IT Operational Excellence

When IT departments are tuned to run their best, they achieve more, spend less and drive success back into the organisations they support.

IT operational excellence is an approach that helps to ensure IT departments run efficiently and deliver great service. Without an operational excellence philosophy, IT departments lack vision and strategy, are slow to adapt and are more likely to be bogged down by trivial issues.

Achieving IT operational excellence isn't about implementing one particular framework. It is a mindset geared towards continuous improvement and performance that incorporates multiple principles designed to align team goals around delivering value to the customer.

IBRS can help organisations achieve IT operational excellence by revealing the most effective ways to leverage resources and identify the most valuable activities and differentiators in a given IT team.

Conclusion: An organisation planning a CRM upgrade, or deployment of a new CRM, has a wide selection of viable methodologies to choose from. Across the various methodologies there are a common set of principles which make application of a suitable methodology relatively straightforward.

Interpreting and using the most relevant components from a methodology will be important, otherwise there is a risk of being overwhelmed with too much information.

Read more ...

Particularly prominent this month was the high level of new senior appointments and employee rationalisation in the IT industry. This highlights the critical nature of taking into account practical, business issues as well as technological developments to maintain efficiency, competitiveness and targeted service provision for a company’s internal ICT customers, as well as for service providers catering to external clients.

Read more ...

Conclusion: There are many benefits in off-the-shelf applications, whether they be onsite or SaaS,  available to organisations in terms of cost reductions, increased productivity, improving market share or customer satisfaction. For organisations that have traditionally followed a custom build approach, there are some key areas that need focus and executive management commitment to ensure the promised value is achieved.

Read more ...

Conclusion: Enterprise software vendors and enterprise software users are increasingly investing in in functionality that is accessible from mobile devices, and many organisations face the challenge of making key legacy applications accessible on mobile devices. Comprehensive and reliable APIs are the key for the creation of architectures that enable a seamless user experience across a range of mobile devices, and across a backend mix of state of the art Cloud services and legacy systems.

Read more ...

Conclusion: A major reason CRM projects stumble, or fail outright, is a poorly argued strategy and business case.

A thorough strategy and business case will provide all stakeholders with a clear rationale of what is being planned, and the related business issues that will be managed better as a result. Additionally, the reason for the investment will be understood and the potential costs and benefits articulated.

Read more ...

Conclusion: Whilst senior management recognise continued investment in IT is critical for business success there is increasing evidence of dissatisfaction with IT management’s performance. It is critical IT managers identify reasons for the dissatisfaction and take remedial action. If not, credible survey data indicates they will be replaced.

Read more ...

April has been an incredibly strong month for outsourcing engagements. Most interesting is the variety of deals in size and nature as well as the vendor and customer size. It is clear that the momentum in outsourcing is steady accelerating as new technologies are accepted and the skills required to support them evolve and become more readily available. A proliferation of smaller and specialist service providers, new service models, efficiencies and affordable technologies have also resulted in increasing the availability of outsourcing to small-to-medium enterprises wishing to take advantage of new developments.

Read more ...

Conclusion: As storage vendors increasingly include active-active storage in their proposals, IT Executives must move beyond a naïve understanding of what it is, to a deeper understanding of the scenarios under which it can deliver a benefit, the risks it mitigates, and where is fits within the overall redundancy and availability architecture.

Since active-active storage typically comes at a significant additional cost it is important that a cost/risk/benefit analysis be undertaken to avoid paying an unnecessary premium that becomes a burden on the business. This cost/risk/benefit analysis can only be done in the context of the organisation’s specific application portfolio.

Read more ...

Conclusion: Organisations that need to run legacy applications under Windows XP will no longer have access to economically sustainable options. In short, there is no way to maintain an XP environment without Software Assurance, and thus there is no practical way for an organisation to continue to run legacy applications without investing in Software Assurance or Enterprise Agreements for the desktop. Organisations should factor in the significant licensing costs when considering the business case for continued support of ‘XP only’ to legacy applications.

Read more ...

Conclusion: 80% of traditional outsourcing contracts established in Australia during the last 25 years were renewed with the same service provider. However, with the emergence of public Cloud, IT organisations should examine the feasibility and cost-effectiveness of migrating to public Cloud prior to renewing the existing outsourcing contracts.

Read more ...

Security continued to be a major concern during March, with particular focus on new privacy regulations (Privacy Amendment Act) that came into effect on March 12th. A lot of interest was generated because of the extensive measures and associated fines for breaching the new Australian Privacy Principles (APPs). The APPs focuses on protection of sensitive information and integrates information security policies which are already in place. Of most interest were the significant changes, the fact that many companies were not sufficiently prepared and the high fines for breaching the APPs. It displays an increased concern and focus on establishing security solutions and a requirement to engage external providers to assist with response measures as well as illustrating the need for strong government regulations to prevent misuse, loss or inappropriate access to sensitive data, facilitate breach detection and to establish responses for security breaches.

Read more ...

Conclusion: Australian organisations in both public and private sectors enthusiastically identify and implement best practices from around the world. After considerable time and effort has been allocated to implementing these processes and tools the results are all too often less than satisfactory. There are many best practices, frameworks and tools to assist in the optimisation of IT but there are two key problem areas that if overcome, can make a significant difference in the benefits that organisations will derive from best practice implementation.

Read more ...

Conclusion: Due to recent advances in IT infrastructure, the capital cost of VDI is now comparable to that of a Full Desktop, making it suitable for a wider range of use cases. However, there remain significant project risks due to the large upfront infrastructure costs and the very high technical risks associated with building the VDI infrastructure. IT organisations need to understand these costs and risks and then formally develop mitigation strategies to control these.

Read more ...

Conclusion: Debate over Microsoft’s mixed record of successes and slow innovation during the last decade has incited conjecture as to its long term durability. As many highly successful vendors have disappeared very quickly, the same inference for Microsoft is a reasonable one.

While Microsoft has been ‘disrupted’ in the sense that it has not adjusted smoothly to new conditions, its demise is not imminent. The corporation has to fix several parts of its business, which will not be easy, but it’s financially sound and growing. Microsoft customers need not fret over its longevity. However, they ought to examine how much they depend on Microsoft or other flexible options over the next five years.

Read more ...

February saw a continued emphasis on security threats and response measures, as well as practical issues that may impact on IT investment. Particularly interesting was a write-down of Tower’s new core IT systems after the sale of some of its business units. This highlights the need for careful planning and extensive consideration of real world issues in an environment where fluid and complex IT and business structures exist. The desire to exploit the benefits of new technologies requires changes to both IT and business foundations which can pose challenges when technologies and business processes need to be integrated. A combination of evolving solutions and limited support can be problematic when business-oriented decisions are made which could have flow-on or unpredictable effects on IT infrastructure and strategies.

Read more ...

Conclusion: Disaster recovery continues to be an issue for many clients. Approaches based on tape have a low cost benefit but often recovery takes too long to meet the business’ requirements. The popular new approach of replicating data to a secondary data centre enables rapid recovery but at a cost which is prohibitive for some applications or smaller organisations.

An emerging third approach is to use Cloud infrastructure (IaaS) as a warm standby. This is attractive both in terms of cost and recovery time and can also be used as a strategic stepping stone for adopting IaaS.

Read more ...

Conclusion: Software Asset Management (SAM) is not simply a set of technologies: it is a set of ongoing organisational practices and processes. Prior to embarking on SAM, organisations need to ensure that the foundations for a successful program are in place: identification and education of executive stakeholders, clarifying the scope of the SAM and setting clear and measurable objectives as well as identifying the sources and quality of information required.

Read more ...

This month has seen a lot of discussion regarding security failures, sparking debate in relation to the adequacy of the solutions and response capabilities for such incidents. Concerns raised because of these failures, emerging technologies and uncertainties regarding security arrangements have forced both vendors and specialist security providers to investigate ways of alleviating customer concerns through integrating solutions and assurances when establishing outsourcing arrangements. While security has always been an issue for customers recent failures are driving more collaborative, open and prospectively sturdier security arrangements for the future.

Read more ...

Conclusion: It has become common for IT staff to refer to their on-premises virtualised infrastructure as a Cloud. The unchallenged assumption is that their on-premises environment is as good as a Public Cloud (aka IaaS) and provides the same benefits.

IT Executives and Enterprise Architects need to un-collapse these two concepts and recognise that while a virtualised on-premises environment has many benefits it does not have all the benefits of a Public Cloud – i.e., pay-as-you-go, hyper-scale, massive scale-up and scale-down.

Read more ...

Conclusion: Software Asset Management (SAM) is now a pressing issue for many organisations, due to growing complexities in vendor licensing as a result of the mix of: traditional per device, virtualisation, consumerisation, mobility, cloud services licensing models. SAM is no longer just a tracking service, but an essential part of financial and risk management. However, implementing SAM solutions must accompanied by the alignment of key business units. Processes – both for governance and automation – must be clearly defined between the key business units if SAM is to be of any lasting value.

Read more ...

Conclusion: Utilising vendor products entails a cost to the user above the licence fee. This cost, which is hidden, is mostly unaccounted except when dealing with a vendor that imposes vexatious conditions. Such conditions may alter usage rights and prolong the negotiation period to conclude contracts. That adds costs to an organisation it should not bear.

Where a vendor has myriad and confusing contractual terms it is a cause for organisations to assess their lock-in with that vendor. In reassessing their connections with vendors, organisations ought to strategically move out of deep lock-in towards more flexible relationships with vendors. For a user organisation to be overly dependent on a limited number of vendors is a potential problem. Reducing dependencies on single or groups of vendors may also deliver more efficient business relationships. It also serves as a signal to vendors that an organisation wants an efficient arrangement.

Read more ...

Especially noticeable in December was the large number of purchases and collaborative agreements in the IT service provider sector. Vendors aiming to expand their customer base and service offerings, reach and scale as well as exploiting new technologies they have no access to are adopting alternative approaches to business growth and sustainability. This underscores the need for the industry to remain flexible and be aware of industry changes, demands and evolving areas that can benefit their customers

Read more ...

Conclusion: When faced with the need to upgrade the desktop, rather than viewing this as a refresh or modernisation project (which is an IT centric approach to technology issues) undertake a business centric Application Delivery roadmap that focuses on the end-user’s application experience and the business benefits.

An Application Delivery approach will reduce project risks by highlighting the linkages between the project and the business benefits, prioritising the delivery stages of the project to get value early in the project, and ensuring application delivery methods are aligned to the user’s needs, ensuring a high quality user experience.

Read more ...

Related Articles:

"The desktop is dead. Long live application delivery! - Part I" IBRS, 2013-10-29 00:00:00

Conclusion: CRM technology is capable of being put to several discrete purposes. The added complexity of the tools is necessary in the more complex digital communications environment. Even though CRM systems are more adaptable and extensible than before, there are still four central questions to CRM activities.

The central business questions that drive the sales and marketing effort are about communications channels and the use of data. Organisations should be clear about how they answer those four questions as that will assist in the way they manage CRM and its associated capabilities.

Read more ...

Conclusion: CIOs must avoid being swept up by the hype concerning SaaS (Software as a Service) and approach each business case on its merits. While the immediate net benefits may be appealing, it is important to evaluate whether the long-term benefits are sustainable and the risks manageable before entering into a service contract.

Read more ...

There has been much discussion this month with regard to IT in the Banking and Financial Services sector. Projects and plans to expand internal IT structures have largely been in response to increased and changing customer needs and demands. The high level of activity and discussion regarding IT in this sector illustrates how evolving technologies and customer awareness and desire to access these new technologies can transform internal infrastructures and how IT service providers must respond positively to these demands. IT service providers catering to these new needs need to address issues such as internal support systems, protocols and IT decision-making and make significant increases in IT investment. This is particularly evident as service providers restructure, extend capacities and begin to offer new services in respect of cloud and security.

Read more ...

Conclusion: The recent enhancements to CRM suites offer deeper and more useful insights into organisational processes. The second and possibly more profound aspect to CRM suites is that they provide the means to evaluate organisational productivity.

Productivity can be seen in ratio terms across the enterprise and therefore the management of assets which can be handled with greater clarity. If organisations chose to use CRM as a productivity management tool, they would need to organise a management team that oversaw such a designated use. It is not a sales or a marketing role but it is a function that finance and those connected with the executive may choose to accept.

Read more ...

Conclusion: When faced with the need to upgrade the desktop, rather than viewing this as a refresh or modernisation project, which is an IT centric approach to technology issues, undertake a business centric Application Delivery roadmap that focuses on the end-user’s application experience and the business benefits.

An Application Delivery approach will reduce project risks by highlighting the linkages between the project and the business benefits, prioritising the delivery stages of the project to get value early in the project, and ensuring application delivery methods are aligned to the user’s needs, ensuring a high quality user experience.

Read more ...

Related Articles:

"The desktop is dead. Long live application delivery! - Part II" IBRS, 2013-11-30 00:00:00

Conclusion: Difficulty in defining performance criteria for an enterprise architecture team typically points to a lack of clearly articulated business priorities, or to a lack of a meaningful baseline against which performance can be assessed. An enterprise architecture team needs to be given clear objectives that relate to the performance of the business, without being prescriptive in terms of the target IT system landscape.

Read more ...

Conclusion: Software Asset Management (SAM) is a widely overlooked and misunderstood practice. Over the last five years IBRS has seen a marked rise in organisations finding themselves out of compliance due to immature SAM practices, and this is resulting in licensing exposure ranging from hundreds of thousands, to millions of dollars. This rise is partly due to the more aggressive stance of software vendors, namely Microsoft, Adobe and Autodesk. However, it is mainly due to a lack of awareness among IT professionals of the financial risks of not having SAM, and the potential benefits of getting SAM right. IT executives should determine the benefits SAM brings to their organisation, and articulate these to senior business executives.

Read more ...

This month there has been a lot of discussion regarding the importance of innovation, in the approach to both technology and business strategies. While this has been flagged previously it is even clearer when examining the IT industry activity this month, in particular company buy-outs, new product and service offerings, investments in development and company growth. Collaboration between companies in the provision of specialised service offerings and in discussions about new standards and protocols for evolving technologies and solutions were also noticeable. These activities are both driven by, and drive, the need to innovate in the current climate, the need to address user concerns in the uptake of new solutions and a desire to maximise the benefits of using new solutions.

Read more ...

Conclusion: With IT infrastructure having gone through major changes in the last five years, due to virtualisation and cloud technologies, organisations should challenge their assumptions about storage, and evolve their strategy prior to the next major storage acquisition.

Rather than assume the current networked storage centric strategy is the right approach, and simply needs a minor update, organisations should look at how their IT infrastructure has changed in the five years, then evaluate alternative approaches such as Integrated Systems or networked storage free Unified Systems.

Read more ...

Conclusion: Customer Relationship Management (CRM) is undergoing major changes. The addition of features, analytics, and high quality data measurement gives users more options than ever to explore how their various customers interact with their organisation.

The substantial enhancements in CRM technologies should encourage organisations to lift their own skills in order to use the power of these tools. To use the CRM tools effectively it may be necessary for people within each department to coordinate their work across different areas of the organisation.

Read more ...

Conclusion: Today, nearly all organisations are delivering digital services to customers and suppliers. Quality of service expectations of external stakeholders create significant challenges for organisations that were used to treating IT and software needs as internal topics that are at least one level removed from customers and suppliers. Digital services have evolved into the key mechanism for embedding an organisation into the external value chain. Articulating a clear conceptual picture of the external value chain in precise terms without using any IT jargon is a prerequisite for innovation and successful business transformation, having an IT strategy is no longer good enough.

Read more ...

September has seen a noticeable rise in the number and value of outsourcing deals, particularly in the provision of communications and network infrastructure. Other IT news was centred mainly around the change in government. Pre-election, there was much discussion on the Coalition’s proposed strategies and plans, and after the election, predictions regarding the impact of the change on the ICT industry. Commentary and opinion was largely positive and focused on increased confidence and business-centric policies which are expected to drive evolution and growth in the ICT industry.

Read more ...

Synopsis: In the previous millennium some CIOs claimed they could reduce their IT costs by not producing printed reports for business managers and only recommencing them if the manager complained. If they said nothing the application software and documentation were put on the back burner in case they were needed and after a decent period given a ‘quiet burial’.

In this millennium the approach above will not work as business professionals and managers can access their data and prepare management reports online when needed. This begs the question, how can CIOs reduce their costs in 2013 while managing risks?

Read more ...

Conclusion: Vendor performance evaluation is a critical component of successful contract execution and has been an area of difficulty for the ICT industry. Deciding what to evaluate, when and how often to evaluate, how to collect the data necessary to undertake the evaluation and fulfilling the responsibilities of a customer requires commitment, planning and active participation. However, CIOs will be rewarded with improved supplier relationships and more successful contract engagements.

Read more ...

Conclusion: Microsoft’s licensing for its end user products (Windows, Office) attempts to straddle the old desktop-bound paradigm and the new user-centric paradigm brought to the fore by mobility, cloud services and consumerisation of end points. This has resulted in a fragmented and complex set of intertwined usage rights that can confound even the most astute procurement specialist. The only workable approach is to prepare long-term scenarios that deal with specific end-user situations and have Microsoft develop and confirm the licensing requirement in writing prior to deployment: plan for more dynamic application deployment, but externalise the effort, time, costs and risk of the licensing decision back to Microsoft.

Read more ...

Conclusion: Withouthonest and informed feedback from clients on the effectiveness of the services delivered, IT management must rely on their intuition to devise ways to enhance services and measure the department’s performance.

The ideal way to obtain the insights needed to enhance IT services and measure performance is to conduct an IT Service Effectiveness, or Customer Satisfaction Survey, on a regular basis and act on the findings. Actions might include, for instance, justifying an increase in the IT Expense budget or acquiring extra computing resources to improve online systems performance.

Read more ...

Conclusion: Application portfolio rationalisation offers the promise of reduced ICT maintenance costs while improving data quality, process support and usability for end users, and increasing organisation effectiveness and efficiency.

An effective approach to application portfolio rationalisation involves five steps: 1. understand your business architecture; 2. understand your applications portfolio; 3. develop principles for rationalisation; 4. assess opportunities for rationalisation; and 5. rationalise.

Read more ...