Log in

Operations & Service Delivery

Conclusion: User-centricity, positive customer experiences (CX) and active customer engagement are the necessary central drivers of any business’ digital transformation.

Customer experience trends and issues need to be addressed methodically using a checklist to produce the necessary reviews of current approaches and plans to transform them into best practices.

Systematic use of the tools contained in contact centres, customer relationship management (CRM) solutions, algorithms in apps and communications-enabled business process will be the only responsible path for enterprises committed to improving their customer experience.

Conclusion: Although virtualisation is widespread in computing and storage, software-defined everything (SDE) is 3–5 years away from broad adoption by enterprises. Early adopters are major ICT Service Providers and enterprises with specific opportunities.

Enterprise architects need to understand the implications of SDE now as Cloud and managed services projects using software-defined technologies ramp up, or risk becoming irrelevant and wedded to displaced traditional sourcing and delivery concepts.

Failure to appreciate the impacts of software-defined ICT will mean that businesses will be making planning and budget decisions today for ICT futures based only on current practices that are becoming superceded. 

Conclusion: Open Data initiatives have been supported by all levels of enterprises, especially government, for a number of years. To date the success stories have not matched the hype.

In many cases local IT departments have been left out of Open Data initiatives.

Pervasive networking is becoming ubiquitous as fixed and mobile communications’ reach, coverage, reliability, latency and speed improve consistently over time. These critical networking characteristics are unlikely to saturate before 2025. The net outcome of all these factors is that telecommunications and enterprise networking will deliver networked applications that create the foundations for transformational corporate agility and productivity.

In this IBRS Master Advisory Presentation (MAP), IBRS outlines the high-level issues, surrounding communications from both business and technology viewpoints. This MAP is designed to guide and stimulate discussions between business and technology groups and point the way for more detailed activity. It also provides links to further reading to support these follow-up activities.

The MAP is provided as a set of presentation slides, and as a script and executive briefing document.

Conclusion: Based on usage patterns and personalisation MCPs (Smartphones and Tablets) offer an opportunity to build a more intimate relationship with customers. While there is great opportunity there are some technology and cultural challenges that need to be addressed.

Conclusion: CIOs and the IT management team continually wrestle with prioritising and coordinating planned and unplanned IT operational changes for both new and existing systems. The problem is compounded when senior managers use informal influence with IT staff to change the priorities, thereby jumping the queue and bypassing formal processes. Not only does this create disharmony, it can also cause system failures.

Conclusion: failure to maintain a competent ERP support group1 can have an adverse impact on an organisation’s business operations. When the group lacks the resources to keep the software current or to resolve data errors in rejected transactions, clients become disillusioned with the ERP and either work around its requirements or develop alternate systems solutions, e. g. using spreadsheets or departmental computing.

Conclusion: IT organisations adopting IT-as-a-Service practices are often challenged by limited resources to meet service demands, especially in the IT Operations space. IT operations groups should develop supply/demand models that link to business priorities and ensure funds allocation. These models will enable IT organisations to meet client necessities, clear workload backlogs, and set the foundation for effective resource management methods.

Conclusion: Running IT-as-a-Service requires offering broad IT services tied to external-value that goes beyond meeting or exceeding SLA targets. This is because the majority of existing SLAs are IT centric and vaguely relate to business value. Much of this issue is related to IT Groups’ lack of business analysis skills and IT ad hoc methods to comprehend business strategic requirements. As a result, business lines perceive IT as a support function instead of being a strategic business partner.

In the News

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...

Intel chip meltdown flaw shows new vulnerability - AFR - Jan 5th 2018

Cyber security experts have warned the long-term implications of chip vulnerabilities nicknamed Spectre and Meltdown discovered by researchers this week are still unknown, despite it appearing that...

Business experience should help parents keep kids safe online - AFR - 28th Nov 2017

The adults in the lives of young people need to know more about security and safety in an online world and they could be learning this at work The Office of the eSafety Commissioner deals with some...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry


Already a subscriber?

Login to read your premium content.

Recently Viewed Articles
Related Articles