BP has signed a contract with Indian suppliers Tata Consultancy Services (TCS) and Infosys for application development and application maintenance.
Over the past 12 months. the energy giant has consolidated the high number of vendors it employed down to a few larger contracts.
TCS will handle application development and application maintenance for refining, manufacturing and corporate IT maintenance work.
Infosys will handle application development and application maintenance work in the integrated supply and trading, and exploration and production businesses.
BP Group chief information officer Dana Deasy said the contracts will help BP to reduce complexity, standardise processes and lower costs.
“In awarding Infosys application development work for our Integrated Supply and Trading and Exploration and Production businesses we look to benefit from their knowledge of the oil and gas sector," she said.
"Additionally, we see opportunities for TCS to help us deliver IT solutions to enable our upstream and trading businesses.”
The energy and utilities vertical of TCS has 30 customers worldwide, including Australian firm AGL Energy.
The supplier also works with oil field service operators to help them increase the production and reliability of upstream operations.
BP awards software outsourcing deals
By
Tom Young
on Aug 27, 2009 8:52AM

Got a news tip for our journalists? Share it with us anonymously here.
itweek.co.uk @ 2010 Incisive Media
Partner Content

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Kaseya Dattocon APAC 2024 is Back

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Tech For Good program gives purpose and strong business outcomes
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report