The planning and implementation of the Australian Defence Force's health records management system in 2009 has been found to have been 'deficient', resulting in a AU$110 million blowout of the project's original budget, according to the Australian National Audit Office.
Showing results 1 to 20 of 418
A Fujitsu research report has highlighted that while Australian industries are using IT to achieve improved emissions management, they've stalled in the last two years and have therefore missed out on financial benefits.
Mega IT outsourcing deals spanning multiple years are no longer a fad due to business concerns over vendor lockin and lack of transparency, but multi-sourcing models are also challenging to manage and require additional resources that companies may not have.
Sponsored by Redhat and Intel
A DevOps strategy should be a primary focus of businesses, especially given the benefits that can be seen through implementation.
Companies should remember to align potential benefits with business objectives, and be prepared to ask vendors critical questions about the architecture and management of the service being considered.
If these numbers were reported in a corporate situation, they would be considered an absolute triumph of big data management and implementation. UPDATE: Response/corrections/clarifications from Washington Post reporter.
Buyers are tired of long software deployments. Here's some background and tips for rethinking how your company implements business software.
New research highlights the importance of communication in driving project success. Many executives are misguided on this topic.
The communications solutions giant saw benefits from the streamlining of operations and cost management, and a one-off boost from the sale of an asset.
Specialized GPS devices coupled with cloud-hosted analytics from Fleetmatics help United Worldwide take the guesswork out of gas consumption and driver locations.
Here's a policy to help ensure that everyone in your organization understands the guidelines and procedures surrounding the use of personal devices in the workplace.
CIOs, other IT leaders, and management are beginning to wake up to the potential of machine-to-machine communications to deliver real business benefits.
Companies will need to fork out for device management and individual mobile and data plans to enable BYOD initiatives, but the extra costs mean they're holding back from implementation.
BYOD is here to stay, as mobile devices have become both more productive and more personal. The key to making BYOD work is to build the program to serve both sides of the employees' needs without compromise.
All-in-one IT environments offer benefits in terms of simplified management, but companies must map their own requirements and decide whether this model makes more sense than best-of-breed systems.
Spike in cyberattacks not spurring similar rise in cyberinsurance adoption worldwide due to issues of cost, trust and limited regulation, which reflect a still immature market especially in Asian region, observers note.
Technology remains nascent and will need to "prove itself" to financial institutions its effectiveness as an authentication tool over more mature methods such as biometrics, say observers.
The rise of JBOCS architecture, or 'Just a Bunch of Cloud Services,' with no coordinated governance or rhyme or reason for enterprises, spells trouble.
Dubbed ACAD/Medre.A, malware targets AutoCAD software, steals and sends files to e-mail accounts located in China, says security vendor ESET, which is working with Chinese firms to prevent further harvesting of data.
Security and privacy concerns over patient data legitimate, but industry needs to adopt balanced view by defining importance of information and avoid being overly "paranoid", execs state.