Main
Log in

Search
 
Results
Total: 253 results found.
Order by
  
Display
Conclusions: Mobility and the exploitation of applications and content on mobile devices have been growing with furious speed in the last year. Although some organisations are moving to broaden or enhance their distribution channels through mobile, many Australasian organisations are employing a “smoke and mirrors” strategy to disguise their tardiness. The ...
Section: Content | Category: Governance & Planning | Date: Tuesday, 28 August 2007 | Hits: 509
Conclusion: More than a year after its launch, IT managers in large enterprises perceive Vista as being costly, having compatibility issues with legacy applications and offering few benefits over its popular predecessor, Windows XP. However, there is a concern that delaying the move to Vista may lead to problems in the deployment of other highly-desired ...
Section: Content | Category: Infrastructure | Date: Wednesday, 28 May 2008 | Hits: 637
Conclusion: Effective ICT architectures allow organisations to become smart buyers of applications and infrastructure; and, ensure that technologies work together in a cohesive and effective way. Attempting an ICT strategic planning project without an effective architecture carries three major risks. The planning team will struggle to turn business ...
Section: Content | Category: Governance & Planning | Date: Monday, 28 June 2004 | Hits: 482
Conclusion:SharePoint’s rapid installation across organisations (and especially within the public sector) is leading to fragmented deployment, which is then causing difficulties when attempting to merge or share content and applications. Organisations that are part of a federation, such as Local and State Councils – can alleviate future integration ...
Section: Content | Category: Vendors | Date: Wednesday, 30 September 2009 | Hits: 626
... devices, netbooks, game consoles and so on) increase, and as consumers become increasingly technology savvy, users are caring less about the operating system and more about the overall ‘usability’ and ‘experience’ of the applications on the devices, which are provided by user interface layers that reside above the operating system. While operating systems ...
Section: Content | Category: Infrastructure | Date: Wednesday, 29 July 2009 | Hits: 468
Conclusion: Migrating physical servers to virtual machines is a one-off project that requires deep specialised knowledge, and IT organisations should engage a specialist third party to develop the migration plans and to perform the physical to virtual migration. This leaves IT staff free to focus on the acceptance testing of the migrated applications ...
Section: Content | Category: Infrastructure | Date: Thursday, 30 July 2009 | Hits: 572
... increasing. This article is the second in a series of three on technologies and techniques that are leading to fundamental changes in the architectures used to construct software applications and software intensive devices. Observations: Software as a Service Software product vendors and software users are now increasingly able to rely on ...
Section: Content | Category: Applications | Date: Monday, 28 April 2008 | Hits: 627
Conclusion: As the number of specialist IT services providers (software, operations and applications) increase each year and organisations choose to engage multiple (technology platform) service providers, organisations must implement tighter systems integration processes. If processes remain unchanged organisations the number of operational problems ...
Section: Content | Category: Sourcing & Staffing | Date: Sunday, 31 May 2009 | Hits: 541
Conclusion:The various techniques of WAN optimisation technology will eventually become a standard component of networks, but this does not negate the need for better application design. Currently, WAN optimisation technology provides the potential of a network band-aid until applications are consistently designed for truly mobile users. Observations: ...
Section: Content | Category: Infrastructure | Date: Monday, 29 June 2009 | Hits: 596
Conclusion: Several models exist for planning mobility around broad categories of mobile worker. While useful, these models are being overused, placing emphasis on the wrong aspects of mobility without deep consideration of the processes and applications being addressed. The basic tenet appears to be ‘build it and they will come.’ That’s fine if you ...
Section: Content | Category: Applications | Date: Saturday, 31 January 2009 | Hits: 546

In the News

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

How Australia must use the PageUp data breach to become stronger - AFR - 18th June 2018

PageUp People, a successful Australian software-as-a-service vendor, has been the victim of a crime , with a data breach that could be extremely damaging for its prospects . There are two lessons...
Read More...

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles