Main
Log in

Operations & Service Delivery

Conclusion: Enterprise software vendors and enterprise software users are increasingly investing in in functionality that is accessible from mobile devices, and many organisations face the challenge of making key legacy applications accessible on mobile devices. Comprehensive and reliable APIs are the key for the creation of architectures that enable a seamless user experience across a range of mobile devices, and across a backend mix of state of the art Cloud services and legacy systems.

Conclusion: For many good reasons collaboration is seen as a means to improve productivity and kick-start innovation. Both productivity and innovation are how organisations can raise their effectiveness and competitive edge.

However, simply ‘doing collaboration’, as though it comes as a readymade solution, is a certainty to fail. Collaboration needs governance and management. The expectations have to be established and the tools to achieve an organisation’s goals need clarity and agreement. The biggest factor is people and culture, and how these respond and develop over time.

Conclusion: IT groups often seek to manage mobile device fleets using practices honed for desktops and laptops. These groups will find themselves facing eight significant challenges. Furthermore, as the mobile management field evolves, desktops and laptops will take on some mobile device management practices, rather than mobile devices being shoehorned into traditional desktop management practices.

Conclusion: In-house IT Service Management (ITSM) initiatives require considerable time and investment (up-to three years, up-to $1.5 million approximately). This has resulted in limited senior management continuous buy-in and reduced ITSM benefits realisation. Therefore, IT organisations wishing to implement ITSM should evaluate a public cloud alternative versus the cost and merits of establishing in-house service management capability.

Conclusion: Software Asset Management (SAM) is now a pressing issue for many organisations, due to growing complexities in vendor licensing as a result of the mix of: traditional per device, virtualisation, consumerisation, mobility, cloud services licensing models. SAM is no longer just a tracking service, but an essential part of financial and risk management. However, implementing SAM solutions must accompanied by the alignment of key business units. Processes – both for governance and automation – must be clearly defined between the key business units if SAM is to be of any lasting value.

Conclusion: Windows XP will not stop working in April 2014 when Microsoft stops supporting this popular operating system. However, as time passes, this OS will become an increasing burden on organisations, due to third party support, security challenges, increasingly specialised skillsets, and perception. Windows XP will quickly become a legacy environment, with all the associated challenges. Consequently, CIOs should have a clear plan for any remaining Windows XP machines. The value of a clear plan is two-fold: firstly for common understanding within the IT department, but also for communicating to stakeholders.

Over the last few years the talk about search engine optimisation has given way to hype about semantic search.

The challenge with semantics is always context. Any useful form of semantic search would have to consider the context of a given search request. At a minimum, the following context variables are relevant: industry, organisation, product line, scientific discipline, project, geography. When this context is known, a semantic search engine can realistically tackle the following use cases:

Conclusion: Over the last five years the market of crisis management and emergency response systems has undergone a rapid evolution. Innovative solutions exploit the proliferation of smart mobile devices, the continuously growing number of available data feeds, the simplicity of the deployment models afforded by the Web, and powerful geographic information system functionality. Given the maturity of some of the available solutions, it makes sense for larger organisations in the public sector and for utility organisations to consider the deployment of a modern crisis management and incident response system.

Conclusion: When faced with the need to upgrade the desktop, rather than viewing this as a refresh or modernisation project, which is an IT centric approach to technology issues, undertake a business centric Application Delivery roadmap that focuses on the end-user’s application experience and the business benefits.

An Application Delivery approach will reduce project risks by highlighting the linkages between the project and the business benefits, prioritising the delivery stages of the project to get value early in the project, and ensuring application delivery methods are aligned to the user’s needs, ensuring a high quality user experience.

Related Articles:

"The desktop is dead. Long live application delivery! - Part II" IBRS, 2013-11-30 00:00:00

Conclusion: Difficulty in defining performance criteria for an enterprise architecture team typically points to a lack of clearly articulated business priorities, or to a lack of a meaningful baseline against which performance can be assessed. An enterprise architecture team needs to be given clear objectives that relate to the performance of the business, without being prescriptive in terms of the target IT system landscape.

In the News

What should be in Australia’s next cyber security strategy? - Computer Weekly - 10 Feb 2020

Peter Sandilands, an advisor at analyst firm IBRS, called the discussion paper “a pre-judged survey” that is mostly looking for answers. He also questioned if the resulting recommendations would be...
Read More...

How Do You Choose The Best Application Environment For Your Business? - WHICH-50 - 8th October 2019

According to a new IBRS study, spend on enterprise solutions is set to increase in 2019-2020. Both IT and line of business buyers need to consider how they manage procurement of these new solutions...
Read More...

The pros and cons of shadow IT In today’s business world - WHICH-50 - 23 July 2019

Shadow IT sounds like a covert — quite possibly dark — force. And to some people it may well be. But the truth is both far simpler and more complex. According to Cisco, Shadow IT is the use of...
Read More...

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap