Main
Log in

ITIL

  • Conclusion:When undertaking business-oriented transformation programs, such as the current wave of digital transformation, it is important for Enterprise Architects to develop an EA for IT in parallel – not as a separate or independent IT transformation effort.

    Establishing the EA for IT requires that the IT organisation itself becomes the “enterprise” in

    ...
  • Conclusion: Many IT organisations are perceived by their business units as high cost/low quality service providers. Much of this perception is due to the IT group’s inability to successfully articulate service value, demonstrate cost competitiveness, and

    ...
  • Conclusion: IT organisations establishing business relationship management to excel at coordinating business and IT strategic matters should assess the current maturity of this role. The rationale is to allow IT to deliver solutions that improve business performance, reduce the cost of doing business and mitigate business risks.

  • Conclusion: The Service Catalogue required by the ITIL framework has undergone several variations during the last 20 years. The rationale was to address the emerging service trends in in-house and outsourced modes of operations. However, while the original service catalogues’ objectives were achieved, they are inadequate in acquiring hybrid Cloud core services

    ...
  • Conclusion: There is debate within the IT industry whether or not DevOps can replace ITIL1. From ITIL perspective, many IT organisations, especially in Australia, have been implementing ITIL processes since 1994 with significant investment in technology and professional services. Hence, it is impractical to just drop ITIL and

    ...
  • Conclusion: Since 1994 many Australian IT organisations have been implementing Configuration Management practices. However, it has been done with limited success when assessed against the key objectives of Configuration Management process and its associated database (CMDB) in terms of service availability and configuration items interdependencies. IT

    ...

In the News

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles