Latest Advisory

Databases Are Evolving in the AI Era… With Huge Implications For ERP
ERP databases are rapidly integrating AI indexing like vector and graph search. This will enable “invisible AI” within core business applications, but adoption may be slow due to migration and skill challenges.

Databases Are Evolving in the AI Era… With Huge Implications For ERP
ERP databases are rapidly integrating AI indexing like vector and graph search. This will enable “invisible AI” within core business applications, but adoption may be slow due to migration and skill challenges.

The Dangers of Google Analytics’ Automated Data Migration to GA4
Google’s announcement of sunsetting Universal Analytics in favour of a new platform, Google Analytics 4 (GA4), raises questions about its data and privacy risks. Should enterprises think twice about consenting to the forced automated migration, or better opt-out and settle for a new analytics platform? What does this imply about the risks of automated data migration?

Time for an Ethical Framework for AI
ChatGPT is becoming a watershed moment in artificial intelligence (AI). Its rapid adoption and the myriad of developments which will follow are underlining the need for organisations to urgently consider adopting an Ethical AI Framework to ensure that the technology is not misused.

Successful ICT Budgeting – Webinar and Presentation Kit
Does your ICT department receive the right amount of funding? Creating a successful budget plan is an important business process for your organisation.

Sourcing Monthly March 2023
IBRS Sourcing Monthly brings you the latest news and deals in the Australian IT world.

Careless Talk – Why Water Cooler Sessions Are Not Social Events
Water cooler sessions offer opportunities for teams to participate in casual conversations among their fellow employees. Yet, many members of the organisation are less engaged in such discussions. What keeps them from participating, and what can be done to increase attendees’ willingness and sustain their interest?

The Customer Identity and Access Management (CIAM) Guide for the Enterprise: Securing Customer Identity in the Customer Journey
Customer experience is never complete without a solid security strategy. Unknown to most enterprises, the linear path of a customer journey necessitates an equal security approach in each interaction to establish trust in the relationship between the brand and the consumer. IBRS explores what solutions an enterprise must invest in to secure each stage of the journey.