July 10, 2017
check out these 6 negotiation tips for hiring managers!

6 Modern Negotiation Tips for Hiring Managers

If you type “negotiation tips” into Google, you might expect to find information about used car purchases. Instead, the links you’ll see will contain salary negotiation advice for job seekers who feel they’re being strong-armed by hiring managers. If hiring managers are seen as worse opponents than used car salesmen, you know there’s a problem. Update your negotiation style—and your hiring success rate—with these six top tips smart hiring managers can use to improve their job offer discussions with candidates. 1. View the candidate as a partner Modern-day negotiations work best when they end in a “win-win” situation. The negotiation tactics of yesteryear pitted participants against each other as opponents, but these days it’s better to view the job candidate as a partner in your discussion. This outlook will help you both arrive at a mutually beneficial arrangement for your negotiations, which will set a positive stage for the many other negotiations you’ll engage in together throughout the years they work as your employee. 2. Let them do the talking Former FBI hostage negotiator Christopher Voss states that the most important time in your negotiation discussion occurs within the first 90 seconds because this is when your discussion partner tells you the most about himself or herself. Since successful negotiations require you to know as much as possible about the other person, make sure to spend the first part of the conversation listening to what’s being said. Consider having a second listener in the room if you worry you’ll be […]
July 8, 2017
As you engage in onshoring, are you aware of what pitfalls may lie ahead?

The 3 Biggest Onshoring Pitfalls and How to Avoid Them

A few years ago, it seemed offshoring would be the answer to all business problems. It would save money and would provide unlimited opportunity for labor. In many cases, offshoring successfully accomplished these aims… but then there were the other cases. If you’re ready to onshore some of your operations, read this article first. There is a correct way to pull ahead of your competition during this process, but you’ll need to avoid the three most common onshoring difficulties in order to succeed. 1. Running Out of Talent Offshoring provided unlimited labor expansion in a global setting. Onshoring definitely limits your expansion. In fact, if done wrong, your onshoring project can quickly lead to a costly labor shortage for your company. Avoid the issue by carefully choosing your onshore location. If you’re planning to “farmshore,” which is when you relocate some of your in-country operations to less populated areas with a lower cost of living, you’ll want to pay attention to key growth and labor generators. These include: These include: • Nearby colleges and universities that offer degrees in the skill sets your company seeks • A base of certified professionals with required skills • A desirable location where young college grads can build a home Increase your onshoring success by making sure nearby colleges and universities have large student populations. In today’s job-hopping society, the one thing you can definitely count on is turnover, so you’ll need new people to fill those vacant spots regularly. In addition, ensure that […]
December 2, 2014
Diversity Business People Big Data Corporate Concept

Is Your Organization Built For “The Third Platform?”

One of the more talked about industry buzzwords has been “The Third Platform,” the rising foundation of IT built on mobile devices, cloud services, social and Big Data. How big could the third platform become? According to a recent report by the International Data Corporation (IDC), every industry in our economy will witness 1/3 of its top 20 companies displaced by either new companies or transformed members of the top 20 who have embraced the third platform. If this prediction comes to fruition, we’re talking about quite the shakeup in a variety of markets, with new players challenging incumbents resistant to change. As IT continues to accelerate toward this platform with companies understanding its importance, the potential impact from people who provide IT solutions is only going to grow larger. More Influence For Developers The shift to a new platform could mean a shift in terms of the people who influence how IT decisions are made, namely developers. The IDC sees a coming trend in 2015 in which developers in the cloud computing market will be highly coveted for their expertise. In fact, rather than the CIO making major decisions on IT, the developer within an application group will be able to design the application and present a prototype to the CIO for approval (and moving forward into procurement). In other words, developers will hold more power than ever in pushing new applications through the organization. An Infrastructure Tug-Of-War The balancing act for companies may come when they struggle to […]
December 2, 2014
Mobile devices. Laptop, smartphone and tablet pc.

How To Breathe Easier When Making The Switch To A BYOD Environment

Letting employees use their own personal devices – what could possibly go wrong? Plenty without the proper planning, actually. Many workplace environments in recent years have considered how to implement a structure of BYOD – Bring Your Own Device – so that employees are allowed to bring their own smartphones, tablets and other devices to work. Successfully done, the business may see a cost savings. Without the right security measures, however, you could be putting your company’s network at risk for attack. Can a BYOD program work well in your company environment? Think about these crucial steps first before you dive right in. Picture this: It’s the early afternoon and many of your employees have just come back from lunch. Just before they settle back into their tasks at hand, they go to their smartphone or tablet. Suddenly, you’ve got a variety of devices that could connect to places you’re not prepared for them to go, from USB drives to wireless printers and more. Bob downloads a few unsupported apps, creating a security concern. Jill visits a website and doesn’t suspect that she’s about to introduce a type of malware into the environment. Ethan has sensitive data on his device, which he leaves out in the open on his desk, just waiting to be compromised. Can you see the potential I.T. challenges surfacing here? Every employee could create serious security issues if there aren’t proactive steps taken. What’s Your Policy On Mobile Security? If your answer is, “We don’t have […]
December 2, 2014
Google Self Driving Car

The Internet of Things: Massive Potential, Massive IT Demand

Don’t look now, but the Internet’s comfortable infrastructure as you’ve known it is about to change drastically, hopefully in a very positive way. By 2020, more than 30 billion devices will be wirelessly connected according to ABI Research, in a manner referred to as The Internet of Things (IoT). As that happens, some point to a new level of machine-to-machine (M2M) communications, but even that can feel somewhat limiting. Because what we’ll continue to see during this evolution won’t be just about mere communication but a number of interconnected applications with automated behaviors. The Car That Could Drive Itself Take the self-driving car project that Google has been working on for several years, for example. Utilizing an array of data from sensors and radar, Google’s prototypical vehicle can be driven without a steering wheel, pedals or any form of human involvement. Unrealistic? Light years away? That’s what the California Department of Motor Vehicles thought as well, but based on the pace of development at Google and the promise of a potentially safer driving experience for the elderly or disabled, the DMV is now writing regulations for automated cars. So when the driverless car becomes a reality, compliance matters will be less likely to hold it back from officially hitting the road. IT Talent Needed Heavily To Bridge Gap So what could hold back some of these advances? For one, a lack of talent with the proper IT networking skills to maintain network security. Think about the large amounts of data […]