1.4. Some terminology (important!) Local Authentication: this is the authentication performed by the Vasco Middleware, checking your PIN code and Digipass dynamic code. Back-End Authentication: this is the authentication performed by Windows Active Directory, checking your username and password. OTP: One-time password. This is the numeric code that the Digipass device displayswhen you push the button. The code changes every 36 seconds and each code can be used only once. PIN: a numeric code that the user needs to remember when working with his Digipass. When you deploy the solution you can choose if you want to work with or without PIN code (see later in this document). Static password: the Active Directory password of the user Serial number: the serial number on the back of each Digipass
Thursday, March 29, 2012
vpn in china
VPN Error 783 solution
Error 783 - Can't enable ICS
Symptom: When you try to enable ICS, you may receive the following error message: "Error 783: Internet Connection Sharing cannot be enabled. The LAN connection selected as the private network is either not present, or is disconnected from the network. Please ensure that the LAN adapter is connected before enabling Internet Connection Sharing."
Resolution: When enabling ICS, your computer is assigned the 192.168.0.1 IP address, and if this address is already in use on the network, you will get this error message. To fix this problem, disconnect the computer using the 192.168.0.1 IP address from the network, or change its TCP/IP settings to use DHCP
Wednesday, March 28, 2012
Error 721:
Error 721:
Remote PPP peer or computer is not responding.
Solution:
Switch from PPTP to L2TP.
$5 Package=One Account=US,AU,UK,CA,Russia,Italy,Spain,Japan,Korea,HK,India,etc. |
Tuesday, March 27, 2012
VPN Error 930 solution
Sunday, March 25, 2012
Buy Portugal VPN Service - Fast, Reliable and Secure!
How to Watch Denmark's Streaming Online TV show from outside Denmark
How to Watch Denmark's Streaming Online TV show from outside Denmark
Saturday, March 24, 2012
How To Get A germany IP Address
How To Get A germany IP Address
WHY WOULD YOU WANT TO CHANGE TO AN IP ADDRESS IN GERMANY? Well, perhaps:
- You are a German citizen wishing to access German websites as if you're at home.
- You are an Internet entrepreneur wanting to review your marketing campaigns in Germany.
- You are learning German and desire to surf the Internet as if you are located in Germany.
- You are a German traveler and your bank only allows online access from within Germany.
- Etc, etc, etc.
How do I hide my IP address?
You can get Free VPN accounts at vpntraffic!
How To Get A Malaysia IP Address
How To Get A Malaysia IP Address
In addition to their safety features VPNs offer great reliability and speed to its users as well and can be configured easily on any computing platform. Keeping these advantages in mind it is safe to say that the use of a Malaysia VPN to get a Malaysian IP address is the best available option for anyone living outside their country.
How do I hide my IP address?
You can get Free VPN accounts at vpntraffic!
How to watch xunlei movie outside china
How to watch xunlei movie outside china
why you need china ip address?
with free china ip address, you can watch free online movie such as tudou.com, youku.com see Watching Free online movie at tudou, youku
$5 Package=One Account=US,AU,UK,CA,Russia,Italy,Spain,Japan,Korea,HK,India,etc. |
Friday, March 23, 2012
reducing the VPN handoff
The main purpose of this thesis is to propose and to implement a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. It tunnels Layer 2 packets between a VPN client and a VPN server without using Mobile IP, Chapter 1: Introduction Page 3 © 2009 Chen Xu Page 3 without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks. The new solution has particular application when several persons inside a moving vehicle are connected to a network at layer 2 (for example a PPP link [39]). An L2TP/IPsec concentrator inside the vehicle is used to encapsulate Layer 2 packets and then to tunnel to the company network. It is also possible to encapsulate IP packets inside the L2TP/IPsec tunnel. The real world topology of the solution is shown in Figure 1-1. The new solution explained in this thesis handles the situation perfectly and quickly when the vehicle is moving and the L2TP/IPsec concentrator inside the vehicle changes IP addresses from time to time. Figure 1-1 Real World Topology This thesis focuses on reducing the VPN handoff time as much as possible. The time for VPN handoff is mainly caused by the time to get an IP address and the time for VPN negotiation. The time to get a new IP address varies from situation to situation as the new IP address can be got from UTMS, WiMAX [77] or even a wireless access point. Therefore, the main goal of this thesis is to reduce the VPN negotiation time. In the simulation, the time to get a new IP address was minimized by using the "ifconfig" command and a very small VPN handoff time was
Thursday, March 22, 2012
software gives VPN
and software gives VPN you the best security and performance possible from a single device.Increased SimplicityFortiOS 4.0 software lowers costs and reduces IT staff workloads. Centralized management and analysis ensure consistent policy creation and enforcement while minimizing deployment and configuration challenges. You gain the flexibility of having a unified security policy at the device level along with an appliance-based centralized management platform for large deployments.Unique Visibility and ControlAdvanced security features such as Flow-based Inspection and Wireless Controller capability allow you to monitor and protect your network from endpoints to core, and from remote offices to headquarters. FortiOS allows greater traffic visibility and more consistent, granular control over users, applications and sensitive data.
Wednesday, March 21, 2012
minimal usa vpn competition
For programmers, the distribution market is more national or regional; programmers can sell to more purchasers if different distributors operate, even in different towns. This national market is also highly concentrated. In 2006, four cable TV distributors, which included two satellite operators, served approximately 63 percent of all cable TV subscribers. The top 10 cable TV distributors served 87 percent of subscribers.12 The two largest were Comcast and Time Warner Cable.13 While the telephone companies have taken some share, the market remains highly concentrated. This minimal usa vpn competition results in bad outcomes for consumers. Cable operators have the lowest consumer satisfaction ratings of any industry,14 even while they soak up large profit margins and raise prices.15 Some had predicted that the advent of competition from satellite and phone companies would decrease prices and increase quality.16 Programming. The programming market is also concentrated, with a few dominant programmers, both non-broadcasters and broadcasters.17 Large non-broadcast players, whose content is available only through a cable TV subscription, include Viacom (owner of MTV Networks, Comedy Central and others) and Time Warner, a content company that split off from Time Warner Cable, and owns TBS, TNT and CNN. Broadcasters, available both on cable TV and over-the-air, for free, include ABC, NBC, CBS, and Fox.18 Programmers have high profit margins based on adding two revenue sources — advertising and per-subscriber fees. While programmers are sometimes "cagey" about their financials, the head of NBC's cable channels stated her channels' operating profit margins "are well over 50 percent."19Programming is often vertically integrated, with distributors owning programmers. In the FCC's last report in 2007 (which was before Time Warner's split from Time Warner Cable), the FCC found that of the 565 national non-broadcast channels it identified, many of the most popular were affiliated with a cable operator (84 channels total).20 Dozens more channels were affiliated with a satellite operator.21 At the time, five of the top seven cable operators held ownership interests in national programming networks.22
Tuesday, March 20, 2012
Netflix Brazil VPN ipad
The goal was simple: Offer $1 million to the first group or individual who can improve Cinematchʼs ratings accuracy by 10%. In order to give developers something to work with, the firm turned over a large ratings database (with customer-identifying information masked, of course). The effort has attracted over 20,000 teams from 170 countries. Not bad when you consider that $1 million would otherwise fund just four senior Silicon Valley engineers for about a year. And the effort earned Netflix a huge amount of PR, as newspapers, magazines, and bloggers chat up the effort. While Netflix gains access to Netflix Brazil VPN ipad any of the code submitted as part of the prize, it isnʼt exclusive access. The Prize underscores the value of the data asset. Even if others incorporate the same technology as Netflix, the firm still has user data (and attendant customer switching costs) that prevent rivals with equal technology from posing any real threat. Results incorporating many innovations offered by contest participants were scheduled for Fall 2008 incorporation into Cinematch.Patron Saint of the Independent Film CrowdMany critically acclaimed films that failed to be box-office hits have gained a second life on Netflix, netting significant revenue for the studios, with no additional studio marketing. Babel, The Queen, and The Last King of Scotland are among the films that failed to crack the top 20 in the box office, but ranked among the most requested titles on Netflix during the year after their release. Netflix actually delivered more revenue to Fox from the Last King of Scotland than it did from the final X-Men film11.In the true spirit of the long tail, Netflix has begun acquiring small market titles for exclusive distribution. One of its first efforts involved the Oscar-nominated PBS documentary, Daughters from Danang. PBS hadnʼt planned to distribute the disc after the Academy Awards, it was simply too costly to justify producing a run of DVDs that almost no retailer would carry. But in a deal with PBS, Netflix assumed all production costs in exchange for exclusive distribution rights. For months after, the film repeatedly ranked in the Top 15 most requested titles in the Documentary category. Cost to PBS? $012.Netflix has since begun trawling film festivals for gems to add to its long tail. Eighty-five percent of films screened at Sundance don't get distribution deals, so Netflix may be the only chance for budding directors to get their work in front of a wider audience. Netflix even uses data mined from its Cinematch ratings and viewer request patterns to determine what to pay for distribution rights. The offer price for Favela Rising, a documentary about Brazilian musicians, was determined after examining customer requests for documentaries and movies set in Brazil13.
Monday, March 19, 2012
How do I enable my VPN to work
A negative aspect of the 802.11e in the service provider's ,perspective is that it requires a hardware upgrade. That is, the ,legacy 802.11 MAC controllers cannot support the 802.11e. Our ,approach is to implement multiple queues in the device driver of ,the 802.11 MAC controller so that a frame scheduling can be ,performed in the driver level. A similar approach was made in ,[12][17]. In case of AP, this software upgrade means the firmware ,upgrade of the AP, which can be done even remotely. ,Figure 6 shows the device driver structure for both the original ,device driver and a modified device driver supporting our ,approach. We have used the HostAP driver [2] of Intersil's Prism ,2.5 chipsets for our implementation. In the original driver, there is ,basically no queue for the frame transmission. A frame from the ,higher layer or from the wireline port is processed for the header ,and so on, and is forwarded to the MAC controller for the ,transmission. The MAC controller basically has a single first-in ,first-out (FIFO) queue. We have implemented two queues in the ,device driver level as shown in Figure 6 (b). We classify each ,frame to transmit into real-time (RT) or non-real-time (NRT). The ,current IP datagrams do not carry any information about the ,corresponding applications, and hence our implementation uses ,the port number as well as UDP packet type to classify a RT ,frame. That is, the device driver is provided the specific port ,number information of the real-time application in consideration. ,For example, KT's VoIP application utilizes a pre-assigned range ,of port numbers along with RTP over UDP protocols. For ,transmission scheduling, we have implemented a simple priority ,queuing so that the NRT queue is never served as long as the RT ,queue is not empty. We are currently investigating a more ,intelligent scheduling as will be discussed below.,
Sunday, March 18, 2012
traffic across N2N VPN
traffic across N2N communities. Packet forwarding through N2N is disabled by default, as this can be a security flaw. N2N users can enable it if necessary but doing so requires explicit user awareness.The need to cross NAT and firewall devices motivated the use of P2P principles for interconnecting N2N nodes. During the design phase, the authors analysed several popular P2P protocols [14] ranging from proprietary (e.g. Skype SDK) to open (e.g. BitTorrent [15]) protocols. Unfortunately most protocols have been created for file sharing and are not suitable for N2N because PDUs (Protocol Data Units) have been designed to carry file information (e.g. name, length, type, attributes such as MP3 tags) and perform distributed file searches. Even though existing P2P protocols were not immediately usable for N2N without modification, some concepts already present in other P2P architectures [16] have been utilised as is explained in the following chapter. In addition to the properties listed so far, N2N presents further differences from other approaches [28] [29] [30]:• Unlike most P2P overlay networks such as Chord [25] and Pastry [26] that are affected by the problem or locating objects/peers in a limited number of overlay hops, in N2N this is not a problem as, by design, peers are reachable either directly or in one hop when passing through the N2N community. This design choice has dramatically simplified peer lookup and membership information without requiring complex algorithms for information bookkeeping [27].
Saturday, March 17, 2012
VPN active RAT
The process of active RAT re-selection at the UEinvolves discovering available networks for each RAT,evaluation of the potential handover candidates (bytaking into account operator policies, user preferences,and signal conditions), and the inter-technology handover trigger if the conditions are right.Starting with Release 8, 3GPP defined the accessnetwork discovery and selection function [3] in thenetwork to provide UE with the available access network information and associated service provider policies. UE can obtain the IP address of the ANDSF aspart of host IP information on initial network entry.
Friday, March 16, 2012
How To Get A Russia IP Address
How To Get A Russia IP Address
The simplest way to change your IP address while browsing is by using a Russia VPN. A VPN acts as an intermmediate between you and the site you visit. So, the targeted site will get the IP address of the proxy instead of yours.
How do I hide my IP address?
You can get Free VPN accounts at vpntraffic!
Thursday, March 15, 2012
supported by a huge VPN network
A very large number of associations can be easily supported by a huge VPN network, and lots of millions can be easily supported by the Internet. So it requires a huge number of VCs which generally makes the process so weak. When every service-linktoward-partner relation is evaluated onto a VC, then the networks having C links of service will generate C(C-1)/2 VCs. Conventional IP-based Virtual Private Networks (VPNs) have been broadly employed all over the world for remote connectivity; however they are usually vulnerable by multifarious client software and complexities in handling the health position of remote clients. A lot of worms and viruses broadcast through these abandoned VPN endpoints causing destruction of the internal security of the networks. Thus with the Internet, one of the most important issue is the VPN's security, particularly for those which depend upon the publicly designed Internet used for transportation. The IP-based network (unlike ATM/frame relay or private-line services) doesn't allocate the constant logical/physical pipes to the special sites, applications or protocols. To address the Internet security, IPSec (Davis, 2001) is the latest IETF (Internet Engineering Taskforce) solution that was initially proposed for the IPv6 (Deering et al., 1998) protocol; however, it has been used in the current's IPv4 networks. Since, it describes a framework for giving a powerful security in support of network transport over the IP-based environments.
Wednesday, March 14, 2012
This is a very basic description of what VPNs are all about
Virtual Private Network is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger networks, such as the internet, as opposed to running across a single private network. The link layer protocols of thevirtual network are said to be tunneled through the transport network. [2] In mid 1990s, the rise of the Internet and the increase of speed for cheap Internet connections paved the way for new technologies. Many developers, administrators, and, last but not the least, managers had discovered that there might be better solutions than spending several hundreds of dollars, if not thousands of dollars, on dedicated and dial-up access lines. The idea was to use the Internet for communication between branches and at the same time ensure safety and secrecy of the data transferred. In other words: providing secure connections between enterprise branches via low-cost lines using the Internet. This is a very basic description of what VPNs are all about. Taking into account literally the acronym VPN (Virtual Private Network) Virtual means there is no direct network connection between the two communication partners, but only a virtual connection provided by VPN. Software, realized normally over public internet connection. And considered to be private because only the members of the company connection by the VPN software are allowed to read data transform.[3] With a VPN The network entities are described as a set of logical connections secured by special software that establishes privacy of safeguard the connection endpoint. As depicted in the Today the Internet is a work medium used, and privacy is achieved by modern cryptographic methods.
what is vpn?
Tuesday, March 13, 2012
Connection Technologies
Monday, March 12, 2012
how to IPSec tunnel endpointsare the VPN client
In an end-to-end VPN, the IPSec tunnel endpointsare the VPN client and the enterprise VPN gateway.This means, as shown in Figure 2, that the innerIP header, the transmission control protocol (TCP)header, and the application payload are not visible atthe IPSS. The IPSS is simply a router that routes packets based on the destination IP address on the outer IPheader. Thus, the IPSS cannot provide any valueadded services to client sessions.In a network-based VPN, there are two IPSec tunnels, one from the VPN client to the IPSS and anotherfrom the IPSS to the enterprise VPN gateway. When apacket is received at the IPSS, the IPSS decrypts theinner IP header, the TCP header, and the applicationpayload. These data are now available in the clear atthe IPSS, as shown in Figure 3. The packet is thenencrypted and put in an IPSec tunnel to the VPN gateway. The aggregation of traffic on IPSec tunnels frommultiple clients onto one IPSec tunnel to the VPNgateway is itself a value-added service provided bythe IPSS. In addition, by using information containedin the headers and the payload, the IPSS can provideother value-added services to the client session; theseare described in the next section. The overhead incurred in providing these services is the cost of thedecryption and encryption of packets at the IPSS
VPN over WDM
In the context of future optical networks, providing qualityof service is one of the critical research issues. Traditionaloptical networks such as synchronous optical networks/synchronous digital hierarchy (SONET/SDH) have beenperceived as high transmission rate networks withoutproviding any QoS to different traffic flows. Recently,some attention has been given to coarse-grain QoS usingdifferentiated optical services [5], and hierarchical scheduling for two classes of traffic in [6]. Some designs for offlineVPN have been proposed in [3, 4]. However, little researchwork has considered providing online VPN on opticalnetworks. By applying the virtual private network conceptto WDM, we explore in this paper how fine-grained QoSfor dynamic VPN traffic may be provided.
Sunday, March 11, 2012
Outsourcing Issues and Challenges Facing CEOs and CIOs: JITCAR JITCA
Outsourcing means getting a service performed outside of the focal firm utilizing the global ICT infrastructure for back and forth communication and delivery of service. The two primary types of outsourcing are: IT Outsourcing or ITO and Business Process outsourcing or BPO. Outsourcing results in exporting of white collar jobs. When blue collar work went to countries like China and Japan and South Korea in the 1980sit was called exporting of blue collar jobs and not outsourcing. Outsourcing in its myriad forms and shapes is here to stay. Companies, large, medium size and small, cannot survive without some outsourcing. ITO includes outsourcing of systems development (designing, coding, testing etc.) and systems maintenance. BPO includes diverse business as well as non-business functions like accounting, call centers, film cartoons and animation, financial analysis, human resources management, legal work, radiology analysis, taxes filing, tutoring etc. In terms of location of outsourcing, it can be on shore, near shore, off shore, or far shore.
Special issues of leading journals are being devoted to the phenomenon of outsourcing: JITCA/JITCAR has had 4 issued on this topic, and an upcoming issue of MISQ will be devoted to offshoring. Several conferences and shows focus on bringing together diverse stakeholders of outsourcing under one roof for knowledge sharing and networking: annual international outsourcing conferences organized by the center for global outsourcing, world outsourcing summits organized annually by Corbett Associates, HRO shows organized annually, periodic conferences organized by Outsourceworld in USA and Europe and others based in Europe, Russia, India etc. To summarize, in the words of Dr. Joseph O. Okpaku, "outsourcing, which epitomizes the quintessence of true globalization, with services being provided where they can most efficiently and economically be produced and delivered where they are most needed and valued, is a reality that is fast becoming the permanent feature of the global economic context."
PREDICTIONS ABOUT GLOBAL OUTSOURCING
The following predictions speak volumes about the size and scope of global outsourcing:
1. IDC estimates the global BPO market will grow to $1.2 trillion in 2006, up from $300 billion in 2004, with both U.S. and European companies planning to outsource businesses, accounting for nearly 23% of their revenues versus 5% today.
2. According to Gartner Inc. and IDC, the market for offshore IT services will more than double from about 3% of overall IT services spending in 2005 to between 6% and 7% of overall spending within the next three years. Gartner expects offshore IT services spending to reach $50 billion by 2007. IDC analysis anticipates that the worldwide IT outsourcing market will grow to $18 billion by 2008, at an annual compound growth rate of 20%.
3. By 2008, nearly one-quarter of U.S. spending on application development, integration and management services will go to offshore providers, according to IDC.
4. In its Global Economics report, Goldman Sachs has created a scenario where over the next 50 years, Brazil, Russia, India and China could become much larger forces in the world economy. In fact, in less than 40 years, some emerging economies could become larger than the G6 in U.S. dollar terms. The report goes on to state that by 2025, they could be more than half the size of the G6. Of the current G6, only the U.S. and Japan may be among the six largest economies in U.S. dollar terms in 2050.
5. By 2008, the Global Insight report concludes, IT offshoring will account for roughly $125 billion in additional U.S. gross domestic product annually, a $9 billion jump in real U.S. exports, and, most important, net 317,000 new jobs in the United States. By 2015, the amount will be increased to $250 billion.
6. More than 80% of the major global multinational corporations will have an offshore presence by the end of 2005.
7. The Foresight Exchange published the claim in Future of IT Jobs that if futures markets trade above $0.50, then there will be more IT jobs in America in 2012 than there were in 2000.
8. After surveying IT services vendors, IDC reported that the offshore component in delivery of U.S. IT services might rise as much as 23% by 2007, up dramatically from 5% in 2003.
CRITICAL OUTSOURCING ISSUES FACING CEOs AND CIOs
Given the predictions for phenomenal increases in outsourcing and offshoring on the world landscape, it is imperative that the MNCs as well as SMEs start paying attention to the critical outsourcing issues facing CEOs and CIOs.
A structured Delphi iteration approach was used during July-August, 2005 to generate a list of rank ordered outsourcing issues facing CEOs and CIOs of client companies. Companies represented in this study are: BAE Systems, GSA Federal Technology, Herbalife International, MacDonald Corporation, MFXchange, Montgomery Chamber, Prudential Financial, Sate of Maryland, World Bank, and The Hawthorne Press Inc. Nine generic issues generated in the first iteration are described in Table 1 on the previous page.
These nine issues have been summarized in Table 2.
In the second iteration, each research participant was asked to rank order the above nine issues in order of importance to them for present and the near future. Based on mean rank received by each issue from the research participants, rank ordered issues are depicted in Table 3.
Rank One - Evaluating Cost Effectiveness of outsourcing onshore and offshore
Cost savings and labor arbitrage opportunity are largely driven by country decision rather than vendor decision (Vashishtha & Vashishtha, 2005; Palvia S., 2004). For a US based outsourcing organization (outsourcer), the cost savings due to wages can be as high as 70% when outsourced to India/China or as high as 40% when outsourced to Ireland/Canada. However, other costs pertaining to setup, physical infrastructure differences, travel, extra training to help in communication due to language and culture differences, must be factored in. Carmel and Tija (2005) also talk about costs related to technology transfer, overhead, governance, and risk mitigation. Robinson and Kalakota (2005) estimate these additional offshoring costs to be about 40% for India/China thus bringing the net cost advantage to only 30%. Sometimes outsourcing within the country may be better, considering all tangible and intangible costs of offshoring. Vashishtha and Vashishtha (2005) recommend looking at the Total Cost of Outsourcing rather than the savings due to wage differences. Outsourcing per se is meant to provide cost advantage as well as improvement in quality and value of the services. In case of on-shoring, the cost basis of internal and external operations is similar; so any cost advantage is only due to leveraging infrastructure and other fixed costs across multiple clients. However, in both on-shoring and off-shoring, a client organization can avail of the improvement in quality and value from a vendor who utilizes best practices and state of the art technology in the particular business activity.
Rank Two - Managing Changes in Client and Vendor Organizations due to Outsourcing
Vashishta and Vashishtha (2005) devote an entire chapter to this topic under the name of The Offshore Program Management Office (PMO). Offshore PMO's functions are further described in detail under the categories of Contract Management, Financial Management, Performance Management, Relationship Management, and Resource Management. Offshoring of non-core activities to another company in another country is fraught with risks and is bound to meet with resistance from employees and managers in both client and vendor organizations. To address such resistance, according to Carmel and Tija (2005), Change Management includes implementing measures and reward systems to motivate offshoring, creating new organizational structures to support change, educating employees and selling offshoring concept internally, funding demonstration projects, and implementing least disruptive human resource policies. Besides top management support, an offshoring champion may also be needed.
Rank Three - Addressing Myriad Training Issues for Vendors and Clients
For any outsourcing, respective vendor and client organizations have their own structure, history, culture, mission, employee profile etc. When such different organizations have to work with each other on an ongoing basis for a long term, there is a need for training and education on both sides. The requirements for training multiply in the context of offshore outsourcing - since country based differences must also be taken into account to provide relevant education and training to the employees of both organizations. These difference include differences of time zones, climate, language, political philosophy, legal and regulatory regime, culture, history, systems of measurement (e.g., MKS versus FPS). Knowledge transfer is at the root of training needs for the people in two organizations that are in an outsourcing relationship. According to Carmel and Tjia (2005), the four types of knowledge that needs to be transferred (in order of increasing difficulty of training) are: skills such as programming language; process such as harmonizing methodologies between onshore and offshore sites (for examples those pertaining to differences in CMM levels); domain such as business, scientific, algorithmic and artistic; and work/domain norms such as organizational and national culture.
Rank Four - Addressing Security Threat and Intellectual Property Protection Concerns
Data security measures take time to be understood and implemented by offshore locations. Software piracy is a legitimate concern. There are no stringent laws for intellectual property protection. Stipulations should be clearly laid out in terms of client organization's classification of the sensitiveness of various information and expected level of protection by the vendor organization. All the data that is exchanged between the client and vendor should be encrypted and relayed through a secure VPNconnection. Executives attempt to weigh cost savings against risks - "We are debating if the offshore cost savings are worth the intellectual property security risks." (Tedesco, 2004). When software and materials are written in the vendor country and then used in other countries, the laws of several countries may apply. According to Carmel and Tjia (2005), "they are like a patchwork quit, with holes." World Trade Organization - Trade Related Intellectual Property Rights (WTO-TRIPs) establish minimum standards for IP protection for the member states. Most businesses rely on the provisions of applicable international treaties and contracts to protect intellectual property.
Rank Five: Managing Across Geographical Distances, Time Zones, Cultural Differences, and Language Differences
Carmel and Tjia (2005) cover two chapters on these issues titled Overcoming Distance and Time; and Dealing with Cross-Cultural Issues. To manage distance barriers, they talk about the five centrifugal forces that make distributed software work difficult: cohesion barriers, control breakdown, coordination breakdown, communication breakdown, and culture clash. To overcome these problems, they articulate eight practical principles based on the dictum: Formalize much of what is often informal and put more effort into creating informalisms. To manage time differences due to differences in time zones, starting and ending times at work, religious and national holidays, weekends, lunch and other break hours, Carmel and Tjia (2005) describe several asynchronous, synchronous, and awareness tactics. They also recommend the use of appropriate collaborative technologies for managing distance and time differences.
In terms of managing cultural and language differences, Carmel and Tjia (2005) go in detail to articulate the differences and then the strategies to deal with these differences. They summarize nine orientations according to (formulated by Hofstede, Hall and other social scientists): power, relationship, uncertainty, future, time, communication, destiny, universalist, and information processing. They also cite several examples of failure in cross-cultureal communication and in language. Finally, they suggest several steps to improve cross-cultural communication. Vashishtha and VAshishtha (2005) suggest additional investment in employee training including immersion in poular culture (TV shows, movies, sports etc.) to help in bridging the cultural gap.
Rank Six: Managing Failure of Outsourcing
In case of failure of an outsourcing relationship, it is best to spell out in the original Service Level Agreement (SLA) mutually agreed steps to disengage from the relationship in a smooth manner. This is very much akin to spouses in a marriage relationship signing a pre-nuptial agreement. What are the options for the client in case of a failure? The options are find another vendor, or smoothly shift to the backup vendor. Another approach can be to have a portfolio of outsourcing vendors, so that in case of failure with one vendor, other vendors can take up the additional work at least on a temporary basis.