Conclusion: Organisations that fail to recognise the difference between information and knowledge are at risk of haemorrhaging knowledge at a rate that at the very least has a measurable impact on the quality of service delivered by the...
HP’s split into two companies is more important as a sign of
the dramatic changes in the IT infrastructure market than the impact
it will have on HP customers. When combined with IBM’s exit
from the PC and x86 markets and Dell going private, poor financial
results from leaders such as IBM and SAP, it is clear we are in the
midst of a major industry transition that is being driven by the
forces of Social, Mobile, Analytics, Cloud and Consumerisation
While the concept of bundling and outsourcing of IT services is simple, its pricing regime based on dedicated devices available and not client applications processed, frustrates efforts to make IT costs transparent to business managers
Determining the optimum licensing mix
involves not only an understanding of Software Assurance, but also
consultation with the organisation’s business strategy groups,
as well as a firm understanding of potential structural changes, such
as mergers, de-mergers, acquisitions, and growth strategies. Getting
the wrong mix can result in overspend, or worse, an inability to
adopt business strategies such as mobility, activity based working,
or bring your own device.
IT organisations developing IT policies in
isolation from business units1
will face challenges to tie policies to business drivers and limit
policies acceptance rate. IT organisations should formulate policies
by involving business units at an early stage in policy scope
discussion. IT best practices2
should be leveraged to develop reliable and practical policies. The
resources needed to develop the new policies should come from both
sides and a business benefits realisation plan should jointly be
developed and tracked.
There are a number of traits and behaviours to look for in an
effective security leader, which are different from a traditional IT
leader. The measure of an effective CISO is not whether their
organisation has had a breach, or not. The measures of an effective
CISO are the types of incidents their organisation has, and how their
organisation responds to these. Consequently, an effective CISO is a
requisite component for comprehensive risk management and
When implementing enterprise Cloud services, a disciplined and
locally distributed approach to user acceptance testing in
combination with real-time dashboards for test management and defect
management can be used as the centrepiece of a highly scalable
quality assurance framework. An effective quality assurance process
can go a long way to minimise risks, and to ensure a timely and
Over the years, many ICT professionals have moved from roles in
commerce to roles in Health without recognising the unique challenges
presented by clinical environments. The result is an underperforming,
expensive and misaligned ICT service that soaks up hundreds of
millions of dollars annually for minimal patient benefit.
Financial models provide insights and support better understanding.
Using the right model depends on a thorough knowledge of its output
and what it means. A powerful and valid model must have currency
Virtual teams continue to be an accepted organisation mode as a means of grouping specialist and project resources together to achieve high quality outcomes. Recent research1 identifies that more than 40% or Fortune 500 companies currently utilise virtual teaming. Smaller organisations have found that technology tools provide the mechanisms to collaborative cost effectively. A key activity of virtual teams is collaborating on research, projects and reports. Understanding the purpose of the collaborative authoring activity, the personality preferences of the authors and the relationship of the authors can enable organisations to increase the quality of the output with less effort and in less elapsed time.
October has been a great month for ICT outsourcing contracts, with a wide range of agreement types, vendors and buyers representing different industries. Particularly interesting is the high number of smaller providers establishing a real presence in the market. Also significant was the nature of contract descriptions this month, with more of an objectives-based focus. In past years there has been a call for greater alignment between business units and ICT when establishing external arrangements to ensure agreement targets include an emphasis on business goals and strategies. Weaknesses and failures in outsourcing contracts are often attributed to a lack of input by other business units and a lack of clarity regarding business goals and strategic plans. Operating in isolation can cause serious problems during contract execution and it is clear customers are beginning to recognise this, with sturdier agreements and reduced difficulties a positive output.