The document discusses opportunities for the Indian IT industry in Japan. It notes that while India's IT exports to Japan are less than $2 billion annually, penetrating the large Japanese IT services market continues to be a challenge. The document analyzes the Japanese IT landscape, the traditional IT management model, Indian presence in Japan, and challenges Indian players face in breaking into the market. It provides recommendations for Indian vendors to target the right services, manage client expectations differently, and for Japan to embrace globalization to fully leverage opportunities.
Points covered: The Indian IT/BPO Industry. The story so far..
BFSI – The dominant vertical
BFSI – Will it grow as a vertical ?
PE/VC interest high
The “Non Linear” Path..
Looking Ahead
Presented by Ramit Sethi, June 2013
Points covered: The Indian IT/BPO Industry. The story so far..
BFSI – The dominant vertical
BFSI – Will it grow as a vertical ?
PE/VC interest high
The “Non Linear” Path..
Looking Ahead
Presented by Ramit Sethi, June 2013
Market Research Report : ICT Adoption in Manufacturing Sector India 2011Netscribes, Inc.
For the complete report, get in touch with us at : info@netscribes.com
Need for maintenance of global standards is stimulating ICT adoption in manufacturing sector, finds Netscribes
Outsourcing - Key Management Challenges, An India-specific analysis of the outsourcing industry and the key challenges that it faces. Part of a report that was submitted as a part of a credit course at IIT Madras.
Market Research Report : ICT Adoption in Manufacturing Sector India 2011Netscribes, Inc.
For the complete report, get in touch with us at : info@netscribes.com
Need for maintenance of global standards is stimulating ICT adoption in manufacturing sector, finds Netscribes
Outsourcing - Key Management Challenges, An India-specific analysis of the outsourcing industry and the key challenges that it faces. Part of a report that was submitted as a part of a credit course at IIT Madras.
11:11Wish is a free iPhone application that lets you send personalized 11:11 wishes to friends on Facebook and Twitter, post and keep track of your own wishes, and be alerted when it’s 11:11 so you never miss a chance to make a wish.
Analysis of HCL Technologies – IT SECTORRiya Aseef
Analysis of HCL Technologies – IT SECTOR
Information technology in India is an industry consisting of two major components: IT services and business process outsourcing(BPO). The sector has increased its contribution to India's GDP from 1.2% in 1998 to 7.7% in 2017. According to NASSCOM, the sector aggregated revenues of US$160 billion in 2017, with export revenue standing at US$99 billion and domestic revenue at US$48 billion, growing by over 13%. The United States accounts for two-thirds of India's IT services exports.
In this report, we have a clear objective of planning and designing the IT structure and its implementation in the firm.
The objectives are as follows:
• Analyse the IT sector scenario and the company structure and working
• Risk assessment of the business environment
• Process, Application and Technology Integration
• Define a cloud strategy for Mindfire Solutions
• Devise the Technology Scorecard for the departments
• Suggest Change Management in regards to cloud implementation
• Prepare an action plan for each stakeholder
• State the benefits of the IT implementation
Chapter 1: Current SMBs and IT scenario in INDIA
Chapter 2: IT adoption Scenario in India’s SMBs
Chapter 3: Usages of IT in SMBs
Chapter 4: Barriers to Technology Adoption and its Remedies
Why Businesses Choose to Outsource to India.pdfFoxnangel
Outsourcing to India has emerged as a strategic business move for organizations worldwide, offering a multitude of advantages that contribute significantly
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Japan report oct_20
1. Opportunities for Indian IT industry : Japan EMERGING MARKETS SERIES PRESS CONFERENCE New Delhi, October 20, 2008 Mr. Som Mittal, President, NASSCOM Mr. Ambarish Dasgupta, Partner and Head of Consulting practice, PricewaterhouseCoopers
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16. Recommendations - Manage client expectations Client expectations What Indian companies offer/ expect Partnership towards a common goal of product development Client-vendor relationship with clearly demarcated scope of work. Project centric approach “ see the larger picture” Trust : Japanese value trust and loyalty above other aspects, especially when they are dealing with ‘outsiders’ Indian vendors view the inadequately defined contracts as potential risk area which also translates in their interactions with the client. “ develop trustworthiness” Value proposition: Technology expertise Value proposition: Low cost services “ target transformational change projects” Help them understand their requirements Look for clearly defined scope of work “ expect long sales cycles and scope changes”
US is the biggest market for IT services at around 350-400 Bn USD Followed by Japan, Germany and UK
It seen as a cost centre. No Designated CIO office. Most CIOs are from Finance/ Admin backgrounds IT is used largely for Fin/Accounts, HR and Purchase automation Vendor/ customer collaboration through IT is not practiced BFSI is the sector which makes strategic use of IT for competitive advantage
1- Each Japanese business group has its own internally defined processes which are not to be shared outside the group. Therefore Package products are discouraged over custom built 2- Employee attrition is low: often the person who designs the system also maintains it and troubleshoots. This leads to poor documentation Package products: Increasing acceptance of ERP, SCM, Sales force automation packages
Keiretsu model: where the supply chain is vertically integrated with interlocking business relationships and shareholdings The top tier works closely helps clients decide on their investment priorities and the roadmap These large system integrators sign contracts with clients as “prime contractors”, and then outsource pieces of work to a number of small and midsize providers who are the “subcontractors” Secondary service providers further break each module and outsource components for development and coding.
Indians are considered high on technology and domain expertise, better IP protection and better service delivery maturity
Client companies are today Overdependent on few vendors. 1 They have not maintained documentations, 2 have to rely on “key” personnel in their IT teams, 3 have to seek advise from partner firm for each aspect of IT 4 cannot articulate their own requirements 5 Do not have processed defined for vendor management, project governance and scope management
High barriers to entry in terms of language & cultural compatibility. Chinese students enrolled in the Japanese universities; After graduation, many of them find employment in Japan, and learn Japanese practices and at the same time develop professional relationships and networks with Japanese managers. These relationships and networks serve as channels for outsourcing work from Japan to China. Indian companies having served global clients struggle to cope with the immature IT project management practices in Japan
Embedded systems development and Engineering and R&D services are the prospective quick win service offerings for Indian vendors Application development & Maintenance are the next big opportunity, helping Japanese clients move from their legacy COBOL based applications to new age platforms As the Japanese integrate with the global world order and compete globally, there is an increasing willingness to adopt package products over custom development. This offers implementations opportunities for Indian companies.
Avoid opportunism : Long gestation cycles, importance of trust, Importance of references and endorsements from Japanese clients for selection Establish right value prop: Differentiate from low end chinese vendors. Indian vendors try to sell only the low cost advantage. “Pricing” is a secondary factor for the Japanese Localise, Localise, Localise: Japanese frontend sales team, markewting collateral in Japanese and English, Seek endorsements from Japanese clients. Additionally, Indian companies should also help the Japanese learn the global best practices on project management and governance Infosys and few other companies run programs where they hire Japanese graduates and train and train them on SDLC, Project management etc for 1 year in Bangalore
Indian companies need to alter their traditional expectations management methods Expect large gestations. 5 person project may still be a 5 person project even after a year. Unlike in US where it can quickly ramp up to 50 in a quarter. Japanese take their own time to test the vendors. However , once you win their trust, you are their to stay. Market billing rates are as attractive as in the US. Indian vendors tend to undercut to get business. Because on undefined contracts and poor scope documents, Japanese prefer the hands on approach where their managers try and control the vendors resources. Issues regarding multiple reporting
Change in Japan is imperative for them to benefit The whole world is able to cut costs and improve the go to market cycle times because of offshoring. Japanese are unable to exploit and remain uncompetitive.