Main
Log in

Operations & Service Delivery

Conclusion: Progressing digital transformation strategies requires a much more holistic view of service delivery and extends beyond existing business process review and business systems improvement. Designing services that support digital transformation objectives need to look at the end to end service including customer experience. Traditional business analysis activities that captured the requirements of the business process owner and are used to implement business systems will not be adequate.

Pervasive networking is becoming ubiquitous as fixed and mobile communications’ reach, coverage, reliability, latency and speed improve consistently over time. These critical networking characteristics are unlikely to saturate before 2025. The net outcome of all these factors is that telecommunications and enterprise networking will deliver networked applications that create the foundations for transformational corporate agility and productivity.

In this IBRS Master Advisory Presentation (MAP), IBRS outlines the high-level issues, surrounding communications from both business and technology viewpoints. This MAP is designed to guide and stimulate discussions between business and technology groups and point the way for more detailed activity. It also provides links to further reading to support these follow-up activities.

The MAP is provided as a set of presentation slides, and as a script and executive briefing document.

Conclusion: Based on usage patterns and personalisation MCPs (Smartphones and Tablets) offer an opportunity to build a more intimate relationship with customers. While there is great opportunity there are some technology and cultural challenges that need to be addressed.

Conclusion: CIOs and the IT management team continually wrestle with prioritising and coordinating planned and unplanned IT operational changes for both new and existing systems. The problem is compounded when senior managers use informal influence with IT staff to change the priorities, thereby jumping the queue and bypassing formal processes. Not only does this create disharmony, it can also cause system failures.

Conclusion: failure to maintain a competent ERP support group1 can have an adverse impact on an organisation’s business operations. When the group lacks the resources to keep the software current or to resolve data errors in rejected transactions, clients become disillusioned with the ERP and either work around its requirements or develop alternate systems solutions, e. g. using spreadsheets or departmental computing.

Conclusion: IT organisations adopting IT-as-a-Service practices are often challenged by limited resources to meet service demands, especially in the IT Operations space. IT operations groups should develop supply/demand models that link to business priorities and ensure funds allocation. These models will enable IT organisations to meet client necessities, clear workload backlogs, and set the foundation for effective resource management methods.

Conclusion: Running IT-as-a-Service requires offering broad IT services tied to external-value that goes beyond meeting or exceeding SLA targets. This is because the majority of existing SLAs are IT centric and vaguely relate to business value. Much of this issue is related to IT Groups’ lack of business analysis skills and IT ad hoc methods to comprehend business strategic requirements. As a result, business lines perceive IT as a support function instead of being a strategic business partner.

Conclusion: The first generation of the Internet of Things (IoT) is now reliably internetworking uniquely identifiable embedded computer devices.

However, the emerging Internet of Everything (IoE) will go beyond the IoT and its machine-to-machine (M2M) communications between devices, systems and services. The demands from popular consumer IT will lead to a broad adoption of IoE in enterprises although corporations will focus on the IoE for its business process improvement.

Use of common collaboration tools will become the most prevalent and valuable way to extend isolated low level IoT interactions into sophisticated orchestrated IoE apps that deliver valuable experiences and tangible benefits to both consumers and corporate users.

Many Australian IT organisations have been implementing Configuration Management practices since 1994. However, with limited success when assessed against the key objectives of Configuration Management process and its associated database (CMDB).

Conclusion: To reduce Service Desk costs and improve resources scheduling, some IT organisations are exploring the potential of Virtual Service Desk Agents to either improve self-service and/or reach to the right subject matter expert at the right time. However self-service success depends on the quality of information available to the virtual agents. It is critical for the virtual agent tool to be enabled by a mature service management engine that describes the service’s known errors and their resolution alternatives. Failure to do so will leave the virtual agent with no alternative but to call the live agents, thereby making the investment in virtual agent technology questionable.

In the News

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles