Ibrs

The future of IT outsourcing contracts

The future of IT outsourcing contracts Conclusion: 80% of traditional outsourcing 1contracts established in Australia during the last 25 years were renewed with the same service provider. However, with the emergence of public Cloud, IT organisations should examine the feasibility and...

02 9238 1931  sales@ibrs.com.au

Current Research

Rethinking what's possible in IT Infrastructure

IT Infrastructure has undergone a major transformation in the last five years yet many organisations cling to their old practices and are unsure how to proceed. As Jeff Smith, former CIO of Suncorp recently said, most organisations are not limited by skills, people or money, but by what they think is possible! To harvest the benefits of these changes IT executives must be willing to stand up and challenge the assumptions that underpin the status quo and as necessary push staff out of their comfort zones.

Usage Management Maturity Self-Assessment - Part 2

While many IT organisations believe that using public IaaS (e.g. AWS, Microsoft Azure, Google) to host business applications is a cost-effective strategy, the lack of IaaS usage planning will most likely increase consumption cost. IBRS recommends that IT organisations undertake a self-assessment of their usage management practices prior to migration to public IaaS1.

The Lingua Franca of Business is SAP - not English

The operational model and associated processes of larger organisations in many sectors of the economy are encoded in software. Enterprise software from SAP plays a dominant role in many industries and significantly influences the terminologies and workflows used within organisations, in particular in those domains where SAP offers out-of-the-box solutions. The resulting level of standardisation has tangible advantages, but also represents an upper limit to the level of operational efficiency that is achievable. Organisations that rely on SAP are well advised to get independent advice to determine the optimal level of lock-in to SAP.

Software Asset Management Maturity Part 3: Aligning Architecture

The architecture for a Software Asset Management solution must take into account an organisation's structure, ability to digest and utilise the information that such solutions provide, using existing tools and processes. Furthermore, the architecture should not be considered a final end-state, but rather an evolving set of technologies and processes which will incrementally deliver benefits over time.

Balance Stakeholder Forces to drive exceptional Value

When it comes to balancing the demands of stakeholders, CIOs are often left with Hobson’s choice1 – give in to demands from their enterprise customers. The alternative (saying no) risks the CIO being labelled a ‘Blocker’. Elite CIOs deal with individual stakeholder demands within an ecosystem of five distinct stakeholder forces, and in doing so drive extraordinary enterprise benefits. Less effective CIOs remain bogged down in a tactical debate focusing on one demand at a time – never really satisfying anyone. Success as a CIO will be defined by how well an agreed balance between these five stakeholder forces is achieved.

Public Sector Shared Services - Spin off or Start up

Governments across Australia have been engaged in shared services initiatives for almost a decade. Unfortunately, while the benefits are clear in theory, in practice all large scale shared services initiatives in the Australian public sector have been problematic. While a number of state shared service programs have been significantly scaled back or completely abandoned, the promise of shared services benefits remains to be realised. Recently, the Australian government has commenced progression towards shared services. Most of the shared services projects were implemented as a ‘spin off’ and failed, while a ‘start up’ strategy may overcome many of the challenges of the previous implementations.

Responding to a Skills Shortage and Surplus at the same time

Whilst surveys highlight a surplus of ICT professionals and managers, job recruiters are not convinced. They claim the many vacancies on their books for skilled ICT professionals indicate there is a shortfall. Ironically both claims are true and together demand a different management response.

Technology Investment Models and Methodologies

There is no single perfect financial analytical method. There are some models which are in common use but their longevity is due to their lack of rigour, or that they can be used for any occasion. The best way to avoid the obvious gaps is to combine techniques, not in one model, but for comparison purposes. By bringing together parts of the stronger methodologies users can obtain better insights. How this type of optimised composite model will work is shown in the next paper.

Cyber-Insurance is the start of an important conversation

Cyber-insurance will be an inevitability for all organisations. However, executives should be clear on what level of cover they are buying, what incidents they are getting cover for, and the costs and impacts on the organisation that insurance cannot (or may not) cover. An exploration into the feasibility of cyber-insurance is likely to raise good questions about whether an organisation has sufficient controls in place, as well as to what degree the organisation is willing to self-insure. But these questions, like the purchase of cyber-insurance, can only be addressed by the business.

Sourcing Monthly June 2014 - July 2014

Discussions regarding unknowns that arise from multi-layered, hybrid and increasingly complex ICT environments have been prevalent this month. There is a recognition that, because of these variables, traditional tools and delivery models are often insufficient to ensure ICT environments function efficiently. Reviews indicate that difficulties can arise because of failures in the implementation of management and operational protocols as well as the critical tools needed to bind the many facets of an ICT environment together, to ensure operational effectiveness which all users can access and understand. For instance, user authentication systems that now require careful consideration and planning are often not feasible as they can require very specific expertise for just one small aspect of a large environment. IBRS Analyst James Turner will be discussing this particular issue in relation to authentication solutions, as well as potential response measures in a webinar to be held on July 31st.