Ukraine: a Prospective Player on the World Software Outsourcing Market

The destruction of the Soviet Union about 15 years ago, made a huge country with a great level of IT science divided into small bricks. Nowadays, despite Russia's expansion into the world software development market, Ukraine keeps playing an important role here too. There are several prerequisites for this.

Prerequisites

Traditionally, Ukraine always was a technical region of the USSR. No wonder, the IT education was and still is one of the most popular and respective education in the region. Such well-known Ukrainian universities as Kyiv National Technical University, Donetsk National Technical University etc. as well as new establishments with more innovative approach for IT specialists education, such as Donetsk State Institute of Artificial Intelligence and others, educate a new prospective generation of young IT professionals, ambitious and purposeful.

It's obvious, Ukrainian students win in international contests, and show true professionalism and ability to enter a business life immediately, hence, to play the first fiddle in the labour market. As the latest example, one can remember students of Kharkiv National University of Radio Electronics that became first place winners of the International Web Development Contest (I.C.W.D.I.C. 2005) held by XITEX Software Company in spring 2005.

That is why governments of European countries encourage Ukrainian programmers to come and to work there. Germany is the best example of a country that understands all pros and cons of Ukrainian IT professional, thus it's the country that sees its benefits of employing Ukrainian programmers.

Another one important factor is the cost of labour. In Ukraine, usual hourly rates for programmers are $10-$15. Although they are little bigger than Indian ones, they are still 1.5 times lesser than Russian ones and several times lesser than American or European costs. If you consider the high level of professionalism and responsibility, then you add a European mind and time zone, plus a fluent English of the most of IT people, you realize that Ukraine is that happy medium each company looks for. Hence, many companies that outsource have already realized it.

Ukraine's Prospects

Due to the Market Visio's research http://research.aventures.biz/eng/result.html, the volume of Ukrainian IT-services export in 2003 was estimated to be $70M, 40% more in comparison with 2002. The market prospects for 2005 were to be $150M; that is three times more in three years.

There are about 300 public companies that work for export. They are located mainly in big cities such as Kyiv, Donetsk, Kharkiv, Dnipropetrovsk etc. There are also a huge amount of groups of professionals who are mainly engaged in export on a level of freelancers. The total number of IT specialists engaged in IT-export services was about 10,000 in 2003 and grew considerably during next years.

Everything mentioned above shows that Ukraine has great prospects to become and equal player to the most known leaders of the market. Its well-developed IT infrastructure, level of services, and professionalism of programmers made Ukrainian companies able to compete for complex and complicated projects with other well-known developers. There are several companies that invest in their own software solutions and market them internationally with success. However, all of them are engaged into smaller or bigger software development projects as subcontractors.

The next step of Ukrainian gait into the world IT market seems to be a wide establishment of offshore development centers based on currently existing software development companies. Prerequisites are obvious:

1. Ukrainian IT companies have whole infrastructure required to develop reliable custom application and deliver it in time.

2. The gross yearly expenditure per one programmer will vary from $20,000 to $30,000.

3. Ukraine's time zone is GMT +02:00. Hence, all programmers and project managers will be available on daytime for any European company.

The only thing remains to be done, though. Ukrainian IT companies are making only their first steps in self-promotion. The more professional they become in this field, the more obvious it would be that Ukraine becomes a competitive player on the world software outsourcing market.

Alex Polonski is a Senior Sales Manager at xitex software company, Ukraine. The company works in offshore software development market since 1999 and has a fair expertise in J2EE and .NET technologies. Among company's own-developed and marketed solutions, one can see a J2EE content management system, xitex software company.

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

Windows Screensavers Explained

In this article you will find some background information about... Read More

How the Firefox: How to... Manual Helped Me

A few months back I really got sick of my... Read More

Navision Attain Database access via C/ODBC in ASP.NET Application

Navision Software was purchased by Microsoft and now it is... Read More

Microsoft Great Plains: Getting New Users Licenses ? Annual Service Plan FAQ

Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More

Lotus Domino Implementation and Development: Infrastructure ? Present and Future

Domino server is a buffer between the operation system and... Read More

Top Questions to Ask Before Buying a Help Desk & Asset Management Software

#5 All your hardware components like Printers, PCs etc come... Read More

CRM 101: Customer Relationship Management for Beginners

Customer Relationship Management, abbreviated "CRM," is the term for a... Read More

Most Dangerous Types of Spyware are on the Rise: How to Choose the Weapon

Bad News - the Threat is Bigger than it SeemedHow... Read More

Know Linux

Linux essentials:It's free for download but you have to pay... Read More

Microsoft Great Plains: exchange & brokerage ? implementation notes

If you company is small or mid-size special products or... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

Photoshop Files and Formats

People often ask me: What image file formats will Photoshop... Read More

Software Engineering: An Introduction

Software Engineering is the Systematic Approach for analysis design implementation... Read More

Bridging the Gap between Paper and Data

The cornerstone of successful automated office systems is the ability... Read More

Daffodil DB: Web Database

What is a Web Database?A web database is a database... Read More

Why do Manufacturers Invest in Business Management Software?

With many manufacturing shops heading over seas in favor of... Read More

Microsoft Great Plains in Construction & Building ? Implementation & Customization Highlights

Microsoft Great Plains could be tuned and setup to fit... Read More

Microsoft Great Plains Implementation: Verticals - Wholesale Order Entry center ? overview

Microsoft Business Solutions Great Plains has substantial market share and... Read More

The Death of Windows

I have always regretted how Microsoft price gouges and rips... Read More

Microsoft CRM Implementation & Remote Support

We would like to give you pluses and minuses of... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

Unofficial Windows 98 SE Service Pack 2.0 RC2

Microsoft has never released a service pack for Windows98 SE,... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

Upgrading Great Plains Dexterity Customization ? switching to new technologies: SQL, Crystal, eConne

1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

limousine service Ava ..