Diaxion IT Strategy & Optimisation
+61 (0)2 9043 9200

Blog

(Managed) Services Transition

Transitioning services can be a painful and lengthy experience. This can be alleviated by ensuring that deliverables are clearly defined and that all parties work together. A previous article outlined some of the required items within a Statement of Work (SoW). For a transition of services – be that between managed service providers (MSP) or from in-house to a MSP or the reverse; or any other transition – it is essential that the scope and deliverables are clearly defined and that most ass...

View More Details

Creation of a Statement of Work (as part of the RFx process)

After a RFx pack has been created and the subsequent evaluation of responses, there will be a negotiation phase which then will result in the creation of a Statement of Work (SoW), defining the details for delivery. There are various approaches to the creation of a Statement of Work; some critical items that should be defined within the SoW will be discussed here. 1. Commercial and financial terms The SoW should include all relevant commercial and financial terms and items. This will include: Costs: Fixed costs vs. time and material covering items like CPI increases, r...

View More Details

Ways of Working

There is enormous pressure on companies to facilitate new “ways of working” for its employees enabling them to work seamlessly – and securely – from virtually anywhere, at any time. Demands of employees have significantly increased over the last few years. With the proliferation of mobile devices that are generally very easy to use, manage and maintain by anyone, employee expectation is nowadays for a “mobile-like” experience with the following features: Always on Secure It “just works” Easy to manage The challenge for any IT de...

View More Details

Evaluation of RFP responses

A previous article looked at the initial creation of an RFx document and some of the challenges both in creating the RFP pack as well as some pitfalls for companies responding to one. Our recent experience confirms that it is beneficial to consider some main points in the creation. This article will focus on the next steps within the RFP process, mainly the evaluation of responses. To recap quickly – in the RFx creation process ensure that the critical requirements are explained clearly, so that respondents can be c...

View More Details

Migrate Your Users Home Drives to OneDrive for Business

Here is one of those tasks that just about every organisation who is running under Microsoft products and adopting or migrating to cloud will have on their “to-do” list. It is also the task that the business will not have got around to starting because of every other item stacked on top of it on that list. That task is to migrate all user home drives in the organisation to cloud storage, which in the Microsoft version means transferring everything to their OneDrive for Business service. The reason this is on everyone’s task list is because it is yet another Microsoft cloud service whe...

View More Details

Security – a permanent concern

I would propose that security has always been a concern with IT systems. It may very well have been easier to control before everything started to connect with virtually everything else; however, the last few years have seen a proliferation of threats including some new issues – be that ransomware, cryptocurrency malware, concerns around IoT and even exploits on Apple devices. Diaxion does not believe this will change much over the next decade. Experts seem to agree that there is a current and future lack of cybersecurity professionals, which will require new approaches to security. One...

View More Details

Google Cloud Platform – Diaxion view

Google Cloud, also known as Google Cloud Platform (GCP), refers to a large suite of public cloud computing services provided by Google. This resource pool is the backend infrastructure used by Google Search, YouTube videos and other proprietary products. The compute power, robustness, flexibility, and scalability are exceptional, and users can consume the resources "on-demand". In recent years, Google has been committed to the development of enterprise cloud computing. More than 90% of global searches are driven by Google Cloud infrastructure. The company is looking for $32 billion in searc...

View More Details

Serverless Services- uses and advantages

The three big public cloud providers are all offering serverless services (AWS Lambda, Google Cloud Functions and Azure Functions). Obviously, the name is equally misleading as the term “cloud” itself – cloud services are run from within a data centre, serverless services run on compute infrastructure. What then are the advantages of serverless computing (and after virtualisation, containers and now serverless will there be any smaller unit)? The main advantages of serverless computing are Low cost (per execution) Quick release / deployment time No serve...

View More Details

Public clouds – Solution for security and management concerns

Given the convenience of cloud computing in TCO and deployment maintenance and expansion, more and more enterprise organisations are moving to public clouds. The main concerns organisations have about public clouds are still security and management issues compared to local deployments. Correspondingly, start-ups that have solved these concerns have emerged. CloudCheckr, which provides enterprises with rich monitoring methods and deployment optimisation practices, is one of them. CloudCheckr is a startup that provides a cloud service management platform, founded in 2011 and headquartered in...

View More Details

Building a Zero Trust Model

New buzzwords in the world of IT come and go at an alarming rate. Just when you think you are getting your architecture or processes up to scratch with some new benchmark that your organisation needs to “comply” with, there is a new benchmark to supersede it. So here is another IT buzzword (or buzz-term if you prefer) to add to your ever growing list of compliance goals: Zero Trust. What is Zero Trust? Do I need it? How do I get it? How will it help me? The Zero Trust Network or Zero Trust Architecture model is a concept for IT security that adheres to the belief that an organisation...

View More Details