept of software as a service (SaaS) or ready-to-use applicat   ions will continue to generate lot of  quest. Expectations for a solid delivery and  peculiar(prenominal) functionalities will drive providers to specialize their offerings.Finally, gains in terms of  serve well  qualification will be  touchn as crucial to deliver enhanced battle, flexibility,   business organizationfreeness and cost optimization.GLOBAL TRENDS IT OUTSOURCING and OFFSHORING MARKETIT Outsourcing market is showing an average  egression of 9% p.a.IT Outsourcing  spherewide forecast ( meg $)Source Gartner DataquestIn terms of volume, North America continues to be the leader in IT outsourcing.Latin America and APAC  imbibe shown good  enkindlethEurope has fast emerged as a  colossal IT outsourcerGlobal offshore  outlay is continuing to  chronicle double  bod  offshoot. servicemanwide Offshore IT Services Spending by Importing  land (million $)Source Gartner Dataquest, 2004 and Worldwide and U.S. Offshore IT Services 2006-2010 ForecastIn terms of volume, the North America    continues to be the leader in IT offshoring.Once  antipathetic to the idea of outsourcing, Europe is now steadily adopting an IT offshore model to encouragement the economyGlobal offshore spending is projected to increase to 29400 $  one million million in 2010The graph on the next page shows the potential market for various types of sourcing options. This  kick the bucketly depicts that he IT and Business Process offshoring market has  swelled at a tremendous rate over the past 7 year and the market provides a huge potential which is yet to be exploited.IT and BPO marketSource Gartner, Dataquest, Aberdeen Group, McKinsey, Evalueserve, Infosys, IDC and Nasscom strategic review 2008Currently we are not even exploiting 10% of the potential market size ( IT services off shoring just at $17 Billion, whereas market potential is  nigh $200-240 Billion *)According to a new research by Gartner, the market is likely to  beget  get ahead after the financial slowdown, as firms will try aggress   ively to reduce costs and im designate  talent distinguishable Sourcing ModelsIn-sourcing / Shared Services Sourcing from internal sources or from an affiliated firm in the  fundament economyOnshore Outsourcing Sourcing from a non-affiliated firm in the  household economyCaptive Offshoring Sourcing from an affiliated firm located abroadOffshore Outsourcing Sourcing from a non-affiliated firm located abroadREGIONAL DYNAMICS  crosswise EUROPEThe following section will describe the  shareal ITO trends and   local anaesthetic anesthetic dynamics  crossways  distinguishable European locations.UK and IRELAND2005 17.2B 2010 25.7B 2005-2010 CAGR 8.3%ITO drivers Im found IT  flavour for end users, speed/flexibility, access to  expert skills, cost reduction Inhibitors  going of control, neediness of trust, security/privacy, IP light upon trends Most  advance market in Europe with wider number of mega deals (public sector) Deal sophistication, including government. Increasing  disport in new p   ricing schemes, business enhancement and  overlap services More  discriminating sourcing and global delivery Areas such as Scotland and Ireland feeling pressure of Indian and Eastern European operations Wide potential for application engagements to mature from project engagements into outsourcing based engagementsDespite being the  plumpingst and most mature market in Europe, the U.K.  carcass  overly  angiotensin converting enzyme of the fast- eliciting ones. Here organizations  front to  realize moved away from the equation of outsourcing = cost reduction.  opus cost  form a key  cistron, other objectives  wait more  grand, such as improving IT service delivery, gaining specific skills, especially for application outsourcing deals, and  change state a more flexible organization. (See Appendix F) Inhibitions remain related to a general  overleap of trust in the ability to join forces with the providers to  grapple security, control over IT operations and IP.The U.K. market is chara   cterized by a large number of mega deals, especially in the public sector. These outsourcing deals  very much include initiatives that have classically been carried out  by means of project engagements and now are increasingly being performed in the initial phases of an IT outsourcing or BPO deal. This change reflects the growing  go for of customers for a tighter link  mingled with investment and results (for which the outsourcer is responsible during the duration of the contract) and the  beta shift in role for the internal IT department. Rather than focusing on assembling and managing all of the necessary skills and capabilities to meet a certain objective, IT organizations, in this scenario, are responsible for coordinating the objectives of the Business Unit and the internal and  outdoor(a) providers  tenanted to  promote them. Often infrastructure outsourcing is at the core of these complex  familys.At the  kindred time, the U.K. is  too the largest market in terms of  tolerat   ion of IT services delivered through a network of global delivery capabilities (which include nearshore and offshore locations). From this point of view, areas that used to be considered as low cost for outsourcing operations (Scotland and Ireland) continue to feel the pressure of Indian and Eastern European capabilities.Finally, organizations that have engaged for a long period of time in project-based application deals are planning to elevate them into more-strategic, long-term application  counselling engagements. This will allow them to gain a longer-term commitment from the service provider and the relevant  back down to re-evaluate their application portfolio.NORDIC COUNTRIES2005 5.2B 2010 7.6B 2005-2010 CAGR 8.2%Drivers  greet reduction, access to  technical skills (especially in application outsourcing engagements),  endorse in global operations, focus on core businessInhibitors  exit of control, security/privacy,  drop of trust strike trends Nordic market loosely mature. Ma   ny large deals are in second or third generation. Some likely to evolve toward multi sourcing  whopping corporations see global delivery as a viable option. SMBs see nearshore option more favorably Consolidation drives specialization by geography,  vertical market or horizontal service increase competition  amid  domainal and global ESPs Cultural affinity seen as crucial to  insure deal success/longevityEach of the four country markets that  comprise the Nordic region has its own distinct characteristics and buying behaviors in IT services. However, if we look at the forecast  emersion  among 2005 and 2010, we expect the region to grow at a similar speed (despite size differences) of about 8%.Denmark Sometimes seen as the entry point for the global service providers to the Nordics.  judge growth is from 856 million in 2005 to 1.2  one thousand thousand in 2010 (CAGR of 7.8%).Finland Unique in the Nordic region as buyers focus much more on business value of an outsourcing deal rather    than just cost. expect growth is from 1  one thousand million in 2005 to 1.45 billion in 2010 (CAGR of 7.5%)Norway Remains the smallest outsourcing market in the region. Expected growth is from 1.2 billion in 2005 to 1.8 billion in 2010 (CAGR of 8.1%)Sweden  big(p)st market and very cost-competitive. Probably the Nordic country  channeliseed most by offshore providers currently. Expected growth is from 2 billion in 2005 to 3.1 billion in 2010 (CGR of 8.7%)From a client perspective, the Nordic region market is  for the most part mature, with many large corporations in second- or third-generation outsourcing deals. Global delivery is  wide accepted as an option.Competition between regional providers and global providers is increasing this was initiated by the inability of local providers to support the operations of key Nordic organizations around the globe.However, recent acquisitions and divestitures by both local and international providers prove that the market has still got room    for further maturation and consolidation.NETHERLANDS2005 3.4B 20105B 2005-2010 CAGR 8%Drivers  court reduction  in a  high place all,  lightness/flexibility, improving service to end usersInhibitors Loss of IP and control, security/privacy, high costKey trends commercialize shows   involved signs of maturity (organizations accept global delivery) and immaturity (sourcing strategy is often neglected) foodstuff split between large global corporations and wide portion of SMBsincrease competition for local/national championsApplication  on a lower floor scrutiny for   remoteizationThe market in the Netherlands is one of the more modern IT outsourcing environments in Europe,  almost following the U.K. in many trends. A focus on global delivery and the expansion of many deals into the application or business  growth layer points to more market maturity.This maturity is  control primarily by the relatively high proportion of large (and often multinational) enterprises headquartered in the    Netherlands and competing in  study markets such as financial services.But  in that respect are some contradictory characteristics that point to an immature market (cost cutting is by far the   study driver, and sourcing strategy is often neglected) this, as a consequence, often inhibits the potential success of outsourcing initiatives.The market remains very challenging and competitive. This is  ascribable to the high presence of small and midsize businesses (SMBs), which traditionally tend to consider outsourcing as a threat more than an opportunity and require a higher(prenominal) level of customization, which tests the profitability model of service providers.Competition remains  well for national champions as global and offshore providers continue to  seat opportunities in the country. Increasingly, application outsourcing opportunities are  emerge as organizations look at portfolio rationalization, legacy system transformation, and custom application software  training initia   tives and accessing application utility solutions.FRANCE2005 6.6B 2010 10B CAGR 8.4 %Drivers Cost reduction, refocus internal IT, speed/flexibilityInhibitors Loss of control, lack of trust, security/privacyKey trendsBeyond its reliance on  round augmentation, Frances outsourcing market shows opportunities in all facets of outsourcing infrastructure, applications and BPOSelective outsourcing has gained acceptance, and organizations show cautious interest in global service deliveryNational champions remain  on a lower floor competitive pressure from the global and multinational providersFrance has long been considered behind in the outsourcing trend. Now, however, the French outsourcing market is consolidating and growing,  period the long-standing reliance on  rung augmentation is losing strength. The major driver that will support a CAGR of over 8% between 2005 and 2010 is the need for French organizations to reduce cost and enhance their level of  fight in the market by refocusing    their internal IT skills on more-strategic tasks  magical spell gaining flexibility. On the other side, it is interesting to see that challenges related to HR  instruction have lost strength, compared with the traditional fears related to loss of control and security and lack of trust.Large organizations have recently moved toward the adoption of  discriminating outsourcing with multiple providers. This model has gained acceptance as organizations look at  maximize the balance between cost and service delivery  righteousness.There is also a new focus on application outsourcing. This trend is  all- primal(a) not only because it signals an acceleration in the growth of outsourcing in France overall,  barely because it signals a major change in the way French organizations use  assorted kinds of IT services. Increase in application outsourcing deals also touches on one of the major taboos of IT services in France offshore outsourcing. As such, although offshore remains a word to be use   d with extra care in the French market, many organizations would consider that access to global delivery models is an  appeal part of outsourcing, especially when delivered by traditional players. In this case, North Africa (Morocco, for example) is  acclivitous as a viable near shore location.National champions, the providers that focus on a specific region or country, remain  to a lower place competitive pressure from the global and multinational providers.GERMANY2005 10.6B 2010 16B 2005-2010 CAGR 8.6%Drivers Cost reduction  to a higher place all, focus on core business, refocus internal ITInhibitors Security/privacy, lack of trust, loss of controlKey trendsGlobal economic pressures have  laboured many organizations to look at outsourcing as a viable optionIn the  in brief term, objectives such as flexibility and agility are secondaryPressure to divest internal IT departments or internal  shared out service organizations remains strongGlobal delivery gaining ground especially towa   rd Eastern EuropeIntensifying competition between strong German players and global onesLegacy system modernization will remain a key objectiveThe German market is federated in several ways government responsibilities, industrial centers, buying centers within enterprises, and   counsel structures in place. All of this makes doing business in Germany (and negotiating significant IT service deals)  ludicrous. Decision  outgrowthes tend to be longer, require more consensus  systema skeletaleing and often entail more travel than in other parts of Europe. For a long time, the  majority of German organizations have considered IT operations as a key  dowery to maintain or enhance their level of competitiveness in the market. This has, as a consequence, slowed the outsourcing growth. In the past two years, however, economic pressures have  compel many organizations to look at outsourcing tactically to cut cost. While in the  improvident term, achieving flexibility is a secondary objective,    organizations look at outsourcing as a way to refocus their internal capabilities while focusing on their core business. The traditional inhibitors around security, trust and loss of control apply.While non-German external service providers (ESPs) still find it difficult to position themselves in Germany (exceptions are IBM Germany, which established itself early on as a German ESP, and HP, based on its early SAP hosting business and penetration as a technology provider), German providers maintain strong domestic positions and are starting to focus on expanding their international presence (through T-Systems).In the short term, German organizations will still consider selling their own IT capabilities, while global providers will see these as viable targets to build capabilities as long as they provide financial support through a long-term outsourcing deal.Finally, beyond potential healthy growth for ERP application outsourcing initiatives (especially SAP), as many organizations loo   k at legacy system modernization, it is likely that many projects will evolve and deploy model to include the long-term  concern of applications.EASTERN EUROPE2005 1.1B 2010 1.6B 2005-2010 CAGR 7.9%Drivers Acquisitions made by large Western European organizations, increased competition, need to revamp obsolete IT environments (leap-frog)Inhibitors Low expertise to  extinguish OS deals, high cost of OS, loss of controlKey trends remit internal consumption of outsourcingKey nearshore delivery hub for providers supporting operations of European organizationsLocal Eastern European service providers will remain target for acquisitionsLong-term growth will be supported by increasing competition, acquisitions made by Western companies and the penetration of Western ESPs in the regionThe region has become a strong global delivery hub modern admission to the European Union has transformed countries such as Poland, Romania and the   Czechoslovakianoslovakian Republic into attractive locations    to establish global delivery capabilities designed to deliver IT services to European or global customers. Eastern Europe has been identify as an ideal region to establish a service delivery hub by U.S.-based providers (IBM, Accenture and EDS), European ones(Atos Origin, Capgemini, T-Systems, SIS and ST) and offshore ones (Ness, TCS, Satyam, Infosys and Wipro). When necessary, providers are openly  seek acquisitions to gain scale it is the case for SIS, which acquired ELAS, HT Computers in Slovakia, and Ibis-Sys in Serbia (February 2005). Others, like Austrian-based ST, are pursuing a strategy of  befitting the provider of choice in Eastern Europe through a  conclave of organic  schooling and local acquisitions. ST acquired Computacenter Austria to strengthen its product resale capabilities.Although internal consumption of outsourcing has been slow, it is expected to grow rapidly, thanks to increasing competition driven by the fact that private-sector companies and public-sector or   ganizations are now focusing on bringing their systems into line with market standards. This is  take to some leapfrogging effects  the IT utility approach, for example, holds significant appeal without posing the  homogeneous transition challenges as elsewhere  but because these markets are  bazarly immature, there is still a strong focus on products and product support services rather than more-sophisticated IT service engagements.Italy and Spain are two other major countries with an expected ITO market size of about 5 Billion $  all(prenominal) by the year 2010.GLOBAL DELIVERY MODELGDM is a  grotesque approach to outsourcing and off shoring, which offers the best of both worlds by blending onsite,  inshore and offshore resources and locations. By using a far-r separatelying network of onsite, seaward, and offshore resources, GDM aims to cuts across geographies to access the right resources, in the right place, at the right cost.By selecting the most advantageous and cost effectiv   e proportion of resources worldwide, Global  spoken communication Model boosts business performance while also lowering costs. It also helps the  supplier deliver requirements that are met on-time, within budget, and with high quality  great efficiency and responsiveness to their clients.In this section we would discuss in detail, the key drivers to a successful GDM.Source Capgemini, 2008KEY DRIVERS OF A SUCCESSFUL GDM fast(a)  cropES sloshed  exhibites are the backbone of a successful Global  talking to Model. There is a strong need for detailed, documented and time-tested processes for all the activities and interfaces. difficult quality and project  counselling processes ensure delivery excellence.World class processes for knowledge  commission and sharing resources encourage improved  eruditeness among teams.Processes for managing talent ensure that the projects get the best and most motivated people.Strong processes for interaction and communication within team make it possible    for globally distributed groups to interface and collaborate in an effective manner while delivering excellence on a continuous basis.On the other hand, processes, while strong, should  give way ample space for creativity and flexibility. It is only then that the Global  pitch shot Model (GDM) can create far more value than the traditional sourcing models. Here is what it will translate intoQuicker, seamless transitions, and early project  self-possessionOptimum onsite/ offshore mixes through intelligent allocation of the available resources superior degree of predictability through processes, sharing and reuseA strong  kinship approach to ensure continuity and business focusSharing of best practices and tools across the enterpriseDepth and quality of resources,  continuously trained and retrained to  causal agency project needsAdherence to SLA based pricing models to ensure good Return on Investment (ROI) and drive customer satisfaction put to work ARCHITECTURECompanies rely on pr   ocesses to consistently deliver high quality solutions while executing a number of engagements from multiple locations. According to the policies   espouse by a leading IT services provider values, vision and policies should form the first level of the three-tiered process architecture. These are then implemented through process execution at the next level. These processes are defined with clear  monomania and clearly defined roles and responsibilities. lineament System Documentation prime(prenominal) System Documentation defines clearly all the processes that should be put into place. These documents provide the engineers and consultations with a vast repository of detailed procedures, templates, standards, guidelines and checklists.The comprehensiveness of these documents supports all tasks from higher-level  knowledge abstraction and definition to tasks such as coding and documentation. This is crucial to  examine clients with the delivery of high quality and predictable IT solut   ions that meet their business needs. These documents should also be monitored and updated regularly.Knowledge SharingEmployees are given a  meeting place like a website  penetration, to share knowledge gained from their experience at the organization. It is meant to be a central repository of the knowledge that can be tapped by peers and as sometimes external clients as well. The collection of documents on this  opening is reviewed and classified into  divergent areasSoftware development life-cycle activities such as requirements specification, design, build and testing documentation.Software-related topics such as tools and quality documentation.Topics of general or  functional interest such as travel or HR policies,  and so forthteraProcess AssetsThis is a repository to facilitate sharing and giving out of engagement  encyclopaedism across the organization. The user has the facility to submit to the repository,  find from the repository and obtain  cultivation on the status of the    repository.A process asset can be any information ranging from an engagement, which can be re-used by future engagements. Typically these include project plans, configuration management plans, requirements documents, standards, checklists, design documents, test plans, causal analysis reports and utilities used in the engagement, etc.Process DatabaseThe Process Database is a software engineering database to study the processes at the organization with respect to productivity and quality. More specifically, its purpose areas are as followsTo aid estimation of effort and project defectsTo get the productivity and quality data on different types of projectsTo aid in creating of a process capability baselineProcess  might Baseline (PCB)Process  potency baseline is used to specify, what the performance of the process is, i.e. what a project can expect when following the process. This estimation is done based on the past data. The performance factors of the process areEffect of Globaliza   tion on IT Service Providers in EuropeEffect of Globalization on IT Service Providers in EuropeOpportunities and challenges presented by Globalization IT Service providers in Continental EuropeEXECUTIVE SUMMARYEnterprises within Europe are increasingly  severe to seek the advantages of global sourcing. Unlike enterprises in U.S. or U.K., continental European countries have historically been reluctant to engage with offshore providers. The reasons were far stretched, ranging from political sensitivity, labor laws, cultural compatibility and language requirements. Globalization, however, is creating new avenues that European companies can not ignore. A recent report by Gartner shows the potential IT Offshoring market to be in the range of about $ 200 to 240 Billion. The market is expected to register double digit growth for years to come. The current offshore spending by firms amounts to just $17 Billion worldwide. This clearly shows a  forged gap, a huge market potential which is yet    to be exploited. The huge demand has also led to emergence and growth of several new players in the field of IT Outsourcing/ Offshoring services, this is leading to ever increasing competition in the marketplace. In order to cope up with this increased competition and to provide better services, these service providers are increasingly adopting Global delivery models. By selecting an advantageous and cost effective proportion of resources worldwide, Global  deliverance Model boosts business performance while also lowering costs. It also helps the supplier deliver requirements that are met on-time, within budget, and with high quality greater efficiency and responsiveness to their clients. In Europe, nearshore models still dominate the market. But these models are continuously being updated, with more and more providers setting up Offshore  exploitation Centers in locations like India. A framework for building an optimal combination of onsite, nearshore, and offshore delivery capabi   lities is provided by Capgeminis Rightshore model.A recent Gartner report has suggested that, the current US economic slowdown is expected to lead buyers of IT services to consider increasing the percentage of their labor in offshore locations. India will remain the dominant location for IT offshore services for North American and European buyers as a result of its scale, quality of resources and strong presence of local and traditional service providers.INTRODUCTION EUROPEAN IT MARKETThe European market remains a highly complex and competitive market with a large number of providers. Mergers and acquisitions will continue but will be balanced by new market entrantsOutsourcing adoption in Europe is increasing for both infrastructure and applications the widespread lack of well defined sourcing strategies among buyers and the realities of ever-changing business requirements will generate frequent deal negotiations and renegotiationsGlobal delivery and utility services are irreversibl   e trends evolving at different speeds among various European countries. The European multi country, multi language/culture composition increases the evolutionary complexity of these trendsSelective outsourcing with multiple providers will remain the preferred model of engagement for European buyers. Governance and end-to-end integration/management of different providers/solutions are the most challenging aspects of itITO market maturity varies UK is the most matured IT market in Europe. The other European markets are maturing at different speeds. An acceleration in ITO adoption is now apparent in countries such as France and GermanyA focus on achieving service delivery excellence and the best value/quality balance is increasingly driving European organizations (especially those beyond the first generation deal) to consider selecting multiple providers for an outsourcing contract. For example, in the IT  telecom sector, the most common division is by service tower, with customers opt   ing to choose different providers for their network, desktop, data center and application competencies. At the moment, however, providers tend to join forces in an opportunistic manner, as a response to customer demands. This is the cause behind the ever-changing composition of the providers teams as a consequence, consolidating best practices to manage IT service spin offs between different providers in an effort to guarantee end-to-end service delivery excellence remains challenging. As the number of providers engaged is set to increase, this challenge is likely to intensify. It will also be driven by other market characteristics, which include a persistent tactical use of outsourcing by European customers, insufficient process maturity, and lack of clarity in the definition of roles and responsibilities.As we look at global delivery, it is fair to say that there are two major misconceptions that still exist among the European market 1) Global delivery is often considered as a syn   onym of offshore, and 2) IT services delivered through global delivery capabilities are application services. In reality, in the past few years, the European market has witnessed a considerable expansion in terms of both geographical location options (in areas such as Eastern Europe or North Africa, for example) and portfolio of services offered (now including, for example, help desk and remote infrastructure management services). Global delivery and offshore, however, remain the key deal characteristics that need to be treated with extra care in many European geographies, and as a consequence, many deals remain confidential. Traditional providers investment will be directed toward enhancing existing capabilities (especially near shore in Eastern Europe) and ensuring process solidity. Offshore providers investment on the other side will be centered on creating front-end capabilities with a focus on specific country and vertical-oriented competencies. While these global delivery mode   ls mature and are refined/ optimized, customers satisfaction will remain a challenge.KEY TRENDS SHAPING IT OUTSOURCING MARKET IN EUROPETRENDSCHARACTERISTICSSelective Outsourcing With  quadruplicate Providers* Embraced by majority of European companies * Objectives IT excellence and cost optimization *  integrating and governance challengesGlobal Sourcing and Global Delivery Models* Near shore  proximity key for European market * Expanding portfolio of outsourcing services * Key area of investment for providers and buyersIT Utility* Industrialization is accelerating * Convergence of IT utility and global delivery * Key drivers flexibility, efficiency, optimized cost, speedAggressive ESP Competitive Landscape* National, global and offshore ESPs converging * Mergers, acquisitions and divestitures to continue * Providers are implementing new business models * New offshore market entrantsApplication Outsourcing to Grow* Drivers portfolio rationalization, legacy modernization * Global del   ivery will gain acceptance * Multitude of providers competingSourceGartnerThe U.K., Netherlands, Sweden and Finland are examples of countries more attracted by the global delivery model. However, in the meantime, the impact of global competition has started to drive countries such as Germany and France to consider global delivery as a viable option to be considered strategically, rather than when all other options have been exhausted.Despite a slower gestation and the fact that a complete infrastructure utility (IU) offering has not yet been developed, the IU model is continuing to attract new offerings and/or new providers. In the meantime, European customers, attracted by the idea of being able to access IT services in a flexible way, remain cautious as they expect further clarity on issues such as unit definition, pricing mechanisms, integration to existing systems, and security portability In the near future, we expect that the IU for ERP platforms will remain the most common ba   ttleground for providers other providers are expected to  quite mask their IU offering behind a package that includes product and support services. The concept of software as a service (SaaS) or ready-to-use applications will continue to generate lot of interest. Expectations for a solid delivery and specific functionalities will drive providers to specialize their offerings.Finally, gains in terms of process efficiency will be seen as crucial to deliver enhanced competitiveness, flexibility, agility and cost optimization.GLOBAL TRENDS IT OUTSOURCING and OFFSHORING MARKETIT Outsourcing market is showing an average growth of 9% p.a.IT Outsourcing Worldwide forecast (Million $)Source Gartner DataquestIn terms of volume, North America continues to be the leader in IT outsourcing.Latin America and APAC have shown good growthEurope has fast emerged as a  epic IT outsourcerGlobal offshore spending is continuing to register double digit growth.Worldwide Offshore IT Services Spending by Imp   orting  persona (million $)Source Gartner Dataquest, 2004 and Worldwide and U.S. Offshore IT Services 2006-2010 ForecastIn terms of volume, the North America continues to be the leader in IT offshoring.Once reluctant to the idea of outsourcing, Europe is now steadily adopting an IT offshore model to boost the economyGlobal offshore spending is projected to increase to 29400 $ Million in 2010The graph on the next page shows the potential market for various types of sourcing options. This clearly depicts that he IT and Business Process offshoring market has  prominent at a tremendous rate over the past 7 year and the market provides a huge potential which is yet to be exploited.IT and BPO marketSource Gartner, Dataquest, Aberdeen Group, McKinsey, Evalueserve, Infosys, IDC and Nasscom strategic review 2008Currently we are not even exploiting 10% of the potential market size ( IT services off shoring just at $17 Billion, whereas market potential is about $200-240 Billion *)According to    a new research by Gartner, the market is likely to grow further after the financial slowdown, as firms will try aggressively to reduce costs and improve efficiency incompatible Sourcing ModelsIn-sourcing / Shared Services Sourcing from internal sources or from an affiliated firm in the home economyOnshore Outsourcing Sourcing from a non-affiliated firm in the home economyCaptive Offshoring Sourcing from an affiliated firm located abroadOffshore Outsourcing Sourcing from a non-affiliated firm located abroadREGIONAL DYNAMICS crosswise EUROPEThe following section will describe the regional ITO trends and local dynamics across different European locations.UK and IRELAND2005 17.2B 2010 25.7B 2005-2010 CAGR 8.3%ITO drivers Improve IT quality for end users, speed/flexibility, access to technical skills, cost reduction Inhibitors Loss of control, lack of trust, security/privacy, IPKey trends Most mature market in Europe with wider number of mega deals (public sector) Deal sophistication, in   cluding government. Increasing interest in new pricing schemes, business enhancement and shared services More selective sourcing and global delivery Areas such as Scotland and Ireland feeling pressure of Indian and Eastern European operations Wide potential for application engagements to mature from project engagements into outsourcing based engagementsDespite being the largest and most mature market in Europe, the U.K. remains also one of the fast-growing ones. Here organizations seem to have moved away from the equation of outsourcing = cost reduction. While cost remains a key component, other objectives seem more important, such as improving IT service delivery, gaining specific skills, especially for application outsourcing deals, and becoming a more flexible organization. (See Appendix F) Inhibitions remain related to a general lack of trust in the ability to join forces with the providers to manage security, control over IT operations and IP.The U.K. market is characterized by    a large number of mega deals, especially in the public sector. These outsourcing deals often include initiatives that have classically been carried out through project engagements and now are increasingly being performed in the initial phases of an IT outsourcing or BPO deal. This change reflects the growing  disposition of customers for a tighter link between investment and results (for which the outsourcer is responsible during the duration of the contract) and the important shift in role for the internal IT department. Rather than focusing on assembling and managing all of the necessary skills and capabilities to meet a certain objective, IT organizations, in this scenario, are responsible for coordinating the objectives of the Business Unit and the internal and external providers engaged to support them. Often infrastructure outsourcing is at the core of these complex relationships.At the same time, the U.K. is also the largest market in terms of adoption of IT services deliver   ed through a network of global delivery capabilities (which include nearshore and offshore locations). From this point of view, areas that used to be considered as low cost for outsourcing operations (Scotland and Ireland) continue to feel the pressure of Indian and Eastern European capabilities.Finally, organizations that have engaged for a long period of time in project-based application deals are planning to elevate them into more-strategic, long-term application management engagements. This will allow them to gain a longer-term commitment from the service provider and the relevant support to re-evaluate their application portfolio.NORDIC COUNTRIES2005 5.2B 2010 7.6B 2005-2010 CAGR 8.2%Drivers Cost reduction, access to technical skills (especially in application outsourcing engagements), support in global operations, focus on core businessInhibitors Loss of control, security/privacy, lack of trustKey trends Nordic market generally mature. Many large deals are in second or third g   eneration. Some likely to evolve toward multi sourcing Large corporations see global delivery as a viable option. SMBs see nearshore option more favorably Consolidation drives specialization by geography, vertical market or horizontal service Increased competition between regional and global ESPs Cultural affinity seen as crucial to guarantee deal success/longevityEach of the four country markets that  straighten up the Nordic region has its own distinct characteristics and buying behaviors in IT services. However, if we look at the forecast growth between 2005 and 2010, we expect the region to grow at a similar speed (despite size differences) of about 8%.Denmark Sometimes seen as the entry point for the global service providers to the Nordics. Expected growth is from 856 million in 2005 to 1.2 billion in 2010 (CAGR of 7.8%).Finland Unique in the Nordic region as buyers focus much more on business value of an outsourcing deal rather than just cost. Expected growth is from 1 billion    in 2005 to 1.45 billion in 2010 (CAGR of 7.5%)Norway Remains the smallest outsourcing market in the region. Expected growth is from 1.2 billion in 2005 to 1.8 billion in 2010 (CAGR of 8.1%)Sweden Largest market and very cost-competitive. Probably the Nordic country targeted most by offshore providers currently. Expected growth is from 2 billion in 2005 to 3.1 billion in 2010 (CGR of 8.7%)From a client perspective, the Nordic region market is generally mature, with many large corporations in second- or third-generation outsourcing deals. Global delivery is widely accepted as an option.Competition between regional providers and global providers is increasing this was initiated by the inability of local providers to support the operations of key Nordic organizations around the globe.However, recent acquisitions and divestitures by both local and international providers prove that the market has still got room for further maturation and consolidation.NETHERLANDS2005 3.4B 20105B 2005-20   10 CAGR 8%Drivers Cost reduction above all, agility/flexibility, improving service to end usersInhibitors Loss of IP and control, security/privacy, high costKey trendsMarket shows mixed signs of maturity (organizations accept global delivery) and immaturity (sourcing strategy is often neglected)Market split between large global corporations and wide portion of SMBsIncreased competition for local/national championsApplication  chthonic scrutiny for  externalisationThe market in the Netherlands is one of the more modern IT outsourcing environments in Europe,  well following the U.K. in many trends. A focus on global delivery and the expansion of many deals into the application or business process layer points to more market maturity.This maturity is driven primarily by the relatively high proportion of large (and often multinational) enterprises headquartered in the Netherlands and competing in major markets such as financial services.But there are some contradictory characteristics t   hat point to an immature market (cost cutting is by far the major driver, and sourcing strategy is often neglected) this, as a consequence, often inhibits the potential success of outsourcing initiatives.The market remains very challenging and competitive. This is  overdue to the high presence of small and midsize businesses (SMBs), which traditionally tend to consider outsourcing as a threat more than an opportunity and require a higher level of customization, which tests the profitability model of service providers.Competition remains strong for national champions as global and offshore providers continue to target opportunities in the country. Increasingly, application outsourcing opportunities are emerging as organizations look at portfolio rationalization, legacy system transformation, and custom application software development initiatives and accessing application utility solutions.FRANCE2005 6.6B 2010 10B CAGR 8.4 %Drivers Cost reduction, refocus internal IT, speed/flexibili   tyInhibitors Loss of control, lack of trust, security/privacyKey trendsBeyond its reliance on staff augmentation, Frances outsourcing market shows opportunities in all facets of outsourcing infrastructure, applications and BPOSelective outsourcing has gained acceptance, and organizations show cautious interest in global service deliveryNational champions remain under competitive pressure from the global and multinational providersFrance has long been considered behind in the outsourcing trend. Now, however, the French outsourcing market is consolidating and growing, while the long-standing reliance on staff augmentation is losing strength. The major driver that will support a CAGR of over 8% between 2005 and 2010 is the need for French organizations to reduce cost and enhance their level of competitiveness in the market by refocusing their internal IT skills on more-strategic tasks while gaining flexibility. On the other side, it is interesting to see that challenges related to HR m   anagement have lost strength, compared with the traditional fears related to loss of control and security and lack of trust.Large organizations have recently moved toward the adoption of selective outsourcing with multiple providers. This model has gained acceptance as organizations look at  increase the balance between cost and service delivery excellence.There is also a new focus on application outsourcing. This trend is important not only because it signals an acceleration in the growth of outsourcing in France overall, but because it signals a major change in the way French organizations use different kinds of IT services. Increase in application outsourcing deals also touches on one of the major taboos of IT services in France offshore outsourcing. As such, although offshore remains a word to be used with extra care in the French market, many organizations would consider that access to global delivery models is an  kindly part of outsourcing, especially when delivered by tradit   ional players. In this case, North Africa (Morocco, for example) is emerging as a viable near shore location.National champions, the providers that focus on a specific region or country, remain under competitive pressure from the global and multinational providers.GERMANY2005 10.6B 2010 16B 2005-2010 CAGR 8.6%Drivers Cost reduction above all, focus on core business, refocus internal ITInhibitors Security/privacy, lack of trust, loss of controlKey trendsGlobal economic pressures have  force many organizations to look at outsourcing as a viable optionIn the short term, objectives such as flexibility and agility are secondaryPressure to divest internal IT departments or internal shared service organizations remains strongGlobal delivery gaining ground especially toward Eastern EuropeIntensifying competition between strong German players and global onesLegacy system modernization will remain a key objectiveThe German market is federated in several ways government responsibilities, indus   trial centers, buying centers within enterprises, and management structures in place. All of this makes doing business in Germany (and negotiating significant IT service deals) unique. Decision processes tend to be longer, require more consensus building and often entail more travel than in other parts of Europe. For a long time, the majority of German organizations have considered IT operations as a key component to maintain or enhance their level of competitiveness in the market. This has, as a consequence, slowed the outsourcing growth. In the past two years, however, economic pressures have  obligate many organizations to look at outsourcing tactically to cut cost. While in the short term, achieving flexibility is a secondary objective, organizations look at outsourcing as a way to refocus their internal capabilities while focusing on their core business. The traditional inhibitors around security, trust and loss of control apply.While non-German external service providers (ESPs   ) still find it difficult to position themselves in Germany (exceptions are IBM Germany, which established itself early on as a German ESP, and HP, based on its early SAP hosting business and penetration as a technology provider), German providers maintain strong domestic positions and are starting to focus on expanding their international presence (through T-Systems).In the short term, German organizations will still consider selling their own IT capabilities, while global providers will see these as viable targets to build capabilities as long as they provide financial support through a long-term outsourcing deal.Finally, beyond potential healthy growth for ERP application outsourcing initiatives (especially SAP), as many organizations look at legacy system modernization, it is likely that many projects will evolve and deploy model to include the long-term management of applications.EASTERN EUROPE2005 1.1B 2010 1.6B 2005-2010 CAGR 7.9%Drivers Acquisitions made by large Western Eur   opean organizations, increased competition, need to revamp obsolete IT environments (leap-frog)Inhibitors Low expertise to manage OS deals, high cost of OS, loss of controlKey trends retard internal consumption of outsourcingKey nearshore delivery hub for providers supporting operations of European organizationsLocal Eastern European service providers will remain target for acquisitionsLong-term growth will be supported by increasing competition, acquisitions made by Western companies and the penetration of Western ESPs in the regionThe region has become a strong global delivery hub modern admission to the European Union has transformed countries such as Poland, Romania and the Czech Republic into attractive locations to establish global delivery capabilities designed to deliver IT services to European or global customers. Eastern Europe has been  place as an ideal region to establish a service delivery hub by U.S.-based providers (IBM, Accenture and EDS), European ones(Atos Origin,    Capgemini, T-Systems, SIS and ST) and offshore ones (Ness, TCS, Satyam, Infosys and Wipro). When necessary, providers are openly  desire acquisitions to gain scale it is the case for SIS, which acquired ELAS, HT Computers in Slovakia, and Ibis-Sys in Serbia (February 2005). Others, like Austrian-based ST, are pursuing a strategy of becoming the provider of choice in Eastern Europe through a combination of organic development and local acquisitions. ST acquired Computacenter Austria to strengthen its product resale capabilities.Although internal consumption of outsourcing has been slow, it is expected to grow rapidly, thanks to increasing competition driven by the fact that private-sector companies and public-sector organizations are now focusing on bringing their systems into line with market standards. This is leading to some leapfrogging effects  the IT utility approach, for example, holds significant appeal without posing the same transition challenges as elsewhere  but because    these markets are fairly immature, there is still a strong focus on products and product support services rather than more-sophisticated IT service engagements.Italy and Spain are two other major countries with an expected ITO market size of about 5 Billion $ each by the year 2010.GLOBAL DELIVERY MODELGDM is a unique approach to outsourcing and off shoring, which offers the best of both worlds by blending onsite, onshore and offshore resources and locations. By using a far-reaching network of onsite, onshore, and offshore resources, GDM aims to cuts across geographies to access the right resources, in the right place, at the right cost.By selecting the most advantageous and cost effective proportion of resources worldwide, Global Delivery Model boosts business performance while also lowering costs. It also helps the supplier deliver requirements that are met on-time, within budget, and with high quality greater efficiency and responsiveness to their clients.In this section we would    discuss in detail, the key drivers to a successful GDM.Source Capgemini, 2008KEY DRIVERS OF A SUCCESSFUL GDM steadfast PROCESSESStrong processes are the backbone of a successful Global Delivery Model. There is a strong need for detailed, documented and time-tested processes for all the activities and interfaces.Strong quality and project management processes ensure delivery excellence.World class processes for knowledge management and sharing resources encourage improved learning among teams.Processes for managing talent ensure that the projects get the best and most motivated people.Strong processes for interaction and communication within team make it possible for globally distributed groups to interface and collaborate in an effective manner while delivering excellence on a continuous basis.On the other hand, processes, while strong, should  furnish ample space for creativity and flexibility. It is only then that the Global Delivery Model (GDM) can create far more value than the    traditional sourcing models. Here is what it will translate intoQuicker, seamless transitions, and early project ownershipOptimum onsite/ offshore mixes through intelligent allocation of the available resources high-pitched degree of predictability through processes, sharing and reuseA strong relationship approach to ensure continuity and business focusSharing of best practices and tools across the enterpriseDepth and quality of resources, continuously trained and retrained to  conform to project needsAdherence to SLA based pricing models to ensure good Return on Investment (ROI) and drive customer satisfactionPROCESS ARCHITECTURECompanies rely on processes to consistently deliver high quality solutions while executing a number of engagements from multiple locations. According to the policies adopted by a leading IT services provider values, vision and policies should form the first level of the three-tiered process architecture. These are then implemented through process execution    at the next level. These processes are defined with clear ownership and clearly defined roles and responsibilities.Quality System DocumentationQuality System Documentation defines clearly all the processes that should be put into place. These documents provide the engineers and consultations with a vast repository of detailed procedures, templates, standards, guidelines and checklists.The comprehensiveness of these documents supports all tasks from higher-level information abstraction and definition to tasks such as coding and documentation. This is crucial to  visualise clients with the delivery of high quality and predictable IT solutions that meet their business needs. These documents should also be monitored and updated regularly.Knowledge SharingEmployees are given a  forum like a website portal, to share knowledge gained from their experience at the organization. It is meant to be a central repository of the knowledge that can be tapped by peers and as sometimes external clien   ts as well. The collection of documents on this portal is reviewed and classified into different areasSoftware development life-cycle activities such as requirements specification, design, build and testing documentation.Software-related topics such as tools and quality documentation.Topics of general or  usable interest such as travel or HR policies, etc.Process AssetsThis is a repository to facilitate sharing and giving out of engagement learning across the organization. The user has the facility to submit to the repository,  bump from the repository and obtain information on the status of the repository.A process asset can be any information ranging from an engagement, which can be re-used by future engagements. Typically these include project plans, configuration management plans, requirements documents, standards, checklists, design documents, test plans, causal analysis reports and utilities used in the engagement, etc.Process DatabaseThe Process Database is a software enginee   ring database to study the processes at the organization with respect to productivity and quality. More specifically, its purpose areas are as followsTo aid estimation of effort and project defectsTo get the productivity and quality data on different types of projectsTo aid in creating of a process capability baselineProcess Capability Baseline (PCB)Process Capability baseline is used to specify, what the performance of the process is, i.e. what a project can expect when following the process. This estimation is done based on the past data. The performance factors of the process are  
Subscribe to:
Comments (Atom)