The challenges of asset management: Part three
- 03 January, 2012 10:00
Just as Woolworths discovered the value of adding a social, self-service element to its asset management, other organisations are finding that long-established systems are ripe for reinvention if they can step outside the typical constraints of the enterprise software mindset and tap into new information management trends. Cloud computing, for example, is emerging as a critical tool in helping organisations improve asset management — particularly in areas such as utilities, where massive infrastructure must be managed down to excruciating detail.
Rural New Zealand electricity distributor, Westpower, has been integrating its EAM system with its geographical information system (GIS) to provide easy correlation of assets and their physical locations, down to the individual tree; this integration smooths production and management of work orders and other operational processes. Queensland electricity distributor, Ergon Energy, is taking the model one step further by kicking off a massive data-capture project that will ultimately improve its EAM by storing 400TB of data — the result of ROAMES, a far-reaching aerial laser mapping project that will update out-of-date maps and measure individual trees near Ergon’s distribution assets — in Google’s Earth Builder collaborative-mapping environment.
It may seem an unusual step to put such critical business information — and so much of it — into the Cloud, and it’s a big step away from the SmallWorld GIS that would normally be given such responsibilities. However, ROAMES program director, James Bangay, says the project will give the company unprecedented visibility of its more than 150,000km of power lines (see Roaming tales, page 44). Not only will Google host and look after the massive volume of data, but its links to a geographic dataset mapping infrastructure will facilitate ‘crowd-sourcing’ of the data by third parties through innovations like the NeatStreets smartphone application, which lets people directly report asset problems. In turn, this is expected to dramatically improve asset maintenance and scheduling, and cut costs by millions of dollars through better focus on things like vegetation management.
That’s the kind of business case you can take to the board — and it’s a case in point as to why CIOs need not be afraid of thinking of ways they can apply new Web paradigms to long-established EAM systems. “We’ve got to find smart ways of solving our problems, and in this case it’s by collaboration” Bangay says. “Our aim is to move things from having to be tied to mapping systems and give them GPS coordinates. Once we create a collaborative environment with the data, anyone can come in and build smart apps on top of that. Doing it in-house simply didn’t meet our objectives.”
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
NetApp FAS6240 Clustered SAN Champion of Champions
Storage systems today must match agility with diversified I/O performance to satisfy an enterprise’s changing needs. In their review, Silverton Consulting ranks the NetApp FAS6240 Clustered SAN, as an Enterprise OLTP “Champion of Champions.” Read the results of their benchmark testing and the features that impressed them the most.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.