Main
Log in

Sourcing & Staffing

Conclusion: This month, financial results reporting for the first half of the 2017 financial year have shown steady growth for many IT managed service providers. Vendors that have acquired other companies to enhance or expand service offerings often report positive outcomes, provided those businesses can be successfully integrated with existing operations. Without carefully assessing potential acquisitions and developing a solid transition plan, difficulties can arise because of unsuccessful integration and restructuring efforts. A stringent consolidation plan is required for vendors to incorporate acquisitions and fully exploit specialist products and skills obtained from these investments. It is critical for vendors to assess their own service capacities, capabilities of potential business acquisitions and determine how they can be consolidated to improve service offerings.
In addition, careful planning is required for acquisitions that require business transformation, as well as other potential shifts, such as different target markets or strategic objectives. These efforts can be complex and expensive, but highly beneficial for vendors. There is a need to provide unique, innovative and efficient solutions to customers in a fast-paced and competitive industry, and acquisitions can facilitate this type of market differentiation.

Conclusion: It is easier to assess the applicant against technical skills and experience than assessing against soft skills. The time to assess soft skills is at the interview. Ask behavioural questions and recruit the more Emotionally Intelligent candidate. This applies to every recruitment position no matter how technically important the skills are.

Conclusion: Prominent this month were agreements and discussions that highlight shifts in the ICT outsourcing market, with increasing demand for targeted solutions to support business functions and long-term goals. These types of offerings have become more common, and are no longer niche services. Set solutions, which are sufficiently flexible to be tailored to individual customers, have become the norm. These solutions bundle a wide range of technologies, associated services and specialist staff, while utilising new business models for the provision of end-to-end services. In order to remain competitive, and facilitate the adoption of new solutions such as the Internet of Things (IoT) vendors are bundling offerings which go beyond the performance of business functions or expanding existing functionality.
Catering to specific goals such as increased customer engagement or the need for monitoring and analysis systems to help with business evolution or protocol development are becoming increasingly popular. Vendors have recognised the importance of portfolios which include extensive suites of strategic managed services that are efficient, diverse and easily customised to individual needs.

Conclusion: This month saw a focus on the development of improved controls over vendor activities due to the high number of recent outsourced solutions failures and serious impacts on customers. In particular, establishing internal early threat detection teams for initial development phases and more stringent, ongoing reviews. These types of activities flag a change in the outsourcing environment, with increased customer involvement in contract execution throughout all phases of an agreement and set processes to assist with technical issues that may arise before implementation as well as basic contract management. This type of involvement can help minimise risks associated with the adoption and consumption of new technologies and business models, with a greater emphasis on frameworks to circumvent threats as well as respond to them.

Conclusion: This month saw a focus on customer priorities and greater demand for niche or highly specialised IT services. In particular, there was a shift in IT investment centred on cost savings to ongoing strategic initiatives which facilitate innovation and expansion to maintain competitive advantage. These types of priorities can be advantageous for enterprises hoping to increase operational efficiencies or avoid irrelevancy in changing markets. However, without adequate preparation and thorough assessments of existing and potential environments, large-scale alterations to business operations can be hazardous, negating potential benefits. Risks associated with unforeseen skills deficits, complexities associated with consolidating or replacing environments and business process changes must be considered carefully. An increased uptake of business consultancy services to manage high-level alterations and avert or respond to difficulties indicates an awareness of the necessity to establish solid plans in conjunction with vendors that can be flexible and sensitive to customer needs.

Conclusion: Too often in organisations, executives focus on the more mechanical elements of Project and Business Management but ignore the need to develop the skills of their staff and encourage them to succeed.

Team members’ salary is rarely in itself a motivator to get things done.1 Many motivational positive factors, when combined, get the results needed to get the most out of each team with minimal staff losses along the way.

Conclusion: IT management teams that spend little time planning to grow and retain talented people will find it hard and expensive to keep pace with technology advances and business model changes. Conversely, IT management that makes every effort to retain staff are likely to be employers that attract the best people. They will do this by helping them enhance their skills and recognise their achievements.

Conclusion:

Prominent this month were reports of outages and system failures which impacted on critical operations for several businesses and government agencies. These types of failures can become costly with the increased reliance on technology and more complex environments that underpin many basic business processes. Outsourcing agreements and protocols can provide frameworks for averting or responding to service interruptions, but cannot cater to all variables that cause unexpected problems which are difficult to resolve. Triggers for serious disruptions this month have included human error, software misconfiguration, failed fire alarms, contravention of standard consultant protocols and ISP failures which had flow-on effects for large companies which rely on networks. It is not always possible to prepare effective responses for the types of disruptions that are not predicted, making it essential for both vendors and customers to conduct more thorough and regular reviews of environments, as well as establish strict protocols for public responses to avoid further damage to vendors or clients depending on outsourced services.

Conclusion: This month, the integration of businesses and expanded service offerings has been especially prominent. In particular, the combination of technologies and managed services to provide more variety and highly specialised IT service offerings targeted to customer strategic initiatives. Vendors are reaching beyond service implementation to deliver full, high-value solutions in innovative ways, including partnering with competitors to expand capabilities and improve service quality. This type of flexibility is critical and indicative of an environment where delivery models, innovations and offerings change at a fast pace and underpin high customer demand for new solutions.

Conclusion: This month, online Census solutions failures prompted the government to launch a review into outsourcer IBM’s performance. Debate regarding causes for the outages commenced, and uncertainties again highlight the need for a solid and structured framework to be established in contractual arrangements, as well as protocols for implementing services and responding to difficulties encountered. Frameworks are more critical now as rapidly changing technologies and solutions are in high demand, combined with the new, often complex customer environments vendors must cater to. Problems can be compounded by an under-appreciation of costs, different vendors working together and time overruns. It seems as though a higher number of contract failures are being reported, but it is a natural output of outsourcers delivering hybrid solutions in large, complex and foreign environments with evolving technologies and solutions. These types of factors that can result in problems for both customer and vendor necessitate a solid legal and operational framework for conducting the contract.

In the News

ANZ business users calling the shots in ICT decisions

Conducted by Australia’s Intelligent Business Research Services (IBRS) and commissioned by TechnologyOne, the survey of 261 business leaders in ANZ has shown that business functions are having more...
Read More...

Managed security: a big gamble for Aussie IT providers - CRN - 02 August 2018

TechSci Research estimates the Australian managed security services (MSS) market will grow at a CAGR of more than 15 percent from 2018-23 as a result of the increased uptake of cloud computing and...
Read More...

Kids, Education and The Future of Work with Dr Joseph Sweeney - Potential Psychology - 25 July 2018

What is the future of work and how do we prepare our kids for it? Are schools and universities setting kids up for future success? Does technology in the classroom improve outcomes for kids? Should...
Read More...

PageUp starts rebuilding and looks to learn lessons after data breach nightmare - AFR - 27 June 2018

The timing couldn't have been worse for PageUp; two days before Europe's new data protection regime came into force the Melbourne-based online recruitment specialist's security systems detected...
Read More...

Australia is still in the cyber security dark ages - AFR - 28 June 2018

In terms of cyber security years, Australia is still in the dark ages, a period typified by a lack of records, and diminished understanding and learning. We're only a few months into practising...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles
Related Articles