Main
Log in

Program Management

  • Conclusion: Deterministic1 project budgets do not convey any information about the range of possible outcomes for a project, or the associated risk factors driving the range. The ability to communicate the risk-weighted range of possible project outcomes can lead to much clearer expectations and understanding of project outcomes,

    ...
  • Conclusion: When engaging the market for suppliers, the objective of the procurement process is to select the supplier with the most suitable approach, who is able to accurately define the scope, and deliver in an effective and risk-mitigated way. In the context of a full project, for a proportionally minor investment, and a comparable amount of time and effort from key

    ...
  • Conclusion: The PMO role has many manifestations. It is also rarely static. When the organisation is in transformation mode the PMO must ensure project managers work as a team and deliver results. It is analogous to the role of an orchestra conductor who must get the musicians to rehearse so they know their roles and work together to make their opening concert a

    ...
  • Conclusion: Too often the CIO or program/project executive will focus on the more tangible aspects of developing a new ICT system, bunch of processes, environments and the like only to have the new initiative fail as a result of risk averse and increasingly change weary and cynical employees1. Successful leaders need to spend increasing

    ...

In the News

How Do You Choose The Best Application Environment For Your Business? - WHICH-50 - 8th October 2019

According to a new IBRS study, spend on enterprise solutions is set to increase in 2019-2020. Both IT and line of business buyers need to consider how they manage procurement of these new solutions...
Read More...

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap