Defence to review systems integration strategy
- 31 August, 2010 12:31
The Department of Defence's peak technology strategy arm has started running the ruler over its cohort of technology suppliers as it considers establishing a new procurement panel for applications and systems integration services.
"The Chief Information Office Group (CIOG) is currently reviewing its strategy for sourcing ICT applications and systems integration services, including the potential to establish a Panel for these services, which would create deeper relationships with industry to rapidly support upcoming demand," an a statement posted on the Federal Government's tendering system said.
Defence has invited Australia's technology sector to respond to a discussion paper it has produced on the subject, and has directly contacted several of its contractors on the matter.
"The information obtained from this market research will assist CIOG in defining its requirements and determining its approach for sourcing ICT applications and systems integration services," Defence wrote.
Like other large government departments such as the Australian Taxation Office, Defence more or less constantly has some large purchasing or technology refresh project under way.
For example, on the software front Defence gave existing partner, Red Rock, the go ahead to upgrade its ailing human resources platform PMKeyS, in a project that will also involve the integration of another HR system, the Central Reserve Pay System.
On the desktop front, it kicked off a long-awaited program to overhaul the way it provides desktop services to about 115,000 users, issuing a landmark request for tender document on the matter to suppliers.
In July the department confirmed plans to upgrade its 90,000 desktop PCs from version 6 to version 7 of Microsoft's Internet Explorer web browser.
And this is all while other purchasing initiatives have been under way. For example, in May Defence confirmed that it had awarded a core IT services contract to Fujitsu — the existing supplier, courtesy of its acquisition of former Telstra subsidiary, KAZ.
Finally, in July Defence revealed it had inked a new 10-year lease agreement with datacentre specialist Global Switch.
It's not clear which of those initiatives — and others — are included in the review which Defence's CIO Group under chief information officer, Greg Farr, has kicked off. One thing is clear, however; it is not showing all of its cards just yet.
"CIO Group is not under any obligation to consider, use, or incorporate any feedback, comments or information provided through this market research," the department wrote on the procurement site. "This market research should not be considered as an invitation to register interest or a request for tender."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Accelerate Cloud and Composite Application Delivery
Are your requirements the need for faster release cycles, you have reduced budgets required to run and manage a complex test environment, and you want to decrease your third party expenses? HP Service Virtualisation, designed to enable your teams to create, develop and test against virtual services that simulate real service behaviour with no constraints, available anytime.
Key Factors in Modernising Backup and Recovery
There is a definite need for better data protection solutions in today’s enterprise data centres. The question is whether to continue with software-only backup and recovery solutions, or to make the move to a purpose-built backup appliance with de-duplication capabilities. This paper discusses the trends that have made modernising backup and recovery an urgent priority. Click to download.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.