Stories by David Braue

“Lazy” humans playing into critical-infrastructure hackers’ hands: POTUS security advisor

By David Braue | 09 May, 2013 16:47

Critical infrastructure operators remain vulnerable to attack from hackers whose motivations have matured from the “pretty juvenile” wanton vandalism of the 1990s to the aggressive, targeted and financially-motivated cyber war being waged online today, a one-time senior security advisor to the US president has warned.

Project portfolio management - Part 3

By David Braue | 10 April, 2012 14:17

Changing market conditions add additional pressure to PPM practitioners: With uncertain economics keeping many companies away from recruiting for now, the resource pool is limited and competition is fierce. In response, PMOs are looking towards increasingly capable PPM platforms that tap into new technologies to maintain their relevance and offer new possibilities.

Project portfolio management - Part 2

By David Braue | 07 March, 2012 14:48

Data-driven project portfolio management Project management suffered an identity crisis half a decade ago, when ever-more-empowered developers were learning to work directly with their business patrons as Agile development philosophies encouraged developers to co-ordinate their activities in tight-knit teams that regularly report, evaluate, reassess and re-plan their short-term strategies.

Project portfolio management - Part 1

By David Braue | 05 March, 2012 15:58

It’s never easy to bring two organisations together, but when they’re both huge companies with millions of customers and deeply entrenched cultures, the difficulty level goes up dramatically. Throw in the pressures of Australia’s cutthroat telecommunications industries, and it’s no surprise that Chelsea Love looks back on the consolidation of Vodafone and Three Australia with some relief.

The challenges of asset management: Part three

By David Braue | 03 January, 2012 10:00

Just as Woolworths discovered the value of adding a social, self-service element to its asset management, other organisations are finding that long-established systems are ripe for reinvention if they can step outside the typical constraints of the enterprise software mindset and tap into new information management trends.

The challenges of asset management: Part two

By David Braue | 30 December, 2011 10:00

Whether your company is maintaining physical infrastructure under contract or simply managing field assets as part of an ongoing business, the heightened role of asset management information systems has been well established as part of the CIO’s responsibility.

The challenges of asset management: Part one

By David Braue | 28 December, 2011 10:00

If you have never considered how much data it takes to keep a toll road running, a brief chat with Barry King may give you pause for thought.

Building the new service management: Part three

By David Braue | 16 December, 2011 10:34

Sometimes, providing the ideal customer service means ditching what you’re doing and simply starting over.

Building the new service management: Part two

By David Braue | 15 December, 2011 13:48

All sorts of businesses are revisiting IT service delivery as traditional internecine rivalries give way to a push towards a future built around a common infrastructure with mutually understood metrics.

Building the new service management: Part one

By David Braue | 14 December, 2011 11:08

One of the Asia-Pacific region’s largest beverage distributors, Coca-Cola Amatil (CCA), maintains an extensive fleet of distributors and manages a complex supply chain that stretches from one side of the country to the other.

Security must change with service management: UXC Consulting

By David Braue | 18 October, 2011 07:32

Security managers must break down their walled-garden mentalities and integrate security deep into the heart of increasingly flexible, BYO computing-driven IT service management (ITSM) environments or risk data death by a thousand cuts, a systems and security consultant has warned.

HTC breach a reminder on mobile security

By David Braue | 07 October, 2011 15:58

It's hardly the kind of thing any company wants attached to its name, but HTC's rapid acknowledgment of confessed "serious" security exploit, discovered and published this week by security researchers, may ultimately help deflect criticisms and will, regardless, serve as a valuable reminder to CSOs that mobile devices represent a new and still-evolving security threat within the enterprise.

Laptops walking out the door of policy-free firms

By David Braue | 06 October, 2011 14:24

Concerned that your employees are being a bit lax when it comes to looking after their laptops? Steal them yourself, one vendor has advised in the wake of yet another damning security report that suggests laptops and other equipment are literally walking out of Australian companies that are still operating at far below world's best practice when it comes to device security.

Supply chain management in Australia - Part 3

By David Braue | 21 September, 2011 07:00

As if data quality and stockouts weren’t enough of a day-today worry for CIOs, added pressure to serve demanding online customers and keep up with changing legislation are creating new challenges. With several retail giants lumbering online and the looming introduction of the government’s new carbon tax, CIOs need to be working with procurement, financial and other business leaders to ensure supply-chain systems are up to today’s new challenges.

Supply chain management in Australia - Part 2

By David Braue | 20 September, 2011 06:00

If supply chain experts can spend so much time and effort improving efficiency and still have more work to do, how are smaller companies meant to get their supply chains right? It’s not as if they have been standing still: CIOs at FMCG organisations and other companies of all sizes have long focused on using high-end supply chain management solutions to trim fat from their company supply chains. Many embarked upon massive enterprise resource planning (ERP) implementations a decade ago as they stared down the end-of-life of existing systems and the spectre of the Y2K bug. Yet while their intentions were good, the same can’t be said for the methods of resolution.