Main
Log in

Infrastructure

Conclusion: IBM’s launch of its PureSystems line of hardware completes the vendor line-up for Integrated Systems. While this does not dramatically change the market it does further solidify our 2009 prediction that IT infrastructure is transitioning to a new procurement and deployment model. However, due to internal barriers adoption rates are modest and this transition will only happen slowly over the next seven years.

On the next major IT infrastructure refresh, especially storage, IT organisations should review their approach to procuring and delivering infrastructure. This may require challenging the established infrastructure dogma in order to accurately evaluate the benefits of Integrated System.

Conclusion: For organisations that use digital content distributors, telecoms suppliers, and social media, the Convergence Review is an important stage in how policy and regulation will evolve. The review sought to update the regulations in the sector which has changed rapidly. Although the review did not focus on digital players, there were elements in the digital arena that indicate where change may lead.

It is probably inevitable that more regulation will enter the digital content and distribution sector. The need to impose controls will be to facilitate market competition and foster new ventures. It will also be used to protect individuals. That means that running an unregulated market is not possible if the goals of increasing local content, commerce and technology innovation are to be achieved. Organisations may have a special interest perspective depending on their role within the content, communications, technology development and social media sectors.

The topic of Bring Your Own Device (BYOD) has resurfaced this year. While this is an important trend that needs to be examined by IT organisations, be careful to separate the facts from the hype. Here are the four most common myths that I keep hearing.

Conclusion: Creating a lightweight governance framework for mobility is essential in ensuring that mobility applications are developed quickly and effectively, and are aligned to organisational objectives. The ideal mobility governance framework provides an agile environment to enable solutions to be developed using shared architectures, and focuses on "what can be done" rather than "what can't be done.” The key is to ensure that the governance framework remains focused on decision-making, as opposed to restricting mobility “run-away mobility deployments”.

Related Articles:

"Coping with Mobility - Part 3: aligning generic use cases to application development approaches" IBRS, 2012-04-30 00:00:00

"Coping with Mobility - Part 2: First steps towards a holistic mobility strategy" IBRS, 2012-03-29 00:00:00

"Coping with Mobility - part 1: mobile architecture and the enterprise" IBRS, 2012-02-28 00:00:00

"Coping with mobility - part 5: developing the strategy" IBRS, 2012-10-28 00:00:00

"Coping with mobility Part 6: Work context" IBRS, 2013-06-26 00:00:00

Conclusion: The speed and disruptive effects of consumerisation in the mobile market surprised many organisations that were looking back, not forward. Even mobile providers have not anticipated rates of change and must invest millions to remain competitive.

Over the next three to four years the mobile market will face stark realities in a fully developed and oversupplied market. Providers will have to manage costs, improve service delivery and raise user revenue. That is not an easy set of objectives to achieve. The effect of raising revenues and cost management on users could be disruptive as users seek to maintain price and service levels they have enjoyed for some time. Organisations may have to manage another round of change when it comes.

Conclusion: IBRS has found that many organisations’ mobility needs can be covered by just one or two “generic use case” categories, thus many user demands for mobility can be met with just one or two development approaches.

Related Articles:

"Coping with Mobility - Part 2: First steps towards a holistic mobility strategy" IBRS, 2012-03-29 00:00:00

"Coping with Mobility - part 1: mobile architecture and the enterprise" IBRS, 2012-02-28 00:00:00

"Coping with mobility - part 4: governance" IBRS, 2012-05-31 00:00:00

"Coping with mobility - part 5: developing the strategy" IBRS, 2012-10-28 00:00:00

"Coping with mobility Part 6: Work context" IBRS, 2013-06-26 00:00:00

Conclusion: In spite of some benefits in security, remote access and speed of deployment, VDI has remained a niche product. This has largely been due to the higher complexity and much greater capital cost compared with a Full Desktop. However, as VDI infrastructure innovations continue to close the gap, the adoption of VDI will increase beyond this small base. Due to the risks and costs of switching from a well understood model to a relative unknown model, the adoption will increase at a moderate rate and there never will be a “year of VDI”.

Related Articles:

"Is this the year of VDI? (Part 1)" IBRS, 2012-02-29 00:00:00

Circa 1960: The “Hard theory of platforms”

In the early days of information technology, hardware was THE platform. Companies such as IBM and DEC provided the big iron. Business software was THE application. In those days even software was as hard as stone. The term application platform was unheard of.

Conclusion: No, and there never will be “the year of VDI”. However, now that the capital cost of VDI is close to that of a Full Desktop the adoption of VDI will begin to increase beyond its current small niche. The large capital cost and complexity of replacing the existing desktop fleet, the perceived risks in using to a new desktop approach, and a general lack of experienced staff will ensure adoption of VDI will proceed slowly.

For the next 5-7 years organisations will continue to use a range of desktop deployment techniques (such as Full Desktop, Laptop, Remote Desktop Services aka Terminal Server) with VDI being just one of many.

Related Articles:

"Is this the year of VDI? (Part 2)" IBRS, 2012-03-30 00:00:00

Conclusion: The foundation of any BYO device initiative is a robust BYO device policy. The policy must set the boundaries for acceptable use, costs and security. Ensure device security is driven by business stakeholders and is based on pragmatic risk analysis rather than technical concerns from IT staff, or FUD from vendors who are anxious to sell their wares.

Robust policy, strong corporate culture and proper training can be more effective than technology in securing corporate data and controlling costs and risk. Use policy, culture and training to drive compliance, minimising the need for complex and expensive technological controls.

Related Articles:

"BYO Devices (Part 1): Adoption in ANZ" IBRS, 2011-11-26 00:00:00

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles