Main
Log in

Search
 
Results
Total: 253 results found.
Order by
  
Display
Conclusion: the adoption of Cloud-based applications and data, the proliferation of mobile devices (i.e. Smartphones and Tablets) and the increased interest in BYOD is driving a radical change in end user computing. The old device-centric model, based on a stateful Windows desktop, is being replaced by an application-centric model where device state ...
Section: Content | Category: Governance & Planning | Date: Friday, 01 May 2015 | Hits: 873
Conclusion: Organisations considering applications migration to a Cloud service provider may lack the experience to understand potential risks or how to select a service provider. This may result in budget overrun or inability to meet business needs. While planning to engage a service provider, a “Plan B” (to invoke in case of failure) is needed to ...
Section: Content | Category: Governance & Planning | Date: Wednesday, 03 August 2016 | Hits: 1029
Conclusion: While the increased adoption of public IaaS1 can reduce cost and simplify technology procurement challenges, IaaS does not meet all IT organisations’ sourcing requirements such as legacy applications maintenance and IT service management. Hence, IT organisations are left with no alternative but to use multiple service providers to satisfy ...
Section: Content | Category: As a Service | Date: Thursday, 02 June 2016 | Hits: 398
Conclusion: This month, there has been a particular focus on service-based Cloud offerings. As this market matures, there are increased concerns regarding vulnerabilities that arise when using evolving environments without adopting new enabling tools and processes to support a shift. Approaches, such as retaining legacy applications in a new ...
Section: Content | Category: Sourcing & Staffing | Date: Sunday, 31 January 2016 | Hits: 428
... and applications has not been an intuitive choice for most enterprises but the supporting evidence for its value has built rapidly as seen in DreamLab. This case shows the power of using intensely popular smartphones to aggregate processing to solve supercomputer-scale problems. It also shows that an enterprise Data Centre is not the only place to ...
Section: Content | Category: Infrastructure | Date: Thursday, 02 June 2016 | Hits: 461
Conclusion: The high-risk and high-reward Agile approach for systems development enabled many organisations to respond quickly to changing management strategies and yielded significant productivity benefits, according to a 2015 survey1. However the same survey found not everyone has been so successful, as lack of experience in using the Agile approach, ...
Section: Content | Category: Workplace Innovation | Date: Friday, 22 April 2016 | Hits: 460
... cost reduction initiatives. IT organisations should revive the enterprise architecture practice by delivering IT-as-a-Service with an outward focus targeting business, information, applications, and infrastructure domains. This will increase IT organisations’ credibility to become key players in business transformation projects. Observations: Enterprise ...
Section: Content | Category: As a Service | Date: Monday, 01 February 2016 | Hits: 336
... to address the new applications’ unique requirements for appropriate security, resilient architecture, and elevated service level standards. Observations: Most organisations are re-engineering their products, services and processes to respond to digital disruption. However, most IT organisations are still using their traditional ITIL Release Management ...
Section: Content | Category: As a Service | Date: Saturday, 02 January 2016 | Hits: 529
... and use their own devices (and in some cases their own applications) while those responsible for information governance seamlessly maintain control over the organisation’s enterprise information, privacy and security. Observations: Over the next few years, digital disruption will present a significant challenge to existing IT departments. They will ...
Section: Content | Category: Governance & Planning | Date: Monday, 02 November 2015 | Hits: 516
... to WOC appliances will become increasingly important: as WOC capabilities get baked into application-specific integrated circuits (ASICs); and as organisations move towards web applications, which will require their own accelerators. Observations:The WAN optimisation (aka WAN Optimisation Controller, or WOC) market is currently dominated by physical ...
Section: Content | Category: Infrastructure | Date: Tuesday, 27 April 2010 | Hits: 578

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles