Recession revisited: Will this time be different for IT?
As the U.S. economy turns downward, CIOs are preparing in dramatically different ways than the last time
Computerworld - When CompuCredit Corp. began feeling the sting of the subprime mortgage mess and resulting credit crunch toward the end of last year, CIO Guido Sacchi's IT organization was forced to absorb a 20% year-over-year hit to its annual IT budget.
But for Sacchi, that's where the similarities between handling the current economic slump and the one earlier this decade end.
Last time, IT budget-cutting was a one-time exercise. Now, Sacchi and his IT finance team are making weekly adjustments to the company's IT budget. They're using scenario planning to analyze changes in consumer spending and credit-market conditions, in order to roll with the business and fine-tune its IT spending plans on an ongoing basis.
"I think today as CIOs, we have more tools to respond to those [financial] challenges," he says.
The situation at CompuCredit illustrates that the current economic deceleration is different for IT than the recession that followed the dot-com bust.
For starters, many IT organizations have risen to the status of business partners, and IT's visible contributions to corporate revenue growth and efficiency gains have made senior management more selective about cutting IT investments. Indeed, unlike the previous economic downturn, where across-the-board IT cost-cutting was de rigueur, investments in certain technologies such as virtualization should continue to rise, thanks to the efficiency gains they generate.
Moreover, the shift to the use of IT contractors, from India to Singapore, has enabled IT leaders to scale back their contract labor without resorting to layoffs.
And finally, any slowdown in IT spending caused by a slumping U.S. economy may be offset, in part, by strong international growth among many multinationals.
To be sure, the industries most directly and adversely affected by the housing bust and subprime mortgage madness have tightened their 2008 IT spending plans. In mid-February, Forrester Research Inc. lowered its predictions for U.S. IT spending for the second time in two months, from a 4.6% growth estimate it issued in December to 2.8%.
But even within those businesses, "it's almost impossible to generalize IT spending changes by sector," says Howard Rubin, professor emeritus of computer science at Hunter College in New York. There are "microclimates" of economic impact and corresponding IT budget reactions that are occurring on a company-by-company basis, he explains.
There are stark differences in spending priorities now compared with the period following the dot-com bust.
In the late 1990s, companies of all stripes invested heavily in new systems during their Y2k preparations. At the same, many businesses were making "speculative investments" to determine which Internet models might work for their organizations, notes Mark Settle, former CIO at Corporate Express and Arrow Electronics Inc. who is currently between positions.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All IT Outsourcing White Papers | Webcasts