Main
Log in

Operations & Service Delivery

One of cloud computing’s apparently key advantages is reduced operational costs. On deeper investigation, however, the purported savings are achieved by removing obvious waste, which represent the bulk of the headlined ‘savings of 50%’ that cloud computing allegedly offers.

Creating a single source of truth is impossible in the modern enterprise. Today’s complex environment of custom, COTS and cloud solutions mean that redundant and inconsistent information will persist for a long time. Instead drive consistency and currency of data across systems using Master Data Management (MDM). Addressing underlying data quality issues will remain a harder task.

Conclusion:Value chain analysis is one of the fastest ways to understand the essence of a business or an organisation, provided appropriate techniques are used in the analysis. The only concepts needed for recording value chains are roles, systems, artefacts, the links between these concepts, and a distinction between artefacts that are exchanged with other organisations and artefacts that are only relevant within the organisation. One of the biggest pitfalls in value chain analysis is to lose track of the big picture, and to get lost in the details - which can easily be avoided by following a small set of best practices to avoid work that does not add value.

Conclusion:An often reported issue with our clients is that they find the process of benchmarking costly and time consuming, while rarely does it provide them with worthwhile information. After discussions with those involved we have found that this dissatisfaction is often due to a small number of issues which could have been resolved prior to undertaking the benchmarking process.

Conclusion: In a continually evolving business world, organisations with immediate access to quality data can fast-track decision making and gain a competitive edge or be recognised as a leading agency. Critical in sustaining this edge will be the performance of the CIO (Chief Information Officer) in securing and supplying data on demand and ensuring its meaning is understood by business professionals and managers.

Conclusion: The role of the traditional service desk has been to act as the single point of contact for clients for operational incidents and to track their resolution. With ITIL v3‘s (IT Infrastructure Library – version 3) having as one of its objectives the improvement in IT Infrastructure service delivery, one way to do it is to expand the role of the service desk. In its expanded role, the service desk takes on activist responsibility for delivery life cycle functions, including implementing continuous service improvements.

Conclusion: Historically grown organisational structures and simplistic job descriptions sometimes stand in the way of creating a high-performance team. Taking personality attributes into account when assigning roles and responsibilities can have a measurable influence on overall costs, delivery time, functional fit of IT solutions, as well as on skill development in the team.

Conclusion: Project managers often find management of the change process one of the hardest aspects to deal with in their projects. While they have been trained to deal with facts and figures using templates and other project management aids, rarely do they have the necessary skills and experience to successfully manage the workplace change associated with their projects.

Conclusion:Departmental computing in most organisations today is pervasive, commonplace and almost impossible to control. Because it is used widely and for multiple purposes line managers, who fail to supervise its use, are allowing an unsustainable situation to continue.

Attempts to bring departmental computing under control and minimise the risks, while a worthy objective, will fail unless senior management is committed to fixing the problem and forcing line to act. Failure will not only compound the risks, it will increase the hidden (or below the surface) costs of departmental computing.

Conclusion: Organisations with existing Business Continuity Plans (BCPs) may find them to be a poor fit when dealing with the unique circumstances surrounding a pandemic. The chief characteristic is massively depleted numbers of available workers, with as many as 25-40% of staff absent throughout the entire government and business eco-system. Those without effective plans face the prospect of severe disablement that may take many months of recovery. For them, urgent action is required to draft pandemic-specific BCPs or to modify, then test, existing BCPs.

In the News

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

The Future of Work: The Role of People - Adobe - 31 Jan 2018

The Future of Work: The Role of People Foreword by Joseph Sweeney, IBRS Advisor For the past 30 years, organisations have applied technology to people to make the workplace more productive. But...
Read More...

Businesses unprepared for new data breach notification laws - AFR - 29th January 2018

Thousands of Australian small businesses remain woefully unprepared for the introduction of new laws that will require them to publicly disclose if their customers' data is breached by hackers or...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles