Log in


Conclusion: Most organisations run a large percentage of their workloads on VMware’s hypervisor, yet they are reluctant to virtualise their production Oracle Databases. The three common reasons given are: lack of support, poor performance and increased licence costs. The first is Oracle FUD, the second is a lack of understanding and testing, and the third needs to be examined on a case-by-case basis, but can result in a reduction in cost.

For many organisations moving some, or all, of production Oracle databases to an existing Intel/VMware platform is a low risk, high value strategy that should be examined.

Conclusion: NBN and other similar high speed broadband networks are presented as opportunities to expand visions and create new industries. However, given the weak position of government finances in some Australians states, NBN is now a critical cost-cutting services delivery medium.

Any state government examining NBN to reduce expenditure should also be certain that what appears convincing as a business case is deliverable. For example, health is a major focus area because health budgets keep expanding. But achieving service delivery and a reduced operating budget may be challenging and long-term, not a quick remedy.

Conclusion: Today organisations need to adapt swiftly to changes in their external environment. Brittleness and inflexibility are characteristic of complex systems that lack modularity and redundancy. Resilient systems offer an appropriate level of redundancy at all levels of abstraction: from replicated skill sets within organisational structures to physical redundancy of hardware. In other words, a simplistic focus on efficiency may introduce more risks than benefits.

Conclusion: The concept of service virtualisation is fundamental to the development of scalable service oriented architectures (SOA) and to the implementation of a DevOps approach to software change and operations. On the one hand service virtualisation enables the development of resilient high-availability systems, by enabling dynamic switching between different service instances that may be running on completely independent infrastructures. On the other hand, service virtualisation enables realistic integration tests of non-trivial Web service supply chains.

ConclusionNow that Android smartphone have taken the market share lead from Apple, with no signs this will be reversed, IT organisations should create a strategy to deal with this change. It is often claimed that Android is not suitable for enterprise, due to poor security or fragmentation. However our analysis finds this to be more myth that fact, and some simple strategies can be used to deal with both issues.

IT organisations that selectively support Android devices will have access to a larger pool of devices with a more diverse set of capabilities(form factors, price points, features and manufactures). This gives a broader range of capabilities, which benefits the business by ensuring the selected device is fit for purpose rather than forcing one device to all use cases.

Conclusion: IT organisations are under significant pressure to allow employees to use their own smartphones and tablets at work. Many organisations support Bring Your Own (BYO) iPhone but are reluctant to support Android due to perceived security and/or management weaknesses.Now that Android has decisively taken the market share lead from Apple this position will become difficult to maintain. IT organisations, especially those in Transport or Health, should re-examine the support issues and develop a management and security model to accommodate Android.

Conclusion: Windows 8 desktops are being largely sidestepped by IT managersresponsible for desktop deployments in the enterprise, with many desktop managers suggesting Windows 7 will reign supreme for at least the next 5-7 years. However, many of these managers do see a role for Windows 8 as a solution for enterprise mobility. Windows 8 tablets address most desktop manager’s concerns: manageable, secure, support for existing software and software deployment methods. But users have a very different set of concerns. Desktop managers need to base future solutions on the users’ concerns first and foremost, which means that Windows 8 tablets, or any device for that matter, will not be a panacea for mobility.

Sometimes IT managers feel like Santa: lots of kiddies storming their armchair, sitting on their laps, demanding the latest must-have toys. But unlike Santa, IT managers don’t have a secret ice bunker full of unpaid yet highly-skilled elves, nor can they deploy their gifts faster than the speed of light via magic flying reindeer. No. Instead, they’re lumbered with the financial constraints of The Grinch.

The only hope for them is to figure out the most popular gift and give it to all the kids. This year’s must have gift is mobility. No question about it, it’s the hands-down favourite toy of screaming kiddies and frustrated executives the world over.

Conclusion: Based on their exposure to consumer technology (iPhone/iPad) Business Executives and Managers are demanding mobile solutions for their knowledge workers and field service staff. Rather than rush to a solution for one group’s needs (which may create a siloed solution and a barrier to further projects) define an enterprise mobility strategy that enables current and future mobility project to be quickly and effectively built.

A mobility strategy can be built in less than three months and must start with use cases. This leads to device selection, which must focus on user experience rather than the IT organisation’s concerns.

Conclusion: The cost of Flash Memory, a high-speed alternative to disk storage, has declined to the point that it is now economical to use in a broad set of cases. This has spawned a large number of Flash based products, often from start-ups, that offer an adjunct, or alterative to, Disk. The different approaches, and the conflicting technology claims, make product selection complex. When coupled with a high capital price, technology risks, and the viability of start-ups, purchasing Flash products carries a high risk for the next few years.

IT organisations should only purchase Flash devices tactically when a sufficiently strong benefit justifies the risk. Over the next five years the cost of Flash will decline by a factor of 10, and the technology and vendors will mature, making it suitable for mainstream use.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles