IDG News Service - SHANGHAI -- Indian outsourcing company Infosys Technologies Ltd. moved into its Shanghai office in February. Now the company is running out of space and is scouting locations for a second outsourcing facility in China, a company executive said yesterday.
"We're already looking," K.S. Suryaprakash, head of delivery operations at Infosys Technologies (Shanghai) Co. Ltd., said.
Infosys is building up its operations in China to tap into demand for IT outsourcing from Japanese and South Korean companies as well as from multinational companies that are doing business in China, Suryaprakash said. In the future, the company also hopes to be well positioned to provide outsourcing services to Chinese companies, he said.
"You may lose out to your competition if you don't have a China presence," Suryaprakash said.
Infosys is considering six Chinese cities as possible locations for a second development facility and will make a decision in the coming months on where it will be located, Suryprakash said. Local governments are wooing Infosys with incentives and other offers in hopes of being selected, he said.
"It's a good feeling," Suryaprakash said.
Infosys will decide on a location based on several factors, including government incentives and the ability to establish a close relationship with local universities, Suryaprakash said. He didn't specify which six cities are under consideration.
Infosys' Shanghai office will reach its capacity of 200 people in January, even though the company has a staff of 50 in Shanghai and doesn't expect to employ 200 here until next March. However, the Shanghai office must also accommodate workers from India who are assigned to China on short-term projects, Suryaprakash said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Understanding big data so you can act with confidence Automating information integration and governance and employing it at the point of data creation helps organizations boost confidence in their big data.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...