Main
Log in

Operations & Service Delivery

Conclusion: Ticketing and other forms of transactions are essential elements to make other forms of non-cash and mobile financial transaction become habitual to customer behaviour. The familiarity of using the mobile device in such a way, with guaranteed security and convenience, is fundamental to user acceptance. It will help encourage all trust-based mobile interactions on a wider scale.

While smartcards have been seen as the transport ticketing solution there are risks and costs. Ticketing solutions built on smartphone platform is the obvious choice for transit authorities and other organisations that offer services to large groups of users and must manage their use of the service.

Frederick Herzberg, a psychologist who was very influential in management theory last century, created a model variously called the Motivation-Hygiene theory, or Two-Factor theory. The theory proposes that there are factors in the workplace which increase satisfaction, and there are other factors that decrease dissatisfaction; and that these factors may not be the same.

For example, when you stop hitting your head against a wall, your dissatisfaction will decrease, but you have not necessarily increased your satisfaction. I think that this model casts an interesting light on the challenge of mobility, and particularly around the ownership issue of BYOD accessing corporate data.

Conclusion: Many organisations approach Unified Communications as a singular initiative: a generic solution that will solve myriad business issues. One key tenet behind this thinking is that the unified communications will "unify" all aspects of communications, from voice and text chat to presence and video. In practice, however unified communications is best deployed to meet specific business cases, and does not actually need to be deeply integrated in order to achieve the benefits sought in many real business cases put forward. In summary, some of the best implementations of unified communications have not been unified at all.

Conclusion: Australian enterprises seem to be slow in adopting social media and related enterprise collaboration tools. Survey evidence indicates that corporate Australia is not as interested in the social and collaborative technologies as counterparts in other regions.

Taking a steady and progressive strategy implementation of social and collaboration is probably an advantage. Being an early adopter with such technology may be an opportunity for some enterprises but not for a mid-sized or larger organisation. However, waiting too long, or crafting an even better strategy may mean wasting opportunities.

Conclusion: Direct dependencies between services represent one of the biggest mistakes in the adoption of a service oriented architecture. An event driven approach to service design and service orchestration is essential for increasing agility, for achieving reuse and scalability, and for simplifying application deployment. Complex Event Processing offers a gateway to simplicity in the orchestration of non-trivial service supply chains.

Conclusion: One of the challenges faced by senior IT and non IT managers is how to encourage right use of IT resources by their staff? One option, favoured by many organisations, is to charge business units for the cost of IT services and make line management accountable for outcomes and astute use of IT resources. Whilst the option is fine in theory, it comes with a price. The effort needed to collect and allocate IT usage costs is not trivial and often leads management to ask whether it is worthwhile.

Conclusion: When conceiving and designing new services, the primary focus of product managers and technologists is often on functionality, and adequate quality of service is largely assumed as a given. Similarly, from the perspective of a potential user of a new service – the user is mainly concerned about the functional fit of the service, and is prone to making implicit assumptions about quality of service based on brief experimental use of a service. The best service level agreements not only quantify quality of service, they also provide strong incentives for services provider and service users to cooperate and collaborate on continuous improvement.

CIOs, architects and managers responsible for IT systems often wonder – how did we end up with this mess? There’s no decent documentation. No-one seems to be responsible for the apparent lack of any rational architecture. A lot of stuff is “due to historical reasons”. Of course this would never have happened under your watch, but now it’s your responsibility to make some sense out of it. If your system represents a substantial investment, it stands to reason that you’ll want to understand why it was designed the way it is before you take any radical action to change it.

Conclusion: In spite of changes over the last decade the Microsoft Windows Server licensing is still rooted in the physical machine era of the ’90s. However, most organisations run the majority of their x86 workloads in virtual machines. Microsoft’s disconnect with the virtualisation realities of the last five years can result in licensing confusion. Organisations that choose the wrong licensing approach will either greatly over-spend on Microsoft licences or, more likely, not be compliant.

Conclusion: Although net neutrality is neither credible nor a legitimate concept in the Australian telecommunications market, it carries commercial leverage. The new network architecture of NBN and the associated changes to the telecoms market regulation make it irrelevant. The ‘user pays’ principle of Quality of Service (QoS) should finally eliminate net neutrality.

Despite all the impending changes, the commercial and political leverage of net neutrality is too powerful to lose and will continue to stalk the telecoms market. For telecommunications providers and regulators the struggle will move to another plane. For end-users, individuals and organisations, it will require vigilance to ensure that the network is really open to everything and not armed with gatekeepers blocking access.

In the News

Busting The Three Big Cloud Myths - WHICH-50 - 11 June 2019

Organisations that are resisting the shift to cloud computing are often basing their decisions on common misconceptions around security, price and integration. That’s a key finding in a recent...
Read More...

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles