The CIO’s guide to smarter vendor negotiation: 10 tips

In an IT marketplace marked by turbulence, inflation, and economic uncertainty, the process of contracting with vendors for technology products and services has gotten significantly more challenging for CIOs. IT leaders may find that prices are going up without an accompanying increase in benefits, with technology providers — less dependent on any one industry or…

Support the development of your IT professionals. Become an ACS partner.

ACS (Australian Computer Society) is the professional association for Australia’s technology sector. With 40,000 members, ACS is dedicated to growing the nation’s digital skills and capacity. ACS members benefit from professional training and skills certification, networking and events, liability insurance cover and access to technology and innovation hubs. In addition, ACS has developed a Professional…

What it’s going to take for advanced AI to reshape the enterprise landscape

According to Infosys research, data and artificial intelligence (AI) could generate $467 billion in incremental profits worldwide and become the cornerstone of enterprises gaining a competitive edge. But while opportunities to use AI are very real – and ChatGPT’s democratisation is accelerating generative AI test-and-learn faster than QR code adoption during the Covid pandemic –…

Don’t let NetOps “gotchas” derail your digital transformation

Over the past few years, technological and business advancements have created increasingly grand expectations. Your customers expect an “always on” experience. (Today, you can also add “always fast,” “always intuitive,” “always successful,” and so on.) Fundamentally, if customers find it too difficult to engage digitally with your business, they’ll engage elsewhere. Digital transformation: The implications…

Understanding the security shared responsibility model in an as-a-service world

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model is essential when choosing as-a-service offerings, which make a third-party partner responsible for some element of the enterprise operational model. Outsourcing IT operations…