Feb
11
Outsourcing – India takes on the World
February 11, 2010 | 1 Comment
India’s IT-BPO market has achieved impressive growth rates over the past decade and is poised to achieve greater revenues in the coming decade.
Software industry chamber NASSCOM reports current export revenues of Indian IT and business process outsourcing (BPO) companies are expected to rise by 5.5% to cross USD50 billion in the ongoing 2009-2010 fiscal and could accelerate by 13 to 15 percent (USD56-USD57 billion) in 2010-2011.
If this 13 to 15 percent rate continues every year, India’s IT-BPO market could reach USD 285 billion in 2020.
Feb
10
Outsourcing Lead Generations
February 10, 2010 | Leave a Comment
Every company and business share the same challenge: how to keep customers loyal for life. Due to the competitive nature of enterprise, rarely do we hear of businesses claim they have life-long customers.
Business do what they can to keep customers happy and loyal, but quality customer service isn’t enough to generate revenue. It’s essential for companies to increase the number of their customers and that’s where customer lead generation comes in.
Feb
9
Outsourcing Cebu – English Proficiency Focus?
February 9, 2010 | 1 Comment
Businessman and commentator/columnist Valeriano “Bobit” Avila shares his views on the fact that though the business process outsourcing (BPO) sector is booming, there is a shortage of people filling in thousands of BPO jobs simply because they lack sufficient English skills.
Mr. Avila calls for a re-evaluation of the Philippines’ obsolete language policies to address this current and pressing need.
Feb
6
Outsourcing – Manage and Protect Your Image Online
February 6, 2010 | Leave a Comment
Warren Buffet was quoted that it takes 20 years to build up a reputation and just five minutes to ruin it. However if one considers the Internet and social media, one’s name, image and reputation is indeed a fragile thing that will not even last 10 seconds.
If you maintain a professional or personal persona online, either via a blog or a social media account, you and your name becomes transparent and vulnerable to malicious attacks through comments, compromising photos or videos and even identity theft.
One must be aware on how to carefully manage and protect one’s name and image online.
« go back — keep looking »
