Conclusion: This month, security issues and responses to threats specific to managed service providers have been discussed. Attacks on vendors can be particularly serious because of provider interaction with customer environments and access to information. These difficulties can be exacerbated by other issues facing vendors, such as obtaining additional resources from contractors, inexperience or lack of expertise with complex, unfamiliar environments. Recent attacks on service providers have raised concerns because of threats to customer environments, as well as flow-on effects such as uncertainties relating to vendors and difficulties establishing trust with customers. New programs, education and vendor collaboration have been launched to address provider-specific security issues. It has been recognised that establishing best practices and protocols to help avert, detect and respond to security threats is required in the industry.

Read more ...

Conclusion: Organisations develop unique cultures. It may be a deliberate and conscious effort of the executive team to define and put in place a culture which will influence the way the organisation works, its priorities and its attitudes. Or it may just be something that has evolved over time as an organisation has grown, added more employees, expanded its business, or entered new markets or geographies.

Acquisitions often occur based on external opportunities, such as growing market share, improving product offerings or gaining a competitive advantage. But it can be the internal issues of how similar or dissimilar the two corporate cultures are that can really impact the potential success of the acquisition.

If the corporate cultures are very different, care needs to be taken to understand this, and develop specific action and change management plans to support the merging of the cultures. This is significant as the impact of a culture change may hurt the acquired organisation which could reduce the capability of the acquired organisation, and perhaps the morale of the employees, resulting in high employee turnover.

Read more ...

Conclusion: “C-suite” leaders including CIOs and IT managers must continually adapt and change their mindset to be digitally savvy in order to keep pace and influence the digital revolution at the workplace12. Failure to do so will increase risks to implement initiatives whilst harming their own careers and those under their care.

Read more ...

Conclusion: Agile teams will struggle to deliver a viable solution (or product) unless they can tap into the business knowledge of an astute product owner who can communicate the objectives of the product and work with the scrum to ensure it meets the stakeholder’s requirements. Without a proficient product owner, the Agile team may lack direction which would put successful outcomes at risk.

Read more ...

Conclusion: Cloud offerings are now commercially available, allowing CIOs to engage the technology offerings with a high degree of trust that the service is secure and responsive at reduced cost to in-house solutions.

CEOs have an obligation to ensure their organisation’s IT systems are cost-effective and meet the security accreditation defined by government (or their Board). PROTECTED Cloud services can reduce cost of operations and meet many of the CEO’s obligations for accreditation (and review) of services, and therefore better manage risk, to meet government and best practice commercial security requirements.

All PROTECTED Cloud data centres certified by ASD are physically located in Australia. Depending on your needs, they all meet Australian Government data sovereignty requirements and offer low latency and in-country technical support teams to assist clients. Provision of PROTECTED Cloud services allows the CIO to restructure IT, moving to a more agile and potentially lower cost option to provide the appropriate security approach.

Read more ...

Conclusion: Public Cloud is not the solution to all IT organisations’ technology and services problems. This is because most IT organisations use a portfolio of environments such as legacy systems, in-house and outsourced services, customised IT service management tools and standard applications (e. g. email) that cannot be all retrofitted in a public Cloud architecture without major rework. As a result, hybrid Cloud has become the preferred direction because it allows the multiple environments to co-exist in a cost-effective manner. However, a convincing business case is needed to gain business and IT senior executives’ sponsorship to adopt hybrid Cloud. While Cloud migration benefits and risk mitigation are critical success factors, the deployment-hidden cost is a major contributor to failure. The objectives of this research note are to provide a framework1 to develop the business case and to ensure its cost includes the following:

  • Hybrid Cloud strategy development,
  • Risks identification and mitigation,
  • Go-to-market strategy, providers’ selection and contract negotiation, and
  • Ongoing governance to realise the desired business benefits. This can reach up to 7 % of the yearly cost.

Read more ...

Conclusion: Australians have become increasingly concerned not only with what data is being held about them and others, but how this data is being used and whether the resulting information or analysis can or should be trusted by them or third parties.

The 2018 amendments to the Privacy Act for mandatory data breach notification provisions are only the start of the reform process, with Australia lagging a decade behind the US, Europe and UK in data regulation.

Therefore, organisations seeking to address the increasing concerns should look beyond existing data risk frameworks for security and privacy, moving instead to adopt robust ethical controls across the data supply chain1 that embodies principles designed to mitigate these new risks. Risks that include the amplification of negative bias that may artificially intensify social, racial or economic discord, or using data for purposes to which individual sources would not have agreed to.

Early adopters of effective data ethics will then have a competitive advantage over those who fail to address the concerns, particularly of consumers, as to how their data is used and if the results should be trusted.

Read more ...

Conclusion: Throughout the year, most businesses invite in a third party to conduct an information security risk assessment – as per best practice. Often this is a compliance exercise, other times it is just good housekeeping. Assessors are paid to find gaps in security controls based on the threat landscape and risk profile and provide recommendations for how to better secure the organisation with appropriate controls. With a thud-worthy report in hand, those charged with remediation must prioritise the recommended tasks to best use their resources to appropriately protect the organisation.

Read more ...

Conclusion: Agility has been introduced into organisations as part of their approach to increase the cadence, or velocity, of design, development and implementation cycles for project delivery. Increased levels of activity and visibility are also integral to many social media solutions and their approach to online presence. However, strategic planning processes evolve slowly and for many organisations this critical business and technology planning activity is lagging behind and no longer supports the business objectives in the digital era. 

Read more ...

Conclusion: Digital transformation is top of the agenda for most companies in 2019. Many organisations have initiated digital transformation programs and are seeing success with small-scale pilots. However, these activities do not easily scale across the enterprise or ecosystem, limiting an organisation’s capacity to fully realise the benefits of their digital transformation investment.

The biggest barrier to scaling is not technology. It is culture. The established culture in a stable and successful organisation is likely to resist disruption. Existing remuneration and recognition frameworks tend to reward existing behaviours. Individuals and groups will resist change if they do not believe the “digital vision”. A clear, compelling narrative is needed.

Effective scaling of digital initiatives must be led with a commitment from the top, intense communication at all levels and a clearly articulated vision of the future. Organisations that recognise this and can source the right capabilities to deliver large-scale digital transformations will have higher success rates than those which do not.

Read more ...

IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.
 

Read more ...

 
 IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.
 

Read more ...

Conclusion: Relying on third parties to succeed in business has become the norm. Cost limitations and workforce requirements mean that businesses need to find efficient ways to achieve their goals. This regularly includes creating an ecosystem of organisations that offer technology, consulting and support services that can be leveraged when required for a fraction of the cost of employing a person or service in-house to the same end. This is great from a business perspective; however, engaging with third parties brings significant risk. Businesses are effectively opening their door to a perfect stranger and inviting them into their organisation to look around, share some data and stay a while. Managing the risk of having a third party connected to an organisation is important. An organisation’s security controls become meaningless once data is transferred to a third party. At the end of the day, if a cyber-attack occurs via a third party, there will be more than one reputation on the line in the eyes of current and future business partners, customers and clients. 

While the impact of a third-party data breach cannot be completely prevented, the key to resilience, detection and management of connections is awareness, being upfront about the security expectations and educating the workforce.

Read more ...

Related Articles:

"2FA is a no-brainer" IBRS, 2018-11-02 11:06:25

"When it comes to security, when is enough... enough?" IBRS, 2018-10-04 11:56:31

Conclusion: This month, there has been a range of company acquisitions, consolidations and partnerships in the managed services industry. These types of purchases can allow vendors to obtain resources necessary to adapt to emerging industries and new offerings. Purchasing providers can be beneficial, expanding and enhancing a firm’s products and services with the successful integration of companies. This has resulted in trends including more targeted purchases such as company assets, or the amalgamation of a number of vendors with very different specialties to provide new offerings and adapt to market shifts. Failure to adapt offerings and business structures which allow for these changes can impact on vendor credibility and is critical in a market where proactive, innovative and highly specialised providers are required by customers.

Read more ...

Conclusion: Developing a digital strategy or embarking on a digital transformation program is now a common business narrative. For some organisations it is a process of recasting existing IT strategy and continuing in more or less the same manner. For others it involves initiating a technology project as a way to learn new processes and update platforms and skills. Understanding the business readiness of the organisation is a critical element for any change but is key to digital transformation.

Read more ...

Related Articles:

"Digital transformation – get strategy and people right first" IBRS, 2016-08-03 08:01:16

"Digital transformation: More than a technology project" IBRS, 2018-06-01 04:04:24

"Digital transformation: Top 4 lessons" IBRS, 2018-10-04 13:03:00

Conclusion: Keeping the executive informed on how the ICT function is performing while advising it how to take advantage of changes in business technology is an ongoing challenge for every CIO or ICT manager.

Astute CIOs know that to get traction with the executive (or equivalent) they must deliver services required by stakeholders while contributing to strategy debates on how to use new technologies to meet the challenges of the future. Getting traction starts with presenting the right ICT-related information to the executive at the right time.

Read more ...

Related Articles:

"Can IBRS provide a Checklist for reporting to the Board on Cyber Security?" IBRS, 2017-06-29 01:41:08

"Digital transformation: Top 4 lessons" IBRS, 2018-10-04 13:03:00

"Mind the Gap in the IT and Business Partnership" IBRS, 2014-10-01 20:39:56

Conclusion: Given the frequency of acquisitions within the information technology (IT) sector, it is prudent that clients of the organisations involved spend time to consider the possible outcomes or consequences of the acquisition, and in particular if the outcomes are likely to be good or bad news for them.

Acquisitions are likely to always involve changes in staff. The staff most at risk of being made redundant are usually in non-client-touching administration roles, such as finance, supply or HR. What clients do need to think about are possible changes to key technical or product development teams, as well as key staff that they deal with on a regular basis.

The other area where impacts may be felt is in the future direction of ongoing product development, with outcomes that can again be positive or negative for clients.

Read more ...

Related Articles:

"Acquisitions Part 1: Determining the goals" IBRS, 2018-12-03 09:49:50

"Mergers, Acquisitions and Divestitures: What does it mean to your business?" IBRS, 2017-01-01 10:35:33

"Running IT-as-a-Service Part 28: IT-as-a-Service Procurement Maturity Model" IBRS, 2017-03-04 16:52:54

"Running IT-as-a-Service Part 46: Mergers and acquisitions impact on service contracts" IBRS, 2018-09-04 13:46:42

Conclusion: The 2018 CIO survey1 revealed that the CIO’s influence is stalling, with fewer CIOs on executive boards. However, improving business processing is still the #1 operational priority. To address this priority, CIOs and IT managers should use everyday tools such as calendars to better collaborate with their staff by exploiting and promoting the features of the tools at their fingertips.

Read more ...

Related Articles:

"Mind mapping at work Part 2: Business thinking and outcomes" IBRS, 2018-08-01 09:56:26

"Real-Time Co-Authoring Part 2" IBRS, 2015-12-02 20:08:00

Conclusion: Increasingly, IT departments are looking for ways to divest their operations of undifferentiated activities – that is, activities that are common among most organisations. One technology that is ubiquitous across every organisation, in every vertical sector, is end-user computing. Theoretically, it should be an easy area of IT to be deployed via a fully managed service. In reality, IBRS has seen more failures in the space than successes.

The reasons why fully managed (aka “as-a-Service”) end-user computing initiatives fail is a result of the initial rationale for the go-to-market strategy and the resulting request for proposal (RFP).

Read more ...

Related Articles:

"IBRS Compass: Beyond the Desktop: Creating a Digital Workspace Strategy for Business Transformation" IBRS, 2016-01-02 11:39:29

"The Components of a Self-Service Desktop" IBRS, 2014-10-01 18:36:09

"The use and abuse of Personas for end-user computing strategies" IBRS, 2017-03-04 16:53:10

Conclusion: While the current artificial intelligence (AI) initiatives are data-driven, there are instances whereby the current data is insufficient to predict the future. For example, answering the following questions might be challenging if the available data is only of a historical nature irrelevant for forecasting purposes:

  • Q1: What will be the effect on sales if the price is increased by 10 % as of the next quarter?
  • Q2: What would have happened to sales had we increased the price by 10 % six months ago?

The purpose of this note is to provide a framework that can be used to derive sales principles to answer the above questions. The same approach can be used to derive other business processes principles such as procurement, customer service and client complaints tracking.

Read more ...

Related Articles:

"Acknowledging the limits of machine learning during AI-enabled transformation" IBRS, 2019-01-06 22:29:52

"Analytics artificial intelligence maturity model" IBRS, 2018-12-03 09:44:43

"Machine learning will displace “extract, transform and load” in business intelligence and data integration" IBRS, 2018-02-01 10:03:37

Conclusion: Increasingly, leaders in the field of AI adoption are calling out the limitations of the current machine learning techniques as they relate to knowledge representation and predictive analysis.

Organisations seeking to adopt machine learning as part of their AI-enabled transformation programs should ensure they fully understand these limitations to avoid unproductive investments driven by hype rather than reality by expanding their definitions of machine learning to include the use of graph networks and social physics solutions.

Read more ...

Related Articles:

"Machine learning will displace “extract, transform and load” in business intelligence and data integration" IBRS, 2018-02-01 10:03:37

"Prepare to manage the “evolution” of AI-based solutions with “DataOps”" IBRS, 2018-03-31 06:43:42

"Preparing for the shift from digital to AI-enabled transformation" IBRS, 2018-06-01 04:10:21

Conclusion: CIOs should consider the environments for their PROTECTED information, both when building new capability and/or when renewing older infrastructure and services. The need to have cost-effective infrastructure services (in-house or IaaS), accredited security of services and responsiveness for clients using the service are three key deliverables for any CIO.

The Australian Government has identified PROTECTED ratings be applied where systems and data are at risk and where the systems or data are critical to ensuring national interest, business continuity and integrity of an individual’s data. Critical business functions are a combination of the IT systems they run on and the data they consume.

Defining what should be afforded a PROTECTED rating and therefore adequately protected is an ongoing challenge. The Australian Government’s Information Security Manual (ISM) and recent legislation “Security of Critical Infrastructure Act 2018” detail the requirements and framework for reporting, on government-run IT systems and critical infrastructure. Using this framework as a base, organisations should assess whether the data or IT environments that support critical business functions should be treated as PROTECTED.

Read more ...

Related Articles:

"Canberra-based Azure is about much more than security" IBRS, 2018-04-14 13:43:57

"On-Premises Cloud: Real flexibility or just a finance plan?" IBRS, 2017-05-06 06:37:20

"Running IT-as-a-Service Part 33: How to transition to hybrid Cloud" IBRS, 2017-08-02 02:32:44

  IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.
 

Read more ...

 
 IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.

Read more ...

Conclusion: This month, discussions regarding the need to strengthen security and recovery solutions have been prevalent. The increased number of breaches which compromise private user data and interfere with business operations has become apparent. While technologies and frameworks can assist with avoiding and recovering from security events, weaknesses still exist when integrating security strategies with company structures and culture. Human error, and the failure to educate or provide all employees with skills to avoid, detect or respond to security events, has been flagged as a particular concern. Any security structure must provide resources that can support employee vigilance and slot into a company’s culture.

Read more ...

Conclusion: Every dollar spent in supporting legacy systems or BAU (business as usual) represents a dollar that cannot be allocated to digital transformation initiatives. Conversely, organisations without legacy systems (digital natives) can be quicker to market with innovative solutions supporting the digital strategy, as there is no residual debt to repay.

Compounding the problem for organisations with legacy systems is that skilled IT professionals supporting them are likely to be fewer each year, as they leave for greener pastures or retire. To back fill, management must pay a premium to engage skilled contractors who will need time to understand the nuances of the legacy systems and become productive.

Read more ...

Related Articles:

"Digital transformation: More than a technology project" IBRS, 2018-06-01 04:04:24

"Innovation: Taking action in 2018" IBRS, 2018-08-01 09:14:16

"Make the process for allocating IT resources transparent" IBRS, 2018-06-01 04:17:01

Conclusion: Acquisitions are a frequent occurrence amongst information and communication technology (ICT) vendors and solution providers. The outcomes of an acquisition or merger will impact clients as well as the employees of the organisations.

Clients and employees should invest in thinking about the announced acquisitions, what the stated goals are for the acquisition, and what exactly might be the reasons and likely outcomes of the acquisition. Whilst clients and employees are unlikely to be able to influence an acquisition being completed, it may be in their interest to take steps to help secure their own position, to either capitalise on the opportunities or reduce the risk of any possible negative outcomes.

Read more ...

Related Articles:

"Running IT-as-a-Service Part 28: IT-as-a-Service Procurement Maturity Model" IBRS, 2017-03-04 16:52:54

"Running IT-as-a-Service Part 46: Mergers and acquisitions impact on service contracts" IBRS, 2018-09-04 13:46:42

Conclusion: As self-service data analytics and visualisation becomes mainstream – due in no small part to Microsoft’s Power BI strategy – traditional data teams within IT groups need to reconsider traditional business intelligence architectures and plan a migration to a new environment. Underpinning the new architecture must be a sharper focus on tools and practices to support data governance, which is not a strength of Microsoft’s portfolio.

Read more ...

Related Articles:

"Can IBRS suggest or advise on any data warehouse products?" IBRS, 2017-07-14 10:20:21

"Can you escape the power of Power BI?" IBRS, 2018-11-02 11:32:21

"Reframing Business Intelligence as Critical Business Imperatives" IBRS, 2015-10-03 00:03:12

 

Conclusion: Artificial intelligence technologies are available in various places such as robotic process automation (RPA), virtual agents and analytics. The purpose of this paper is to provide an AI maturity model in the analytics space. The proposed maturity model can be applied to any type of industry. It provides a roadmap to help improve business performance in the following areas:

  • Running the business (RTB): Provide executives with sufficient information to make informed decisions about running the business and staying competitive.
  • Growing the business (GTB): Provides information about growing the business in various geographies without changing the current services and products.
  • Transforming the business (TTB): Provides information to develop and release new products and services ahead of competitors.

Read more ...

Conclusion: Fraud and cybercrime can both keep key stakeholders in a business awake at night. But these threats are often driven by very different malicious motivations. In the end, the two threats overlap but are very different. Fraud is a crime carried out for financial gain. Cybercrime on the other hand can be executed for many reasons including political, passion and even opportunistically, purely because a vulnerability was there. Aside from reasons/motivation, two other key differences include skill set needed to manage such threats and the delivery method of the event. Organisations need to prepare for both of these threats to be realised and cannot always rely on the controls of one to detect, prevent or manage the impact of the other.

Read more ...

Related Articles:

"When criminals hijack your organisation’s brand for phishing" IBRS, 2016-11-01 21:37:01

"When it comes to security, when is enough... enough?" IBRS, 2018-10-04 11:56:31

Conclusion: Digital transformation is happening everywhere. It is being included in organisational strategic plans for government service improvements and in commercial organisations to address market challenges and industry disruptors. Digital transformation efforts include a core group of domains including strategy, innovation, experience, automation and trust and these must be addressed in any digital transformation approach. However, a core element of digital transformation is people and the hardest part of digital transformation is the cultural piece.1 Understanding the people elements of digital transformation and appropriately addressing them can mean the difference between success and failure for organisations.

Read more ...

Related Articles:

"Digital transformation: Top 4 lessons" IBRS, 2018-10-04 13:03:00

"Digital: Use it to garner support for your next initiative, but avoid the risks!" IBRS, 2016-08-03 08:01:14

"Know how to sell ideas and support the digital strategy" IBRS, 2018-08-01 09:46:03

"Who should lead digital transformation?" IBRS, 2018-11-02 11:39:29

Conclusion: There are many strategies to consider as well as challenges to be aware of when migrating from a traditional waterfall development methodology to an agile methodology. Plan and prepare carefully and be patient during this transition and anticipated benefits will be realised.

Read more ...

Related Articles:

"Buying agility" IBRS, 2012-01-30 00:00:00

"SNAPSHOT: Agile services spectrum" IBRS, 2018-05-04 19:10:01

"When the Stars are Aligned use Agile" IBRS, 2016-04-22 23:15:40

"When to use Agile project management" IBRS, 2018-07-05 03:29:21

Conclusion: In IBRS’s 2018 Top Business Technology Trends Priorities Report, we noted that despite significant media attention on blockchain or distributed ledger technology (DLT) in 2017, the primary concerns of Australia’s Chief Information Officers (CIOs) in 2018 remains focused on the more pressing issues of migration to the Cloud, and its impact on IT operations and staffing.

However, ignoring DLT in the long term is no longer an option. After 10 years since the advent of blockchain, real world and production examples are now emerging from market-influencing players in Australia such as the Australian Securities Exchange (ASX) and Commonwealth Bank (CBA). This, combined with significant investment from credible vendors (both old and new), requires that CIOs and their Enterprise Architects review the implications of DLT becoming a mainstream means for secure, immutable data exchange to enable fully automated multi-party workflows.

Read more ...

Related Articles:

"Blockchain Principles and Cases" IBRS, 2016-03-31 23:14:46

"The Top Business Technology Priorities for 2016" IBRS, 2016-02-01 01:10:48

IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.
 

Read more ...

 IBRSiQ is a database of Client inquiries and is designed to get you talking to our Advisors about these topics in the context of your organisation in order to provide tailored advice for your needs.

Read more ...

Conclusion: This month, IT vendor acquisitions and partnerships have been prominent. The incentive for companies with disparate products and services to consolidate has increased, resulting in strategic arrangements aimed at expanding offerings and future company developments. However, this kind of consolidation can result in difficulties when separate entities make efforts to integrate. This type of integration requires an orderly transition and establishing a solid foundation for ongoing operations to maximise benefits associated with new resources. Detailed planning and execution is necessary to establish direct relationships and better understand the resources available, customer base and externals from both companies and allow for a more consistent fit between internal departments as well as a framework for practical and flexible implementation of plans.

Read more ...

Conclusion: The CIO’s role has changed considerably over the past couple of decades, from “keeping the lights on” and working on cost-saving initiatives (automation) to expanding into embracing new technologies and enablers to transform the organisation. The importance of this has created additional roles like the Chief Digital Officer (CDO) to lead this critical activity.

Read more ...

Related Articles:

"Digital Strategy Part 1: What are the traits of digital leaders?" IBRS, 2018-02-01 10:26:23

"Innovation - The new core competency" IBRS, 2012-06-29 00:00:00

"Inspirational leadership core qualities and behaviours" IBRS, 2017-11-02 04:18:41

Conclusion: Project management principles and frameworks are now implemented in the majority of organisations, including public, commercial and the not-for-profit sectors across Australia. While project delivery metrics indicate an improvement in successful project execution there is still a concerning level of project failure (approximately 35 %). Project failure is extremely costly and while focus is on the project execution elements, many failures can be traced back to poor governance and decision making. Project boards set the tone and show the way forward for projects by helping to resolve challenges or to provide alternative actions. Their behaviour will be reflected whether the tone is positive or negative and has enormous impact.

Read more ...

Related Articles:

"Bite the bullet – stop failing projects sooner not later" IBRS, 2016-09-02 05:06:18

"PMO – Models and structures" IBRS, 2018-05-04 18:33:08

"Tips for improving and monitoring ICT project governance" IBRS, 2018-07-05 03:12:50

Conclusion: When scanning the market to find new solutions or vendors, it is usual to consider who else uses the solutions, the size of the organisation and their customer base. Vendors often publish examples of clients that use their solutions, and particularly like highlighting those clients that represent well-known global or local brands.

Whilst being nice to know, the details provided are usually very shallow, and should never be relied on in terms of influencing a buying decision. It will take a significant effort to get any details that may actually help a project team, and in many cases, the detail will simply not be available.

Read more ...

Related Articles:

"Don’t let poor research cloud your thinking" IBRS, 2015-12-02 19:54:39

"Embedding research and advisory into an organisation" IBRS, 2016-07-02 04:20:00

Conclusion: Microsoft’s portfolio of business intelligence (BI) products now places the vendor in a market-leading position. Over the next three to five years, IBRS expects Microsoft to continue to strengthen its market position in BI, largely through its ability to expose a large number of users to self-service data visualisation and storytelling via some of Power BI’s features being included in Office 365.

Exploring Microsoft’s strategy for Power BI provides several important issues for consideration.

Read more ...

Related Articles:

"Digital and AI-based transformation requires an evolution in business intelligence architectures" IBRS, 2018-05-04 19:06:41

"Return on Investment in Data and Analytics" IBRS, 2015-10-03 00:12:43

Subscribe

Want to get the latest papers from all our advisors? Subscribe, and we'll send you the information you need.

Invalid Input
Please enter a valid email address
Invalid Input
Please enter your mobile phone number
Invalid Input