• Top of mind: deal integration

    Integration practices have to catch up with an extremely fast-changing technology landscape. Explore how a new approach to deal integration for technology companies offers flexibility.

  • View from the top: December 2014

    The next round of disruptive technology innovations will be even bigger and more intensely competitive, reveals the latest edition of our View from the top report.

  • View from the top: September 2014

    Technology companies are acting fast to take advantage of a hot M&A market, increased confidence and high cash flow.

  • Top of mind: valuation metrics

    Today’s technology landscape is different from that of the dot-com era. M&A is more important than ever to keep up with the pace of change.

  • Cash in the cloud: working capital management 2014

    The leading US technology companies have up to US$58b of cash unnecessarily tied up in working capital. Learn why we expect little improvement this year.

  • Global technology M&A update: 1Q14 highlights

    Global technology M&A had a “blowout” first quarter of 2014. We explore the multiple big-ticket deals and one megadeal the sector witnessed.

  • View from the top: Q413 final view

    Aggregate sales growth eluded the top 100 global technology companies in the fourth quarter of 2013, and for the full year. We explain why.

  • Top of mind: divestiture activity

    Technology company divestitures increased in every quarter of 2013, demonstrating that more technology companies are focusing on portfolio management. Learn why.

  • Global technology M&A update: 4Q13 highlights

    Big ticket transformative deals surged in 2013, driving global technology M&A value to new highs. We explore in our end-of-year review.

Technology

Operating in a new era

Technology is a multifaceted, influential and fluid industry whose executives must manage the art of being agile while focusing on operational excellence and meeting greater consumer demand. Our worldwide team of industry-focused assurance, tax, transaction and advisory professionals has the deep sector knowledge and technical experience to interpret the market and help you compete powerfully.

Key issues in today's technology environment include:


  • Cloud computing

    Is cloud computing transforming the industry?

    The IT services now known as cloud computing have been around for decades, but they never grew beyond a small fraction of total industry revenue. Now, however, their time has come: over the past few years, a dizzying array of hardware and software available as services over the internet has emerged.

    Consumers and businesses have embraced a multitude of cloud services, from mature sales force management services to email and photo editing to the latest smartphone applications and the entire social networking phenomenon. Further, researchers project an imminent inflection point in the adoption of cloud services by organisations both large and small.

    As cloud adoption becomes widespread, its characteristic of enhancing business agility is likely to lead to an increasing pace of change for all industries worldwide. Adding fuel to the interest in cloud computing is that cloud services advance “green” agendas: they allow fuller utilisation of shared infrastructure capacity, thus consuming less power and lowering the carbon footprints of their users versus alternative IT approaches.

    Related content

    Cloud computing issues, impacts and insights

    Cloud computing issues, impacts and insights

    Cloud computing is a fundamental shift that will alter the technology industry power structure and undoubtedly change consumers’ habits and expectations. Make the most of it.

  • Social networking: creating a presence

    Some organisations are creating a presence on social networks to promote products and services and to communicate directly with their customers.

    • But when an organisation creates a profile for this purpose, how does it define and communicate its privacy practices for the information it collects?
    • And how should employees who communicate with customers on an individual basis use the additional personal information available to them from their customers’ profile?

    These are all questions companies using social networks as a sales or promotion tool should be asking.

    Organisations also need to be aware that social media sites can be abused for fraud purposes and that the information that is collected by the site is not in the control of the organisation and will likely end up “living” longer than the organisation intends or expects.

    Policies and training are key 

    It is important that organisations develop and communicate thoughtful policies that address interactions among customers, employees and job candidates. 

    Merely disabling social network use in the workplace is not a sustainable solution 

    The reliance on these policies is especially paramount in an environment where regulatory requirements do not easily align with technology and its common uses. Awareness campaigns and training must accompany the policy changes.

    Related content

  • Information security in a virtual world

    Business is moving into the virtual world as more and more data is transmitted over the internet, and cloud computing, social networking and mobile devices become more prevalent.

    Our 14th annual Global Information Security Survey confirms that information security is one of the most important issues facing organisations today.

    Overall, we have identified three trends with a significant impact on the role and importance of information security:

    • Physical boundaries are disappearing as more business data is transmitted over the internet
    • The pace of change continues to accelerate
    • Companies are moving from the more traditional outsourcing contracts to cloud service providers

    Are you prepared for the risks?

    Related content

    Global information security survey findings 2011

    Global information security survey findings 2011

    If your organization is looking to the past for ways to protect the future, your information security program is already out of date. Get prepared.

    EY - Privacy trends 2012

    Privacy trends 2012

    To achieve greater accountability, many organizations will have to rethink their approach to privacy.

  • Getting information technology right

    Information technology functions need to strike a balance between risk and performance.

    But reality often falls short of this goal.

    That’s because IT’s influence on the business has evolved so quickly that many IT functions are still struggling with how to marry their technical expertise with a new business perspective.

    Top IT leaders are now facing broad challenges, including:

    • Increasingly complex IT and business operating models
    • Cost efficiency and transparency demands
    • New regulations and new forms of threat
    • Corporate responsibility expectations

    Our research suggests that successful firms are focusing on these key issues and formulating their response at the enterprise level.

    Learn more about getting IT right:

    Related content

    EY - Protecting and strengthening your brand

    Protecting and strengthening your brand

    As social media reinvents business relationships, we look at the rise of consumer media, understanding its risks, holistic social media governance, and brand protection.

    EY-Ready for takeoff - Preparing for your journey into the cloud

    Ready for takeoff - Preparing for your journey into the cloud

    Organisations are looking at cloud computing to increase effectiveness of IT initiatives, reduce costs, increase operational flexibility and generate a competitive advantage. Are you prepared?

    Advisory

    Keep pace with change using hybrid IT models

    CIOs increase their strategic value as IT becomes a more critical function in business strategy.

    EY - Advisory

    New risks redefine the role of the CIO

    The pace at which technology is changing is an ongoing challenge for CIOs and presents new risks.

    Bringing IT into the fold

    Bringing IT into the fold

    A coordinated, strategic response that addresses the dynamic nature of cyber-security and the rapidly changing operational technology (OT) environment demonstrates responsible risk management.



Connect with us

Stay connected with us through social media, email alerts or webcasts. Or download our EY Insights app for mobile devices.

EY - CODE_n

Contest seeks big data entrepreneurs

Applications are being accepted for CODE_n14, a global competition for startups innovating in the field of big data. Finalists will present at CeBIT 2014.

Man using technology

Global technology M&A report highlights:

View from the top report:

Click here to view our archive of reports for the above.