Diaxion IT Strategy & Optimisation
+61 (0)2 9043 9200

Blog

Evaluation of RFP responses

A previous article looked at the initial creation of an RFx document and some of the challenges both in creating the RFP pack as well as some pitfalls for companies responding to one. Our recent experience confirms that it is beneficial to consider some main points in the creation. This article will focus on the next steps within the RFP process, mainly the evaluation of responses. To recap quickly – in the RFx creation process ensure that the critical requirements are explained clearly, so that respondents can be c...

View More Details

Migrate Your Users Home Drives to OneDrive for Business

Here is one of those tasks that just about every organisation who is running under Microsoft products and adopting or migrating to cloud will have on their “to-do” list. It is also the task that the business will not have got around to starting because of every other item stacked on top of it on that list. That task is to migrate all user home drives in the organisation to cloud storage, which in the Microsoft version means transferring everything to their OneDrive for Business service. The reason this is on everyone’s task list is because it is yet another Microsoft cloud service whe...

View More Details

Security – a permanent concern

I would propose that security has always been a concern with IT systems. It may very well have been easier to control before everything started to connect with virtually everything else; however, the last few years have seen a proliferation of threats including some new issues – be that ransomware, cryptocurrency malware, concerns around IoT and even exploits on Apple devices. Diaxion does not believe this will change much over the next decade. Experts seem to agree that there is a current and future lack of cybersecurity professionals, which will require new approaches to security. One...

View More Details

Google Cloud Platform – Diaxion view

Google Cloud, also known as Google Cloud Platform (GCP), refers to a large suite of public cloud computing services provided by Google. This resource pool is the backend infrastructure used by Google Search, YouTube videos and other proprietary products. The compute power, robustness, flexibility, and scalability are exceptional, and users can consume the resources "on-demand". In recent years, Google has been committed to the development of enterprise cloud computing. More than 90% of global searches are driven by Google Cloud infrastructure. The company is looking for $32 billion in searc...

View More Details

Serverless Services- uses and advantages

The three big public cloud providers are all offering serverless services (AWS Lambda, Google Cloud Functions and Azure Functions). Obviously, the name is equally misleading as the term “cloud” itself – cloud services are run from within a data centre, serverless services run on compute infrastructure. What then are the advantages of serverless computing (and after virtualisation, containers and now serverless will there be any smaller unit)? The main advantages of serverless computing are Low cost (per execution) Quick release / deployment time No serve...

View More Details

Public clouds – Solution for security and management concerns

Given the convenience of cloud computing in TCO and deployment maintenance and expansion, more and more enterprise organisations are moving to public clouds. The main concerns organisations have about public clouds are still security and management issues compared to local deployments. Correspondingly, start-ups that have solved these concerns have emerged. CloudCheckr, which provides enterprises with rich monitoring methods and deployment optimisation practices, is one of them. CloudCheckr is a startup that provides a cloud service management platform, founded in 2011 and headquartered in...

View More Details

Building a Zero Trust Model

New buzzwords in the world of IT come and go at an alarming rate. Just when you think you are getting your architecture or processes up to scratch with some new benchmark that your organisation needs to “comply” with, there is a new benchmark to supersede it. So here is another IT buzzword (or buzz-term if you prefer) to add to your ever growing list of compliance goals: Zero Trust. What is Zero Trust? Do I need it? How do I get it? How will it help me? The Zero Trust Network or Zero Trust Architecture model is a concept for IT security that adheres to the belief that an organisation...

View More Details

Modernising the Data Centre

Continuing our focus of working with our clients on defining and assisting on their DC Modernisation journey we have over the last six months expanded our partner community to include: Hashicorp - for secrets management (Vault), Provisioning...

View More Details

When not to use Agile

The article will provide a (very) short overview of Agile software development and Agile project management. It will then look at where an Agile approach to project management makes little or no sense and, some of the possible issues. Agile takes an iterative approach to implementation. It requires collaboration between cross-functional teams. These do not start with a fully complete or final project plan, but adapt their planning to the environment and circumstances with the aim to achieve evolutionary development and close alignment with changing business needs. Continual improvement and ...

View More Details

30 second guide to building an Operating Model

In my previous article I discussed what an operating model was and what value it brings. I also said that I would go through approaches to building your operating model. First lets go back and state what an operating model is: An operating model describes how the business is run. It describes how the business deliver value and enacts its strategy. So, in this article we will be looking at approaches to build your target operating model and how that might translate into implementation. We cannot look at a...

View More Details