Main
Log in

Applications

Conclusion: Astute managers know that once a project is completed, skilled staff will be reassigned and their recall of the lessons learned and what worked and what did not is quickly lost. This is because corporate memory dissipates the longer the recall is delayed.

Apart from determining whether the objectives of the project were or were not achieved, an open and frank conversation needs to occur regarding the project’s outcomes and stakeholders need to be:

  • Brave enough to admit failures and shortcomings
  • Modest when highlighting successes
  • Generous in giving credit to all who contributed to the project’s success
  • Prepared to adopt practices and approaches that worked well
  • Comfortable in disseminating the review’s findings to all who need to know.

Conclusion: To facilitate business and IT transformation PMOs must be given a role that puts them at the forefront of advising management where best to invest scarce resources in business and IT-related projects whilst ensuring business systems are successfully implemented.

To be successful PMO staff need:

  • People management skills to help project managers reach their potential
  • Business acumen to assess competing claims for funds for business systems projects
  • To be able to shape management’s expectations of what IT can and cannot deliver.

Conclusion: Office 365, like Google Apps, holds the potential to impact workplace practices through new collaboration capabilities such as real-time co-authorship. However, this potential may only be realised if activities for the Office 365 environment go beyond the traditional post-implementation review plan. Instead, organisations wishing to see genuine changes must create a post-implementation review plan which must assess the extent to which business benefits have been delivered over the long-term.

Conclusion: Organisations that fail to develop the skills of their BAs, or give them intellectually challenging roles, are in danger of losing them and their corporate memory. BAs used wisely are often the glue holding complex projects together.

Use them to elicit and simplify business requirements, develop compelling business cases and redesign business processes and the investment will reap dividends. Allocating them mundane tasks and failing to involve them in critical decision making meetings will demotivate them and give them a reason to move on.

Conclusion: CIOs continually wrestle with how to replace or modify failing core systems and having to convince management to invest in modernising them. They also know that ignoring a bad situation will probably cost the organisation more to fix the longer they postpone the replacement decision.

Conclusion: The fragmented uptake of real-time co-authoring will disrupt current business practices and impact a number of core information technology solutions as it changes how some types of knowledge are created and how people organise to accomplish some types of work. It is imperative the CIO/CDO engage business strategists, those involved with workplace innovation, and human resources executives to discuss the opportunities and impact of real-time co-authoring, and develop policies and cultural change plans to minimise the risks and disruptions, while also taking advantage of the opportunities.

Conclusion: In this note, IBRS defines real-time co-authoring, and outlines the factors hindering its adoption. Real-time co-authoring has been available for almost a decade via products such as Google Apps, and in the past few years, web-based Microsoft Office 365. However, the uptake of this capability has been lacklustre due to immature collaboration environments and, more significantly, deeply held preconceptions about the nature of documents and work.

The introduction of real-time co-authoring in the Microsoft Office 2016 (Word) desktop client removes some barriers to the end user adoption of real-time co-authoring. However, it does not directly address the cultural aspects that hinder adoption. Even so, organisations should expect the use of real-time co-authoring to rise, but in a fragmented, infectious manner.

Conclusion: Despite the prominence of Business Process Management (BPM) in most organisations, Enterprise Architects are routinely oblivious to the scope for using Communications-Enabled Business Process (CEBP) within their BPM.

The very large global Microsoft and Google developer communities have run with the most popular collaboration suites as a foundation for their CEBP apps.

The most common CEBP solutions are based on customised messaging allowing alerts, alarms and notifications to be used to support business process. Widespread use of customised ‘Presence’ has become particularly helpful in giving the status of people or resources to inform transactions. Human delay and business latency is being minimised by using notifications to handle routine processes as well as exceptions to business rules.

Conclusion: Organisations typically discuss the selection of enterprise mobility development in terms of web-based applications versus native applications, which quickly leads to debates regarding cross-platform tools versus standardising on one platform, such as iOS or Windows10. This is entirely the wrong way to think about enterprise mobile application development, resulting in unsustainable portfolios of fragmented and increasingly difficult to maintain applications. Instead, organisations should first identify the generalised use cases (i.e. common patterns of work) and seek to select mobile solution architectures (as opposed development tools) that meet each use case.

Conclusion: Microsoft’s consumer-led strategy for Windows 10 will create ‘pester power’ for the new OS within the enterprise. However, simply upgrading to Windows 10 will re-entrench old assumptions, and continue an out-dated SOE model, yet with no additional business value. An alternative approach is to delay the introduction of Window 10 while a new digital workspaces strategy is developed to transform the business environment. A digital workspace strategy will take time to define and execute, so the CIO must prepare activities to avoid the negative impact of pester-power, while engaging the business in a re-envisioning of the work environment.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles