Main
Log in

Search
 
Results
Total: 252 results found.
Order by
  
Display
Conclusion: The concept of service virtualisation is fundamental to the development of scalable service oriented architectures (SOA) and to the implementation of a DevOps approach to software change and operations. On the one hand service virtualisation enables the development of resilient high-availability systems, by enabling dynamic switching between ...
Section: Content | Category: Infrastructure | Date: Wednesday, 30 January 2013 | Hits: 877
... pull system2 pioneered by Toyota relies on statistical data on variability in production to determine minimal local inventory levels. Lean IT guideline 1: The classical notion of lean manufacturing makes sense in the context of the pattern-based activities encountered in IT operations (which is often called “the production environment”). Lean techniques ...
Section: Content | Category: Governance & Planning | Date: Saturday, 28 April 2012 | Hits: 728
... expanding and improving business operations. Overall it seems there will be some interesting times ahead as business growth impacts on outsourcing industry practices and trends. Deal Table Date Supplier Summary 27/04/2012 CDC The Department of Finance and Deregulation has leased datacentre facilities from Canberra ...
Section: Content | Category: Sourcing & Staffing | Date: Wednesday, 23 May 2012 | Hits: 706
Conclusion: Patching is now considered a standard part of IT operations. Vendors release patches either to mitigate against new risks, or to introduce new functionality. However, the application of a patch can not only result in the intended outcome (risk mitigation or expanded functionality), it can also have unintended consequences. Organisations ...
Section: Content | Category: Security Leadership | Date: Thursday, 23 February 2012 | Hits: 837
Conclusion: DevOps is a grassroots movement that is only a few years old but has quickly spread across the globe, and its influence is present in virtually all organisations that operate popular Cloud services. DevOps is a portmanteau of software system Development and Operations, referring to the desire to bridge the gap between development and operations ...
Section: Content | Category: Applications | Date: Tuesday, 25 December 2012 | Hits: 964
... server still supports just one operating system and data is stored on captive disk. The goal is to gain control over the physical systems and networks, provide a robust environment and enable hands-on, shared operations. Due to constraints (e.g., network latency, application design or local laws), not all systems can be collocated. Improvements in networking, ...
Section: Content | Category: Infrastructure | Date: Thursday, 28 September 2006 | Hits: 565
... onto a single IFL enabling the many benefits of mature virtualisation, e.g., rapid deployment, high utilisation, continuous operations, low cost high-availability and disaster recovery (see “Server Virtualisation, Much, Much More Than Just Consolidation IBRS August 2006). Since some ISV’s (e.g., Oracle, IBM) price their software by processor at the ...
Section: Content | Category: Infrastructure | Date: Thursday, 28 December 2006 | Hits: 546
... a perceived wrong, that the organisation deserves the fraud for some undesirable aspect of its business operations, or that the fraud is so inconsequential that the organisation will not miss the money. Revenge is a powerful motivator and the desire to have revenge can easily drive an IT worker to attack the organisation where they work, or have previously ...
Section: Content | Category: Security Leadership | Date: Saturday, 29 November 2008 | Hits: 547
... quality assurance and testing into the limelight To improve software quality 2. Insulate application development from operational IT tasks To eliminate the significant churn caused by frequent context switches between different tasks To establish disciplined requirements management and a fast and reliable feedback loop between operations ...
Section: Content | Category: Applications | Date: Thursday, 28 August 2008 | Hits: 576
... legislation. Cloud computing operations are complex and many involve the transfer of data across multiple jurisdictions. In this situation the client organisation is unlikely to know if/when data has been moved, where it is stored, who has access to it, and what applicable legislation applies. These data issues are much more complex in a cloud environment ...
Section: Content | Category: Applications | Date: Monday, 29 June 2009 | Hits: 567

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles