Latest Advisory

SaaSpocalypse? What’s Really Rattling Software Stocks – AFR Feb 27 2026
Recent SaaS volatility isn’t an ‘AI apocalypse’; it’s a mix of yield-driven valuation shifts, geopolitical sovereignty risks, and evolving pricing models.
Client Testimonial – Commentary and Thematic Case Study
Joe is speedy, efficient and always has more than you were looking for. His insights are valued as it balances our views with the objectivity of a vendor agnostic influencer.
Susan Prakasam
Senior Analyst Relations Manager, Microsoft Asia

IBRSiQ – Template to Capture Functional and Non-Functional Requirements
Our client required a comprehensive template for gathering functional and non-functional requirements for their upcoming information management and collaboration system.

Mergers and Acquisitions – ICT Processes and Checklists
Learn how to plan a successful merger or demerger with our comprehensive guidelines and checklists. Avoid costly mistakes and ensure a seamless integration or separation of ICT elements.

How to Implement a DAP: User Adoption Framework – Part 2. Realising the Value
Unlock the potential of digital adoption platforms (DAPs) and enhance user engagement. Our research paper provides key insights into implementation effectiveness and continuous improvement.

AI and Workforce Transformation in the Asia-Pacific Region
The future workforce in ANZ and the Asia Pacific region will undergo significant changes due to AI adoption, leading to cost optimisation and differentiation. Job roles will transform, emphasising automation and human skill augmentation. For CIOs in this evolving landscape, how are you preparing to upskill and reskill your workforce effectively?

Why Diversity Is The Smart Approach To The Skills Shortage In The IT Industry – Women in Tech, 20 September 2023
Solving the IT skills shortage isn’t about coding; it’s about genuine diversity. But our unconscious biases are blocking the very talent we need.

Authenticating With or Without Passwords – Webinar And Presentation Kit
How we authenticate ourselves online is of paramount importance. Traditionally, passwords have been the go-to method, serving as a unique identifier to confirm one’s identity. However, the landscape of authentication has witnessed significant evolution, largely driven by vulnerabilities associated with password-based systems.