Latest Advisory

Your Microsoft Enterprise Agreement is Not a Procurement Exercise
Treating Microsoft EA renewals as mere procurement risks 30% cost hikes. Success requires 18-month strategic governance to align licensing with usage.

Your Microsoft Enterprise Agreement is Not a Procurement Exercise
Treating Microsoft EA renewals as mere procurement risks 30% cost hikes. Success requires 18-month strategic governance to align licensing with usage.
‘No Winners’: CEO of Software Giant SAP Urges End to Trump Tariff War – AFR – 24 March 2025
US tech’s push for unfettered market access clashes with national sovereignty, ignoring crucial privacy, intellectual property, and security concerns, risking a fragmented digital world.

What Are Graph Databases and Why Will They Be the Next Big Thing
While agentic AI is grabbing the headlines, graph databases are quietly revolutionising AI applications with their ability to capture complex relationships.

The Grand-Unified Theory of Knowledge Management: How Did We Get in This Mess and What To Do About It
The era of deep collaboration and democratised data analytics forces two very different disciplines – knowledge management and data management – together. A surplus of idealised hype and a lack of practical technologies add pressure.

VENDORiQ: Adobe’s AI-Powered Evolution – A 35-Year Photoshop Legacy
Adobe’s Creative Cloud leverages AI for targeted productivity gains, setting a precedent for SaaS vendors to deliver tangible, work-specific AI enhancements, not just generic features.

Business Impact Analysis for Cloud/SaaS IT Ecosystems – Webinar and Presentation Kit
Disasters disrupt hybrid clouds. Understand the responsibilities of providers, the differences between availability and recovery, the implications of recovery time objective (RTO) and recovery point objective (RPO), and strategise for minimising data loss.

How Does the Recent Federal Government Cyber Security Legislation Impact Your Organisation?
The Cyber Security Legislation Package approved in November 2024 has significant implications for existing cyber incident response plans and processes. CISOs should review current response plans and desktop response exercises as a matter of priority.