juraganbola juraganbola https://www.prediksi-score.co/ https://www.prediksi-rtp.co/ https://senimanangka.com/ https://sprr.org/ http://pakde4drezeki.com/ https://sudututara.com/ https://exipple.com/ https://137.184.132.172/ https://147.182.217.233/ https://afterromeoworld.com/ https://galerestaurant.com/ https://pakde4d.crackerjackplayers.com/ https://coventryhalf.com/ https://www.goddesshuntress.com/ https://heylink.me/Gopaytogelhoki/ https://www.ppa-group.com/ https://linkr.bio/gopay.togel/ https://heylink.me/Gopaytogelterpercaya/ https://desty.page/gopay_togel/ https://bento.me/gopaytogel/ https://mez.ink/daftargopaytogel/ https://bizbuilderuniversity.com/ https://cappadociatoursandtravel.com/ https://gopay.asia/ https://endlesssun-nj.com/ https://blmyeg.com/ https://bantengputih.com/ https://monopricehub.com/ https://outtatheparksauce.com/ https://www.earthsystems.net/ https://www.wordpirates.com/ https://dj-figo.com/ https://www.carswithmuscles.com/ https://anesuiliaucepai500.com/ https://165.232.165.42/ https://165.232.165.52/ https://english-forum.com/ https://printecosoftware.com/ https://www.petrockfest.com/ https://rbgnrp.com/ https://eckoto.net/ https://178.128.144.196/ https://206.81.9.18/ https://159.223.180.229/ Pakde4d https://goitour.com.vn/css/ http://coralino.com/gopay/ http://ontransportesyservicios.com/css/ https://www.salemskates.com/2000/ https://www.desarrolloweb.mx/firmas/ https://142.93.5.12/ https://178.128.144.117/ https://georgiamediaagency.com/ https://calendarinthesky.org/ https://142.93.252.113/ https://bonbonchu.com/ juraganbola https://meinhardtvineyards.com/ https://heylink.me/PremantotoAlternatif/ https://fettlebotanic.com/ https://danielcuthbert.com/ https://whm.shoptosurprise.com/ https://143.198.176.143/ https://157.230.60.97/ https://www.theindependentproject.org/ https://ethiothinkthank.com/ https://www.warshipstats.com/ https://161.35.6.244/ https://67.207.80.19/ https://134.122.19.250/ https://mezzofanti.org/ gopaytogel gopaytogel gopaytogel gopay togel Gopaytogel Gopaytogel https://mongoliainvestmentsummit.com/ gopay togel amanahtoto https://saffronstrand.org/ https://habibideal.com/ https://137.184.202.97/ https://161.35.115.113/ amanahtoto amanahtoto PAKDE4D https://www.genevaworldwide.com https://www.holmesbrakel.com https://159.223.191.207/ Link Togel Terbaru slot bet 200 perak pg soft slot qris resmi 2024 Bandar slot resmi togel deposit pulsa 5000 amanahtoto amanahtoto Gopaytogel Gopaytogel Gopaytogel Gopaytogel Gopaytogel https://174.138.40.78/ amanahtoto Gopaytogel Gopaytogel https://www.dotnetindex.com/ pakde4d https://jaki.pta-bandung.go.id/css/inspirasi/ https://danmihalkogallery.com/ https://grahel.com/ https://137.184.144.54/ https://178.128.152.228/ https://photolamancha.com/ slot bet 200 perak https://www.arlingtontrotters.com/ https://147.182.161.99/ https://142.93.119.205/ Gopaytogel Gopaytogel Gopaytogel Gopaytogel Amanahtoto
Greg Spencer, Author at Beyond Technology - Page 2 of 3

Pandemic Planning

With the general public seeming to be panic buying toilet paper and hand sanitiser many of our clients have been asking what should IT be doing to prepare. Although formal pandemic planning is quite an involved process, understanding your IT capabilities and governance processes is key to making sure that you are able to respond if required. With local authorities now predicting that peak risk of major disruption will be in August, we have come up with our top 5 questions that IT needs to be able to answer today.

They are:

  1. What percentage of your workforce would be able to simultaneously work from home with the existing remote access capacity? How many workers know how without instruction from IT?
  2. Has the technical architecture of your remote working systems been designed to provide the level of reliability required to support critical business tasks, or has it been design with a best efforts approach as you could “always drive into the office if it was important”?
  3. What IT capabilities are single man sensitive – does documentation exist to cover the recovery of failed key systems while key IT staff are on unexpected medical leave? Are security protocols robust enough to support mass remote working when key decision makers may be unavailable?
  4. What 3rd party suppliers or services are you critically reliant upon, and do they have a pandemic response plan in place? How easily is your off-site backup process disrupted?
  5. Is your IT support capability able to provide the required levels of service when a significant proportion of the workforce are not in the office? How many times are technical problems solved with a quick drop in to the IT guys desk?

Often these questions have answers that can surprise, and with the continuity of critical systems and IT services vital to the ongoing operation of any business we are finding many CEO’s are seeking to undertake an independent IT assessment to provide assurance that they are able to rely on those capabilities during an unexpected disruption. Fully understanding your existing capabilities and limitations, as well as reviewing your technical governance processes seems like a small step, however it can significantly improve an organisations ability to respond quickly and effectively to rapidly changing circumstances.

Top ten for 2020 and BEYOND

I wish you and your family happy holidays on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2020 bring you success and exciting opportunities.

With the start of a new decade comes an opportunity to think about what the twenties will bring. Many may point to climate change and increasing political uncertainty, however as a Technologist I have increasingly been thinking of the years ahead in terms of prioritization. Opportunities for technology to truly transform thinking, markets, and your business are endless – but our ability to consume and manage the required change is the challenge we face. In thinking of the year ahead, the BTC Team has identified key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Deciding what not to do – Focus and prioritisation is undoubtedly the theme for 2020, with a planning focus of what needs to be done first to support the initiatives of the future. If your organisations executive is yet to review or understand what your IT Strategy means for the business, then now is the time to act.
  2. Network Planning 2020 style – With the NBN build completing and the fibre wars largely ending the vision for the new corporate network is clear and its new capabilities are beginning to be assumed within strategy plans. Gigabit to the branch with carrier diversity being standard, SD-WAN is combining with uCPE to make virtual network functions deployable. This along with next generation security requirements and WiFi 6 (802.11ax) has the potential to create the perfect storm for network infrastructure upgrades that will drive large CAPEX requirements if not planned appropriately.
  3. Ongoing focus on IT governance – Just ask the now Ex-Chairman and Ex-CEO of Westpac on the importance of IT Governance. The focus on Technology strategy and execution has never been higher, boards have continued to ask questions of organisations executive team on IT strategy, risk management and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. Independent external advisers to boards and steering committees have become common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) are the norm.
  4. Digital transformations – IDC reports that 85% of CEO’s believe they have only 24 months to execute their digital transformation before its too late. Second and third order digital disruption is generally focused on an embedded digital engagement capability, with organisations seeking more involvement of IT in defining the business needs. Boards and CEO’s continue to move away from the focus on the defensive play to instead seek out digital engagement and transformational opportunities.
  5. Security as an Immune system – With commercially motivated cyber attacks becoming increasingly commonplace we continue to evolve our defensive security posture. As always the trade-off between high security and high functionality continues to be a fine balance, however we need to embed security responses into the core of our environment. We have the conclusion that healthy living through isolation is not feasible and our systems need an immune system that can respond to the inevitable breach.
  6. User Experience Instrumentation  Technology is now clearly expected to monitor and remediate the user experience rather than focus on the technology that provides it. UX instrumentation will increasingly provide the required insights that keeps the technology department on the front foot.
  7. IoT (Internet of Things) use-cases evolve – With 1.3 billion services in use worldwide at the end of 2019 and Cat-M1 & NB-IOT carrier networks being available nationwide for a few cents a day, use-cases are continuing to evolve and we are starting to see the growing management overhead that this is bringing. New security obligations are being considered by the federal department of Home Affairs which will likely also add pressure to ensure that appropriate management automation is deployed from day 1.
  8. LowCode/NoCode Development initiatives spread – with digital initiatives seeking to exploit competitive advantages of from organisations system capabilities we are seeing more and more businesses considering bespoke development as part of their technology strategy. With offshore development team results often leading to disappointment, the LowCode/NoCode approach provides an attractive proposition.
  9. Increased penetration of integration platforms – The continued preference for replacing monolithic systems with an integrated best of breed approach has set the scene for a simplified approach to stitching systems together. Different circumstances require different approaches however the age of bespoke point to point integration patterns has definitely past.
  10. Further increased board-level oversight of IT operations – The importance of secure, reliable and efficient IT to support the competitiveness of businesses will continue to be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. Boards will continue to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.

Organisations that are not deliberately planning their technology strategy will not be able to prioritise the avalanche of opportunity that they face today. To take advantage of transformation and digital innovation opportunities CEO’s must have confidence in their Technology capabilities. Those that don’t, must act now before being left with an uncompetitive legacy cost base and be in the dark compared to others that will be leveraging digital insights to exploit market opportunities.

Top 10 for 2019 and BEYOND


I wish you and your family happy holidays on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2019 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Compliance cost focus – After a year where the Australian Privacy Principles were cemented into the consideration of many boards and the true cost of compliance to the requirements of the GDPR out of the EU became understood to those with clients or operations in Europe, many have predicted that our local compliance burden will soon mirror that of Europe. Armed with this prediction and observing the challenges in the EU we expect that a more mature approach to compliance will be formed in 2019 that seeks to avoid additional compliance costs by baking the consideration of privacy directly into the business processes and technology solutions. Those organisations that have taken this approach have successfully demonstrated an improved responsiveness of technology to the business and a reduced compliance cost.
  2. Less “Geeks” in the office  – The importance of technology engaging with the business and aligning its priorities has never been higher, and with the ongoing simplifications efforts there are less a less technicians required to keep the light on. Technology departments will increasingly focus on IT business analysis skills and engage more directly with efforts to assist users to get more productivity from technology investments.
  3. Ongoing focus on IT governance – The importance of technology strategy and execution has never been higher, boards have continued to ask questions of organisations executive team on IT strategy, risk management and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. Independent external advisors to boards and steering committees have become common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) are the norm.
  4. Digital Engagement transformations – As second order digital disruption became common place over the last few year the organisations response continues to seek more involvement of IT in defining the business needs. Boards and CEO’s continue to move away from the focus on the defensive play to instead seek out digital engagement and transformational opportunities.
  5. Decline in MPLS networks  With carrier diversity increasingly considered the best approach to business resilience the deployment of MPLS based networks is expected to see an acceleration in its decline.  With Hybrid Network and Internet based SD-WAN quickly maturing the use-case for MPLS networks will become increasingly rare.
  6. Initial 5G deployments  With the battle lines drawn and the major telco’s all seeking new opportunities for better margins I expect to see the rollout of 5G technology this year primarily in the fixed line broadband replacement space. Although this will only be with Mid-band spectrum, the use of pole-top densification will ready the networks for mmWave deployment in the future.
  7. IoT (Internet of Things) – With Cat-M1 and NB-IOT carrier networks being available nationwide at around 10 cents a day, new use-cases will develop and we can start to expect all new field assets to come standard with centralised telemetric capabilities.
  8. NBN Matures and 10G becomes mainstream – with the mainline NBN rollout due to complete in the next 24 months and a likely change of the federal government providing some blame shifting opportunities we expect to see the NBN offering mature significantly. With FTTC set to be the upgrade path for FTTN and with the completion of the HFC rollout we expect to see 1G consumer connections become feasible. Similarly with telco’s around the world starting to work with the retail equation of “double the price for five or ten time the bandwidth” and the market increasingly being able to distinguish between congested and contented bandwidth, we think that commercial users will increasingly deploy 10G connections.
  9. Further increased board-level oversight of IT operations – The importance of secure, reliable and efficient IT to support the competitiveness of businesses will be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. Boards will continue to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.
  10. Security as an Immune system – With cyber criminal gangs proving to be the most digitally agile organisations on the planet we continue to evolve our defensive security posture. As always the trade-off between high security and high functionality continues to be a fine balance, however new approaches seek to embed security responses into the core of our environment. We have reached the conclusion that healthy living through isolation is not feasible and our systems need an immune system that can respond to the inevitable breach.

Organisations that are waiting to be digitally disrupted will simply not survive into the future. To take advantage of digital innovation and transformation opportunities CEO’s must have confidence in their Technology capabilities. Those that don’t have this confidence must act quickly before being left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging digital innovation to exploit market opportunities.

Top 10 for 2018 and BEYOND


I wish you and your family happy holidays on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2018 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Robots building Robots – In what we see as being an escalation of the data wars (where organisations are seeking to leverage their ongoing investment in Data Warehousing, CRM, BI and BigData to apply competitive pressure to their market) vendors are increasingly deploying machine learning solutions where the hard work of process and data analysis is being skipped in favour of an outcome based approach. For example, the development of a system to control a self driving car where each detail of what to do for every unexpected event needed to be defined and coded would take many decades of development by large teams, whereas when the computer learns through watching – those events are not defined and deliberate defined actions taken, the computer makes a judgement call. The implications of this approach for many business processes will likely start being considered in the coming year and will provide an enormous opportunity for transformational innovation.
  2. SD-WAN continues to be the WAN technology of choice – During the uncertainty of forced NBN migrations over the next 24 months, the ability of the technology to intelligently choose between two alternate links to both improve resilience and bandwidth, together with it effectively re-engineering TCP flow control to more intelligently handle modern network dimensioning will continue to be compelling.
  3. Ongoing focus on IT governance – The importance of technology strategy and execution has never been higher, boards have continued to ask questions of organisations executive team on IT strategy, risk management and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. Independent external advisors to boards and steering committees have become common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) are the norm.
  4. Digital Engagement transformations – As second order digital disruption became common place over the last few year the organisations response continues to seek more involvement of IT in defining the business needs. Boards and CEO’s continue to move away from the focus on the defensive play to instead seek out digital engagement and transformational opportunities.
  5. EMM device management – As more and more organisations are managing hybrid device fleets the idea of a “Standard Operating Environment” is becoming less and less common. As the EMM technology capabilities continue to improve we expect to see less locked down SOE devices and more policy based management of all devices weather they are mobile phones or PC’s
  6. 5G planning and new NBN capabilities – Although it will take some time for the exact use-cases to be derived for 5G services, the higher bandwidth and lower latency will start to make an impact in technology planning in the later part of the year. We can expect that fixed line player will start to get more serious in there approach to bandwidth with clarity on reporting of contention and congestion being expected and the start of the commoditisation of 10G interfaces.
  7. Serverless Computing – We expect to see the beginning of a wave of change away from COTS business systems (Commercial Off The Shelf) towards bespoke development using serverless computing. Time will tell on how this shift is adopted in Australia, however it has the potential to be the current generation’s business users excel macro or access database.
  8. Further increased board-level oversight of IT operations – The importance of secure, reliable and efficient IT to support the competitiveness of businesses will be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. Boards will continue to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.
  9. Security as an Immune system – With cyber criminal gangs proving to be the most digitally agile organisations on the planet we continue to evolve our defensive security posture. As always the trade-off between high security and high functionality continues to be a fine balance, however new approaches seek to imbed security responses into the core of our environment. We have reached the conclusion that healthy living through isolation is not feasible and our systems need an immune system that can respond to the inevitable breach.
  10. Digital Workplace Strategy – We expect to see deliberate development of digital workplace transformational strategies that will see to improve staff productivity and business processes. Although we think that material workplace change driven by IoT devices or BYOA (Bring your own Apps) is unlikely in the short term, we see real-time collaboration and digitally enhanced work practices to continue to drive workplace innovation and productivity.

Organisations that are waiting to be digitally disrupted will simply not survive into the future. To take advantage of digital innovation and transformation opportunities CEO’s must have confidence in their Technology capabilities. Those that don’t have this confidence must act quickly before being left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging digital innovation to exploit market opportunities.

Top 10 for 2017 and BEYOND

I wish you and your family happy holidays on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2017 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.  

  1. Machine Learning and AI (Artificial Intelligence) – Will start to make itself known in Australian Business Processing – Big cloud providers have been making machine learning accessible to masses for the last couple of years, however we think that the time is right for this to start making itself known in the Australian workplace. Either being used to provide business insights in the analysis of big data sets, or in the automation of customer service – the ability for computers to learn from its mistakes will provide an enormous opportunity for transformational innovation.
  2. SD-WAN becomes the WAN technology of choice – As its proved itself in 2016 as one of the major innovations for replacing highly expensive international MPLS networks we are likely to see it drive firmly into the domestic space. The ability of the technology to intelligently choose between two alternate links to both improve resilience and bandwidth, together with it effectively re-engineering TCP flow control to more intelligently handle modern network dimensioning has proved compelling. This will team up with the increasing availability of both NBN tails and competitive fibre from TPG and Vocus to change the perception of business grade WAN links.
  3. Ongoing focus on IT governance – With an increased visibility of high profile information security and IT project failure events, boards have continued to ask questions of organisations executive team on IT strategy, risk and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. During these deployments, questions are asked about the organisations skills, experience and independence. Independent external advisors to boards and steering committees are becoming common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) are the norm.
  4. Digital Innovation & transformation becomes mainstream – While digital disruption was the buzz word of 2016, a new focus on a proactive response will be the norm going forward. Boards and CEO’s move away from the focus on the defensive play to instead seek out digitial innovation and transformational opportunities.
  5. Collaborative cloud – As the industry take up and approach to the cloud matures we expect to see a continued trend towards communities of interests in cloud offerings. The opportunity to take advantage of common requirements and service levels will be augmented by the ability for inexpensive data interconnects and integration points.
  6. Virtual and Augmented Reality Growth (VR & AR) – Although it will take some time for the exact use-cases to be derived, the technology with the help of massive technical advances in the consumer space will start to make an impact in many businesses in the later part of the year. We have already seen AR been used effectively in some high tech specialist manufacturing processes, however we are likely to see it rolled out into proof of concept environments in warehouse workplaces with the help of better recognition of the possible OH&S improvements.
  7. Mandatory Cyber-breach reporting – The likelihood of mandatory cyber-breach reporting appears to be nearing certainty during 2017. This will not only mean that incident response plans will need to be urgently revisited, but will also cause some added levels of anxiety when many find out the extent of the problems in existence.
  8. Further increased board-level oversight of IT operations – The importance of secure, reliable and efficient IT to support the competitiveness of businesses will be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. Boards will continue to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.
  9. Information Arms race – the old adage, you don’t need to swim fast to escape a shark, just faster than the guy next to you is true in the quest for business intelligence. Organisations are seeking to leverage their ongoing investment in Data Warehousing, CRM, BI and BigData to apply competitive pressure to their market. Those organisations that have failed to invest in automation and analytic technology are increasingly being left flatfooted as competitors are able to drive efficiency and take advantage of market insights provided by new predictive analytics.
  10. Revisited Outsource models – We expect to see increased incidents of large IT outsources being reconsidered in a cloud world. Where legacy incumbent providers are set maintaining the status quo and maintaining management of large data centre environments, we can expect boards to demand that independent review be used to define how cloud service delivery can be exploited to significantly reduce the cost base.

Organisations that are waiting to be digitally disrupted will simply not survive into the future. To take advantage of digital innovation and transformation opportunities CEO’s must have confidence in their IT capabilities. Those that don’t have this confidence must act quickly before being left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging digital innovation to exploit market opportunities.

Top 10 for 2016 and BEYOND

I wish you and your family a Merry Christmas on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2016 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Emergence of the “Hacker Industry” – An increase in unreported business impacting cyber security events of over 350% in the last 9 months of 2015 has set the scene for 2016. Relying on perimeter defence and rule-based security is now clearly inadequate. Application self-protection, as well as user and entity behaviour analytics, will help fulfill the adaptive security architecture.
  2. Ongoing focus on IT governance – With an increased visibility of high profile information security and IT project failure events boards have continued to ask questions of organisations executive team on IT strategy, risk and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. During these deployments questions are asked about the organisations skills, experience and independence. Independent external advisors to boards and steering committees are becoming common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) the norm.
  3. Gen 3.0 Flexible working – Ongoing improvements in enabling technologies and greater acceptance by corporate Australia has reached a point where adoption is accelerating. Combining improved take up of digital collaboration tools, activity based working technologies in the office and improved availability of supportive broadband speeds provided by the NBN has improved the business cases for mass deployment of hyper-portable PC’s (such as SurfacePro’s etc), and has seen working from non-office locations more mainstream.
  4. Multi-point Collaboration – The Microsoft Office ecosystem has made significant progress with Office2016 and Skype for Business supporting real-time document co-editing and room based conference integration. BlueJeans and other technologies are bridging the gap between traditional conferencing technologies and the more widely deployed and cost effective desktop conferencing setting up 2016 to be a tipping point for collaboration technology deployment.
  5. Information Arms race – the old adage, you don’t need to swim fast to escape a shark, just faster than the guy next to you is true in the quest for business intelligence. Organisations are seeking to leverage their recent investment in Data Warehousing, CRM, BI and BigData to apply competitive pressure to their market. Those organisations that have failed to invest in automation and analytic technology are increasingly being left flatfooted as competitors are able to drive efficiency and take advantage of market insights provided by new predictive analytics.
  6. Ongoing digital disruption – All organisations cannot hide from competitive innovation lead by technology. Simple examples include company’s leveraging social media to engage with their customer base (in product development, promotion and general customer engagement), or professional services organisations leveraging collaboration tools to make teams more productive and agile. The form will change depending on the industry however the increased reliance on technology driven innovation will be constant.
  7. Human Firewall Engagement – Users has always been the week link for information technology security. With the emergence of the “Hacker Industry” and the increasingly targeted approach to their trade the requirement to engage more directly with users to demonstrate the vulnerabilities and educate with respect to their responsibilities.
  8. New business applications for augmented and virtual reality – With Samsung, Oculus, Microsoft and others seeking to bring consumer electronics global scale and pricing to the new generation of technology in this space there is increasing potential for useful deployments outside of the entertainment industry. Much in the way that 3D printers has had unexpected industry impacts, firms in the property development, construction and engineering sectors are seeking to use new visualization technologies to provide insights prior to physical construction.
  9. Increased board-level oversight of IT operations – With information security likely to be in the headlines again in 2016, the importance of secure, reliable and efficient IT to support the competitiveness of businesses will be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. Boards will continue to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.
  10. Robotic Process Automation – Realising increases in both efficiency and effectivity recent implementations of this technology has produced incredible ROI numbers. Although the technology is considered “inelegant” by many technologists, the pragmatic approach to systems integration for work flow value chains means that the complexity, cost and risk of the implementation projects is far more attractive than most alternatives. We expect to see RPA being a common project is 2016.

Organisations that are not embracing recent advances in their IT Strategy planning will be left behind with IT that slows the business down rather than facilitates improved business velocity. They will be left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging better data analysis and social media tools to inform them of market opportunities.

Top 10 for 2015 and BEYOND

I wish you and your family a Merry Christmas on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2015 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Next Gen Security Concerns– Information security experts are now advising organisations to prepare for cyber security breaches rather than just their depth of defence. In 2014 we saw zero-day malware attacks increasing to 70% of reported attacks. This requires an entirely new approach to network security and a change of cultural acceptance of user impacts. While awareness and education campaigns remain the most effective tool, new technology approaches will be a big focus on 2015.
  2. New focus on IT governance – boards have continued to ask questions of organisations executive team on IT strategy, risk and benefits realisation which has spurred on the deployment of more formal IT governance frameworks. During these deployments questions are asked about the organisations skills, experience and independence. Independent external advisors to boards and steering committees are becoming common place and IT governance frameworks based on the ISO/IEC 38500:2008(E) the norm.
  3. The new wireless carrier wars – 2015 brings the introduction of the 700Mhz mobile spectrum into the Optus and Telstra network which will at last bring in-building capital city coverage onto a level playing field. Telstra has leveraged the technical superiority of their 850Mhz 3G spectrum without mercy leaving its competitors floundering. With both the iPhone6 and Samsung S5 both already supporting the APT700 band the typical wait for devices will be avoided and all carriers are spending big on expanding their 4G coverage and capabilities. Adding to this the opportunity for WiFi calling and VoLTE that is also supported in new devices, we can expect to see significant improvements in effective coverage and competition across the board.
  4. The beginning of the end for the desk phone – Although many organisations have been questioning the need for a desk phone for some time, they have proved difficult to remove on mass. Our prediction is that the combination of improvements in mobile and softphone technologies will provide a level of reliability and functionality to match the humble desk phone, and with the ongoing uptake of collaboration and video technologies, we will see 2015 be the point of decline for desk phone deployments.
  5. Data considered a corporate asset – Big Data and self service BI tools has driven the technical capability, however the cultural change within the business is only just beginning. As the organisation starts to recognise their data as a corporate asset the expectations on IT to protect and help facilitate the organisations exploitation becomes a key focal point.
  6. More external advisory – The only thing increasing faster than the opportunity for IT to improve business productivity and competitive advantage is the number of things that can go wrong. The rate of change in the IT industry spurred by the growing diversity of “cloud” offerings and sourcing options seems to be increasing exponentially. Organisations are seeking access to experience and insights  from independent advisors to cut through the complexity and protect from potential catastrophes.
  7. Changing desktop – The new year promises several areas on innovation for how knowledge worker interact with their PC. From wireless docking stations (including wireless power), 4K monitors and improved Hybrid PC form factors, we will start to see changing expectations of users within the workplace where mobility and desk based productivity is no longer seen as a trade-off.
  8. New Privacy Act considerations – The new Australian Privacy Principles (APP) came into force March 2014. Some organisations have taken steps to address their obligations, however many have deferred technical privacy audits until the new year with critical steps such as developing a personally identifiable information data inventory not being completed.
  9. Ongoing digital disruption – All organisations cannot hide from competitive innovation lead by technology. Simple examples include company’s leveraging social media to engage with their customer base (in product development, promotion and general customer engagement), or professional services organisations leveraging collaboration tools to make teams more productive and agile. The form will change depending on the industry however the increased reliance on technology driven innovation will be constant and ongoing.
  10. Technology based business productivity improvement opportunity to support growth  As was seen in 2014, IT is being asked to do more with less. We are continuing to see boards focusing on understanding how they can deliver organisational capacity for more sustainable growth through productivity improvements.  Mobility, collaboration, CRM and real-time business intelligence capabilities will continue to be an ongoing technology focus to deliver these improvements.

Organisations that are not embracing recent advances in their IT Strategy planning will be left behind with IT that slows the business down rather than facilitates improved business velocity. They will be left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging better data analysis and social media tools to inform them of market opportunities

I look forward to working with you in the new year and hope that you get to enjoy some time off before then.

Regards,

greg-spencer-signature

Greg Spencer BE(Hons) MBA
Principal Consulting Partner
Beyond Technology Consulting
Mobile: 0448 866 801
Office: 1300  469 909

Are you getting value from your IT spend?

No matter if your view of IT is as a cost centre or a potential strategic advantage, ensuring that you are receiving good value in your IT spend is critical. Reducing cost and improving service delivery through effective IT management and improved business alignment are key outcomes from undertaking an Independent IT review and health check.

  • We will assess your internal IT service delivery or external IT service provider to consider if improved services or technology architectures could provide efficiency or capability improvements.
  • We will review your technology roadmap, consider technology failure scenarios and insure that appropriate steps have been taken to mitigate those risks that are a real danger to the organisations wellbeing.
  • We will assess your business requirements, consider best practice, new technology architectures and service delivery models and provide actionable advice on how to improve your IT service levels and reduce cost.

Unfortunately information technology is not a one size fits all proposition, and over time, many organisations IT service delivery falls out of alignment with their business requirements. Although many organisations may strategically decide to not make their IT capabilities a source of competitive advantage, we are seeing more and more organisations where IT has become the ball and chain holding back business agility and the source of a competitive disadvantage. Although independent reviews are common across many areas of business, some technology managers are reluctant to invite external parties in to review their organisation and infrastructure. This reluctance can often be traced to a lack of management maturity within Technology, however we have reviewed the top 5 of the remaining reasons:

  1. “Reviews always lead to new infrastructure” – It is critical when you seek an external party to undertake an independent review that they are actually independent. Bringing in an equipment vendor to provide a “consult” is almost always provided by pre-sales resources that unsurprisingly are paid to sell their product, similarly a “consulting” organisation that provides implementation services or sells infrastructure are equally incapable of providing you true vendor agnostic advice.
  2. “Consultants don’t understand our business” – We believe that it is critical to develop a keen understanding of an organisations business requirements to be capable of offering technology advice. It is therefore vital that any consult seeks to include a business requirements discovery as part of the initial part of the project. This not only ensures that your business requirements are understood, but also means that a fresh set of eyes are used to review the issues without the blind spots that we all develop in our day to day business as usual activity.
  3. “We are already highly efficient and resource constrained” – By taking an external perspective and the experience across hundreds of organisations we have often seen ways of doing things differently that are part of the broader picture can provide efficiency gains through the deployment of new tools or techniques. However it is often identifying what not to do, through more appropriate alignment to actual required levels of service that provide the biggest cost and efficiency gains.
  4. “Consultants provide reports that never get read” – We believe that all advice should be actionable. Any recommendation that is not achievable within the constraints of the organisation is inappropriate and should be left to the text books rather than an assessment report.
  5. “Our outsourced IT service provider doesn’t think its required” – We believe there are three important technology areas that need to be reviewed periodically. Technology Strategy, Technology Operations and Technology service delivery. Each of these can (and do) fall out of alignment with business requirements, and each are inter-related. Many medium sized organisations have taken the approach to outsource their technology operations and/or service delivery, but have found that they no longer have the skills internally to provide appropriate levels of strategic direction. Unfortunately the easy answer of retaining your operations provider for assistance with your strategy roadmap is poor governance practice and leads to inevitable conflicts of interest. Many organisations that have outsourced IT capability undertake Independent reviews only prior to contract renewal, however best practice would suggest that the independent development or update of your IT strategic roadmap should be undertaken on a more regular basis.

The Beyond Technology Consulting vision is to provide our clients with “Actionable Advice” on how to create optimal technical solutions for your business. Each of our partner level consultant combines engineering and technical qualifications with a globally recognised MBA from a leading business school. Our consultants are practical people focussed on delivering tangible outcomes rather than grandiose “shelfware” reports that appear impressive but could never be implemented. Our methodologies, tools, and models are tried and tested to rapidly and reliably assist to develop our recommendations.

Top 10 for 2014 and BEYOND

 wish you and your family a Merry Christmas on behalf of the entire Beyond Technology team. Thank you for your continued support and I hope that the challenges ahead in 2014 bring you success and exciting opportunities. In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions.

Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Fortress Datacentre – with the continued race to the cloud for commodity application and infrastructure we expect many organisations to cross the line where more services will be accessed from the internet than from their own infrastructure. This is leading a security paradigm shift where rather than having a private network connected to the internet, some organisations will start to only secure the endpoints rather than the network.
  2. Death of the SOE and the 3 year refresh – large corporates have been holding onto the notion of command and control standardising PC’s in an effort to reduce support efforts. App store style application delivery and cheaper more mobile devices will reinforce the desire of users to not be controlled by IT.
  3. CYOD – Rise of the “Choose your own device” infrastructure model. The enormous variety of form factors combined with the management tools developed to support BYOD computing will combine to move traditional IT service to let users define their own consumption model.
  4. Increased digital disruption – All organisations cannot hide from competitive innovation lead by technology. Simple examples include company’s leveraging social media to engage with their customer base (in product development, promotion and general customer engagement), or professional services organisations leveraging collaboration tools to make teams more productive and agile. The form will change depending on the industry however the increased reliance on technology driven innovation will be constant.
  5. Finally the end of Windows XP and Office 2003 – As the end to support and security updates finally arrives early in 2014, thankfully most organisations have plans in place to remove these systems from the production network. Unfortunately there is increasing levels of evidence that hacker groups are stockpiling XP exploits to unleash once they are safe from a Microsoft response, increasing the security risk for everyone from increasing numbers of rouge “botnets” across the globe.
  6. New Privacy Act considerations – The new Australian Privacy Principles (APP) will come into force March 2014. This formally outlines the responsibility of organisations to take effective steps to protect the information security of private information and has mandatory disclosure requirements for security events.
  7. Increased Security threats – The face of Information security crime is changing rapidly. While previously your biggest threat was malicious insiders or board teenagers, international crime gangs now threaten even the most innocuous organisations. Motives range from stealing your data to denying you access to your systems for ransom, or even using your systems and PCs as a platform to launch an attack on another target. Reported breaches of information security have been rising 50% annually, we expect this to escalate in 2014.
  8. Technology based business productivity improvement opportunity to support growth – The Australian economy is forecast to hit rough waters in 2014. We are continuing to see boards focusing on understanding how they can deliver organisational capacity for more sustainable growth through productivity improvements. Mobility, collaboration, CRM and real-time business intelligence capabilities will be an ongoing technology focus to deliver these improvements
  9. Increased board-level oversight of IT operations – With information security likely to be in the headlines often in 2014, the importance of secure, reliable and efficient IT to support the competitiveness of businesses will be a focal point for many boards. Data custody has become an increasing concern as increasingly complex supply chain and IT environments threaten to affect the “line of sight” of organisations to its information. The cloud or managed service providers false claim of “you don’t need to know the complexity behind the curtain” has been exposed with several high profile failures in 2013. Boards will start to ask questions on their risk levels for data integrity, information protection and privacy compliance. We expect many more organisations will opt for Independent external review to provide appropriate oversight directly to the board.
  10. NextGen Workflow Automation – We expect to see continued work in organisations updating Application Strategies and growing deployments of next generation workflow automation and other technologies to reduce business lag and improve accountability.

Organisations that are not embracing recent advances in their IT Strategy planning will be left behind with IT that slows the business down rather than facilitates improved business velocity. They will be left with a legacy cost base leaving them uncompetitive and be in the dark compared to others that will be leveraging better data analysis and social media tools to inform them of market opportunities.

I look forward to working with you in the new year and hope that you get to enjoy some time off before then.

Regards,

Greg Spencer BE(Hons) MBA
Principal Consulting Partner
Beyond Technology Consulting
Mobile: 0448 866 801
Office: 1300  469 909

Top 10 for 2013 and BEYOND

I wish you and your family a Merry Christmas on behalf of the entire Beyond Technology team.

Beyond Technology has again had its best ever year. Thank you for your continued support and hope that 2013 is looking exciting and productive.

In thinking of the year ahead, I thought that I would share with you what the BTC Team has identified as the key trends and challenges that we feel our clients will be facing next year. As independent IT management consultants, we not only see a variety of different industries suffering the same issues, but it’s our job to help you identify and form the solutions. Please feel free to contact me at any time to discuss how Beyond Technology can help your organisation.

  1. Increasing need for governance and board-level oversight of IT operations – The increasing importance of appropriate, reliable and efficient IT to support the competitiveness of businesses will continue for the foreseeable future, however several industry developments are likely to sharpen the boards attitude to oversight of IT operations in 2013. Data sovereignty has become an increasing concern as cloud services not only often seek to store data in different legislative domains, but the treatment of data (and its security and protection) become less transparent to the users. This combined with often poor internal IT governance of the server sprawl created by the flexibility given through virtualization has left many organizations unable to answer basic questions on their risk levels for data integrity, information protection and privacy compliance. We expect many organizations will focus their oversight of such concerns during 2013.
  2. Death of Blackberry – While only a short time ago the most often heard quote regarding blackberry’s was “the only way you can take my Blackberry is out of my cold dead hand”, nowadays IT departments can’t give them away. Real concerns about the ongoing viability of the company and therefore support for the technology and the user driven demand and significant improvements in manageability of alternate smartphones has turned into a tsunami of change.  Plan 2013 to be the year to close down your BES and stop paying the blackberry tax to Canada.
  3. Windows SmartPhone to hit the prime time – Only a few months ago it seemed unlikely that Microsoft would ever be able to mount a challenge to the Smartphone marketplace. With Windows mobile 8 the viability of enterprise fully supporting the platform is risen significantly, and with the new devices being released (including in the tablet space) we can expect that user driven demand will see Windows Smartphones being a real alternative.
  4. Growing Device Envy & BYO Device Strategies – Forget Ultrabooks, Convertibles, Windows8, USB3, 802.11ac, WQXGA, 10point touch, Ivy Bridge or Haswell – these are all just components to device envy. Certainly the increasing penetration of Windows8 “touchbooks” at home will drive disenchantment with existing notebooks in a similar manner that the iPad did, however the generational change to the notebooks in 2013 will be a serious challenge to manage. BYO device strategies (Smartphone, Tablet and Notebook) are increasingly become common place across enterprise IT. Getting in front of the need and proactively developing a management strategy to leverage the advantages without being caught without a plan is key. Any organization that has not developed a strategy yet would need to make this a priority in 2013.
  5. Criticality of Heterogeneous MDM and device security policies – With the changes in the device market place, more BYOD and the increasingly active hacker activity targeting mobile devices the necessity of a Heterogeneous Mobile Device Management (MDM) platform is clear. If you do not have a MDM deployed with clear security policies defined and communicated around mobile devices this should be one of your highest priorities for 2013.
  6. Windows XP & WindowsServer2003 end of support planning – Any organization that still has Windows XP or Server2003 deployed in their environment must develop and implement an exit strategy in 2013. With Microsoft putting an end to security updates in early 2014, no organization can afford to leave these machines within their environment past that point. In some organizations this will be a major planning an logistical exercise and will be a critical part of their 2013 work program.
  7. NBN, 4G Mobile & IPv6 – The rapid rollout of LTE devices and network coverage during 2012 has surprised many observers. Although the achievable speeds on the current networks is patchy depending on load the opportunity presented by the technology is clear. The NBN on the other hand has yet to impact many organisations with rollout appearing glacially slow. Again the opportunity is clear, however the timeframe is not. Ipv4 address space has run out, however the impact of this has yet to be felt by Australian enterprise. This should be maintained on a watching brief and be seriously considered in any medium to long term planing. Any development or refresh of your telecommunications strategy or procurement activity in 2013 should give clear consideration to these technologies.
  8. Social Media Policy – The speed at which damage can be done to an organisations brand, and the potential
    information security threat that inappropriate use of social media can pose should put the development of an
    organization wide social media policy as a high priority. If your organization does not have a formal well
    communication policy it should be a joint priority of HR and IT during 2013.
  9. Technology based business productivity improvement opportunity to support growth – The Australian economy has recently been dependent on China for its economic growth which has led to our famous two speed economy. We are seeing boards focusing on understanding how they can deliver organisational capacity for more sustainable growth through productivity improvements. Mobility, collaboration, CRM and business intelligence capabilities will be an ongoing technology focus to deliver these improvements.
  10. Application Strategy Roadmap – Updating application strategy roadmaps to take into account recent changes in mobility and collaboration technologies should be undertaken with a broad view of the organisations productivity improvement opportunity. “Communications enabled business processes” is the buzz word for 2013, Remote diagnostics, Real-time field worker situation aware information, mobile analytics & re-tasking are all areas of keen interest for many organisations..

I look forward to working with you in the new year and hope that you get to enjoy some time off before then.

Regards,

Greg Spencer BE(Hons) MBA
Principal Consulting Partner
Beyond Technology Consulting
Mobile: 0448 866 801
Office: 1300  469 909