Main
Log in

Search
 
Results
Total: 253 results found.
Order by
  
Display
Several years ago I was in the UK visiting construction companies to discuss and understand their major drivers and issues in their deployment of strategic IT infrastructure. In one company I talked to an Information Systems Manager who was most insistent that unless total user sponsorship and involvement in the analysis, selection/development and implementation ...
Section: Content | Category: Governance & Planning | Date: Saturday, 28 May 2005 | Hits: 377
Section: Tags | Date: Tuesday, 30 June 2015 | Hits: 103
Conclusion: Most organisations that use enterprise resource planning (ERP) software have a need to integrate the ERP system with other enterprise software. It is common for ERP systems to be integrated with customer relationship management software (CRM) and with all the bespoke applications that operate at the core of the business. Some organisations ...
Section: Content | Category: Applications | Date: Tuesday, 28 May 2013 | Hits: 893
Conclusion: Rather than building specific solutions for individual, mobile form and workflow applications, organisations should look towards identifying the most appropriate overarching mobile forms architecture from which many different forms-oriented solutions can be realised. Observations: IBRS has noted that some organisations seek to develop ...
Section: Content | Category: Applications | Date: Saturday, 30 March 2013 | Hits: 928
Conclusion: Along with many benefits, mobile devices bring new challenges in securing access to the organisation’s data and applications. The real issue is not with technology, but in striking a balance between security and the mobile user experience. A common mistake is touse typical desktop management practices and tightly control the mobile device. ...
Section: Content | Category: Governance & Planning | Date: Tuesday, 27 November 2012 | Hits: 831
This month, there has been a lot of discussion around mobile technologies and BYOD practices. What’s especially interesting is a shift in focus from actual technology adoption and reasons for growth in this area, to the need for systems and solutions that can support the adoption of these devices, including device management systems and applications, ...
Section: Content | Category: Sourcing & Staffing | Date: Thursday, 22 November 2012 | Hits: 673
Conclusion: IT organisations wishing to migrate in-house services to public cloud should ensure that service providers understand the complexity of the in-house architecture candidate for cloud migration. This can be achieved by identifying the in-house service failure points within the legacy applications and their associated infrastructure. The service ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 26 October 2013 | Hits: 742
Conclusion: Given that the public cloud value is maximised when end-to-end SaaS is reached, IT organisations’ misunderstanding of SaaS building blocks, business applications architecture integration and lack of mature multi-sourced environment governance will limit SaaS public cloud adoption. CIOs should establish a cloud sourcing strategy to assess ...
Section: Content | Category: Governance & Planning | Date: Thursday, 29 August 2013 | Hits: 779
Conclusion: Organisations looking at building enterprise mobile applications too often put the device selection and coding tools selection as their primary concerns. Instead, organisations should be focusing on identifying the mobility architectures need to support business strategy. Technological priorities then become identification of broad mobile ...
Section: Content | Category: Applications | Date: Friday, 31 May 2013 | Hits: 929
... 2. understand your applications portfolio; 3. develop principles for rationalisation; 4. assess opportunities for rationalisation; and 5. rationalise. Observations: Many organisations in Australia and New Zealand are being asked to “do more with less”. It is therefore a good time to consider the many disparate benefits and advantages that can result ...
Section: Content | Category: Applications | Date: Friday, 23 August 2013 | Hits: 807

In the News

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

       
Recently Viewed Articles