Main
Log in

Search
 
Results
Total: 253 results found.
Order by
  
Display
Conclusion: Disaster recovery continues to be an issue for many clients. Approaches based on tape have a low cost benefit but often recovery takes too long to meet the business’ requirements. The popular new approach of replicating data to a secondary data centre enables rapid recovery but at a cost which is prohibitive for some applications or smaller ...
Section: Content | Category: Infrastructure | Date: Friday, 31 January 2014 | Hits: 1892
Conclusion: In the last two years VMware’s desktop vision has undergone a profound transformation from a narrowly focused VDI (a centralised, virtualised desktop) strategy to a broader Dynamic Desktop1 strategy that supports Physical and Virtual desktops and Software as a Server and mobile applications. Despite this change, for the next 18 months VMware ...
Section: Content | Category: Infrastructure | Date: Sunday, 29 July 2012 | Hits: 907
Conclusion: Creating a lightweight governance framework for mobility is essential in ensuring that mobility applications are developed quickly and effectively, and are aligned to organisational objectives. The ideal mobility governance framework provides an agile environment to enable solutions to be developed using shared architectures, and focuses ...
Section: Content | Category: Infrastructure | Date: Thursday, 31 May 2012 | Hits: 962
This month Microsoft unveiled aspects of its new Windows 8 operating system at the Build developers’ conference. A significant change in the new OS is the use of the “Metro” style user interface, which will be familiar to anyone who has used Windows Phone 7. Metro involves extensive use of multi-touch and “tiles” that represent both applications and ...
Section: Content | Category: Vendors | Date: Wednesday, 21 September 2011 | Hits: 835
Conclusion: For the last 20 years an organisation’s applications and data have been largely accessed from a Windows desktop. While the Windows desktop will remain an important access platform, IT organisations will be expected to also enable access via mobile device and to support Software as a Service (SaaS) applications. The first step is to shift ...
Section: Content | Category: Infrastructure | Date: Tuesday, 28 August 2012 | Hits: 998
... of the NBN (when that occurs) will solve the issues of speed, it will not because more users, richer media and more applications will fill the bandwidth. Consequently a content distribution network (CDN) strategy ought to be part of any organisation’s online planning. Observations: According to Cisco, average IP traffic in Australia will reach 2 ...
Section: Content | Category: Infrastructure | Date: Monday, 28 November 2011 | Hits: 764
Conclusion: Organisations looking to develop and deploy mobile applications must realise that the mobile device market will undergo significant change over the next five years. This creates serious challenges for developers within enterprises, who must either create applications for specific devices and different form factors, or attempt to develop ...
Section: Content | Category: Applications | Date: Tuesday, 28 February 2012 | Hits: 1128
Conclusion: Once an organisation decides its on-premises IT infrastructure model must be transformed into a Hybrid Cloud model the important question becomes “how is this best achieved?” While Cloud Native applications and Dev/Test infrastructure are the typical first steps they do not address the Enterprise applications that are central to most enterprises. An ...
Section: Content | Category: Infrastructure | Date: Friday, 02 January 2015 | Hits: 878
... appeal to different types of organisations, and different applications. Due to the rate of maturation of these factors, CIOs should expect that an MDM platform deployment will have a shelf life of less than two years. Observations: The management and security of smartphones and tablets in an enterprise environment has been a popular topic across ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 27 August 2011 | Hits: 898
... change how desktop refresh decisions are made. Instead, organisations should be creating an applications deployment strategy that looks not at devices and operating systems, but at ways in which to get the right applications in the right hands, no matter the device or OS. Observations: With the recent announcement of Microsoft Windows 81, and up ...
Section: Content | Category: Governance & Planning | Date: Monday, 26 September 2011 | Hits: 759

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles