Main
Log in

Search
 
Results
Total: 252 results found.
Order by
  
Display
... the business impact of such a failure will be significant as clients may place their orders with a competitor when they face an unavailable service for a prolonged period of time. IT organisations should deliver recovery-as-a-service that provides non-stop business operations. Observations: Recovery Time Objectives (RTO) and Recovery Point Objectives ...
Section: Content | Category: As a Service | Date: Wednesday, 03 August 2016 | Hits: 713
... planned to support their business operations. Conducting a fundamental high level appraisal of a business’ ability to undertake IT tasks may be the most valuable contribution that most management teams and boards can make for the modern enterprise. Objectives: This Compass is a companion document to IBRS’s Master Advisory Presentation (MAP) ‘Finding ...
Section: Content | Category: Governance & Planning | Date: Friday, 02 September 2016 | Hits: 916
... and provide more specialist services, ITO sector growth is expected. These types of changes in the ITO industry have been seen in the past, as service providers adapt to accommodate customer demands and new services and technologies. These market shifts are typically beneficial for customers, vendors and business operations providing a greater range ...
Section: Content | Category: Sourcing & Staffing | Date: Friday, 01 July 2016 | Hits: 426
Conclusion: The Total Cost of Ownership (TCO) was created two decades ago to provide visibility of the total cost of IT assets. It was targeted at IT organisations running an in-house mode of operations. While TCO can provide a good understanding of the internal IT asset cost, it could not estimate the cost per service because the IT budget was never ...
Section: Content | Category: As a Service | Date: Tuesday, 01 November 2016 | Hits: 747
Conclusion: There are distinct differences between traditional outsourcing, managed services and as-a-service contracts. Traditional outsourcing and managed services are input-based contracts with a fixed price based on the number of the supplier team members delivering the service, service levels that do not reflect business operations and significant ...
Section: Content | Category: As a Service | Date: Sunday, 01 January 2017 | Hits: 628
... undertake the migration without disrupting the current business operations. IT Procurement Managers should: Establish governance arrangements underpinned by an effective organisational structure, tools and processes to select the service broker Request the acceptance of the transition plan to become a prerequisite to contract signature Manage ...
Section: Content | Category: As a Service | Date: Wednesday, 02 August 2017 | Hits: 570
Conclusion: Business-centric IT strategies are critical to run IT-as-a-Service1 because they attempt to integrate IT with business strategies. The rationale is to support business operations by implementing new technologies that reduce business risks, create business opportunities and achieve high levels of customer satisfaction. Business-centric IT ...
Section: Content | Category: Operations & Service Delivery | Date: Wednesday, 01 October 2014 | Hits: 672
Conclusion: The current wave of digital transformation will see the retirement of large numbers of legacy systems. Although the cost of operations, including storage of data, in newer Cloud-based solutions is often cheaper, the cost of migration of historical data to new platforms can be significant. IBRS has observed increasing numbers of digital transformation ...
Section: Content | Category: Applications | Date: Monday, 02 October 2017 | Hits: 376
Conclusion: Managing large IT environments and provisioning IT services within an organisation is complex and complexity will always exist. However, not all complexity is “bad”. “Good” complexity is the complexity required to simplify, to reduce costs, create value, improve security and improve overall operations and results. Focus needs to always ...
Section: Content | Category: Infrastructure | Date: Saturday, 02 December 2017 | Hits: 441
... advance Alexa and consumer digital assistant Echo capabilities rapidly3. Treat Amazon Web Services’ (AWS) new “Connect” Contact Centre-as-a-Service (CCaaS) product as a complementary customer experience (CX) tool. Expect Connect to operate as a Trojan Horse for more complete AWS AI and CX solutions inside AWS customers’ operations. Within two years ...
Section: Content | Category: Operations & Service Delivery | Date: Saturday, 02 December 2017 | Hits: 480

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles