Treasury CIO’s big data odyssey
- 02 November, 2012 10:04
The Treasury CIO Peter Alexander.
The Department of Treasury’s CIO, Peter Alexander, has likened the Treasury’s journey of utilising big data technology to classical Greek poet Homer’s epic poem The Odyssey.
Speaking at CeBIT Australia’s Big Data Conference 2012 in Sydney this week, Alexander said that like the events in Homer’s poem, the Treasury’s big data roadmap took a decade to achieve. Its internal big data project is also called Odysseus after the Greek hero of The Odyssey.
Part of the reason the Treasury’s big data odyssey took a decade, just as it took 10 years for Odysseus to return home after the Trojan War, was, according to Alexander, subject to forces beyond his control.
“Without being too unkind to my own organisation, in some ways they were stuck in the mid-1990s where Microsoft Excel [spread sheets] had been used,” he said.
“We have people taking massive data sets from the Australian Bureau of Statistics [ABS], Reserve Bank and other sources which are cut into a set of rows. This meant that we ran out of rows and columns in Excel.”
To solve this problem, Treasury IT staff took a number of Microsoft products and integrated these into Excel to build what is called Odysseus.
“Now what we do is take data from ABS and all the sources we did previously, lay it into a data warehouse and then present it to people in a nice Excel front end,” Alexander said.
“It’s very usable and reduced a number of risks and issues that people might have had in data loading and transformation.”
Big data benefits
According to Alexander, the big data solution has cut report creation time down from one week to almost real-time report creation.
“There are a set of [economic] reports that my secretary takes to meetings,” he said. “With this system, you just push a button and it automatically updates with the new data.
“Lots of senior executives have worked their way up the organisation so they have all experienced having to do that [reporting] task or one similar. It was a nice example of how we can improve productivity through improving technology.”
Turning to the future, Alexander said there would be more expansion in the big data space.
“We’ve got other areas within Treasury where people are still doing manual Excel work so we want to make better use of business analytics,” he said.
In addition, the Treasury is also in talks with other organisations in the federal government who use the same kind of source data.
“We want to build a data warehouse that other federal government organisations can all share,” he said.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
5 Ways To Be More Productive At Work
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
Bell Gully Law Firm Success
Read this whitepaper to find out how one of New Zealand’s oldest leading law firms was able to remove tangible risk to the business and enhance productivity by rapidly deploying an improved fundamental Unified Communication solution.
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.