Conclusion: Proficiency in financial analysis and concepts is critical for management. Assessment of an organisation’s skills establishes the requirements necessary to raise abilities. The financial maturity model can assist with the process of setting those requirements.
Governance & Planning
Conclusion: Big data and analytics projects can learn important lessons from the domain of information security analytics platforms. Two critical factors to consider when planning deployment of an analytics platform are: the need for a clear business objective and; the depth and duration of organisational commitment required. Without a clear understanding of the objective of the analytics project, or adequate resource commitment, the project will likely fail to deliver on expectations. The worst outcome is that inadequate investment in people could result in an organisation drawing incorrect conclusions from the analytics platform.
Conclusion: The Workspace of the Future is a vision statement on how staff and stakeholders will perform tasks related to their work in the next decade. It includes technological innovation (e. g. mobility, Cloud, data analytics), organisation transformation (e. g. activity-based working) and cultural change (e. g. social, collaboration). To realise this vision, especially given its all-encompassing and potentially transformational impact, requires a strategy that is specifically crafted to fit with an organisation’s long-term objectives. Part of this strategy is a complete rethink of end user computing, by challenging desktop era assumptions.
However, challenging assumptions is difficult. To gain clarity, IBRS recommends mapping assumptions to principles and business impacts. By conducting an assumption mapping exercise, organisations may begin to not only communicate the need for change within both IT and business groups but, also, uncover potential for fundamental business transformation.
Conclusion: Nearly all organisations recognise that the world, their industry, and their customers are changing. Evidence of that realisation can be seen in company restructures, strategy and vision documents, and the discourse used by executive management. Change vocabulary such as transformation, innovation, anything Cloud, as-a-service or mobile is widely used. However, history shows that even highly successful companies find change and transformation difficult, with icons such as Novell and Netscape either failing completely or being relegated to market followers.
Review of these and similar organisations shows that being overly committed to a previously winning formula, misreading the market and competition dynamics or responding to market changes too slowly were common missteps.
Conclusion: IT organisations adopting IT-as-a-Service strategies tend to acquire the best of breed services from the market instead of building them in-house. This leads to increased adoption of multi-sourced services, whereby reliable governance processes are critical success factors to realise the desired business benefits in a timely and cost-effective manner.
Conclusion: the Department of Finance has produced a Cloud Policy that is linked to a paper about Cloud implementation that does not mention modern Cloud architecture, which in turn is linked to an architecture paper that does not mention Cloud.
Agencies looking to adopt Cloud services are advised to look for advice beyond the Australian Government’s Cloud Policy and its supporting documents.
Conclusion: in the publication ‘Running-IT-as-a-Service part 4’, IBRS defined how Service Value Agreements can be constructed by correlating business performance metrics with IT service levels. This note describes how Service Value Agreements can be constructed by aligning IT service levels with business service levels and processes. As a result, meeting or exceeding SLA targets will demonstrate the IT organisation’s contribution to business performance improvement and cost reduction undertakings.
Conclusion: leading Mobile Device Management (MDM) solution providers will persist but face multiple challenges with Microsoft’s Enterprise Mobility Suite, especially its Intune Configuration, rising as a logical challenge to MDM in >50% of Australian enterprises before 2017.
The dominant MDM selection criterion will remain: how well does this mobility solution integrate with Microsoft and others?
Conclusion: the adoption of Cloud-based applications and data, the proliferation of mobile devices (i.e. Smartphones and Tablets) and the increased interest in BYOD is driving a radical change in end user computing. The old device-centric model, based on a stateful Windows desktop, is being replaced by an application-centric model where device state is transient. While this is not yet the end of the Windows desktop, the beginning of the end has arrived.
Conclusion: the key factor in the selection of a CRM vendor should be the duration in which the product will be in service. The time in service period could be up to a seven year horizon and therefore durability is a critical condition in order to make a selection. This recommendation counts equally for vendor abilities as it does for an organisation’s requirements.