Main
Log in

Operations & Service Delivery

Conclusion: IT groups often seek to manage mobile device fleets using practices honed for desktops and laptops. These groups will find themselves facing eight significant challenges. Furthermore, as the mobile management field evolves, desktops and laptops will take on some mobile device management practices, rather than mobile devices being shoehorned into traditional desktop management practices.

Conclusion: In-house IT Service Management (ITSM) initiatives require considerable time and investment (up-to three years, up-to $1.5 million approximately). This has resulted in limited senior management continuous buy-in and reduced ITSM benefits realisation. Therefore, IT organisations wishing to implement ITSM should evaluate a public cloud alternative versus the cost and merits of establishing in-house service management capability.

Conclusion: Software Asset Management (SAM) is now a pressing issue for many organisations, due to growing complexities in vendor licensing as a result of the mix of: traditional per device, virtualisation, consumerisation, mobility, cloud services licensing models. SAM is no longer just a tracking service, but an essential part of financial and risk management. However, implementing SAM solutions must accompanied by the alignment of key business units. Processes – both for governance and automation – must be clearly defined between the key business units if SAM is to be of any lasting value.

Conclusion: Windows XP will not stop working in April 2014 when Microsoft stops supporting this popular operating system. However, as time passes, this OS will become an increasing burden on organisations, due to third party support, security challenges, increasingly specialised skillsets, and perception. Windows XP will quickly become a legacy environment, with all the associated challenges. Consequently, CIOs should have a clear plan for any remaining Windows XP machines. The value of a clear plan is two-fold: firstly for common understanding within the IT department, but also for communicating to stakeholders.

Over the last few years the talk about search engine optimisation has given way to hype about semantic search.

The challenge with semantics is always context. Any useful form of semantic search would have to consider the context of a given search request. At a minimum, the following context variables are relevant: industry, organisation, product line, scientific discipline, project, geography. When this context is known, a semantic search engine can realistically tackle the following use cases:

Conclusion: Over the last five years the market of crisis management and emergency response systems has undergone a rapid evolution. Innovative solutions exploit the proliferation of smart mobile devices, the continuously growing number of available data feeds, the simplicity of the deployment models afforded by the Web, and powerful geographic information system functionality. Given the maturity of some of the available solutions, it makes sense for larger organisations in the public sector and for utility organisations to consider the deployment of a modern crisis management and incident response system.

Conclusion: When faced with the need to upgrade the desktop, rather than viewing this as a refresh or modernisation project, which is an IT centric approach to technology issues, undertake a business centric Application Delivery roadmap that focuses on the end-user’s application experience and the business benefits.

An Application Delivery approach will reduce project risks by highlighting the linkages between the project and the business benefits, prioritising the delivery stages of the project to get value early in the project, and ensuring application delivery methods are aligned to the user’s needs, ensuring a high quality user experience.

Related Articles:

"The desktop is dead. Long live application delivery! - Part II" IBRS, 2013-11-30 00:00:00

Conclusion: Difficulty in defining performance criteria for an enterprise architecture team typically points to a lack of clearly articulated business priorities, or to a lack of a meaningful baseline against which performance can be assessed. An enterprise architecture team needs to be given clear objectives that relate to the performance of the business, without being prescriptive in terms of the target IT system landscape.

Conclusion: IT organisations wishing to migrate in-house services to public cloud should ensure that service providers understand the complexity of the in-house architecture candidate for cloud migration. This can be achieved by identifying the in-house service failure points within the legacy applications and their associated infrastructure. The service providers’ lack of understanding of the existing operational weaknesses will most likely extend the transition period and delay achieving the expected service levels in a gradual and cost-effective manner.

Conclusion: IT organisations managing a multi-sourced environment and wishing to reduce unscheduled service downtime, should establish end-to-end Change Management Frameworks. This will ensure that business operations remain unaffected by service providers’ system changes.

In the News

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles