How to manage IT contractors
- 18 July, 2012 15:19
As companies ramp up projects postponed by the recession and attend to delayed maintenance, they're beginning to fill in the IT ranks -- with full-time staffers, to be sure, but also with a breed of worker who once lurked at the edges of the organization: the IT contractor.
Proponents say contract IT workers -- meaning those engaged on a temporary basis for either in-house or remote work -- allow companies large and small to access skills not currently available on staff; quickly round out project teams without a lengthy, costly hiring process; and offload routine tasks for which low cost is the primary consideration.
Jack Cullen, president of IT staffing firm Modis, says companies view contract labor as a smart way to find the exact skill set they need for as long as they need. "Employers are relying on contractors in every aspect of IT," he reports, "from network engineers to web developers to call center professionals and business analysts."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- CSO Spotlight: Security-as-a-Service Gaining Popularity
- Myths and Realities of “Top to Shop” in Manufacturing
- Unified Recovery Management - Reducing Risk and Cost by Simplifying the Recovery Infrastructure
- IBM Solutions for Cloud and Virtualisation in Enterprise Environments
- Cloud ready business intelligence with Oracle Business Intelligence 11g
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Agentless Security for Virtual Environments
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result in a number of significant operational security issues. Find out more about the first agentless security platform solution.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.