START UP SUCCESS: TIPS FOR PERFECTING YOUR PITCH AND SELLING TO BIG BUSINESS DECEMBER/JANUARY 2014

IS TECHNOLOGY THE CAUSE OF CAR CRASHES? OR THE CURE? PLUS OVERCOMING RESISTANCE TO SELF-DRIVING CARS

> TOP ICT TRENDS FOR 2014 > 3D PRINTING FOR BUSINESS INNOVATION > MOBILE: AN ERGONOMIC NIGHTMARE!

CONTENTS Information Age December/January 2014 | 3

Gartner: the top 10 IT changing 16 predictions for 2014 What’s your The consultancy’s list of what will affect the ICT industry in the near future. new year’s 26 Five ways to prepare for wearable devices at work resolution? The technology industry has a new challenge after smartphones and tablets in the workplace: wearable computing. Get set for new tech 3D printing adds new dimension 36 to innovation Amid the consumer hype, companies are using the machines for product development. 29 Do’s and don’ts for tech start-ups When launching a new product, these common mistakes could cost start-ups valuable opportunities. 31 Perfect pitch How start-ups should sell to the enterprise. Information Age December/January 2014 | 4 CONTENTS

6 Focus on professionalism a feature for Tate As he comes to the end of his term as ACS president, 44 All in the mind Nick Tate reflects on some of the highlights of his time User-centric computing now requires more than in office. lip service.

19 Is technology the cause of car 46 There’s no vacation from fitness crashes or the cure? Going on holiday? That’s no excuse to stop working Are smartphones and other tech products unfairly out with apps and gear for exercising anywhere. targeted for deadly car accidents? 48 Surprise: mobile devices don’t 22 Get the message right help office ergonomics Bruce Thompson, from Victoria’s Department of Getting a move on is good, but understand the Environment and Primary Industries, shares his limitations of devices as you do so. tips for working to tight schedules and the power of communications. 52 Introducing the smart chair A new flexible office chair has been designed 24 So you’re studying IT? for mobile workers. Six women from the University of NSW discuss why they chose a career in IT. 54 Guide to organisational change management 33 Making the move to Agile A new guide aims to help ICT professionals Changing organisational culture is crucial to helping understand the psychology of change management. your company adopt Agile methods. 55 Ethics: be safe, be social 39 Remote chance The privacy implications of social networking systems The use of teleworking in Australia is increasing even such as . while many businesses lack written agreements. 58 7 top wishes of project managers 41 Bosses without borders If you could have three project management-related Staying connected to telecommuters has never been wishes, what would they be? easier with these tools for managing remote workers. 60 11 sure signs you’ve been hacked ...And what to do about it. Information Age December/January 2014 | 5 CONTENTS

DEPARTMENTS 7 CEO’s column 8 Editorial 12 ACS Foundation update 64 New members 68 Australian answers: students create device to digitise mileage recording

ACS NEWS 9 Brenda Aynsley elected ACS president for 2014-2016 Nick Tate awarded honorary life membership ACS Queensland Fellows lunch Australia crowned F1 in Schools World Champions 2013 Indigenous Business Australia builds technology skills with certification 2014 challenge: skills shortage

VIEWS 13 Misconceptions rife with self-driving cars 14 Trust me, I’m a... 15 For geeks, avoiding blame is a silent career killer Interview : ACS president Information Age December/January 2014 | 6

FOCUS ON PROFESSIONALISM A FEATURE FOR TATE As he comes to the end of his term as ACS president, Nick Tate reflects on some of the highlights of his time in office. By Deanne McIntosh

he problems facing the US government’s healthcare.gov site Engagement are a good example of the need to campaign for profession- Tate’s presidency has occurred during some interesting times, most Talism in ICT, outgoing ACS president Nick Tate says. recently navigating a change of federal government, something he The site was supposed to introduce Americans to a new era of says the ACS has taken in its stride. “We work with both sides of health insurance, and before the launch, Americans were promised government,” he says. “It’s about policy not politics. Our role is to be Membership enhanced it would allow them to compare various insurance offerings. Instead, a trusted and impartial advisor on what’s best for ICT professionals Closer to home, Tate highlights a number of ways the ACS has the project went so awry and the site functioned so poorly that very and the industry.” worked to improve its offerings to members. For one, he thinks the few people were actually able to sign up. One area where the ACS has helped take a lead in facilitating move to take Information Age online and mobile is a step forward. US president Barack Obama was forced to apologise for poor major industry discussion is the Cloud Computing protocol. Early He also pointed to closer ties with the ACS Foundation to give performance and the government hastily set about repairing both the in 2013, the government asked the ACS to manage a consultation students a membership targeted at starting their careers in ICT, technical and public damage. process with the cloud industry and with cloud users and potential along with professional indemnity insurance for university students According to Tate, these high profile failures have an effect on the users. Stakeholders from government, education and industry as earning less than $25,000 per annum in ICT consultancy fees, credibility of the ICT industry and underscore the ACS approach to well as businesses and consumers were invited to share their views offering coverage of between $10,000,000 and $20,000,000. promoting professionalism. “We need to constantly push the require- and expertise to create the protocol. ment for ICT projects to be managed by ICT professionals,” Tate says. Tate says the ACS had, along with other industry organisations, Opportunities “It is the only way to reduce the risks.” encouraged the federal government to join the Open Government According to Tate, the industry has a great deal to look forward to in It that context, Tate says he is pleased to see that membership of Partnership. “We advocated for Australia to join the partnership,” he the future. “If we look at what’s happening, we see the emergence of the ACS has grown, along with the number of Certified Practitioners says. “It means more data is opened up to let SMEs build applica- new roles, such as user experience gurus, as well as the significant and Certified Technologists. tions that will be helpful to citizens.” requirement for data scientists,” he says. “There’s huge and con- “There’s so many great ICT projects going on but the high profile He also pointed to the ACS’s role in SEARCC, the South East tinuing demand for ICT professionals.” failures are big and visible, and it’s so important for us to counter Asia Regional Computer Confederation, as a highlight of his time in The challenge, of course, is supply, he says. “We need to help that message with the focus on professionalism and give the public office. “Last year we held the SEARCC conference in Sydney and it bridge the gap in available ICT professionals. Our universities are greater confidence in ICT projects.” was very successful.” doing a fine job in training but we can help both in encouraging To that end, the ACS has recently acquired the exclusive rights to Tate, who was also SEARCC president for 2012-2013, believes young people to enter the industry and helping ICT professionals use help companies and individuals with SFIA accreditation in Australia. involvement in the confederation allowed for useful discussions in professional development to move into those new roles.” The MySFIA online tool helps ICT professionals benchmark their the region around professionalism and certification. Or as Tim Berners-Lee said during his ACS-sponsored visit to skills against a global framework and work towards certification and Sri Lanka, for instance, has established a SFIA accreditation Australia early 2013 – another highlight for Tate – “We need more map potential career pathways. scheme. people to code, especially girls.” ACS CEO’S COLUMN Information Age December/January 2014 | 7

PROVIDING LEADERSHIP

The ACS is ideally placed to help Australia to increase professionalism in the ICT industry, to the greater benefit of the country and our region. Alan Patterson MACS (Snr), CEO, ACS

any of us would be familiar with the technical infrastructure organisations is also an essential element in increasing confidence supply chain, the outcome of which is enhanced trust in the in the decisions and outcomes that technology can and will deliver. Mquality and integrity of goods and services which is in our Our national university accreditation program also sets us apart national interest and for the public good. However, it is increasingly from other organisations in the sector and positions us as the leading important given the growth of the services sector and global supply professional association in ICT internationally. chains, and the ubiquitous use of technology, that these concepts Today there is recognition of the need to move towards partner- and the role that professional associations such as ACS has to play ships and to deliver the benefits these partnerships between across them is better understood. individuals in their work context can bring – either to staff, the Professional associations are the fulcrum on which individuals, organisation or to customers. Because we have such strong industry and government can pivot to achieve mutually beneficial relationships with industry and active members, we are now taking outcomes. In the context of ICT, the ACS is uniquely placed to a closer look at professional development in the context of individual achieve this, given our position as the only national, vendor-neutral, and organisational partnerships including $10 million worldwide P/I cover for those entrepreneurs independent, not for profit peak industry body and the breadth and The idea that professional development (PD) can be rolled out earning less than $25k per annum, removes a barrier for local depth of our members’ expertise across all elements of the technical in a ‘cookie cutter’ approach will not win business anymore. To that start-ups. infrastructure ecosystem. end, we have created bespoke professional development tailored to The key debates about ICT are focusing on skills, and the ACS We are recognised as a senior member of the standards commu- meeting needs of our members and partner organisations. has demonstrated leadership in Australia across our public policy nity, partnering with Standards Australia to ensure the ICT industry So what else is new in ACS over the last 12 months or so? research and advocacy to governments and industry. Internation- standards operate at the highest level. And, as an independent We are expanding the digital library to 4000 short videos covering ally, we continue to demonstrate leadership in creating and authority, able to provide world-class, third-party attestation, both technical and non-technical issues, and we have increasingly moved promoting regional approaches to developing the ICT profession and skilled migration applications in ICT and professional certifications, to develop and expand our online PD, including short courses and professionalism. we help set benchmarks for standards of practice, demonstrated vodcasts. Some other highlights include enhanced channels of com- So what does the future hold for the role of professional associa- ongoing professional development and ethical behaviour. munication via social and digital media, and work to streamline our tions? Well, there is no clear answer and I’m not much chop with a The development of professional standards is an essential mech- pathways to full professional certification. crystal ball. But if we continue to innovate and think laterally and we anism in a deregulated environment, reducing technical barriers to We also refreshed our offering to students this year, giving the listen and become increasingly relevant, we will continue to grow. trade, and ACS has a critical role to play in this space. Domestically, next generation of innovators and leaders a membership that is And, in true partnership with our members, organisations and creating a demand for such standards in and by government and valuable and attainable at just $60. This offers great value and, by government, we and the whole community will prosper. EDITORIAL Information Age December/January 2014 | 8

GET MOVING Can new tech gear help this desk-bound worker find the impetus to get on her feet?

s Australia moves into the Summer holiday season, we’ve put days doesn’t give a lot of opportunity for racking up the steps. I have together a package of stories that address some of the ways been inspired by the Fitbit to do a bit more, however, and the notifica- Atechnology is changing the way we work and live. tions when I’ve almost reached the 10,000-step mark certainly help One area that won’t be new to readers is the surge in mobile use, to engage the competitive spirit! but did you know that stepping away from the desktop has many Even if you don’t want to buy an additional fitness device, we have ergonomic challenges? some suggestions for apps to take your fitness routine with you these INFORMATION AGE Contributors to this issue This is something I find enormously frustrating: I am either many holidays on page 46. Most of the options are under $10. President and Publisher: Nermin Bajric, Ann Bednarz, Adam Bender, Byron Connolly, Michael Cooney, Christina Susan Searle, [email protected] hours at my desk (not good for fitness or health) or hunched over my Of course, we have other articles to take you into 2014, including des Marais, ,Roger A. Grimes, EDITORIAL Paul Glen, Sarah Jacobsson Purewal, David notebook or iPad (not good for my posture). Some of my friends have two that focus on tips for start-ups, if that is your goal for the new K. Johnson, Shona Leitch, Jennifer Lonoff Editor: Deanne McIntosh, Schiff, Lucus Mearian, Zach Miners, Robert standing desks and even walking desks to break the sitting habit and year (page 29). We also have a look at how workplaces can prepare [email protected] J. Mullins, Colin Neagle, Silvia de Ridder, Production Manager: Rajiv Roy, Ernest Stabek, Matthew Warren, I’d love to hear if your workplace has introduced similar measures. for wearable devices (page 26) and the how user-centric computing Mike Gee, [email protected] Lamont Wood. Art Director: Lee McLachlan © Copyright 2014 IDG We take a look at the issue on page 48. There’s lots of good can help businesses (page 44). Communications. ABN 14 001 Photographer: Ian Sharp tips for dealing with this ergonomic challenge. I will certainly Our cover story on driving tackles one of the thorniest issues to 592 650. All rights reserved. ADVERTISING Reproduction in whole or in part be working on using the suggestions for walking meetings and do with the intersection of life and technology. The accepted wisdom Cherry Yumul, [email protected] in any form or medium without express written permission of IDG Communications (02) 9902 2756 scheduling calls for when I can be walking. Do you think this is is that gear such as smartphones is increasing the number of is prohibited. Copyright on works submitted Managing Director: Davy Adams by ACS members is retained by the original practicable? It’s worth a shot! distractions that lead to accidents. But could technology also make owner.

One company in the US has even created a chair that deals with us better and safer drivers? That’s the promise and a wonderful goal Information Age is the official publication of the Australian Computer Society Inc (ACT) and is produced on their behalf by IDG Publications. different postures users adopt when working on different devices. You to reach for. Have a great Summer and stay safe! Australian Computer Society President: Nick Tate CEO: Alan Patterson can read about it on page 52 as well as watch a video of it in action. Level 11, 50 Carrington Street, Sydney NSW 2000 P: (02) 9299 3666 E: [email protected] www.acs.org.au www.acs.org.au/infoage I recently aquired a Fitbit device and was shocked to see how few Deanne McIntosh ARBN: 160 325 931 Copies are distributed free to members of the ACS. All material in Information Age is protected under the Commonwealth Copyright Act 1968. steps I take. I’m sure I’m not alone here, as working at a desk most editor YOUR INDUSTRY : ACS News Information Age December/January 2014 | 9

Brenda Aynsley elected ACS president for 2014-2016 Brenda Aynsley has been elected to the ACS presidency and will commence her two-year term on 1 January, 2014. ACS president Dr Nick Tate paid tribute to his successor. “Brenda is an exceptional member of the ACS who has dedicated much of her time to the advancement of the ICT profession in South Australia and across the nation,” Tate said. “She will be an inspiring leader for the organisation as it continues to grow in membership and relevance.” Tate also reflected on his time as president. “It has been a singular honour to lead the Society,” he said. “We are a great organisation made so by the strength and talent of our members, volunteers and staff. I want to thank all of those who have supported me in my role.” Nick Tate awarded Aynsley said she was honoured to lead the ACS at this critical time in the evolution of the digital economy, particularly in Australia, honorary life membership where the need for professionalism in ICT is more pressing than Dr Nick Tate, outgoing president of the ACS, has been awarded ever. honorary life membership in recognition of his exceptional “As president-elect I would like to acknowledge the work of service to the Society, its members and the ICT profession. the current president, Dr Nick Tate, and the ACS management Tate joined the ACS in 2004, rising quickly to be appointed committee, congress, boards and branches.” a Fellow of the ACS just two years later. Since 2008, he The new management committee of the ACS (see the table) will ACS president for 2014-2016, Brenda Aynsley. has served on the management committee of the ACS as a take effect on 1 January, 2014. congressional representative, then as treasurer and most recently as president. SUCCESSOR FROM 1/1/2014 INCUMBENT POSITION His achievements within the profession have also seen him Brenda Aynsley Nick Tate President serve as chair of the World Computer Congress held in Brisbane Nick Tate Anthony Wong Immediate past president in 2010, and as president of the South East Asian Regional Yohan Ramasundara Yohan Ramasundara Treasurer Computer Confederation in 2013. Anthony Wong Doug Grant VP membership Throughout his presidency, Tate has played a pivotal role in securing the ACS as the lead agency in the development of a Rathika Suresh Rathika Suresh VP community consumer cloud protocol and has overseen the establishment of Paul Bailes Paul Bailes VP academic the ACS Future Leader’s Institute. Jo Dalvean Peter Palmer National congressional rep Tate holds a Bachelor’s degree in physics from the University Vladas Leonas Michael Driver National congressional rep of St Andrews, a Masters in computer science and a PhD in Michael Hawkins Ian Wells National congressional rep IT security. He is currently the director of the Research Data Storage Infrastructure project at the University of Queensland. Arnold Wong Arnold Wong National congressional rep YOUR INDUSTRY : ACS News Information Age December/January 2014 | 10

F1 in Schools winners A1 Racing celebrate their ACS Queensland world final victory. Fellows lunch ACS Queensland held its annual Fellows lunch in November to recognise existing Fellows and to welcome new Fellows. The new Queensland Fellows announced at the event are Alex Stefan and David Denham. Denham was presented with his Fellows certificate and badge by Christine Cornish FACS. Over the past four years, Barry Garard FACS, chairman of the ACS Qld Fellows committee, has successfully processed 22 distinguished professionals through to Fellows. Following the Fellows presentation, attendees were entertained by guest speakers Dr Kelvin Ross FACS and ACS president Dr Nick Tate FACS. Fellows lunch sponsors BCI Technology and Dialog were represented by ACS Fellows Christine Cornish and Bob Tisdall respectively.

Australia crowned F1 in Schools World Champions 2013 Australian students have taken out five major awards, including first place and the Bernie Ecclestone Trophy, at the F1 in Schools World Champions 2013 world finals in Austin, Texas. A1 Racing, a collaboration of students from Phoenix P-12 Community College in Ballarat, Victoria, and Pine Rivers State High School in Queensland, are the new F1 in Schools World Champions. A1 Racing defeated 38 teams made up of students from 30 nations, including the might of the USA, Germany and England, to become world champions. Motion Racing from Engadine High School in Sydney won the award for the Best Team Display and was also nominated as a finalist in the Best Verbal Presentation, two of the five major areas judged. “This year there was an incredibly high standard of work and it made it very difficult to judge,” Andrew Denford, founder and chairman of F1 in Schools, said. “A1 Racing shone out from their rivals and deserved all their success and the world champions title.” Australia’s third team, Odyssey, was a collaboration between students from Brighton Secondary College in Adelaide and students from Donabate Community College in Ireland. These students only met the day before the competition began but had collaborated virtually for months prior. Odyssey won the award for the Best International Collaboration and the Best Team Portfolio. Defence Materiel Organisation’s (DMO) CEO, Warren King, congratulated the teams on their success. “It is crucial to the future of the From left, Christine Cornish, ACS president defence sector in Australia that high school students are made aware of career opportunities in project management, engineering and Nick Tate, David Denham, Chris Bridge, ACS Qld design through activities such as the F1 in Schools program,” he said. BEC chairman. “I am encouraged that Australian students are not only embracing the program but are excelling on the world stage.” DMO has been a national sponsor of Re-Engineering Australia’s F1 in Schools Program since November 2008. YOUR INDUSTRY : ACS News Information Age December/January 2014 | 11

Indigenous Business Australia builds technology skills with certification Indigenous Business Australia has strengthened its technology capability with Skills Framework for the Information Age (SFIA) accreditation awarded to six ICT staff. The certificates were presented by Jeff Mitchell, chairman of the Canberra branch of the ACS. The ACS has acquired the exclusive rights to facilitate SFIA accreditation in Australia. The training required for certification is delivered through a course tailored to each individual, known as mySFIA. IBA saw the value of mySFIA as an online tool for staff to be able to manage their skills throughout their careers. Having those skills formally certified by the ACS enables the IBA to benchmark its capability with industry and understand the types of tasks that can be completed by staff. “Benchmarking my skills using mySFIA helped me identify my capability, and plan my development,” recently certified IBA expert Ronae Camaggi said. Alan Patterson, ACS CEO, welcomed the certification of IBA staff. “This is a clear demonstration of the strength and importance of certification, particularly with regards to skills in the technology space,” he said. “That IBA has chosen to go down the path of SFIA is a great show of support for the certification framework, and gives me confidence that other government bodies will soon follow suit and give the public the confidence that certification brings.” 2014 challenge: skills shortage 2014 will hopefully see Australian and international companies, particularly in oil, gas and mining, move projects from the back-burner to reality, but the problem will be finding the right people, ACS Canberra chair Michael Collins, managing director of Command Recruitment, said. Jeff Mitchell introduces “Technical specialists can be in very short supply, particularly in sub-sea engineers, piping CIO of Defence, Dr Peter engineers, project engineers with SURF and pipe-laying experience, process design, systems Lawrence, keynote control process testing and project management,” he said. morning speaker at The problem is the cyclical nature of the business, Collins said. When the global market booms the ACS Canberra everyone wants specialists all at once, which can put pressure on wages and deadlines. Collins said local Conference. he has seen some local businesses pay enormous penalty rates for delays because they couldn’t The Conference find experienced staff and complete projects on time, not forgetting the inflated salaries that certain attracted over 220 ICT specialised skill sets can demand. professionals from “When the cycle turns and there are [fewer] projects on the horizon, these specialists go Canberra and interstate overseas,” he said. “Then, when the projects gets green-lighted, no one is available.” as well as overseas The only option is to pay inflated salaries to tempt people back to Australia, especially in oil and visitors from South gas where Australia is currently competing with a busy cycle overseas. Africa and New Zealand. Command has recently been included in the Department of Immigration and Border Protection’s The 2013 conference on-hire labour agreement to source talent from around the world. theme was Your World, According to Collins, this agreement sits on top of the 457 regime and requires Command to Our World, Informing undertake market testing to ensure people with the required skills are not already in Australia. your world, Governing “We have to make sure there is no person in Australia that could undertake the task,” he said. your world. “This way you don’t get the type of rorting some people, during the election campaign, suggested takes place.” ACS FOUNDATION UPDATE Information Age December/January 2014 | 12

CREATIVITY AND INNOVATION: THE PASSPORT TO AN INTERNATIONAL CAREER By John Ridge

n inspiring story from the progress of this year’s iAwards lack of confidence in using electronic devices and technologies. has come to my attention. It tells so comprehensively the “We hope the potential for this app will be recognised so we can potential for our society when it can benefit from the input of release it commercially,” he said. “Not only does it give sufferers A Jose Alvarado (with certificate), Huihyon You those young people whose passion is technological innovation. the ability to monitor their own health, but it is of great advantage to and Adriansyah are presented with their Colombian-born Jose Alvarado has always been curious about neurologists as it assists them to keep track of multiple patients. WAiTTA award by John Ridge (right). how things work: how you can use this to solve that. He was drawn to “Parkinson’s sufferers often have frustratingly long waits to visit study ICT because he wanted to explore how you can apply everyday their neurologist but our solution brings patients closer to their recently completed his undergraduate studies in computing science technologies to solve real world problems. doctors. Minor changes can be detected, in a timely way, and that will and software engineering at ECU, has been offered an Honours posi- Alvarado and fellow international ICT students from the School prevent possible complications. Neurologists can remotely adjust the tion in 2014 to undertake a research project in ICT security issues of Computing and Security Science at Edith Cowan University (ECU), tests and medications. and hopes to continue to a PhD. Huihyon You and Adriansyah, have developed a Parkinson’s iTest app “Anyone with a tablet and internet connection can download our He saw the potential for an Australian university to put him in the that helps sufferers to trace the progression of this neurological disease. app, test their progress and share the results with their neurologists. right place with the right people as he dreams of creating a company Parkinson’s is a relentless condition that Australia’s 65,000 suf- It has worldwide application.” to develop his own high quality mobile applications and cloud ferers must deal with every day. By creating this app, Alvarado hopes Alvarado also pointed out that the app would become even more technologies products. to provide them with more confidence about their health and keep useful as Australia’s population ages and the number of people with Alvarado’s story also, unfortunately, fits with Australia’s reluc- them connected to their carer network. The project’s genesis was Parkinson’s increases. tance or inability to commercialise great innovations. his concern over the lack of continuity of care between the health Safety, security and privacy are key in the health arena, as we’ve ECU was very helpful and encouraging in the development of professionals treating his grandmother for Parkinson’s. seen in the development of the government’s eHealth initiative. Given the project while the group was completing undergraduate studies. Parkinson’s patients can use the app to monitor their symptoms the sensitivity of medical data, the app ensures test results are kept And many sufferers and aged care facilities have registered their at home, on their own tablet or smartphone. Its tests were developed secure and backed up via cloud technology. Only those authorised interest on the project’s website to test the app and participate in its in conjunction with Robert Broadway, an IT engineer who himself has are able to retrieve files. And there’s the added benefit of safekeeping successful development. But, and it’s a big but, the time, effort and the disease. They measure muscle rigidity and tremors by assessing patient data, should they lose their device. resources to continue improving the app must now be met by the a series of simple fine motor exercises such as finger tapping and I’m thrilled that the ECU team, mentored by the university’s Dr individual members of this young team who have enough on their spiral movements that require coordination and control. Crucially, Mike Johnstone, won the tertiary student category of the WA Infor- plates as they juggle to find work and maintain their studies. the saved results can then be sent to the patient’s clinicians for mation Technology and Telecommunications Award (WAiTTA) in June To find out more, or to contact Alvarado, go to review and shared with families and carers. 2013. And their achievements were further recognised when they www.parkinsonitest.com or email [email protected] Alvarado told me that when designing the Parkinson’s iTest app, went on to win that category in the national iAwards in August. or [email protected]. lengthy consideration was given to not only the physical strictures of Alvarado’s story is typical of the success of our international the disease but the compounding factors of age, failing eyesight and student programs and its potential for our society and economy. He John Ridge, AM, is executive director of the ACS Foundation. Views : technology trends Information Age December/January 2014 | 13

Misconceptions rife with self-driving cars By Lucas Mearian

s the development of self-driving car technology moves ahead, “There are a lot of people who enjoy driving under the rightToday, cir- there are predictive emergency braking, adaptive cruise control a growing faction in the blogosphere says it will refuse to let cumstances, but there’s also a lot of driving that’s grunt work,”and David lane departure warning systems that act to assist drivers for safety, but Aits driving independence be usurped by a computer. Alexander, an analyst at Navigant Research, says. “Under thosedo not cir- take away a person’s ability to control the overall driver experience. In one game site discussion, comments ranged from, “They’ll take cumstances, the challenge is to stay awake and not bump into“What’s the important to understand is the definition of autonomous the steering wheel out of my cold, dead hands...” to “I’m not trusting cars in front of you.” vehicle,” Alexander says. “It’s an autonomous functionality available a robot to drive a car for me in a long time.” More importantly, backers say autonomous car tech willin reduce the car. It’s not going to mean the cars will be completely automatic A 2012 survey of British drivers commissioned by Bosch, a Germany- accidents and enable those who are physically unable to driveand today you’re not going to be able to do anything. It’s a bit like having based supplier of automotive components, found that most would not to get behind a wheel, so to speak. cruise control in the car, but not everybody uses them.” buy a self-driving car. Only 29 per cent of respondents said they would “[Autonomous car technology] has the potential to change the very consider buying a driverless car and only 21 per cent said they would nature of vehicle ownership,” Alexander says. “I believe it will bring feel safe as a passenger in a self-driving car. The results were vastly independence to people, not take it away.” Lucas Mearian covers storage, disaster recovery and business continuity, financial services infrastructure and different depending on whether the respondents were men, women, A Navigant report forecast that by 2035, healthcare ICT. Follow him on at @lucasmearian. younger or older. It found that 36 per cent of men would consider buying more than 95 million self-driving cars will a self-driving car, but only 20 per cent of women felt the same way. be sold worldwide every year. In that year, And 52 per cent of 18- to 34-year-old respondents would consider an sales of autonomous vehicles will represent autonomous vehicle. 75 per cent of all light-duty vehicles sold, the Bosch, which has invested heavily in driver assistance tech, also Navigant report states. found that 34 per cent of respondents believe driverless cars would Alexander says he’s aware of the negative reduce accidents. online comments about autonomous cars, Automakers such as GM and Volvo, and even tech companies such but compared them to people who rallied as , are developing autonomous vehicle technology that will one against the automatic transmission in its day let cars and trucks automatically navigate roadways. early days. In fact, Google believes that self-driving or autonomous cars will The public view of automated cars, Alex- be a reality in short order. ander says, suffers from misperceptions. Google co-founder and special projects director Sergey Brin said in For example, if a driver wants to take the 2012 that self-driving cars will be a reality for “ordinary people” in less wheel, they’ll likely be able to disable the than five years. Among car makers, General Motors has said it plans to automated function. Also, many technolo- introduce a semi-automated driving system in the Cadillac line in 2015. gies now in development are aimed more Proponents of the technology say it will allow commuters or long- at offering assistance to drivers, not fully haul truckers to make better use of their time on boring trips. automating vehicles. Views : careers Information Age December/January 2014 | 14

Trust me, I’m a ... By Silvia de Ridder

want you to think about someone you trust most. What words comeintensely personal. As a leader, the willingness to have emotional to mind when you think of that person? Now, think of someone youhonesty about these and other issues in the workplace increases Itrust least. What words come to mind? the trust your team has in you and the commitment they have to What would it take for you to trust that person again, and how doesyour agenda. that apply when you may have lost the trust in your relationships – Self-orientation.The additive effect of credibility, reliability and inti- personal, staff, team, management, suppliers, clients? macy is affected by how much others perceive someone is acting There are two schools of thought with regards to trust – some say primarily out of self-concern. If others believe someone is building it should be earned and the other that you have trust until it is broken. a ‘relationship’ primarily to serve his or her own interests – i.e., to Either way, the elements that make up that term we call trust advance his or her career, to manipulate a situation for advantage WHAT DO DO would be similar. without regard to the goals, needs and struggles of others, to reject Take a look at a relationship that may be challenging In their book The Trusted Advisor (Touchstone, 2001), authors Maister, responsibility and blame others – trust is destroyed, the relationship for you. Which of the elements of the trust equation Green and Galford discuss the trust equation, a formula for building is seen as disingenuous and engagement and commitment plummet. needs work by you? sustained relationships with others. Relationships are key to success Self-orientation is about motive. To what degree have you developed a ‘real’ both personally and professionally. Examples of high self-orientation include: relationship with people in your life, personally The trust equation is: and professionally? • A tendency to relate stories to self Ways to build trust: the 5Cs Credibility.Credibility has two components. The first is how much• A need to appear clever and witty Commitment: take time to give support, look for others believe your words and actions. The second is to what degree• An inability to provide clear, direct answers solutions, have a “Yes I can do that” attitude. Consistency: do people know what to expect from you know what you are talking about. Credibility is about words. • An unwillingness to confess lack of knowledge you? If you change your mind, do you let others Reliability. Reliability is about whether you do what you say you are• Name dropping know? You can show your consistency by matching going to do. Do you walk the walk and talk the talk? Do you follow• Tendency to want to have the last word words and deeds. through on promises and follow up on commitments? Reliability is• Passive listening Caring: spend time getting to know others as a about action. • Treating someone as merely a source of data. person and take a genuine and caring interest. Competency: invest in yourself and others and Intimacy is the ability to create a personal connection. How secure or continually improve yourself. safe does someone feel in discussing a difficult topic or agenda withSources: Communication: above all communicate with you? Intimacy is about emotion. The Trusted Advisor by David H. Maister, Charles H. Green, Robert M. Galford people. Bring them along. Be prepared to say you As a leader, this does not mean that you need to share your privateRebuilding Trust by Lea Brovedani do not know. life or dwell on the private lives of your people. It means recognising As you start the new year and reflect on your that work is a personal place and issues like career development, relationships, both personal and professional, Silvia de Ridder is an “engineer of human excellence” and director of Unconscious Potential, an organisation promotions, compensation, reorganisations, hiring and firing are what one change can you make to build trust? specialising in supporting technical specialists to step into the role of high-performing leaders. Views : careers Information Age December/January 2014 | 15

For geeks, avoiding blame is a silent career killer By Paul Glen

here’s a silent killer attacking the careers of technical people.avoiding blame happens long before things go wrong. Here, you position It runs rampant through organisations, destroying the futureyourself to be immune to blame, thus demonstrating that avoidance is Tjob prospects of even the most talented geeks. They end upa primary concern even when nothing has gone wrong. This is usually sidelined, passed over for promotions or laid off. Sadly, this killer canexpressed through “CYA” behaviours like officiousness, unnecessarily lead us to engage in some self-destructive, dysfunctional behaviours.rigid adherence to process or preemptive defensiveness. You’ll say I’m talking about the all-too-common compulsion to avoid beingthings like “Don’t blame me when this falls apart” or “I’ll be happy blamed for anything. (And if the thought “I would never do that”to change the colour of that button after you submit a change order.” just passed through your mind, you are doing it without even being Although this version usually doesn’t give people the impression aware of it.) that you’re immature, it does radiate self-centredness. And worse, Nearly every geek has some degree of this tendency. It’s just part itof not only gives the impression that you are more concerned with our DNA, inextricably intertwined with the reasons we chose technicalprotecting yourself than doing good work, it also ensures that the work in the first place. We love problem-solving and finding the rightimpression is accurate. If you focus your creative energy on avoiding answer. Conversely, we hate being wrong. blame, you have less creativity to focus on your work. The desire to avoid blame shows up at work in three distinct behav- So how do you get out of this trap? The first step is to recognise iours, none of them helpful. that you’re in it. This can be hard, since blaming yourself can be the most painful blame of all. Being defensive.When things go wrong and you say something like, Once you’ve accepted that you engage in blame avoidance, you can “Hey, it’s not my fault,” you send a number of negative messages alldo two things to break the habit. First, you can recognise the impulse at once. You sound petulant and immature, like a kid who just knockedand choose a different response. Second, you can ask colleagues over a lamp. And you seem more concerned with yourself than theto privately point it out. Just telling them that you want to work on it work or other people. Rather than discussing how to make thingsgoes a long way. better, you’re focused on your image, without realising what a poor No amount of technical talent can overcome the career damage of image this conveys. blame avoidance. If it has infected your career, you owe it to yourself and your colleagues to address it right away. Blaming others.Another dysfunctional response to things going wrong is to blame other people. “Hey, Sandy chose that platform, so don’t blame me.” Here again, you sound immature and self-centred. But this time it’s worse. You also sound disloyal to your colleagues. Paul Glen, CEO of Leading Geeks, is devoted to clarifying the murky world of human emotion for people who Preventing blame. The most subtle, pervasive and insidious form ofgravitate toward concrete thinking. Technology : trends Information Age December/January 2014 | 16

Gartner: the top 10 IT changing predictions for 2014

Gartner has announced its always interesting and sometimes controversial look at what the consultancy thinks will affect the IT arena in the near future.

By Michael Cooney

ome of the technology trends are not new – the so-called Internet The top 10 strategic technology trends for 2014 as Gartner sees of Things and cloud computing for example – but there are some them are: Shot new areas like 3D printing and software defined networking that will be having an effect on ICT sooner rather than later. Mobile device diversity and management These changes are due in no small part to the fact that by 2020, there By 2018, the growing variety of devices, computing styles, user contexts will be up to 30 billion devices connected with unique IP addresses, most and interaction paradigms will make “everything everywhere” strategies of which will be products. “This creates a new economy,” Gartner analysts unachievable. The unexpected consequence of BYOD programs is a say. “Gartner predicts that the total economic value add for the Internet of doubling or even tripling of the size of the mobile workforce. Enterprise Things will be $US1.9 trillion dollars in 2020, benefiting and impacting policies on employee-owned hardware usage need to be thoroughly a wide range of industries, such as healthcare, retail, and transportation.” reviewed and, where necessary, updated and extended. Most compa- Gartner’s vice president David Cearley says four powerful forces – nies only have policies for employees accessing their networks through social, mobile, cloud and information – continue to drive change and devices that the enterprise owns and manages. Companies need to set create new opportunities, creating demand for advanced programmable policies to define clear expectations around what they can and can’t infrastructure that can execute at web-scale. do. Balance flexibility with confidentiality and privacy requirements. Technology : trends Information Age December/January 2014 | 17

Mobile apps and applications Smart machines Gartner predicts that in 2014, improved JavaScript performance will By 2020, the smart machine era will blossom with a proliferation of begin to push HTML5 and the browser as a mainstream enterprise contextually aware, intelligent personal assistants, smart advisers (such application development environment. Gartner recommends that devel- as IBM Watson), advanced global industrial systems and public avail- opers focus on creating expanded user interface models including richer ability of early examples of autonomous vehicles. The smart machine voice and video that can connect people in new and different ways. era will be the most disruptive in the history of IT. New systems that Apps will continue to grow while applications will begin to shrink. begin to fulfil some of the earliest visions for what information technolo- Apps are smaller and more targeted, while a larger application is more gies might accomplish – doing what we thought only people could do comprehensive. Developers should look for ways to snap together apps and machines could not – are now finally emerging. Gartner expects to create larger applications. For the next few years no single tool will be individuals will invest in, control and use their own smart machines optimal for all types of mobile application so expect to employ several. to become more successful. Enterprises will similarly invest in smart The next evolution in user experience will be to use intent, inferred machines. Consumerisation versus central control tensions will not from emotion and actions, to motivate changes in end-user behaviour. abate in the era of smart-machine-driven disruption. If anything, smart machines will strengthen the forces of consumerisation after the first Software-defined anything surge of enterprise buying commences. Software-defined anything (SDx) incorporates various initiatives like OpenStack, OpenFlow, the Open Compute Project and Open Rack, 3D printing which share similar visions. As individual SDx technology silos evolve Worldwide shipments of 3D printers are expected to increase by 75 and consortiums arise, look for emerging per cent in 2014 followed by a near doubling of unit shipments in standards and bridging capabilities to 2015. While very expensive “additive manufacturing” devices have benefit portfolios but challenge individual been around for 20 years, the market for devices ranging from $500 Developers should look for technology suppliers to demonstrate their to $500,000, and with commensurate material and build capabilities, ways to snap together apps commitment to true interoperability stand- is nascent yet growing rapidly. The consumer market hype has made ards within their specific domains. While organisations aware of the fact 3D printing is a real, viable and cost- to create larger applications openness will always be a claimed vendor effective means to reduce costs through improved designs, streamlined objective, different interpretations of SDx prototyping and short-run manufacturing. definitions may be anything but open. Vendors of SDN (network), SDDC (data The Internet of everything centre), SDS (storage), and SDI (infrastructure) technologies are all The Internet is expanding beyond PCs and mobile devices into enter- trying to maintain leadership in their respective domains. Vendors that prise assets such as field equipment, and consumer items such as cars dominate a sector of the infrastructure may only reluctantly want to and televisions. The problem is that most enterprises and technology abide by standards that have the potential to lower margins and open vendors have yet to explore the possibilities of an expanded Internet broader competitive opportunities, even when the consumer will benefit and are not operationally or organisationally ready. Imagine digitising by simplicity, cost reduction and consolidation efficiency. the most important products, services and assets. Technology : trends Information Age December/January 2014 | 18

Hybrid cloud and IT as service broker The era of personal cloud Bringing together personal clouds and external private cloud services The personal cloud era will mark a power shift away from devices is an imperative. Enterprises should design private cloud services with toward services. In this new world, the specifics of devices will become a hybrid future in mind and make sure future integration/interoper- less important for the organisation to worry about, although the devices ability is possible. Hybrid cloud services can be composed in many will still be necessary. Users will use a collection of devices, with the ways, varying from relatively static to very dynamic. Managing this PC remaining one of many options, but no one device will be the composition will often be the responsibility of something filling the role primary hub. Rather, the personal cloud will take on that role. Access of cloud service broker (CSB), which handles aggregation, integration to the cloud and the content stored or shared from the cloud will be and customisation of services. Enterprises that are expanding into managed and secured, rather than solely focusing on the device itself. hybrid cloud computing from private cloud services are taking on the CSB role. Terms like “over-drafting” and “cloud-bursting” are often Web-scale IT used to describe what hybrid cloud computing will make possible. Web-scale IT is a pattern of global-class computing that delivers However, the vast majority of hybrid cloud services will initially be the capabilities of large cloud service providers within an enterprise much less dynamic than that. Early hybrid cloud services will likely be IT setting by rethinking positions across several dimensions. Large more static, engineered compositions (such as integration between an cloud services providers such as , Google and Facebook are internal private cloud and a public cloud service for certain functionality re-inventing the way in which IT services can be delivered. Their or data). More deployment compositions will emerge as CSBs evolve, capabilities go beyond scale in terms of sheer such as private infrastructure as a service (IaaS) offerings that can use size to also include scale as it pertains to external service providers based on policy and use. speed and agility. If enterprises want to keep pace, they need to emulate the architectures, Cloud/client architecture processes and practices of these exemplary If enterprises want to keep Cloud/client computing models are shifting. In the cloud/client archi- cloud providers. pace, they need to emulate tecture, the client is a rich application running on an Internet-connected Gartner calls the combination of all of the practices of exemplary device, and the server is a set of application services hosted in an increas- these elements Web-scale IT. Web-scale IT ingly scalable cloud computing platform. The cloud is the control point looks to change the IT value chain in a sys- cloud providers and system of record and applications can span multiple client devices. temic fashion. Data centres are designed with The client environment may be a native application or browser-based; an industrial engineering perspective that the increasing power of the browser is available to many client devices, looks for every opportunity to reduce cost mobile and desktop alike. Robust capabilities in many mobile devices, and waste. This goes beyond re-designing facilities to be more energy the increased demand on networks, the cost of networks and the need efficient to also include in-house design of key hardware components to manage bandwidth use creates incentives, in some cases, to minimise such as servers, storage and networks. Web-oriented architectures allows the cloud application computing and storage footprint, and to exploit the developers to build very flexible and resilient systems that recover from intelligence and storage of the client device. However, the increasingly failure more quickly. complex demands of mobile users will drive apps to demand increasing amounts of server-side computing and storage capacity. Michael Cooney is the online editor of Network World. Technology : wearable computing Information Age December/January 2014 | 19

Is technology the cause of car crashes or the cure? totalled my car when I was 16. Here’s what happened: it was the middle of the day, and I was listening to Ithe car radio while driving. I started fiddling with the radio while I headed toward an intersection with a The conventional wisdom says green light. The second I looked down at the radio, the smartphones cause deadly car light changed. By the time I looked up, I was sailing accidents, and Google Glass is already into the intersection. My car smashed into a brand-new getting banned. But what are the facts? car crossing from my right. Upon impact, both cars slid toward a corner, pinning a third car against the curb. I was lucky. Nobody was hurt. Insurance paid for everything. But I learned a lesson that would keep me By Mike Elgan from ever getting into another car accident: distracted drivers are dangerous. Technology : wearable computing Information Age December/January 2014 | 20

So let’s ban gadgets for drivers, right? And this bias itself might be dangerous. My beef is with the bias against technology. If looking at In August 2013, director Werner Herzog released a docu- More advanced technology might very well help to a screen is illegal, why not cite every driver using a GPS? mentary about the dangers of texting while driving called reduce distraction-related car accidents. And why is the law biased against “screens”? How are From One Second to the Next. In the film, Werner cites digital displays more distracting than analogue knobs, the US National Safety Council’s figure that texting The fervour to criminalise Google Glass buttons and controls? while driving causes 100,000 accidents per year. The most advanced technology I use is Google Glass. And why are electronically based distractions banned For that claim to be true, it would also have to be It’s so advanced that it doesn’t even exist yet, at least as while non-electronic ones are not? true that 100,000 accidents have been added to the total a generally available consumer product. Let’s say there’s an accident and police find in the number of accidents that have occurred for other reasons. Various people with anti-technology biases can’t wait wreckage a newspaper, a radio, a GPS device, a passenger, Looking from that perspective, it’s a harder argument to ban Glass for drivers. For example, it has already a half-eaten sandwich and a smartphone with a recent to make. Since 1996, accident rates in the US have gone been formally banned in the UK. In late 2013, a woman incoming text. They’ll probably attribute the cause of down from one year to the next every year except two. in San Diego named Cecilia Abadie was ticketed for the accident to texting while driving, for no other reason So as first mobile phone use and then texting on wearing Google Glass while driving. (She was also than a bias against technology. mobile phones grew more common, the number of ticketed for speeding.) accidents in the US went down. Where are those extra The cop didn’t make up a law against wearing Glass. A surprising discovery 100,000 accidents? They’re hard to find in the overall He fined her for a real law that essentially makes illegal Remember the “hang up and drive!” movement, with statistics. the use of any kind of video screen while driving. associated bumper stickers? Before texting was as popular It seems possible to me that it’s the distracted drivers (Abadie claims that she wasn’t using such a screen as as it is now, everyone was apoplectic about the distraction (like the 16-year-old me) that cause accidents; the acci- Glass was off.) caused by talking on mobile phones. dents are not caused by whatever object it is that distracts I can’t know the particulars and neither can the police However, a study conducted by the Carnegie Mellon those drivers. In other words, yes, distraction by text officer. It’s almost certain that he doesn’t actually know University and the London School of Economics analysed messaging causes accidents, but those same distracted whether her Glass screen was on or not. It’s far more more than eight million car accidents and road fatalities drivers would probably find something else to be dis- likely that he pulled her over, saw Glass, experienced a of all kinds, looking for (among other things) correla- tracted by if they weren’t texting. moment of what journalist and professor Jeff Jarvis calls tions between drivers talking on mobile phones and the I’ve seen people texting while driving, but I’ve also “techno panic” and cited her for being distracted by her accidents. To their surprise, they found no correlation. seen people reading the newspaper, putting on make- advanced technology. When the number of phone calls went up, for example, up, eating food, poking at GPS devices, arguing with the number of car accidents did not go up. passengers, reaching into the back seat to interact with This study suggests that it’s possible that our assump- children, lighting cigarettes and so on. tions about technology may be wrong. And the impulse Drivers who do those things are careless about atten- to ban super advanced technology, such as Google Glass, tion, don’t understand the risks or simply don’t care. may be wrong as well. I think making laws that minimise accidents caused by distracted drivers is a good idea. However, I’m bothered What if Google Glass is the solution? by an obvious bias against technology. It seems like the Google Glass has already The UK ban on Glass was enacted without evidence more advanced the technology, the stronger the bias. been banned in the UK for drivers. or study. In fact, to the best of my knowledge, without a Technology : wearable computing Information Age December/January 2014 | 21

single report of Glass causing a single accident. Mean- That might be true of a smartwatch, too. With your VICTORIAN CORONER CALLS while, the distractions I listed earlier are known to have hands at the 10 and two positions on the steering wheel FOR TOTAL MOBILE PHONE BAN caused fatal car crashes, yet they remain perfectly legal. and your eyes on the road, you could mentally register In this argument, Google Glass is a surrogate for two an incoming alert to the watch with a tiny turn of your Victorian Coroner Heather Spooner has recom- mended that a ban on mobile phones extend to broad categories of technologies that will soon be widely wrist and a half-second glance. If this action replaces hands-free use. Spooner also suggested VicRoads used: wearable computing devices and heads-up displays. fumbling for a phone, picking it up, sliding on the investigate technology that will block drivers from Within three years, millions of people will be using screen and looking down at it, then the world might using their phones while driving. wearable computers – mostly smartwatches – while be a safer place. The recommendations came after a November 2013 they drive. Many people will want to wear Google Advanced technologies like high-end smartphones, inquest into the death of Melissa Ryan, who died when her Volkswagen Golf GTI was hit from behind Glass as well. Google Glass and smartwatches can also know you’re by a truck on the Monash Freeway in January 2011. Cars will increasingly get heads-up displays, where car driving, and behave accordingly. Ryan’s family believe the crash was due to a mal- and contextual data – including data fed from the driver’s My Moto X smartphone, for example, auto-switches to function of her car but evidence by police officers smartphone about texts and other notifications – will voice mode for some notifications when it detects I’m in at the inquest suggested drivers talking on mobile appear not on the dash, but overlaid on the edges of the the car. If I get a text in the car, the phone asks whether phones can slow down dramatically due to distrac- tion. According to the truck driver, the car slowed windshield itself. Some luxury cars already have this. I want it to read the message aloud. If I do, I can just but he didn’t see any brake lights. Victorian police These heads-up displays are better because they’re say “send text” and the phone will reply with a message told the inquest that they did not find a hands-free less distracting; you can be perceive them with your from me telling the other person that I’m driving and kit installed or phone holder in Ryan’s car. peripheral vision, rather than having to take your eyes I’ll contact them later. At the inquest, Spooner ruled out any systemic off the road to look at them. Or even if you do actually It’s almost certain that wearable technologies will do safety issues with the car and said authorities should review road laws in light of research that “has shown glance at the display, the distance your eyes travel is this, too. the risk of crashing while using hands-free is equal shorter than it would be with other technologies, so the Even more than that, they will probably be able to to that of handheld use of mobile phones”. road remains in your peripheral vision while you take alert drivers to obstructions ahead and other hazards. note of the information. Overall, they may reduce distractions and improve And this is precisely the argument for why a driver safety. wearing Google Glass may be safer than one who isn’t So let’s all resist the urge to ban new distractions wearing it. Glass doesn’t cover the eyes. Worn while because they’re new. Let’s keep an open mind, and base driving, the display is significantly higher than, say, the laws on fact and reason, rather than bias and techno rearview mirror. Your vision is unobstructed and, unlike panic. It’s very likely that drivers careless enough to be a mirror, Glass can be moved with a simple movement distracted are the root cause of accidents blamed on of your head. texting while driving. Google Glass information is hyper-simplified and The best solution would be to invent a better driver. short, and you can perceive it either without taking your (Google’s working on that, too.) But in the meantime, eyes off the road or with a glance that’s quicker than, for let’s consider the possibility of a better distraction. example, reaching down and looking at the phone on the passenger seat, as millions of people now do every day. Mike Elgan writes about technology and tech culture. Interview : government Information Age December/January 2014 | 22

Get the message right

Bruce Thompson, deputy secretary for corporate services at the Victorian Department of Environment and Primary Industries, shares his tips for working to tight schedules and the power of communications. By Ernest Stabek

ruce Thompson is deputy secretary for corporate Starting on May 12, the primary objectives were to services at the newly formed Department of Envi- have the newly created department ‘open for business’ Bronment and Primary Industries (DEPI), a major on July 1, and to define the corporate services’ role. Victorian government department employing more than There are a thousand and one things to do to but the 3500 staff in more than 100 locations. priorities were branding and identity, accommodation Prior to joining DEPI, Thompson was CIO at the master planning, an information strategy to support the Department of Sustainability and Environment (DSE). new departmental approach and operating model, and He has many years’ executive experience in the public systems integration (merging two existing departments sector in Victoria and Queensland. is a Noah’s Ark scenario – there’s two of everything). In this exclusive interview with ACS, he shares with We also worked hard on clearly and tightly defining the us his experiences as an ICT leader within the Victorian role of corporate, which we’ve scoped as only those tasks government thus far, and gives us an insight into his that need to be performed consistently and uniformly broader role as a deputy secretary of a major government right across the enterprise, and based on four fundamental department. roles – planning, enabling, compliance and reporting.

What did you plan to do when you came into the role? Looking back, did you achieve all you wanted? There were big shoes to fill – the former deputy secre- Yes, mostly. We were open for business on July 1 at more tary, Dr Gillian Sparkes, had made DSE’s corporate than 100 locations across Victoria. I’m very proud of services a highly efficient and well-respected group. It the achievements across the Corporate Services Group was important for me to continue Gill’s high standard – Finance & Planning, People & Culture, Information of leadership and innovation, and to shape that excel- Services, Legal Services, Communications, and Busi- lent platform to deliver the new departmental agenda, ness Operations. Branding and identity is crucial to the resulting from the merging of the former Department development of a constructive organisational culture, of Primary Industries and the former Department of and accommodation is also critical for both morale and Sustainability and Environment. operational performance. The core business systems Interview : government Information Age December/January 2014 | 23

have been resolved to the point we can support busi- In practical terms the top priorities are: the right message for the audience, or if the message ness as usual, and we are scoping the required levels of • Systems integration (decommission, reduce costs, sent isn’t the message received. efficiency and performance. We’re still working through simplify); the nitty gritty of the information strategy – pulling • Delivery of a single, authoritative information What advice do you have for CIOs or ICT leaders aspiring together existing capabilities and services, looking for source as the base for improved regional service to move up the leadership ladder? synergies, and ensuring we’re fully aligned to the busi- delivery. We have both the opportunity and the Mostly common sense – things that we all know, but ness drivers – but close to moving from planning to obligation to equip our regional staff to be more don’t seem to keep in focus as consistently as we ought: operations. This strategy is something we have to get effective and responsive, so we must provide them 1. Get sponsorship/ownership at chief executive level. right – a solid shared authoritative information platform with the tools they need; and 2. Work on business initiatives, not ICT projects. is fundamental to the department’s developing service • Identifying transformational change opportunities. 3. Develop role clarity – the business should own what needs delivery model, particularly as we have a strong and to be done, but the CIO should own how it is delivered. broadly distributed regional presence. What is the greatest challenge in terms of risks and 4. Use the business to establish requirements for con- opportunities from the DEPI perspective and as a former tinuous improvement, but perhaps not for transforma- What are your top priorities now? And what do you plan DPI CIO to delivering the recently announced Victorian tional change. External influences may be necessary for to do in the next three to six months that will make a ICT strategy? transformational change. significant difference? The ICT strategy is a great opportunity to coordinate and 5. Don’t look to technology first. I don’t know who to DEPI priorities are productive communities and a direct ICT resources across government to greater effect. credit, but the 60 per cent, 30 per cent, 10 per cent healthy environment. These two priorities are to be The big opportunities lie in common whole-of-Victorian- priority rule for people, processes and technology seems delivered within the broader requirement of improving government systems and services. The big challenges are right to me, in terms of both issues and solutions. service delivery, particularly for regional Victoria. Our developing an integrated and cohesive forward plan, and 6. Look for the opportunities to stop doing some things. secretary has identified six transformational projects in coordinating investment and development cycles. The This is usually at least as valuable (and as difficult) as support of these priorities, so it’s been a time of incredible business case for many whole-of-government initiatives driving the case for investment. activity and quite stimulating debate at and across all (not just in Victoria) are weakened by agency investment 7. Work hard on and leverage communications capabili- levels of the department. We’re excited about delivering cycles and timeframes. ties to build support, report progress and demonstrate the government’s ‘one-stop shop’ approach to regional achievement. service delivery and the services required to support You have had a pretty full-on time of it and it is early days local decision-making and operations. Along with this, yet. Any lessons to share? What would you like to say to the members of ACS? it’s important for me and DEPI’s senior executives to It’s a big jump for me, and has meant a change in The current combination of a tight fiscal environment be visible and accessible to staff, as we’re learning a lot approach. I’m learning from my colleagues and peers and the productivity opportunities arising from ‘digital about what’s required to meet our goals. daily, and hopefully I’m improving my performance. only’, cloud and other ICT capabilities means this is a We also have a set of whole-of-Victorian-government Biggest lessons are: good time to be in the ICT sector. Take the opportunity objectives in respect of reducing fiscal pressures through • Build a team that can do the job, then step back and to leverage your professionalism and expertise, for your both continuous improvement and transformational let them do it; and organisation’s and your own career development. change, and developing greater capability across the • Get the communications right. The best efforts and public sector. performance are devalued if the message sent isn’t Ernest Stabek is vice chair of ACS Victoria and chair of its policy and government relations committee. ICT industry : careers Information Age December/January 2014 | 24

So you’re studying IT?

Six women from the University of NSW discuss why they chose a career in IT. Byron Connolly ICT industry : careers Information Age December/January 2014 | 25

t’s one of the fastest growing industries in the world, yet the information technology sector is dominated by men at just about every level. I The vast majority of chief information officers in Australia, executives at the peak of their careers, are male. In fact, women make up just 20 per cent of the total ICT workforce in Australia, compared to 45 per cent in all occupations. This low number of women is even hampering the supply of skills in Australian IT. And despite more than 50 years of technological innovation, many women still believe technology careers are for socially awkward, geeky males in dark rooms fixing computers. The reality, however, could not be more different. In an age of social networking, mobile apps and the emergence of companies like Google and Facebook, which have literally changed the way people interact and learn, the tech sector is more exciting than ever. But will this level of excitement and innovation attract more women to the industry?

It just might as more women seem to be pursuing careers in IT. In 2013, 52 per cent of students studying IT at the UNSW are women. This compares to 51 per cent in 2012 and 52 per cent in 2011 – numbers that were unheard of 20 years ago. We spoke to some students to see this change in action. In the first group interview, Jasmine Chau, Jenny Yang and Michelle Tandjung, who are studying IT at UNSW, provide insights into what drove them to pursue a career in technology, how to best close the gender gap, and why working in IT is a wise choice. Chau is working as an analyst at Origin Energy while studying, Yang is an informa- tion security analyst at Westpac ISG, and Tandjung is an analyst at Deloitte. In the second group interview, we speak to Kimberley Jacinto, Carine Ma and Gabriela Coronel. Coronel is also working as a business analyst at Merck, and Ma is working as a product manager at Atlassian.

Byron Connolly is the editor of cio.com.au. BYOD : wearable computing Information Age December/January 2014 | 26

Five ways to prepare for wearable devices at work Just when ICT execs are getting a handle on how to accommodate employees’ personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge: wearable computers. By Robert J. Mullins

earable devices are just starting to trickle into the marketplace, but now is the time for enter- Wprises to start thinking about how to control these new gadgets and also how to leverage them. Besides Google Glass, due out sometime in 2014, other companies are already selling smartwatches, some of which sync with a smartphone that a customer already owns, so some of the smartphone functions can be used on the wearable. While the initial appeal of the wearables will be to consumers, it’s inevitable that, like smartphones and tablets, buyers will want to use wearables at work. “This is a very natural continuum of what we’ve seen for a long time in terms of this notion of ubiquitous computing,” Bret Hartmann, CTO for the security group at Cisco, says. “We can take these lessons we’ve BYOD : wearable computing Information Age December/January 2014 | 27

In order for MDM apps to work on wearables, the operating learned in the broader `bring your own device’ space, … and the starting point is to think about how the wear- how enterprises have dealt with that, and apply them system vendor needs to offer able devices are to be used in their organisation.” to wearables.” APIs to modify the app While that’s the basic approach, a lot of work still lies 2. Explore MAM instead of MDM ahead to make sure mobile device management (MDM) Taylor says. “If Google were to put a full set of APIs in An emerging alternative to mobile device management software that enterprises deploy on smartphones and Android, and they do have that, not all mobile device is mobile applications management (MAM), in which tablets extends to wearables. manufacturers implement those equally because of the the enterprise only seeks to manage the work-related Here’s some advice for enterprises preparing for the latitude Google has given the manufacturers.” applications and let the employee also use their personal advance of wearables: Such Android APIs aren’t yet available, but Google apps on their device unfettered, according to Ahmed appears to be working on it. Datoo, vice president of product marketing at Citrix for 1. Talk to your MDM vendor “Once we make our GDK (Glass developer kit) avail- Xen Mobile, the company’s MDM platform. Mobile device management software lets a company able, MDM vendors should be able to use it to write their “You don’t actually manage the device; you only establish security and privacy rules on mobile devices software to run on Glass,” a Google spokesperson says, manage the enterprise apps on the device,” Datoo says. designed to protect business data and applications when declining to indicate when that might be. A fitness enthusiast, he has already bought two brands they are run on a smartphone or tablet, whether they are Apple, meanwhile, controls both the mobile OS and of smartwatches – first the Jawbone Up and then the company-issued or owned personally by the employee. the device, making it more likely that MDM-related APIs FitBit Flex – that monitor his vital signs and send the The issue is whether MDM software running on an would be available throughout the Apple platform, Taylor data to his personal smartphone. existing mobile device will automatically run on a wear- says. Apple hasn’t announced any wearable products yet, “I’ve got 100 apps on my device, 90 are personal able. The answer today is, not yet. but speculation is that it will introduce an Apple pair of and only 10 are work-related.” As with smartphones In order for MDM apps to work on wearables, the glasses like Google Glass and some kind of smartwatch, and tablets, the enterprise can accommodate personal operating system vendor needs to offer APIs to modify dubbed the iWatch. wearables in the workplace and just manage those 10 the app to run on wearables, and device manufacturers Enterprises will want to make sure MDM apps work apps he says. need to implement those APIs in their devices, says Bryan on wearables if they want to accept them into the work- Mobile application management is just one more Taylor, a research director at Gartner. place, because it’s still not certain what the security risks solution to the issue of melding of work and personal Take the case of Google, which is developing Google might be, Angela McIntyre, another Gartner research computing. Wearables will add another wrinkle. Glass, and whose Android operating system will power director, says. According to a recent survey conducted by Ipsos the Samsung Galaxy Gear smartwatch unveiled in “There could be residual images left on the wearable MORI, the issue of work done on personal devices and September. devices that might need wiping out if they were very personal computing done of work devices is murky. The “In the case of Android, it’s up to the device manu- secret,” she says. “Enterprises are starting to think about survey found that 44 per cent of US office workers using facturers themselves what APIs they’ll make available,” what these wearable devices mean for their corporations company-issued devices download personal software onto BYOD : wearable computing Information Age December/January 2014 | 28

Many companies have written policies governing when them, while 52 admit to storing, sharing and working cameras can and cannot be used in the workplace. An on company documents on their personal devices. cameras can and cannot be used example could be a test lab where new products are in the workplace being designed. Some companies may already have rules 3. Address both sides of security worries prohibiting camera phones from being taken into such Initial worries about mobile devices in the workplace came Citrix MAM software, and most likely that of other places. McIntyre says just to be on the safe side, compa- from the enterprise, and concerned whether proprietary vendors, sees into the work-related apps, but only detects nies should update those policies to apply to wearables, company information or personal customer information what personal apps are on the device, not the data write them down and add employee training to reinforce could be exposed if they’re beyond the control of the inside them. the policies. corporate network. But the reverse is also potentially a problem as some 4. Trust but verify 5. Look for opportunities employees worry that if they use their personal gadgets, The catchphrase made famous by former US president Rather than worry about the potential problems with particularly wearables, at work, that their personal infor- Ronald Reagan in regards to arms control negotiations wearables, companies should embrace the possibilities of mation could be exposed to their employer. with the Soviet Union also applies to enterprise accom- the technology. Several reports and analyses of wearables “What’s different is that with wearables, because they modation of wearables. describe multiple use cases where wearables can make are intended to be part of your everyday life, there is a This comes into particular focus when it comes to workers more productive. bigger and bigger mix of your personal life and your cameras on the new wearables. Both the Google Glass Imagine an aviation mechanic working on a Boeing 747 work life,” Cisco’s Hartmann says. and Samsung Galaxy Gear products will come with still with a pair of wearable glasses displaying the schematics While some people carry two smartphones, one for and video cameras. While people are used to being wary of the particular part of the plane he’s working on. work and the other for personal, it wouldn’t be practical of smartphones and tablets with cameras, some may be A doctor could be examining a patient while the display for people to have two pairs of Google Glass, for instance. unaware that the new gadget their co-worker is wearing shows test results she ordered for the patient. “In a wearable context, that’s not going to work,” can take pictures, too. A service dispatcher for a pay TV provider could he says. “You can’t be swapping them out. It just puts While Cisco’s Hartmann says it is feasible for device determine which field worker is closest to a customer more pressure on this sort of collision course between cameras to be disabled in certain areas for security requesting a service call. my personal private life and my corporate life. reasons, many organisations will simply trust their “Often times, IT jumps to security and control and “It’s even more important for IT departments to make employees to know when to not use the cameras. how do I lock this down,” Datoo says. “But they miss sure [wearables] are set up and configured because the “Enterprises are starting to think about what these the bigger point, which is let’s start by talking about risks will just grow greater and greater.” wearable devices mean for their corporations and the how these things are actually going to change business While Citrix’s Datoo has heard the same concerns leading ones are considering updates to their security for the better.” from users about their boss seeing what’s on the personal policies,” Gartner’s McIntyre says. side of their device, he believes the fears are unfounded. Many companies have written policies governing when Robert J. Mullins is a technology reporter who has covered Silicon Valley since 2000. Start-ups : strategy Information Age December/January 2014 | 29

Do’s and don’ts for tech start-ups

When launching a new product, these common mistakes could cost start-ups valuable opportunities. By Colin Neagle

he DEMO Fall 2013 conference in October pro- vided more than 40 start-ups the opportunity to Tlaunch. For some, it may have been the first step toward massive success. Some major names in the tech industry, such as VMware, E-Trade and .com, began their rise to prominence with a brief pitch at a DEMO conference in the past. However, a lot of start-ups make the same small mis- takes when launching. Start-ups : strategy Information Age December/January 2014 | 30

These aren’t the kinds of mistakes that will necessarily to remain in the dark until they launch, but they’ll with advertising will cheapen the presentation, and could cause a young company to fail, but rather the kinds of have to understand that doing so could mean passing dissuade people from paying attention. mistakes that just make it more difficult for a start-up up free publicity. to get the publicity that could be so valuable early on. 4. Do prioritise the most relevant information Wherever you pitch your new idea, here’s how to fine- 2. Don’t use industry jargon and buzzwords This has more to do with how a pitch is constructed, but tune the message for a smoother launch. While keywords are important to get a product noticed could make a big difference in getting an audience hooked. online, a pitch that is weighed down with jargon and One demonstrator pitched a photo-sharing app for the 1. Don’t hide everything about your company buzzwords will only distract from the message. enterprise, and did so by explaining some use cases as Many companies reserve these large start-up-centric One demonstrator at DEMO simply listed buzzwords examples. The first was a retail store manager sharing a events for their debut, remaining in stealth mode right that apply to the product – “mobile-first, cloud-based,” photo of an empty product display with employees, along up until they get on stage and introduce themselves to and so on. Those terms might apply to the product, but with a message instructing them to re-stock its shelves. A the world. While that might make sense for a company they’re used in that same sequence so often that, in the photo, however, isn’t really necessary in this use case. The with an exact launch date, keeping the press completely constant stream of tech-related announcements and press manager could just tell employees which display needed in the dark prior to the launch may cost a start-up some releases, they start to lose meaning. to be re-stocked over the phone, or even face to face. opportunities for coverage. If a product is in fact mobile-first or cloud-based, a Later in the demonstration, the same presenters For example, DEMO collects demonstrator informa- more useful way to get that point across is to explain why showed a photo in which a manager in a similar use tion to provide to members of the press ahead of the those aspects matter to the consumer. Explaining that case shared a photo of a retail display with a message event. It’s meant to give the press some information “because it’s cloud-based, it has this benefit” will resonate telling employees that all displays should look like the on the demonstrators before they launch, sometimes in with more people than simply rattling off buzzwords. one in the photo. This is a much more relevant use order to write pre-show content on which companies case. The manager would have an easier time showing seemed the most interesting. 3. Don’t sound like an infomercial employees how something should look than describing Some companies provide little to no information on Similarly, several demonstrators employed some phrasing it to them. The part of the demonstration that showed their company websites, limiting it to a splash page with in their demonstrations that seemed like it had been the product’s value to its customer based was buried, a company logo and a tag promising that more informa- ripped from a late-night infomercial. After explaining a and due to the brief nature of a DEMO pitch, it ended tion is “coming soon!” Others use vague language that handful of a product’s features, one demonstrator said up being rushed. may sound good for advertisements but doesn’t provide “and that’s it… but wait, there’s another thing,” before This demonstration was hardly the only one to bury any hint as to what the products might do. One such proceeding to explain another feature. Another demon- the most important information, but it’s a good example company described its product as aiming to “level the strator began the pitch by saying “our app is a… sorry, of how that could happen. It was a reminder of how playing field” in the market and “revolutionise the brand- words won’t suffice. Let’s show you how it works.” important it is to put the most pertinent information to-consumer channel through mobile”. How exactly the These are the kinds of tactics that seem good in about a product front and centre, because otherwise a product would accomplish that was never made clear. writing, but don’t translate well when put into practice lot of potential customers may not see it at all. Basically, the press can’t write about something they during a pitch. A pitch should be a demonstration, not don’t know anything about. Some companies may want an ad. Using terminology that most people associate Colin Neagle covers emerging technologies and the start-up scene. Follow him on Twitter @ntwrkwrldneagle. Industry : entrepreneurs Information Age December/January 2014 | 31

Perfect pitch

How start-ups should sell to the enterprise. By Colin Neagle

he DEMO series of business conferences is all about start-ups However, some start-ups have been able to sell to enterprise customers pitching their new products, but a panel discussion at the recent after taking an alternative route. Yammer, for example, was mentioned Tevent turned the tables, with CIOs telling start-ups what they during the panel as a company that gained traction with lower-level can do to win business in the enterprise. employees, often without the knowledge of the CIO. Once Yammer The panel was moderated by CITEWorld editorial director Matt started to attract attention from executives, it embraced CIOs and Rosoff and featured Dish Network CIO Mike McClaskey, BDP Interna- scaled to meet their needs, satisfying both an enterprise customer’s tional global CIO Angela Yochem, EchoSign co-founder Jason Lemkin, users and decision makers. and Workday strategic CIO Steven John. Similarly, McClaskey mentioned the opportunity afforded through Citing the growing reach of technology into new departments of consumer technology outlets, such as the Google Play and Apple App the enterprise, Lemkin said that buying decisions for technology all Stores. Almost all CIOs use multiple devices that access these outlets, eventually come back to the CIO. Even though other areas of the and if they come across a potentially useful enterprise technology while company may make small or even moderately sized purchases, CIOs using a personal device, they’re more likely to seek more information may take note of the vendors that circumvent them when making the about it later on. sale, and could block them from any future business. What seems like Flexibility was mentioned as a key aspect for start-up companies that a short-term win could turn out to be a long-term problem. are lucky enough to land large customers early on. McClaskey cited Industry : entrepreneurs Information Age December/January 2014 | 32

two cases in which Dish opted to work with start-ups. One of the most conversation with a potential customer by asking if they know anyone important aspects of the relationships was the younger companies’ else they should talk to. willingness to incorporate Dish’s input on the product. The start-ups’ The panelists also gave valuable insight into the most effective, and product development teams worked directly with Dish to help adjust ineffective, methods of engaging an enterprise customer. McClaskey aspects of the product to accommodate their needs. This is important mentioned being “bombarded” with cold calls, emails and webinar not only to sustain business with early customers, but to help attract invites from sales representatives, and often even from third-party new customers in the future. companies hired to do this work for them. These requests often receive Lemkin cited the importance of use cases and references when trying the lowest priority, sometimes for no other reason than that they get to attract customers as a young company. Those that are willing to lost in the white noise created by all the companies that want their adapt in order to establish strong relationships early on will be more business. likely to build similar relationships with new customers. The best way to connect with a CIO, according to McClaskey, is The panel also discussed the importance of maintaining trust with through mutual connections – analysts, partners, references, or other customers and other connections throughout the IT industry. John companies they’ve done business with. cited trust as a main factor in all business Similarly, Lemkin also warned against decisions, from engaging in new business bringing in outside employees to head up to hiring employees. Decision makers in Regardless of how a discussion their sales operations too early on. Most large enterprises are more likely to side with on new business goes, entrepreneurs won’t have a clear idea of people who they can trust, whether that trust the connection made what they want in a president or vice presi- comes directly from previous business or dent of sales until they’ve made a handful of from word-of-mouth recommendations from is still valuable meaningful sales on their own. He advised others in the industry. start-ups to hold off on hiring a sales vice Yochem pointed out the benefit of establishing a good relationship president until they’ve made two sales to CIO-type customers, and to even when failing to complete a sale. Regardless of how a discussion learn from that experience. on new business goes, the connection made in the process is still valu- For young companies selling tech products and services, Lemkin able. Another important and often overlooked consideration is asking said the CIO is their best ally. Following his advice, and that of his around for any other potential customers. Even if a potential customer colleagues, may set one start-up apart from the rest of the crowd. company isn’t in a position to make a purchase, they might know of others who are. Yochem advised salespeople at start-ups to end every Colin Neagle covers emerging technologies and the start-up scene. Follow him on Twitter @ntwrkwrldneagle. Project management : agile Information Age December/January 2014 | 33

gile methods have been taking the IT landscape by storm for some years now. ‘Agile’ possesses Making the move to Agile Aa kind of halo, variously implying being flexible and adaptive in today’s turbulent business operations; contemporary or avant garde instead of old or obsolete; Changing organisational culture is crucial to helping organic instead of bureaucratic. Agile has been touted as your company adopt Agile methods. a means to survive in today’s competitive business world By Rajiv Roy, MACS in which new, innovative competitors can quickly drive old-style businesses to the wall, as has been the fate of a number of traditional organisations. We find, therefore, that a number of large enterprises that traditionally had set, structured project delivery process have embraced or have been ‘pressurised’ to adopt Agile methods as better suited to deal with their present business conditions and competitors. Their top c-level executives have also strongly espoused ‘Agile’ methods in implementing IT programs and projects in internal or external forums, such as industry events and town halls. The key promises of Agile are: • Flexibility: the ability to adapt to business conditions dynamically • Early delivery of desired user features/functions, including prototypes • Less red tape and cumbersome documentation • User engagement within the IT delivery cycle. Project management : agile Information Age December/January 2014 | 34

So, if the executive management is sold on going Agile, typical organisation embarks on its ‘going Agile’ trans- • Test automation: this was to be achieved by who can argue with these benefits? Actually implementing formational journey. transferring the testing from legacy mainframes to a this within an organisation is another thing altogether. Let’s focus on a concrete example from my own, recent MicroFocus environment (MFE), thereby achieving Such a transformation does not happen overnight, much experience. This large enterprise had: continuous integration of developed software as the executives may want it so. Organisations, or large • Many interlinked, complex IT systems involving components and virtualisation of build/test phases parts of it, are often entrenched in time-worn practices several global vendors on MicroFocus servers which were separated from and unrelenting personnel. This article examines some • Management imperatives to cut costs so as to legacy mainframe environments, and automation of of the challenges that especially large enterprises face in improve the financial bottom line and increase testing within the MFE, especially regression tests transitioning to Agile. shareholder value • Final integration of all changed software • Several work streams, each concurrently targeting components and comprehensive UAT testing before Background and context separate software releases at different times during software release. Let’s first set the context for why the executive team wants the year to implement Agile. Typically, we are talking about a • Intricate manual testing with little or no automation Actual results achieved large established enterprise, such as an international bank owing to the mainly mainframe platforms hosting The actual results achieved were far from the desired out- or government department, that has been operational their IT applications comes. Over an 18- month period, only a few (less than 10) for many years, probably decades. Such organisations relatively minor Agile projects were actually undertaken. have been transitioning from legacy business processes Thus, for most of the major, mission-critical applica- in facing up to today’s turbulent, highly competitive Often teams will adopt Agile methods tion changes, legacy waterfall methods were used. The marketplace. just to get the Agile branding; project systems development life cycles (SDLCs) were Typically, these organisations carry a lot of baggage and not because Agile adds real characterised by detailed, cumbersome documents, such from decades of working in traditional ways. By ‘baggage’ as verbose ‘boiler-plate’ change requests and business we mean two things. Firstly, legacy procedures and forms value in delivering projects requirements. Much of this documentation consisted of that have served them well over the years but that are legal disclaimers and phraseologies that nobody no longer relevant in today’s business world. Secondly, • Business teams not involved in solution ever completely read but made the document they likely have personnel with many years’ service who build until user acceptance tests (UAT). voluminous and hard to work with. have entrenched habits that are difficult to alter. • During the Agile transformation The build and test teams were sourced These two factors are naturally interlinked. Personnel program, this enterprise embarked on and stayed offshore, primarily due to cost with entrenched attitudes towards “what works best” the following actions: reasons. The client’s teams, justifiably or generally will continue to use legacy processes they have • Created an Agile training office (ATO) not, shied away from engaging with them served them over many years. that would be a ‘centre of excellence’ and in daily meetings or even phone conference Organisations usually lose many of these veterans, impart training and mentor targeted groups calls. This was due to three main reasons: lack either through natural attrition or through restructure throughout the organisation of face-to-face conversations, entrenched attitudes of or redundancies. Newer sections of the organisation • ‘Componentised’ all its projects in logical chunks not engaging with the developers, and communication adopt more contemporary, state-of-the-art processes. of work that could be distributed to multiple Agile problems in engaging with offshore teams because of In effect, we have a mixture of old and new when the development teams time zone differences and foreign accents. Project management : agile Information Age December/January 2014 | 35

The client team (project managers/architects/ business requirement and cornerstone of Agile that was not and not clearly defined. Then, prototyping and analysts) had an ‘us vs them’ attitude to the project. achieved at this client site. Again, it meant a revolutionary quick delivery of functioning software – even when They did not collaborate in the solution design, build change in the mindset of the client team – primarily the this is only the ‘shell’ – assists the users to crystallise and test of the system. Nor did they participate in reviews project managers/architects/analysts. The entrenched their concepts and requirements. of test cases and inter-system testing. Instead, they only approach was to regard the service provider (vendor) as engaged at specific milestone events, such as busi- a cost centre and a ‘necessary evil’ that had to be The way forward ness requirement document (BRD) approvals minimised and constrained wherever possible. In summary, even though organisations face strong pres- or UAT sign-offs. This negative, ‘us vs them’ attitude was a sures to ‘go Agile’, the pathways to achieve this goal The top driver for projects was invariably result of decades of adversarial experiences, can be tricky and challenging. This is especially true its cost and funding approvals. Hence, off- including legal battles, with vendor teams. for large enterprises with established procedures. Even shoring of project tasks was pursued when- It required a sea change in culture to evolve though executive management promotes and evangelises ever and wherever possible. into a ‘partnership’ approach based on open- Agile, actually implementing it in projects means over- The client project managers mostly remained ness, honesty and integrity. coming entrenched attitudes and cultural impediments. stuck to the traditional waterfall mindset. They The client’s project managers were generally were mostly short-term contractors exclusively focused external contractors hired for short-term assignments. on delivering to the letter of their employment contracts. Their KPIs and performance assessments were based Agile is best when the business They did not bring a long-term perspective to their on the following: requirements are still fuzzy projects. • Reduce project costs whenever and wherever and not clearly defined The MicroFocus virtualisation and test automation possible environment was not adopted by the client. This was • Do everything to ascribe the blame for application probably due to the additional costs involved and the faults on the responsible vendor so that the Often teams will adopt Agile methods just to get the logistical difficulties of training the offshore developers remediation costs are borne by the vendor, not the Agile branding; and not because Agile adds real value and testers in its use. client host. in delivering projects. The training team (ATO) played a very passive, inef- Most of these contractors had extensive past experi- Agile is best suited for projects where requirements are fectual role. They neither implemented nor assisted in ence and personal networks at the client site – which is still fuzzy and need staged, iterations to drive towards transitioning to Agile. Their members did not make why they were hired – and, hence, were used to legacy their clear specification. Hence, certain projects, such as themselves visible and tended to stay in their ‘private waterfall processes. They remained rooted to these time- well-defined changes in established applications, should club’ discussing various Agile topics and exchanging worn procedures. continue to be done in waterfall SDLC. It is really up to documents amongst themselves. Additional observations: the experienced program or project manager, bearing in Few, if any, retrospectives occurred in the Agile pro- • Large multivendor projects, typically spanning more mind existing team cultures and maturity, when selecting jects undertaken. As a result, the cultural impediments than one calendar year, were difficult to co-ordinate the right project to ‘go Agile’ in delivering business value. or other problems were not identified or highlighted. using Agile. Projects were labelled either Agile or non-Agile and there was no middle ground Rajiv Roy’s career has spanned over 25 years in IT. His current focus is on implementing hybrid Agile methods Cultural impediments • Not all projects are suited to using Agile. Agile is for mission-critical projects. He holds a Master’s in Computer Science from the Ohio State University (USA) and Client involvement in the delivery cycle is a key best when the business requirements are still fuzzy is a Certified Professional Member of the ACS. Technology : 3-D printing Information Age December/January 2014 | 36

3D printing adds new dimension to innovation Amid the consumer hype, companies are using the machines for product development.

By Zach Miners

printing may have an image problem. It’s sometimes seen as a hobbyist pursuit – a fun 3D way to build knickknacks from your living room desktop – but a growing number of companies are giving serious thought to the technology to help get new ideas off the ground. That’s literally off the ground in aircraft maker Boe- ing’s case. Thirty thousand feet in the air, some planes made by Boeing are outfitted with air duct components, wiring covers and other small, general parts that have manufacturing techniques such as subtractive or forma- been made via 3D printing, or, as the process is known tive manufacturing, which mainly rely on removing mate- in industrial applications, additive manufacturing. The rial through moulding, drilling or grinding. Additive company also uses additive manufacturing with metal to manufacturing instead starts from scratch and binds produce prototype parts for form, fit and function tests. layers of material sequentially in extremely thin sheets Whether it’s the living room or a corporate factory, into a shape designed with 3D modelling software. the underlying principle of 3D printing – additive manu- Boeing has been conducting research and development facturing – is the same. It’s different from traditional in this area since 1997, but the company wants to scale up its processes in the years ahead so it can use the technology to build larger, structural components that can be widely incorporated into military and commercial aircraft. Technology : 3-D printing Information Age December/January 2014 | 37

David Dietrich, lead engineer for additive manufac- Reducing costs, time Previously, 3D printers were too expensive, but the turing in metals at Boeing, says the larger titanium struc- At Boeing, the team handling additive manufacturing in revolution now is their affordability, the lab’s chief tech- tures that constitute the backbone of aircraft generally fall plastics has cut down its processing time dramatically. nology officer, Tom Soderstrom, says. JPL uses the outside of the capacity of additive manufacturing in its While it might take up to a year to make some small printers as a brainstorming tool as part of what Soder- current state because they’re larger than the equipment parts using conventional tools, 3D printing can lessen strom calls its “IT petting zoo”. that can make them. the processing time to a week, according to Michael So far, the program’s results have been good. This “That’s our goal through aggressive new machine Hayes, Boeing’s lead engineer for additive manufacturing year, mechanical engineers used the printers to create designs: to scale to larger applications,” Dietrich says. in plastics. concepts for simple items like table trays. An actual Boeing’s use of 3D printing may seem unconventional stand for a webcam was produced as well to be used for because of the growing attention on the technology’s conference calls. And engineers realised that by using consumer applications for things like toys, figurines and the 3D printers, they could incorporate the same swivel sculptures. But it’s not. mechanism that was used for the stand into their design Dietrich says the industry doesn’t like to use the term “Eventually an entire spacecraft for a new spacecraft part for deploying parachutes. ‘3D printing’ as ‘additive manufacturing’ has been could be printed using 3D technology. “That was the ‘aha’ moment,” Soderstrom says, when around longer and is more accepted. The spacecraft would be unmanned, his team realised the printers could be used to conceive For consumers, some of the more prominent 3D and print parts for actual spacecraft. The swivel part, printer makers include MakerBot, MakieLab and and small, perhaps a flat panel which has been designed but not manufactured yet, RepRap. Industrial-grade makers include 3D Systems, the size of an art book” would provide wiggle room to the parachute to reduce which also makes lower-cost models such as Stratasys, the torque or rotational impact when it deploys. ExOne and EOS. Another advantage of having a 3D printer in-house The cost of a 3D printer varies widely. 3D Systems’ is that it can give a company an easier way to fine-tune Cube, which is designed for home users and hobbyists, designs for new products, Soderstrom says. “It can take starts at around $US1300. Machines built for industrial- The company can also more easily tweak its products you 20 times to get an idea right.” grade manufacturing in industries like aerospace, auto- using the technology, Hays says. “You can fail early. You Soderstrom hopes that eventually entire spacecraft motive and medical, such as those made by ExOne, can can make the first part very quickly, make changes, and could be printed using the technology. The spacecraft fetch prices as high as $1 million. get to a high-quality part faster.” would be unmanned, and small, perhaps a flat panel The average selling price for an industrial-grade 3D NASA is another organisation that is using 3D printers the size of an art book. “Not all spacecraft need to look printer is about $75,000, according to market research to experiment. The space agency has been looking at like the Voyager.” compiled by Terry Wohlers, an analyst who studies trends the technology for years, but over the past six months, For consumer-level 3D printers, the technology is still in 3D printing. Most consumer printers go for between NASA’s Jet Propulsion Laboratory has been using the developing. Depending on the machine, the printed objects $1000 and $3000, he says. technology more frequently to test new concepts for parts are not always polished, and the software to make the 3D printing or additive manufacturing offers several that may soon find their way into spacecraft. designs can be buggy and difficult to learn, Soderstrom advantages over traditional subtractive processes. The Located in California, the lab has a dozen 3D printers, says. Software for generating designs for 3D printing biggest benefit, some businesses say, is that the technology including consumer models made by companies such can be supplied by the printer vendor, take the form of allows for speedier, one-off production of products in-house. as MakerBot, Stratasys and 3D Systems. computer-aided design programs such as Autodesk, or Technology : 3-D printing Information Age December/January 2014 | 38

come from large engineering companies like Siemens. says makes it the first US nationwide retailer to test 3D government contractors and other people who just have Still, Soderstrom recommends that CIOs make the printing services in-store. an interesting idea. investment in 3D printing and purchase or otherwise Office supply company Staples claims to be the first One customer wanted a physical 3D replica of his obtain several machines on loan. They don’t have to retailer to stock 3D printers for consumers, but UPS says own head, Jones says. There was also a scuba diver who be the most expensive models, he says, but companies its program makes it the first to offer 3D printing services printed a light filter for an underwater lamp and a moun- should try to identify which business units might see the like computer-aided design consultations in addition to tain biker who printed a mount for a camera. most benefit from the machines. Companies should try the printing itself. For early stage companies, Jones estimates that the to find somebody who can act as the “IT concierge”: a Currently, there are six independently owned UPS store has printed roughly a couple of dozen product person with knowledge of the technology who can advise store locations in the US offering Stratasys’ uPrint SE prototypes. In total, it has done probably as many as 50 the company how best to use it. Plus printer, an industrial-grade machine. The UPS Store printing jobs for various types of customers, producing “Producing a high-fidelity part on some of the cheaper will gather feedback from store owners and customers 200 different parts. 3D printers can be hard,” Soderstrom says. “This con- over the next 12 months and then will decide whether to There are other online companies that offer 3D cierge could help with that.” add printers in additional stores if the test is successful. printing services. Two sites are Shapeways and Quick- Certain skills this person may need could include So far at the San Diego store, costs to the customer parts, which take files uploaded by the customer and then knowing how to work with multiple different materials have ranged from $US10 for lifelike knuckles printed print the object for them. But the UPS Store project is within a single object, he says. by a medical device developer, to $500 for a prototype different because it’s more personal, Jones says. Organisations don’t have to be as large as Boeing or printed by a prosthetics company. The biggest factor in “We get to know the people, and their vision.” NASA to get some use out of 3D printers. The technology determining price is the complexity of the design. 3D Hubs is another company betting that there are is also an option for small businesses and entrepreneurs The customer brings in a digital file in the STL format people who are interested in 3D printers but don’t own looking to make customised designs for prototypes and to the store. The store then checks to make sure the file one. The site operates like an Airbnb for 3D printers, then print them in small-scale runs. is print-ready by running it through a software program. by helping people find 3D printers that are owned by One company making strategic use of 3D printing is If it is, the customer gets a quote for the printing and other people or businesses nearby. shipping and logistics giant UPS. The company, which labour costs. 3D printing is already a crucial element in some large also makes its services available to smaller customers Sometimes the digital file needs to be reworked or companies’ manufacturing processes, but for smaller via storefront operations, has responded to the growing created from scratch. In such cases, the customer can companies, the technology’s biggest obstacle may be a interest in the technology with a program designed to work with a contracted 3D printing designer to iron lack of awareness about when it’s right to use it, Gartner help small businesses and start-ups that may not have out the design. Depending on how this meeting goes, analyst Pete Brasiliere says. the funds to purchase their own 3D printer. it can be a several-step process before a file is ready for Though the desktop machines may not be as advanced, printing, says Daniel Remba, the UPS Store’s small- their popularity within the “maker” culture could provide Small business interest business technology leader, who leads the company’s that knowledge to the business world. “The hype around A poll of small-business owners conducted by UPS 3-D printing project. the consumer market has made senior management showed high interest in trying out the technology, par- So far at the San Diego store, there have been aware,” Brasiliere says. ticularly among those wanting to create prototypes, several different types of customers coming in to use artistic renderings or promotional materials. In July, the the printer, owner Burke Jones says. They have ranged Zach Miners writes about social networking, search and general technology news. Follow him on Twitter at company announced the start of a program that UPS from small start-ups to engineers from larger companies, @zachminers. ICT management : teleworking Information Age December/January 2014 | 39

Remote chance

The use of teleworking is increasing isco’s Trans-Tasman Telework Survey was jointly even while many businesses in Australia and conducted by the University of Melbourne’s Insti- New Zealand lack written agreements or Ctute for a Broadband-enabled Society and AUT training, a Cisco survey has found. University’s NZ Work Research Institute. By Adam Bender The researchers surveyed about 1800 employees and 100 managers from 50 organisations in Australia and New Zealand. The research took place between April and September 2013, and consisted of an online survey and manager interviews. While 89 per cent reported teleworking one or more hours per week, and the mean number of teleworking time was 13 hours per week, only 22 per cent of businesses ICT management : teleworking Information Age December/January 2014 | 40

in Australia and New Zealand have a formal written teleworking effectiveness. Managers tell us [that] a lot and can be improved,” Bosua says. teleworking agreement with employees, the survey found. of them don’t have the necessary attitudes or skills to Gloet adds that employers tend to only inspect the On the contrary, 47 per cent of teleworkers said they promote and manage teleworking, and they also have home offices of employees who telework 100 per cent of have only an informal arrangement with their manager some concern about some employees not having the the time, and McLeod says that a barrier to conducting and three per cent said they telework without the organi- necessary skills and training.” more intensive inspections is that employees may feel sation’s knowledge. The other 27 per cent of teleworkers Less than 50 per cent of employees said they had been uncomfortable about their companies dictating how they said they have a verbal agreement with their manager. given any training related to teleworking, including how set up their home office. The largest proportion of employees surveyed, 38 per to set up a home office and effective IT security. Cisco sees health and safety as a “clear issue that needs cent, said they do “hybrid teleworking”, working remotely Tim Fawcett, Cisco’s general manager of government to be dealt with” by government regulators, Fawcett one to three days per week. Another 16 per cent reported affairs and policy, says Cisco does teleworking training says. “Twentieth century regulations don’t necessarily teleworking more than three days per week. The study for its own employees, and support services are mostly automatically fit a twenty-first century economy.” found that 35 per cent work remotely sometimes, but online rather than face to face. not more than eight hours a week, and only 11 per cent On covering employee expenses related to teleworking, did no teleworking at all. Bentley says most companies are paying for equipment ‘‘It’s people, not technology, “A lot of the organisations couldn’t actually tell us ... like mobile phones and laptops, but the employees tended that are limiting how many of their workers actually teleworked to any to provide their own broadband connection. teleworking effectiveness” degree, and that reflected a lot of it is actually ad hoc,” “Generally, it was something negotiated between the Laurie McLeod, a researcher at the NZ Work Research manager or the organisation and the employee, and it Institute, says. depended ... a lot on the role,” Marianne Gloet, research The report found many benefits to teleworking, fellow at Melbourne University’s department of manage- including increased productivity and well-being of Policies improve outcomes ment and marketing, says. employees. For the business, teleworking can save money Tim Bentley, director of the NZ Work Research Insti- on office space, provide access to a wider pool of talent tute, says establishing a policy for telework will yield the Ergonomics a grey area and increase employee retention. Outside the company, greatest results. Health and safety issues such as maintaining an ergo- teleworking can reduce traffic congestion and is more “Teleworking will be effective to you in terms of pro- nomic work space are still a “grey area” in teleworking environmentally friendly. ductivity and well-being if you provide the necessary policy, Bentley says, although the study found no more The report found that 71 per cent of employees said support, including technical support,” Bentley says. health and safety problems with those who teleworked teleworking had a favourable influence on their job atti- Organisations interested in teleworking should start compared to those who stayed in the office. tude. Only four per cent said that teleworking makes it with a hybrid teleworking pilot program and then do a Rachelle Bosua, a lecturer in Melbourne Univer- tougher to communicate and collaborate with colleagues. cost-benefit analysis to prove its benefits, he says. sity’s school of engineering, says many companies ask Internally at Cisco, teleworking has improved employee One issue is overcoming cultural resistance to tel- employees to complete a self-assessment survey of their retention and increased worker productivity, Fawcett eworking. Bentley says having training for both managers work environments. says. “We see teleworkers as actually being amongst our and the teleworking employees could overcome those “The organisations don’t necessarily go out and have top workers right across our business.” kinds of problems. their own assessment to see whether the things are really “It’s people, not technology, that are limiting in place and as they should be, which is a bit of a concern Follow journalist Adam Bender on Twitter @WatchAdam. ICT management : teleworking Information Age December/January 2014 | 41

Staying connected to telecommuters has never been easier with these essential tools for managing remote workers. By Christina DesMarais

ahoo CEO Marissa Mayer made headlines in February 2013 when she banned telecommuting, Ybut according to recent research, remote working is on the rise. It’s all well and good for workers who can opt out of frazzling commutes or choose to crank out a bunch of work in their pyjamas, but what about their boss? How can you know if telecommuters are working as much as they say they are, and how can you help them do their best work? Here are some of the best tools available to promote stellar communication with remote workers. ICT management : teleworking Information Age December/January 2014 | 42

For feedback and communications: 15Five project or team member. Click a particular task there Forget about tedious status reports. This slick cloud to get more details about it in the right pane – informa- platform works as a communications backbone for com- tion such as due dates, people assigned to the project, panies by prompting employees to spend 15 minutes a and comments that team members have made about it. week writing about their successes, challenges, ideas Asana lets you attach files from your computer, Google and morale in a report that takes a manager only five Drive or Dropbox to any task. The company also nudges minutes to read. Managers decide the questions 15Five new users toward a demo video to make the process of asks, such as “What’s going well in your role?” or getting started less difficult. “What challenges are you facing, and where do you If your employees are coders, you might try Pivotal need support?” With the click of a button, managers Tracker, a project management tool for software devel- can include an employee comment in their own report. opment teams. It starts at $US7 a month for three col- Whenever an executive responds to an idea or issue, laborators and five projects. both the manager and employee receive an email noti- fication, so they can hop back onto 15Five to continue the conversation. Currently 15Five is off-limits if you use a free email provider, such as Gmail or Yahoo. The company plans to lift that restriction in an upcoming upgrade to the platform. Try it at no charge for four weeks; after the trial period, it costs $US49 a month for the first 10 people and $US5 more for each additional person.

For project management: Asana or Pivotal Tracker Though millions of people use Basecamp, that solid and popular project management platform no longer offers a free version. Instead, tiers start at $20 a month for managing up to 10 projects. If you’re managing a small For ‘face-to-face’ virtual meetings: Google+ business on a tight budget, try Asana, a free product you Hangouts or Zoom can use on the Web or on your mobile device. For a two-person video call, Skype is easy and free. Asana’s cloud platform, which resembles the three- But if you want to Skype with up to 10 people at once, panelled Web app that Evernote uses, gives you a wealth someone in the group has to ante up for Skype Premium, of information about a given project. On the left you can which starts at around $5 a month. filter what will appear in the main, middle section by For that reason, I recommend using Google+ ICT management : teleworking Information Age December/January 2014 | 43

Hangouts, which is free for meetings of up to 10 people. technology to analyse photos of receipts and automati- Though you have to have a Google+ account to use cally fill in date and amount fields. If users import bank one, iOS and Mac users can also take part. In contrast, and credit card transactions, the platform will generate Apple’s FaceTime isn’t available on Android or Windows. e-receipts for expenses that will pass muster with the Google has baked some pretty cool features into Hang- IRS, so nobody has to keep files of paper receipts. outs, such as Hangouts On Air, which lets you live-stream Expensify integrates with many popular products, any Hangout to Google+, record it to your YouTube including Evernote, FinancialForce, FreshBooks, Google channel, or broadcast it to your website. You can also Apps, NetSuite, QuickBooks and Salesforce. You’ll need share screenshots, snap photos of the Hangout, and pull a premium subscription to connect to some of these in apps like SlideShare and Cacoo to give presentations accounts. and enable drawing, respectively. The free version lets bosses accept, review and approve If you need to hold an online meeting with more than the expense reports of two employees. Coverage of addi- 10 participants, you might try Zoom (http://zoom.us). tional staffers costs $US6 per person per month. Users For $US10 a month (or no charge if you can keep your can upload as many receipts as they want to Expensify. meeting to less than 40 minutes), it lets you include up Free SmartScans are limited to 10 per month. to 25 participants. And like Google+ Hangouts, Zoom works on your mobile device. Unlike Hangouts, however, Other essentials Zoom supports HD video and audio. Want more? If you need to track remote workers’ time on the job, give TransparentBusiness a whirl. It does things For expenses: Expensify like take screenshots from an employee’s computer every Expensify – offered by a San Francisco start-up whose few minutes. Need to group-chat with a bunch of people tagline is “Expense reports that don’t suck” – is an online at once? Try HipChat. Harvest is great for time-tracking, tool and mobile app that greatly simplifies tracking managing expenses and invoicing, and it integrates into expenses and creating and submitting expense reports. many project-management apps. FreshBooks is a good When installed on your employees’ mobile devices, the cloud-based accounting service that integrates with a mobile app lets them record expenses on the fly, snap plethora of other software platforms that your employees photos of receipts, use GPS to figure out how many might already be using. miles they’re driving, and track how many hours they’re Honestly, the list could go on. There has never been a spending on a project. This is especially handy now that better time to embrace remote work, because fantastic, Expensify offers invoicing features. affordable tools abound that make keeping in touch with Once back in the office, workers can access the Web telecommuters dead simple. app, which syncs with information entered on the mobile app. From there, they can use Expensify’s SmartScan Christina DesMarais writes about technology, the automotive industry and health and fitness. Opinion : ICT management Information Age December/January 2014 | 44

All in the mind User-centric computing now requires more than lip service. hange and confusion reign in the technology world one in particular that I think is most important. By David K. Johnson today. Consumerisation, mobility and virtualisa- The people calling are smart and almost always well Ction are disrupting the vendor landscape to an informed about workforce computing technology, as well astounding degree. As an analyst at Forrester Research, as compliance topics, because that’s what they’re being I field between 90 and 120 inquiry calls every quarter asked to look after by their leaders. But they’re almost from industry leaders trying to make sense of all these never informed about the human aspects of workforce disruptions, which gives me a very good sense of what’s computing – the conditions that are necessary for the missing. Gradually, new insights are emerging. There’s employees of their organisation to be as effective as they Opinion : ICT management Information Age December/January 2014 | 45

can be, and how technology actually affects that. This is Amabile’s work shows that, of these three, motivation them to using a terminal, for example – a very common important because without this knowledge, we have no is the most important, and her work echoes the earlier scenario for offshore engineering – or lock down their way to know how the technology and policy decisions work of Mihaly Csikszentmihalyi on motivation. Csik- workstations, they lose the sense of autonomy so essential we’re making will affect the way people work, and that szentmihalyi’s research was the first to explore a concept to reaching flow. Making matters worse, the latency will have profound effects on innovation, productivity called “flow” – the state of optimal experience. In flow, effects of server-hosted desktops (e.g., virtual desktop and business results. we are fully engaged in our work and we lose track of the infrastructure) on a transoceanic scale can be enormously As it turns out, this is not news to the scientists who passing of time. The more complex the work, the more disruptive to concentration and flow. study human behaviour at work. In fact, the basic prin- effective a state of flow is for multiplying the results. The point I want to make is that the human effective- ciples of when and why people do their best work has Software developers and engineers will likely recognise ness potential of our organisations may be the single been well understood for more than two decades. Here’s this concept from their own work experiences, since they most important factor in our long-term business success, the kicker: what science knows is counter to the way were likely experiencing flow on those evenings when they and yet we’re sacrificing it to other priorities, in part most organisations operate. Teresa Amabile of Harvard totally lost track of time and ended up skipping dinner because the core science of what people need in order Business School makes a compelling case in her book to be effective is getting lost in a sea of misinformation, The Progress Principle that people are happiest when they rhetoric and technology marketing. As technologists, have meaningful work and can make daily progress. Her Human effectiveness potential may we think of the end-user experience as something we research shows that this “inner work life” is a function be the single most important factor can monitor and get reports on, but we’re missing the of three things: in our long-term business success point. The end-user experience is a mosaic of emotions, Emotions: examples include the joy we feel when we perceptions and motivation – all enhanced or eroded solve a complex problem, the disappointment we feel by our choices as leaders – and technology choices play when a VP rejects our strategic plan, the gratitude we and going home at 2am after writing amazing code. a defining role in information work. We have met the feel when a co-worker helps us with a favour, or the For our minds to reach a state of flow, there are several enemy, and he is us! anger we feel when a co-worker betrays our trust and prerequisites, but the most important for IT professionals Are you a CIO or a senior leader who wants to make takes credit for our work. is the idea that if our clients are going to achieve flow, they a lasting difference? Study the human behaviour science Perceptions: examples include how we perceive things need to have autonomy and a sense of control over how of the inner work lives of employees in organisations – like the competency of our leadership, the viability of the work will get done. The policy choices we make as Amabile’s and Csikszentmihalyi’s work are great places the company strategy, the value of our work, and the an IT organisation directly affect the sense of autonomy to start – and educate yourself on how your decisions ethics of our co-workers. that these workers feel. and approach to leadership and technology influence Motivation: our grasp of what needs to be done at any Take engineers as an example: engineering of all kinds, effectiveness and your people’s drive and ability to do given moment and our drive to it at that time. Examples software included, is a creative activity. Engineers need to great work. include how engaging, interesting and meaningful work have the freedom to experiment with different tools and is a more effective motivator than financial incentives. approaches to solving problems, but when we constrain David K. Johnson is a principal analyst at Forrester Research serving infrastructure and operations professionals. Mobile : apps Information Age December/January 2014 | 46

There’s no vacation from fitness

Going on holiday? That’s no excuse to stop working out with apps and gear for exercising anywhere. By Sarah Jacobsson Purewal

taying in shape is difficult enough when you’ve on track, whether you’re in the air, on the ground, or got a routine down. So it’s no wonder that when flitting from city to city. Syou travel, be it for business or pleasure, working out often becomes priority number 528, right below Apps for the plane ride getting up at 6am. In transit? That’s no excuse! In fact, if you’re travelling But there are plenty of reasons to work out when on a plane for several hours, you should definitely be you’re on the road. Not only will you look and feel better, moving around as much as possible to avoid deep vein healthier and more energetic, you won’t have to worry thrombosis and generally achy muscles. If you’re travel- about that dreaded return visit to the gym when you ling by bus, boat, train or car, well, it’s still not a great arrive home. You know, the one where you walk on the idea to sit for extended periods of time. treadmill for approximately three minutes before you Sure, you can try to remind yourself to stand and start gasping for air. stretch every few hours, or you can do some Airplane Working out on the go doesn’t have to be difficult, Yoga. This popular iOS app promises a “Zen-like” flying however, and the recent boom in fitness tech devices has experience (for $4.49). It features 24 standing and sitting made it even easier. We’ve found some of the simplest yoga poses that you can easily perform on a plane (either gadgets, apps and Web services to help you stay fit and in your seat or standing in the aisle), complete with Mobile : apps Information Age December/January 2014 | 47

photos, text descriptions, audio cues and videos. Airplane are slim, rubberised bracelets – stylish enough to wear entire collection. What’s nice about Yogify is that the Yoga also has some cool extras, such as planning tips, with any outfit (making them less likely to get lost or sessions are classified by category – strength, balance packing lists and a checklist of ways to “relax en route stolen as well). Also, both devices track sleep patterns, and flexibility – so you can tailor your workout to your to the airport”. which can be helpful if you’re also battling jet lag. The weaknesses. If you’re travelling on a form of transportation where FuelBand has a slight advantage over the Up in that For more advanced yoga practitioners, All-in Yoga is an you have even less mobility than a plane seat provides, such it has a built-in USB plug, which means you can log excellent choice. This $5.49 app has everything including as a bus or a car, you may want to check out aStretches activity and charge the device without carrying around full workouts, a pose library with over 300 poses, and a instead. This 99c iOS app offers sitting stretches for an extra cable. calendar for tracking your workouts. All-in Yoga doesn’t specific body parts, with pictures, text descriptions and If you’d rather not spend money on a smart pedometer, hold your hand as much as the aforementioned apps, so background music for each stretch. aStretches includes you can always go with a free pedometer app such as it’s better for people who are looking to build their own targeted stretches for your neck, back, wrists, hands, Activity Tracking by Striiv for iOS or Runtastic Pedom- workouts on the go. hips, legs, ankles, shoulders and elbows. eter for Android. These apps use your smartphone’s built-in accelerometer to track steps and calories. They’re Work out anywhere not 100 per cent accurate – they can’t track elevation Sometimes, you just need a gym. For those days when you If you want to take your yoga gain from trudging up hills or stairs, for example – but just can’t motivate yourself to do a prison-style workout they’re good enough to help you stay on track. in your cramped hotel room, you’ll need to venture out workout on the go, or start a practice, into whatever city you’re in and find a dedicated workout there’s an app for that Tablet yoga space. One of the greatest things about yoga practice is that Gym Finder is a free iOS app that helps you locate you can do it literally anywhere: on a mountain, on nearby gyms and health clubs. The app uses Google Tracking fitness around the world a plane, on the floor of a hotel conference room, you location data to help you find chain gyms, as well as It’s pretty common to get a “walking workout” when name it. But if you’re not a seasoned yogi, you might pilates studios, yoga studios and swim and racquet clubs. you’re travelling, especially if you’re visiting a pedestrian- not know exactly what to do in order to get the best For Android users, the free Health Club Finder app friendly city. It’s also common to assume that, because workout. If you want to take your yoga workout on the helps you find gyms, fitness centres and yoga studios you walked so much more than you usually do, you can go, or start a practice, there’s an app for that. Okay, around the globe. now eat three desserts with every meal. there are hundreds of apps for that, but here are some If you’re looking for something a little more tailored, Not so fast. Just how many calories are you really of the best places to start. you might want to download Lululemon’s free Om Finder burning when you’re trekking through Manhattan or For beginners, Simply Yoga is a simple $3 app for app, which helps you locate yoga studios and look up sightseeing in Paris? A smart pedometer, such as the iOS and Android that walks you through timed work- class schedules. Runners, joggers and cyclists can use Nike FuelBand (around $250) or the $130 Jawbone Up outs. In Simply Yoga, you can choose to do a 20-, 40-, an app such as Map My Run (free for iOS and Android) will be able to tell you. or 60-minute workout, which is perfect for travellers or WalkJogRun ($5.49 for iOS) to find jogging trails The FuelBand and the Up are ideal fitness trackers with tight schedules. For more intermediate students, favoured by the locals. Windows Phone users should for travellers, compared to less-expensive options such Yogify is a free iOS app that offers 35 hours of full yoga check out free options in Run the Map or RunBuddy. as the Fitbit Zip and the Omron Activity Tracker, for a workouts. The first five workouts in Yogify are free; the couple of reasons. First, both the FuelBand and the Up rest cost $2 per session, $4 per level, or $10.49 for the Sarah Jacobsson Purewal is a freelance writer and editor based in Silicon Valley. Mobile : ergonomics Information Age December/January 2014 | 48

Surprise: mobile devices don’t help office ergonomics

Getting a move on is good, but understand the limitations of devices as you do so. By Lamont Wood

he decades-old prescriptions of office ergonomics sought to mini- mise musculoskeletal damage to people who were sitting fixedly Tat their desks for hours at a time. But today’s office ergonomics experts increasingly do not see sitting for long periods as a good thing. Meanwhile, the upsurge of mobile devices would seem to offer a way to alleviate the problem, but it turns out that such devices come with their own ergonomic baggage. “For decades, ergonomics was billed as a way to get people to stay at their desks longer and more pro- ductively,” Dr James Levine, director of obesity solutions at the Mayo Clinic in the US says. “Over the past six or seven years we have realised the consequences of people sitting too long, and it is an astonishing list.” Specifically, he lists (in no particular order) diabetes, low productivity, hyper- tension, apathy, clinical depression, hyper- lipidaemia (elevated levels of lipids in the blood), low moods or mild depression, cardiovascular diseases, obesity, back problems, deep vein thrombosis and mental sluggishness. Mobile : ergonomics Information Age December/January 2014 | 49

“Modern thinking is that we need to reverse the process of 40 years and director of the Human Factors and Ergonomics Laboratory at Cornell get people out of their chairs and off their bottoms,” Levine says. “Office University. With a book, people will occasionally change posture as productivity and school grades improve as people get mobile, as they get they turn the page, but with tablets they can remain hunched for up and move. They will tell you that they feel brighter and sharper. long periods. They will say, much as I hate the term, ‘I feel more alive’. About 10 “Leaning forward doubles the compressive forces on the vertebrae years ago I had senior scientific colleagues screaming at me in lecture in your lower back compared to leaning back,” Hedge says. “When halls about this, saying I was wrong, but now there is international leaning back 20 degrees in a lounge chair, you are really relaxing and recognition that sedentariness is killing people.” halving the compression. That is why we say ‘sit back and relax,’ not ‘hunch forward and relax’.” Mobile’s new ergonomics One result of hunching is a syndrome called iPad Neck – chronic Oddly enough, no one is saying that mobile devices hold the answer soreness of the back of the neck and upper shoulders. Hedge recom- through their potential for personal mobility. This may be because, as mends propping up the tablet or putting it on a holder so you can read it turns out, the mobile gadgets introduce new ergonomic problems. it with a straight neck. Tablets, for instance, might at first glance seem to free people from Overuse of tablets may also interfere with getting a good night’s sleep, their desks, but in fact people tend to place them flat on their desks says Dr Mariana Figueiro, director of the Light and Health Program and read them as if they were books, according to Dr Alan Hedge, of the Lighting Research Center at the Rensselaer Polytechnic Institute in New York. Exposure to bright light in the evening will suppress the body’s production of the sleep-aid chemical melatonin, making it SOME OLD-SCHOOL ERGONOMICS STILL APPLY harder to go to sleep. You’ve probably heard them since primary school, but the admonitions about posture in The use of an iPad at full brightness for two hours is enough to trigger relation to office ergonomics still hold true. melatonin suppression, she has found. (She also tried the experiment “As a rule of thumb, you should be able to touch the screen with your fingertips,” Dr Magdy with TVs and CRT computer screens, but did not find any suppres- Akladios, associate professor at the University of Houston in Texas, says. “The knees, hips sion, presumably because they aren’t as bright and are used at greater and elbows should be at a 90-degree angle. But it’s also okay to, for instance, cross your legs, as long as you don’t do it for eight hours straight.” distances from the eye.) The keyboard should also be flat on the desk. “There is no functional reason for the feet on Extensive typing on a tablet opens another can of worms. “We’ve the back of the keyboard,” Linda Weitzel, senior ergonomist for Xerox, says. (One keyboard done a lot of work on this,” Hedge says. First, it slows people down maker says the feet serve only to improve visibility for those who can’t touch-type.) compared to typing on a regular keyboard since it provides no feedback Ignoring the rules is as risky as ever. “The complaints have not changed that much since – the varying resistance of a key as it’s pressed. the 1990s,” Weitzel says. “The number one problem is back complaints, since they are sitting all day long. Part of it is how effective the computer is today. Whereas five years ago The fingers also tend to get sore since there is no give on that surface, office workers still printed out documents, today they don’t even have to get up and go to the Hedge says. “It’s like drumming your fingers all day on your desk. printer because they are forwarding documents electronically, or sending links.” For the convenience of technology we have moved people away from In the face of discomfort, act immediately. “The best fix is to stay away from the cause,” typing and back to poking and prodding, dramatically reducing their Akladios says. “You need to prevent the problem motion and introduce a new set of motions, productivity. It’s ludicrous.” or take frequent breaks. Rather than do any one specific thing, you need to do something different from what you have been doing.” Haptics, which attempt to provide that missing feedback from flat screens, might be a help eventually, but the technologies are still being Information Age December/January 2014 | 50

developed and not yet widely adopted in mobile devices. “There is a foundation of activity that we need to do throughout Laptops, meanwhile, are considered non-ergonomic by nature, since the day to stay healthy,” she says. “This is the kind of activity that our there is no way to adjust the distance between the keyboard and screen. parents and grandparents used to get throughout the day, but gadgets “Your hands want to be close to your chest, but your eyes want to be have taken it away from us.” focused on something two feet in front of you,” making an ergonomic Going to the gym for half an hour in the morning and then sitting for posture unobtainable with a laptop, Hedge says. the rest of the day does not provide that foundation, she says. Using laptops on a desk, in place of a desktop, only compounds the “The signal to stand up does something to the body that tunes it, problem. “Desks are usually about 30 inches high, which is a good controlling the blood pressure and circulation. Every 20 to 30 minutes height for writing by hand on paper but dreadful for typing, as it is too you need to stand up. More often is fine, but doing it 20 times at once high unless you are taller than 6’2”. Then you are adding the height and saying you are done is not sufficient; you must do it throughout of the laptop.” the day.” The problem can be alleviated by the use of LCD monitor arms, She bases her conclusions on research she did for NASA on the bodily which hold the laptop in an elevated position where its screen can be effects of having no gravitational stress, such used as the system display. An add-on keyboard and mouse can be as that which astronauts experience in free “Whereas five years ago office placed on the desk. fall. Volunteers stayed in bed for a month; An alternative set-up is to close the laptop and use an external monitor some of them got up to use a treadmill and workers still printed as well as the external keyboard/mouse, but Hedge feels that the displays others just got up. A third group just stayed out documents, today they don’t on late-model laptops, such as the Retina display on the MacBook Pro, in bed. The completely bed-bound volunteers even have to get up and go to are too good to waste. lost 25 per cent of their aerobic capacity in As for smartphones, the reliance on thumbs for texting has led to just four days, Vernikos says. the printer because they an upsurge in a condition variously called BlackBerry Thumb, Text As for the ones who got up, “To my are forwarding documents Thumb, Nintendo Thumb or De Quervain Syndrome. surprise, standing was more effective than electronically, or sending links.” “BlackBerry Thumb is really tendinitis at the base of the thumb, walking,” she says. “You need to stand up caused by rapid texting, and it’s a growing trend,” Linda Weitzel, once every hour, and every 30 minutes was senior ergonomist for Xerox, says. Using other texting input options even better.” will help, such as predictive spelling and speech recognition. Extrapolating the results to people who are sitting rather than lying Hedge says that a 2006 Virgin Mobile survey of British users found down, people need to stand up 36 times a day, she says. that reports of sore thumbs or wrists were up 38 per cent over a span To take it to another level, Weitzel says she personally uses a standing of five years. More recent research confirms those findings. desk and has recommended that solution to hundreds of Xerox employees over the years. “Most say pretty quickly that it does help their back. Out Standing up for frequent breaks of all those people I only know one that went back to sitting. Maybe If mobile devices are not the answer, neither is gym membership, since it was high heels.” exercise outside the office does not undo the unnatural effects of sitting Weitzel is quick to point out that it is better to both sit and stand, fixedly at a desk for hours, says Dr Joan Vernikos, former director of saying that she works with employees to recognise the signs of fatigue. NASA’s Life Sciences Division. “I educate them on how their body should feel and [tell them] not to Mobile : ergonomics Information Age December/January 2014 | 51

push it beyond a certain point, since standing all the time can create display screen is clean and that their eyeglass prescriptions are up to as many issues as sitting.” date. They should also take breaks every hour that involve looking off into the distance, she says. The office as submarine You may also be feeling sluggish because of what’s streaming down The search for relief from overhead: fixed, unchanging artificial lighting, especially in the Unlike the posture-bound prescriptions of the old office ergonomics, the absence of windows. new playbook is more art than science, especially as it has to constantly address new technology. In other words, there is no one answer. “Sitting should be a posture of choice, not the posture of obligation,” Levine says. “I am not saying to stop working and go for a walk; I am saying you should do the same amount of work but do it while in motion.” Besides standing desks, Levine recommends treadmill desks, as well as less elaborate fixtures such as telephone cord steppers that let you pace up and down while on the phone. Office workers should schedule calls when they can be walking while on their Figueiro has done studies for the US Navy con- mobile phone. These can be colour-coded green in Outlook, cerning the use of light to enhance crew alertness on submarines. so they can see at a glance how “green” their schedule is. She found that, left to itself, your body will drift into a 24.2-hour He also suggests holding office parties in art galleries (or other schedule, and so eventually your sleeping hours will begin to venues where everyone stands) instead of in sit-down restaurants overlap your office hours. To reset your body to the 24-hour or bars. Instead of rewarding employees with movie passes (and day, you need to expose yourself to sunlight, but in winter people encourage yet more sitting), management might bring in massage often commute in darkness. In the absence of sunlight, exposure therapists or yoga instructors. Office competitions can be launched to bluish light will serve. with health-related objectives. “Exposing yourself to sunlight can be a kick Finally, experts say office workers need to accept a basic premise like a cup of coffee,” Figueiro says. Bluish that, for many, apparently flies in the face of their work ethic: you are cubicle lighting is also available, but, supposed to be comfortable at the office. whatever the source, she says “The first principle is to be comfortable,” Hedge says. “Have a the light has to reach your neutral posture. If there is any sign of discomfort, change what you retinas – you have to see are doing straightaway. Do not think that if you are at work it is sup- the source, directly or posed to hurt.” reflected. If it does hurt, Weitzel says, “we have to figure out something For general eyestrain, different.” Weitzel recommends that sufferers make sure that their Lamont Wood is a freelance technology writer. Mobile : ergonomics Information Age December/January 2014 | 52

arms move like human limbs so that a user’s arms and shoulders remain supported when texting, typing on a keyboard or swiping a tablet. “The workplace and the seating experience had been designed for someone sitting at a computer all day long, not the way people are working today,” James Ludwig, vice president of global design and engineering at Steel- case, says in a video Steelcase created about Gesture. “The human body doesn’t want to remain in one posture all day. It wants to be fluid and be supported dynamically. That’s a big challenge. It caused us to fundamentally rethink how we do a chair.” When people interact with mobile technologies, they tend to be more casual than they would be in a traditional office setting. In the workplace, where office chairs are meant for desktop PC users, it can be painful to hunch over a too-low laptop or a strain to view tiny screens. Small technologies tend to pull the body down, Carol Stuart-Buttle of consulting firm Stuart-Buttle Ergo- Introducing the smart chair nomics says. A new flexible office chair has been designed for mobile workers. “If the chair doesn’t move with the user, people slouch By Ann Bednarz to make up for it, or flop on the desk to overcompensate for what is uncomfortable,” Stuart-Buttle says. “Workers today are moving from bad posture, to bad posture, to o you cocoon when you’re texting? Or strunch office chair geared for people who juggle multiple devices. bad posture. when you’re laptop gazing? Put another way: does The Gesture chair encourages a sitter to move around “Gesture helps you be where you need to be – it helps Dyour back ache from hunching over small electronic rather than hold a single position. Set to retail for $US979, workers find support in smarter ways so they can use devices and tapping at tiny keypads? it’s built differently from other desk chairs with a seg- their devices in safer ways.” Office furniture firm Steelcase has studied changing mented structure that is designed for flexibility. Steelcase studied 2000 people in 11 countries to postures in the workplace and says mobile technology is If a sitter reclines to scroll on a tablet screen, the core see how we interact with technologies. Specifically, it changing how people work. It has since created a new shifts and hugs the lower back, for instance. The chair’s looked at how the human body responds as workers Mobile : ergonomics Information Age December/January 2014 | 53

shift from one device to another – swapping a laptop for The Trance: this posture was observed when people were hunch posture for a long time, the person begins to prop a smartphone, for instance. The studies led Steelcase focused on the screen and either mousing or using a themselves up with their resting arm. to distinguish nine distinct poses. The nine poses, as touchpad to navigate on the screen for extended periods “We looked at these new postures in the workplace and defined by Steelcase, are: of time. This is a long duration posture. asked, ‘what if we could design a chair that encourages The Draw: technology (small and mobile) allows people The Take It In: in this posture, people recline to view motion rather than forcing the body to hold a pose?’” to pull back from their desks while they use it. They content on the large display and/or sit back to contem- Ludwig says. recline, signalling they’re contemplating or absorbing plate. This posture is about “taking in” information rather “That supports your arms while texting? That cradles information and draw the device closer to their body to than generating it. your back while you’re reclining and scrolling? That maintain an optimal focal length. The Strunch: the “strunch” (stretched-out hunch) is a draws you closer to your work so that you don’t need to The Multi-Device: this posture is representative of how very common posture with laptops. As people become hunch over to see the screen? That fosters movement and people adapt to multitasking on multiple-devices. One fatigued, they gradually push their laptop further from changing postures as quickly as you change devices?” hand holds a phone to the ear, while the other is working the edge of the work surface, resting their weight on Steelcase’s solution is Gesture. on a laptop. The result is a forward lean that is a symbol the surface. This causes them to reach forward to work. of concentration and an orientation to the smaller screen Since the back and neck cannot sustain the reach and Writer Ann Bednarz covers IT careers and Internet culture. Follow Ann on Twitter at @annbednarz. of a laptop. The Text: smartphones are small compared to other forms of technology and, therefore, require unique postures. Workers bring arms in close as keying and gesturing are performed. The Cocoon: people recline, bring up their feet onto the seat, and draw their smartphone or tablet close, resting on their thighs. The result is a cocoon: small mobile technology allows people to remain productive in this posture. The Swipe: this posture happens when the device is used on a work surface in “surfing mode,” in which people operate the device with one hand, typically with swiping gestures. Because it’s on a work surface, a person must keep their head a certain distance above the tablet in order to see it, and position their head to look down at it. The Smart Lean: this posture is the result of mobile devices that create the desire for people to temporarily “pull away” from others without leaving a meeting or collaborative environment. This is typically a temporary posture and used for glancing at incoming texts or emails. ICT industry : resources Information Age December/January 2014 | 54

GUIDE TO ORGANISATIONAL CHANGE MANAGEMENT A new guide aims to help IT professionals understand the psychology of change management.

here is increasing industry awareness that the need to engage professionals who are involved in change initiatives. The final section rounds off the discussion with business stakeholders is a critical success factor in pro- It is designed to be a practical tool either to be read with an examination of the impact of change on Tjects and that change management skills are in high demand. as an overview of or as a reference on the change individuals, groups and the organisation. Topics Rod Dilnutt (FACS, CP) has compiled Organisation Change Man- phenomenon with topics selected as required. It covered include the process of individual change, the agement: A Guide for Practitioners, based on over 25 years’ experience draws on well-accepted business concepts rather nature of teams, how teams are developed and the as a consultant and educator. The guide aims to increase awareness than trying to reinvent OCM theory and presents an effectiveness of teams in implementing change in the of the importance of change management. It is based on practical interpretation of these concepts as practical tools. organisation. Change management as an investment experience and best practice and is a great professional develop- It is hoped that any reader wanting to gain a and risk mitigation proposition is discussed. ment opportunity for all those involved in change broader understanding of any of the theory will pursue further “It is important to understand that change management is based investigation and study of the references noted in the bibliography. Learning and practical outcomes on psychology rather than engineering principles and therefore The first section looks at the context of change for contemporary In writing the guide, Dilnutt says he has attempted to provide a sound focusses on the management of people as they encounter and organisations and considers the nature of change, how we can grounding in change concepts. The guide is offered as a first step transition through change,” Dilnutt says. understand change and the different types of changes encountered. and further study on topics of interest is encouraged. It then asks why we need to manage change, and what are the impli- Assessment against the Skills Framework for the Information Overview cations for organisational improvement programs that fail to manage Age standard supports business change management, organisa- The topics covered in the guide have formed the basis for post- change. Finally, it looks at John Kotter’s model of leading change as tional design and implementation skill sets at an assure and advise, graduate courses including in the Masters of Information Systems at a technique to ensure successful outcomes. level of responsibility five. the University of Melbourne and in the ACS’s Professional Education The second section looks at the issue of technology and change The guide focuses on the development and implementation of Program, and short courses for the Records and Information Man- and how individuals and organisations adapt to technology. It con- information systems as both a catalyst for, and a response to organi- agement Professionals Association and numerous industry clients. siders the relationship between the information systems function as sational change. This provides the foundational understanding for the In the guide you will learn: a catalyst for change and the host business. Importantly, it looks at professional to understand and manage the impact of change from

• Practical techniques to assist in relationship building the role of the information systems professional as a catalyst for and an ICT project perspective. Dilnutt says it will be a useful reference

• The underlying nature of change and how individuals, groups and leader of change. for all ICT and business professionals involved in change initiatives organisations respond The third section seeks to understand the motivations of the and positions the reader to perform a change manager’s role.

• How to recognise and overcome stakeholder resistance individual and stakeholders as they react to change. It discusses • The importance of relationships based on trust and how trust can the influence of personality type on individual perception of Availability be developed change and how this informs our approach and the attributes The guide is available through the Lulu Bookshop in either PDF or

• The importance of communication, and we require to effectively manage and lead change. This includes paperback format. If you would like a paperback copy personally

• How to build and understand a change management strategy. discussion of personality assessment techniques and the concept signed by Dilnutt, at no additional cost as an ACS member, order The guide is offered as a reference to ICT and business of emotional intelligence. through WBA Marketing ([email protected]). Ethics : social networks Information Age December/January 2014 | 55

Be safe, be social

What are the privacy implications of social networking systems such as Facebook. By Matthew Warren and Shona Leitch Ethics : social networks Information Age December/January 2014 | 56

ocial networking sites (SNSs) like Facebook, third parties not only obtain a collated collection of users’ SNSs enable malware to thrive due to malware’s ability Twitter and LinkedIn have become increasingly behaviour but can also discover the viewing habits of to access personal information. Increased use of SNSs Spopular and are being used on a daily basis by mil- specific individuals. such as Facebook increase the chance of malware or lions of users across the globe. This vast usage can create Personal information may also be available through peer phishing attacks that can potentially cause serious fantastic opportunities but also brings with it a host of secondary leakage through external applications. Face- damage to organisational data security. For example, issues. One of these problems is the sharing of personal book uses a large number of third-party applications as a there were concerns regarding data leak after a hacker information with a wide audience and the associated part of its platform; these are provided for entertainment, broke into the ‘Top Friends’ application on Facebook, security risks of doing so. education and social purposes. However, Facebook does making users private information visible. In 2012, the not have any control over the third-party application Ramnit computer worm stole 45,000 log-in creden- Information security issues providers and websites supported through its platform. tials from Facebook users in the UK and France. This People often fail to understand the implications of making Publicly available information is made available to information could have been potentially used in a social personal information public through SNSs such as Face- these third-party applications and websites once a user engineering attack. book. Research by the Society of Corporate Compliance begins to use them. Before approving third-party appli- and Ethics and the Healthcare Compliance Association cations or websites, Facebook requires the providers to revealed that 24 per cent of the organisations surveyed agree to Facebook terms of user information disclo- had disciplined their employees for inappropriate behav- sure and takes technical measures to ensure that only iour on social networks and that this behaviour had authorised information is delivered to these third-party caused embarrassment for the organisation. For example, vendors. Estimates in 2011, identified 100,000 third- pictures uploaded by a finance industry employee dis- party applications that allowed information closed a colleague faking a sick day and the subsequent to be shared accidentally outcome was that the employee lost their job. between Facebook third- Research also has shown that SNSs are leaking iden- party applications. tity information to third parties including data aggrega- tors, which track and aggregate users viewing habits for targeted advertising purposes. One implication for users is having tracking cookies associated with their user identity information taken from their SNS profile, which makes tracking their movement across several websites much easier. Although user identities are not directly available to third parties that track users through IP addresses, these IP addresses can be easily related to a particular user and therefore disclosing their personal information obtained through the SNSs. The leakage of personal information means that the Ethics : social networks Information Age December/January 2014 | 57

Organisational effect Facebook users can restrict certain information from than blaming an SNS, and to make sure that they check Corporate organisations use SNSs for many different being viewed from different cohorts, including friends. their privacy settings, only make available information reasons. One use is to help expand or gain a competitive In 2009, Facebook altered its privacy settings, including that they are comfortable with sharing and only adding advantage. Another important use is as a marketing tool the control over who sees individual messages posted, people to their “friend list” who are actually friends or in order to increase the organisation’s business profile. meaning Facebook users could amend their access rights known to the user. This was the original purpose of Employees within the organisation generally create an regarding information they posted so that specific indi- Facebook, rather than the more recent use of adding as organisational profile on Facebook as a way of informally viduals could, for example, view their postings but not many “friends” as possible. communicating with customers, sharing information, their photos. There is also the new worry of whether Facebook promoting products, getting informal product feedback In 2010, Facebook announced a new groups feature friends actually exist in reality. An internal review of and building brand loyalties. that allowed users to specify circles of friends with whom Facebook’s customer base identified 83 million illegiti- By building these organisational profiles, employees are they want to share data, in essence allowing users to mate accounts. These fake pages ranged from companies able to communicate and interact with customers from categories user friends and share information with only setting up individual profile pages so that these fake all over the world, but this can result in data leakage and certain groups of friends. The ways in which information individuals can “like” the company’s products or services, cause serious issues for the organisations as employees can be shared within Facebook is constantly changing to fake pages set up for pets that can “like” and interact may accidentally post information about the organisation’s and one of the key issues is whether users are able to with their owners. latest products; for example, pictures of the latest iPhone. keep up with these changes and calibrate the settings so that their privacy is protected. Conclusion The right to privacy? Another issue surrounding privacy and information In conclusion, the security and privacy threats that Organisations may have concerns about Facebook and its safety in SNSs is the candidness of SNSs to commu- exist within the general internet community also relate usage, and these concerns also relate to individuals that nicate to users what information is private and what to SNSs. In many cases these risks are greater due the organisation communicates with such as employees is public. This is clearly laid out in Facebook’s policy to the sheer number of SNS users as well as the fact and customers, and those individuals’ right to privacy. documents, but it is likely that very few of the 1.19 billion that users place their trust in safeguarding personal Organisations can monitor current and potential monthly users have taken adequate time to familiarise information in their friends’ hands. As the number of employees through SNSs and some colleges and schools themselves with these documents and change their set- SNS users and third-party applications increases, so even keep track of their students’ posts on SNSs. tings accordingly. will the security risks. Police can use online information for investigative Another matter is trusting that those that have access and tracking purposes, as witnessed during the English to any personal information (such as those on a friend’s Professor Matthew Warren and Dr Shona Leitch are from the School of Information and Business Analytics in riots of 2010. Facebook was used by the rioters to post list) will treat personal information such as birth dates, the Faculty of Business and Law at Deakin University. information about their activities and as a way to incite status updates and photos in an ethical manner and other individuals to join them in the rioting behaviour. not disseminate or use the information in an unethical After the riots had ceased, police used the same rioters’ fashion. This wholly relies on an individual and their posts as evidence to prosecute and imprison the indi- own conscience, however it is prudent of users of such CLICK FOR REFERENCES viduals concerned. SNSs to take responsibility for their own actions rather Project management : strategies Information Age December/January 2014 | 58

7 top wishes of project managers

If you could have three project management-related wishes, what would they be? Here are the seven most wished for items. By Jennifer Lonoff Schiff

Wish No. 1: to be involved from project inception “Genie, use your magic to let project managers set the conditions for success,” Chet Anderson, program manager at management consultancy Trissential, says. “This means involve them from the start so that the right resources are budgeted for, correct assumptions are made and the right questions are asked.” Anderson says he also wishes that management understood that “experienced project managers know the challenges involved in getting vendors to satisfy expectations and that their input into the RFP, vendor selection and contract conditions is crucial to achieving a fruitful outcome”. Project management : strategies Information Age December/January 2014 | 59

Wish No. 2: the ability to put, and keep, together says increased visibility across the entire team is impor- Cory Crosland, founder and president at custom the perfect team for each project tant for successful project completion. technology firm Croscon, says “nothing sucks the wind “If only I could have a solid handle on what people and “If the IT project manager doesn’t know what his out of your team’s sails more than an end user who is skills are available at any point in time, so I can assemble employees are working on, he doesn’t know if he can lethargic about engaging in the process and/or suffers the perfect team to meet the specific requirements of the assign additional tasks or if the task is moving forward,” from paralysis when it comes to providing feedback when project,” Jeff Jackson, vice president of development at Nielson says. “With a cloud tool that keeps the project in you need it the most. Compuware’s Changepoint business division. one central location, the whole team can see the project “Finding the right stakeholder is critical.” For Mary Beth Rath, project manager for custom details, in real time, eliminating extra emails that flood software solutions at SWC Technology Partners, her inboxes every day.” Wish No. 6: to be treated with respect wish is to always have dedicated resources. “This would “Genie, make people recognise that project managers avoid switching gears and ramp-up time, to ensure we Wish No. 4: to have clearly defined project are skilled leaders who are uniquely qualified to help can deliver against the project schedule,” she says. objectives and requirements you achieve your aspirations,” Anderson says. “Do not “Very often IT development projects get launched with use project managers as highly skilled administrative Wish No. 3: to have powerful yet simple to use general or imprecise objectives and/or product require- assistants to conduct your meetings and take meeting project management tools ments that create land mines later on in the project life- minutes. They are bona fide leaders with advanced skills “I wish for a magic wand to wave and take away the cycle,” Edward R. Jones, director of professional services to energise and motivate people that they have no direct reporting nightmare I face every quarter,” Jackson says. at Diligent eSecurity International, says. control over.” “Today I live a nightmare that consists of multiple “It is reasonable that a project may have to be initiated spreadsheets, conflicting data, inaccurate information with some unknowns or unclear items,” Jones says, but Wish No. 7: to be allowed to adjust projects as and missed reporting deadlines. If only I had one source “it would be great if the project manager is made aware needed (without being second-guessed) for all project-related information and the ability to react of these so they can include the need for their refinement “Even if you’ve perfectly spec’d out a project, there are quickly and take corrective action when a project begins as a part of the effort.” gremlins waiting for you at every turn,” Crosland says. to go off the rails.” “Especially on longer-term projects, the business and its Daniel Kushner, project manager at MBX Systems, a Wish No. 5: to get buy-in from stakeholders and requirements may shift from underneath you.” And good provider of network server appliances, says that from a end users project managers have to quickly adapt, Anderson says. software perspective, “what every project manager wants is “Another wish would be to have the ability to identify “Grant project managers the flexibility required to a software solution that can plan, schedule and work with key stakeholders who will validate priorities and major adjust the project approach as needed,” without “bur- shared resources in the larger enterprise environment”. decisions,” Rath says. “This would help ensure not only dening them with unnecessary processes and checklists,” “The obstacle is that by the time you need a solution that the budget is properly managed, but that the most he says. “Skilled project managers know how to apply the like this, you are likely to have a number of home-brewed important items are delivered [on time].” appropriate management techniques to achieve optimal or off-the-shelf solutions you have already invested in, Project management expert Mark Calabrese says that team performance. If you hire for the right skills, you and no one wants to waste money on a new solution with similarly, it would be nice to have “sponsors who want won’t need as much process control anyway.” significant overlap with older systems,” Kushner says. to hear what risks are associated with their requested Bryan Nielson, a work management expert and strate- changes and who will own those risks, once they under- Jennifer Lonoff Schiff is a contributor to CIO.com and runs a marketing communications firm focused on gist for AtTask, a project management solutions provider, stand them and request to go forward anyway”. helping organisations better interact with their customers, employees and partners. Security : management Information Age December/January 2014 | 60

11 sure signs you’ve been hacked ...And what to do about it. By Roger A. Grimes

n today’s threatscape, antivirus software provides Sure sign of system compromise No. 1: little piece of mind. In fact, anti-malware scanners Fake antivirus messages Ion the whole are horrifically inaccurate, especially In slight decline these days, fake antivirus warning mes- with exploits less than 24 hours old. After all, malicious sages are among the surest signs that your system has hackers and malware can change their tactics at will. been compromised. What most people don’t realise is Swap a few bytes around, and a previously recognised that by the time they see the fake antivirus warning, the malware program becomes unrecognisable. damage has been done. Clicking No or Cancel to stop the To combat this, many anti-malware programs monitor fake virus scan is too little, too late. The malicious soft- program behaviours, often called heuristics, to catch ware has already made use of unpatched software, often previously unrecognised malware. Other programs use the Java Runtime Environment or an Adobe product, virtualised environments, system monitoring, network to completely exploit your system. traffic detection and all of the above at once in order to Why does the malicious program bother with the “anti- be more accurate. And still they fail us on a regular basis. virus warning”? This is because the fake scan, which Here are 11 sure signs you’ve been hacked and what always finds tons of “viruses”, is a lure to buy their product. to do in the event of compromise. Note that in all cases, Clicking on the provided link sends you to a professional- the No. 1 recommendation is to completely restore your looking website, complete with glowing letters of rec- system to a known good state before proceeding. In ommendation. There, they ask you for your credit card the early days, this meant formatting the computer and number and billing information. You’d be surprised how restoring all programs and data. Today, depending on many people get tricked into providing personal financial your operating system, it might simply mean clicking on information. The bad guys gain complete control of your a Restore button. Either way, a compromised computer system and get your credit card or banking information. can never be fully trusted again. The recovery steps For bad guys, it’s the Holy Grail of hacking. listed in each category below are the recommendations What to do: as soon as you notice the fake antivirus to follow if you don’t want to do a full restore, but again, warning message, power down your computer. (Note: a full restore is always a better option, risk-wise. this requires knowing what your legitimate antivirus Security : management Information Age December/January 2014 | 61

program’s warning looks like.) If you need to save any- browser somewhere other than you want to go. The constantly amazed about which websites, legitimate thing and can do it, do so. But the sooner you power off hacker gets paid by getting your clicks to appear on and otherwise, can bypass your browser’s anti-pop-up your computer, the better. Boot up the computer system someone else’s website, often those who don’t know that mechanisms. It’s like battling email spam, but worse. in Safe Mode, No Networking, and try to uninstall the the clicks to their site are from malicious redirection. What to do: not to sound like a broken record, but typi- newly installed software (often it can be uninstalled like cally random pop-ups are generated by one of the three a regular program). Either way, follow up by trying to previous malicious mechanisms noted above. You’ll need restore your system to a state previous to the exploitation. These days it’s more common for to get rid of bogus toolbars and other programs if you If successful, test the computer in regular mode and make malicious emails to be sent to some even hope to get rid of the pop-ups. sure that the fake antivirus warnings are gone. Then of your friends, but not everyone follow up with a complete antivirus scan. The scanner Sure sign of system compromise No. 5: will often find other sneak remnants left behind. Your friends receive fake emails from your You can often spot this type of malware by typing a email account Sure sign of system compromise No. 2: few related, very common words (for example, “puppy” This is the one scenario where you might be okay. It’s Unwanted browser toolbars or “goldfish”) into search engines and checking to see fairly common for our email friends to receive malicious This is probably the second most common sign of exploita- whether the same websites appear in the results – almost emails from us. A decade ago, when email attachment tion: your browser has multiple new toolbars with names always with no actual relevance to your terms. Unfor- viruses were all the rage, it was very common for malware that seem to indicate the toolbar is supposed to help you. tunately, many of today’s redirected Internet searches programs to survey your email address book and send Unless you recognise the toolbar as coming from a very are well hidden from the user through use of additional malicious emails to everyone in it. well-known vendor, it’s time to dump the bogus toolbar. proxies, so the bogus results are never returned to alert These days it’s more common for malicious emails What to do: most browsers allow you to review installed the user. In general, if you have bogus toolbar programs, to be sent to some of your friends, but not everyone in and active toolbars. Remove any you didn’t absolutely want you’re also being redirected. Technical users who really your email address book. If it’s just a few friends and to install. When in doubt, remove it. If the bogus toolbar want to confirm can sniff their own browser or network not everyone in your email list, then more than likely isn’t listed there or you can’t easily remove it, see if your traffic. The traffic sent and returned will always be your computer hasn’t been compromised (at least with browser has an option to reset the browser back to its default distinctly different on a compromised computer vs. an an email address-hunting malware program). These settings. If this doesn’t work, follow the instructions listed uncompromised computer. days malware programs and hackers often pull email above for fake antivirus messages. You can usually avoid What to do: follow the same instructions as above. Usually addresses and contact lists from social media sites, but malicious toolbars by making sure that all your software is removing the bogus toolbars and programs is enough doing so means obtaining a very incomplete list of your fully patched and by being on the lookout for free software to get rid of malicious redirection. contacts’ email addresses. Although not always the case, that installs these tool bars. Hint: read the licensing agree- the bogus emails they send to your friends often don’t ment. Toolbar installs are often pointed out in the licensing Sure sign of system compromise No. 4: have your email address as the sender. It may have your agreements that most people don’t read. Frequent random pop-ups name, but not your correct email address. If this is the This popular sign that you’ve been hacked is also one of case, then usually your computer is safe. Sure sign of system compromise No. 3: the more annoying ones. When you’re getting random What to do: if one or more friends reports receiving bogus Redirected Internet searches browser pop-ups from websites that don’t normally gen- emails claiming to be from you, do your due diligence Many hackers make their living by redirecting your erate them, your system has been compromised. I’m and run a complete antivirus scan on your computer, Security : management Information Age December/January 2014 | 62

followed by looking for unwanted installed programs sent to you in email) and see if the same information is program, reboot the PC, and re-enable the program and toolbars. Often it’s nothing to worry about, but it being requested when you log on using the legitimate only if some needed functionality is no longer working. can’t hurt to do a little health check when this happens. method. You can also call the service via their phone line or email them to report the received phish email Sure sign of system compromise No. 8: Sure sign of system compromise No. 6: or to confirm its validity. Lastly, consider using online Your mouse moves between programs and Your online passwords suddenly change services that provide two-factor authentication. It makes makes correct selections If one or more of your online passwords suddenly change, your account much harder to steal. If your mouse pointer moves itself while making selec- you’ve more than likely been hacked – or at least that tions that work, you’ve definitely been hacked. Mouse online service has been hacked. In this particular sce- Sure sign of system compromise No. 7: pointers often move randomly, usually due to hardware nario, usually what has happened is that the victim Unexpected software installs problems. But if the movements involve making the responded to an authentic-looking phish email that Unwanted and unexpected software installs are a big correct choices to run particular programs, malicious purportedly claimed to be from the service that ends sign that your computer system has likely been hacked. humans are somewhere involved. up with the changed password. The bad guy collects the In the early days of malware, most programs were com- Not as common as some of the other attacks, many log-on information, logs on, changes the password (and puter viruses, which work by modifying other legitimate hackers will break into a computer, wait for it to be idle other information to complicate recovery), and uses the programs. They did this to better hide themselves. For for a long time (like after midnight), then try to steal service to steal money from the victim or the victim’s whatever reason, most malware programs these days are your money. Hackers will break into bank accounts and acquaintances (while pretending to be the victim). Trojans and worms, and they typically install themselves transfer money, trade your stocks, and do all sorts of What to do: if the scam is widespread and many acquaint- like legitimate programs. rogue actions, all designed to lighten your cash load. ances you know are being contacted, immediately notify This may be because their creators are trying to walk them all about your compromised account. Do this to a very thin line when the courts catch up to them. They Consider using online services minimise the damage being done to others by your can attempt to say something like, “But we are a legiti- that provide two-factor mistake. Second, contact the online service to report the mate software company.” Often the unwanted software is compromised account. Most online services are used to legally installed by other programs, so read your licence authentication. It makes your this sort of maliciousness and can quickly get the account agreements. Frequently, I’ll read licence agreements that account much harder to steal back under your control with a new password in a few plainly state that they will be installing one or more other minutes. Some services even have the whole process programs. Sometimes you can opt out of these other What to do: if your computer “comes alive” one night, automated. A few services even have a “My friend’s been installed programs; other times you can’t. take a minute before turning it off to determine what hacked!” button that lets your friends start the process. What to do: there are many free programs that show the intruders are interested in. Don’t let them rob you, This is helpful, because your friends often know your you all your installed programs and let you selectively but it will be useful to see what things they are looking account has been compromised before you do. disable them. My favourite for Windows is Autoruns. It at and trying to compromise. If you have a mobile phone If the compromised log-on information is used on doesn’t show you every program installed but will tell you handy, take a few pictures to document their tasks. When other websites, immediately change those passwords. And the ones that automatically start themselves when your it makes sense, power off the computer. Unhook it from be more careful next time. Websites rarely send emails PC is restarted. Most malware programs can be found the network (or disable the wireless router) and call in asking you to provide your log-on information. When here. The hard part is determining what is and what isn’t the professionals. This is the one time that you’re going in doubt, go to the website directly (don’t use the links legitimate. When in doubt, disable the unrecognised to need expert help. Security : management Information Age December/January 2014 | 63

Using another known good computer, immediately steal a little money. They like to transfer everything or What to do: this is a bad one. First try to think of how change all your other log-on names and passwords. Check nearly everything, often to a foreign exchange or bank. your account was compromised. If it was one of the your bank account transaction histories, stock accounts, Usually it begins by your computer being compromised methods above, follow those recommendations. Either and so on. Consider paying for a credit-monitoring or from you responding to a fake phish from your bank. way, change all your log-on names and passwords (not service. If you’ve been a victim of this attack, you have In any case, the bad guys log on to your bank, change just the one related to the single compromised account), to take it seriously. Complete restore of the computer your contact information, and transfer large sums of call law enforcement, get a case going, and start moni- is the only option you should choose for recovery. But money to themselves. toring your credit. You’ll probably spend months trying if you’ve lost any money, make sure to let the forensics What to do: in most cases you are in luck because most to clear up all the bogus transactions committed in your team make a copy first. If you’ve suffered a loss, call law financial institutions will replace the stolen funds (espe- name, but you should be able to undo most, if not all, enforcement and file a case. You’ll need this information cially if they can stop the transaction before the damage is of the damage. to best recover your real money losses, if any. truly done). However, there have been many cases where Years ago you could be left with a negative credit the courts have ruled it was the customer’s responsibility history that would affect your life for a decade. These Sure sign of system compromise No. 9: to not be hacked, and it’s up to the financial institution days, companies and the credit reporting agencies are Your anti-malware software, Task Manager or to decide whether they will make restitution to you. more used to cyber crime, and they deal with it better. Registry Editor is disabled and can’t be restarted If you’re trying to prevent this from happening in the Still, be aggressive and make sure you follow every bit This is a huge sign of malicious compromise. If you first place, turn on transaction alerts that send text alerts to of advice given to you. notice that your anti-malware software is disabled and you when something unusual is happening. Many financial you didn’t do it, you’re probably exploited, especially if institutions allow you to set thresholds on transaction Malware vector trifecta to avoid you try to start Task Manager or Registry Editor and amounts, and if the threshold is exceeded or it goes to a The hope of an anti-malware program that can perfectly they won’t start, start and disappear, or start in a reduced foreign country, you’ll be warned. Unfortunately, many detect malware and malicious hacking is pure folly. Keep state. This is very common for malware to do. times the bad guys reset the alerts or your contact infor- an eye out for the common signs and symptoms of your What to do: you should really perform a complete restore mation before they steal your money. So make sure your computer being hacked as outlined above. And if you because there is no telling what has happened. But if you financial institution sends you alerts anytime your contact are risk-adverse, as I am, always perform a complete want to try something less drastic first, research the many information or alerting choices are changed. computer restore with the event of a breach. Because methods on how to restore the lost functionality (any once your computer has been compromised, the bad search engine will return lots of results), then restart your Sure sign of system compromise No. 11: guys can do anything and hide anywhere. It’s best to computer in Safe Mode and start the hard work. I say You get calls from stores about non-payment just start from scratch. “hard work” because usually it isn’t easy or quick. Often, of shipped goods Most malicious hacking originates from one of three I have to try a handful of different methods to find one In this case, hackers have compromised one of your vectors: unpatched software, running Trojan horse that works. Precede restoring your software by getting rid accounts, made a purchase, and had it shipped to some- programs, and responding to fake phishing emails. Do of the malware program, using the methods listed above. where other than your house. Often, the bad guys will better at preventing these three things, and you’ll be less order loads of merchandise at the same time, making likely to have to rely on your anti-malware software’s Sure sign of system compromise No. 10: each business entity think you have enough funds at accuracy – and luck. Your bank account is missing money the beginning, but as each transaction finally pushes I mean lots of money. Online bad guys don’t usually through you end up with insufficient funds. Roger A. Grimes is contributing editor of the InfoWorld Test Center. A frequent industry speaker and educator, Recently graded members of the ACS Information Age December/January 2014 | 64

CANBERRA Salt, Andrew Bajpai, Shreesh Findlay, Michael King, Peter O’Neill, Riannon Santos, Ethel Banerjee, Kaushik Fouquet, Julien Kleijn, Orlando O’Neill, Emilie Associate Sarabia, Tim Basnet, Rajesh Frangie, Raymond Charles Koirala, Seema O’Rourke, Jason Adeyinka, Adebule Senanayake, Sumedha Beedles, Gabriel Galt, David Kosasih, Jason Ovington, David Ahmad, Adeel Sharma, Arun Benfatto, Richard Ganesan, Saravanan Krishna, Yadav Owen, Susan Barrow, Frank Shepherdson, Thomas Benjabutr, Jason Gardose, Maria Perpetua Krishnamoorthy, Narayani Pacia, Catherine Beale, Jodie Singh, Reshma Berang, Sina Geale, Matthew Kukade, Amit B. Panangalage, Ravina Bedford, Richard Sirimanne, Nilushi Beresford, James Gill, Bikram Kwan, Brendon Pandey, Nitu Blasi, Jenny Stewart, Celina Bhaskar, Vinaykumar Mishrilal Ginzburg, Philip La, Kenny Pandya, Kalpesh Bush, Darren Sui, Lixin Bhrugubanda, Rao Groth, Andrew Lam, Cuong Papaluca, Riccardo Cano, Robert Thandar, Mya Bides, Emmuel John Gunawardena, Ganegama Liyanage Lamichhane, Jyoti Paravastu, Sai Casabar, Mark Jasper Tipping, Alicia Black, Charles Don George Asantha Le, Chinh Parida, Chandan Kumar Cechet, Tristan Tobgay, Tashi Bourchier, James Frederick Gvero, Stefan Lear, Matthew Parnell, Ian Chang, Aaron Tran, Anthony Boyd, Kieran Haidari, Zaki Lee, Kenneth Paul, Vakti Kusum Curtin, Neil Tran, Vinh Boyle, Mark Halan, Raghunathan Lenehan, Lance Pejoski, Daniel Cutler, Ian Brandt, Dean Han, Jia Leong, Fleur Das, Suman Truong, Paul Perera, Uduwa Vidanage Venura Daza, Kris Jaeyani Vilches, Eddie Breen, John Hao, Wensheng Li, Songtao Kaniska Didimiotis, John Vithanage, Mayura Bridges, Luke Haque, Rumana Li, Huiyu Perpic, Roland Glew, Michael Walker, Kenneth Butler, Scott Hatzistavros, Bill Lian, Jing Wu (Jack) Peter, Benny Goodwin, Phillip Warner, Joshua Cai, Stephen Ho, Shun Dong Danny Liu, Peggy Peterson, Isaac Guerin-Smith, Katherine Webster, Jason Charlton, Stephanie Holly, Gerrard Lunn, Mark Phillips, Sebastian Ross Holm, Timothy Wilcox, Liam Chavan, Ravi Howlader, Ishak Luu, Nikki Priest, Ryan Hoo, Yen Wittchen, Sven Chen, Yong Huat, Donald Yap Soon Mahalingam, Anbanandh Priya, Padma Horniak, Peter Woldhuis, James Chen, Eric Iqbal, Syed Malesev, Simon Quinn, John Jayamanne, Don Yogarajan, Anton Chiluveru, Bhanu Priya Iyer, Venkat Gopal Krishnan Malviya, Ashish Quinquis, Manuel Jee, Weng Young, David Chockalingam, Shan Jadhari, Suman Raj Mane, Purnita Raghunath, Mithun Chong, Benjamin Jain, Priyanka Manickavelu, Senthil Kumar Rahman, Thalha Yasir Refaye Abdul Jiang, Ming Member Chung, Zane Jangra, Vinod Kumar Maroli, Gautham Raman, Ragu Keed, Tim Jalil, Ahsan Cilesio, Cecelia Jeon, Sang Seok Martin, Rick Rana, Priyanka Langan, Adam Newman, Clare Cokinas, Melanie Jiang, Lee Mason, Kris Ravichandran, Kumaran Last, Samuel Pi, Kening Conway, Roderick Johansson, Bengt Stefan Mathew, John Rehman, Abdul Lazaari, Suzanne Wei, Jenalle Coopso, Mark John, Binil Mathur, Nandita Reichenberg, Warren Sheldon Liu, Kun Zhou, Jin Luo, Zhi Lin Corless, Jonathan Jones, Gavin Neil McGeachie, Todd Rimac, Melissa Malaiman, Dion Senior Member Cully, Thomas Kahn, Gregory McRae, Glen Roberson, Brian Manderson, Doug Lucey, Peter Cunha, Winny Kalam, Faisal Mehmet, Emil Rodgers, Andrew Martyn, Lloyd NEW SOUTH WALES Cutamora, Ricardo Kamalanathan, Arunmainthan Mehta, Aakanksha Rosen, Jordan McElwee, Rohan Czvetics, Timothy Kandasamy, Sabariram Melam, Ramakrishna Rytsk, Dimitri Mcgruddy, Craig Associate Dali, Prerak Kar, Animesh Merryfull, Matthew Saeed, Kumail Mee, Caleb Kaur, Gagandeep Davis, Mark Kar, Animesh Mert, Esra Saheb Jamei, Shaghayegh Moir, Culum Abashkina, Ksenia Den Hertog, Paul Karaaslan, Emre Moran, Steve Samiei, Sepehr Ngo, Quan Abraham, Seenu D’Moirah, Lisa Kaur, Sumeet Muscat, Daniel Sankar, James Nguyen, Huy Abrahams, Elizabeth Dowling, Peter Kaur, Harsimran Najeeb, Mansur Ali Santhanakrishnan, Sathish Kumar Nguyen, Phi Acharya, Sambal Drabsch, Jordaan Kaur, Harsimran Nalwa, Vishal Santoso, Stella Oji, Kanu Aggarwal, Kunal Du, Shuyu Kazi, Rezwan Narayana, Prasad Saraph, Ruchita O’Neill, Harry Ahmed, Shamim Du Toit, Susara Magdalena Kazzaz, Ali Navale, Amit Vilas Savarimuthu, Selvakumar Pan, Lingli Akhmetov, Roustam Dua, Jatin Kedar, Anil Yallapa Nayak, Jalpa Sawant, Ashish Patel, Neil Akhter, Husne Farhana Duggal, Sunil Kelley, Davinia Nedbaylov, Dmitry Sayed, Sajid Ali Shah Phan, Dan Ali, Mohammad Ehsan Edson, Kate Keremelevski, Zoran Ng, William Kok Wee Schilt, Robert Porter, Kate Anderson, Tristan Eid, Razy Kerkar, Shekhar Ng, Wee Leong Schwartz, Carike Pradhan, Lal Bahadur Angel, Gary Elloso, Jose Mikhail Kerkar, Shekhar Shenvi Nguyen, Jack Scourfield, David Davies Quilter, Lisa Aravind, Niranjan Esakkiappan, Suresh Khan, Yasir Majeed Nguyen, Thanh Seeto, Lincoln Quimno, Val Arora, Abhishek Evecek, Hank Kharel, Sarita Nithin, Joseph Sethi, Harpreet Kaur Robertson, Graeme Asad, Mina Fahad, Mohammed Khimani, Alnoor Niu, John Sevenler, Hakan Rudolph, Shawn Baboo, Ashish Falia, Matthew Khisti, Sachin Noon, Alex Shafigh, Saman Saint, Steven Bajpai, Shireesh Ferguson, Iain Kim, DongWoo Novacek, Stephen Shaik, Aslam Recently graded members of the ACS Information Age December/January 2014 | 65

Shaik, Aslam Arumugam, Prabakar Joshi, Subhadra Sharma, Sangam Allen, Karen Smits, Tamara Sharma, Sheena Asaduzzaman, Md K C, Bishal Sherpa, Sange Chumbe Anbalagan, Jayachandran Tomei, Ross Sharma, Mohit Attieh, Daniel Karki, Sunil Shi, Yifeng Antonio, Juan Tsang, Carolina Shen, Jeffrey Azam, Shafiul Katepalli, Naveen Kumar Shrestha, Tri Bikram Arora, Amandeep Wakely, Narelle Shingleton, Julie Banskota, Subesh Khan, Md Rashedul Hasan Shrestha, Nidhish Austin, Bradley Walsh, Charice Simes, Bridget Bertram, Charmane Koedbangga, Sittichai Shrestha, Prabin Beavis, Robin Westley, Keith Singh, Ashish Kumar Bheemidi, Laxminarsimhmareddy Kongara, Aravind Chakravarthy Shrestha, Bal Prasad Brown, Belinda Whitear, Jonathan Singh, Upjeet Bian, Xian Kothakapu, vamshi Krishna Reddy Sigdel, Dev Kumar Caceda, Ricardo Williamson, Bruce Siripurapu, SantoshiRupa Billah, Morsalin Kuikel, Prabodhan Singh, Sukhsimran Partap Chaddha, Sushil Yeduru, Jaya Siswanto, Handy Bojanic, Boris Kurien, Philip Singh, Bibek Chocron, Ariel Yum, Wilson Smallwood, Robert Boppana, Venkata Sundeep Lafraisiere, Marc Siriputipornkul, Auttapong Chokkatil, Vijai NORTHERN TERRITORY Srivastava, Archana Campbell, Richard Lamsal, Shauharda Sonawane, Payal Chour, Heroly Su, Julia Carvajal Pabon, Aura Mylena Leung, Wai Shuen St John Cox, Tara Clay, Rebecca Associate Sultan, Bassem Chaulagain, Gaurab Li, Xiao Sthapit, Samrat Connell, Robert Galet, Roy Sun, Jianqiang Chen, Rui Liao, Zijun Stolyarov, Natan Crowe, Helen Mashipe, Lisah Supa, Marek Chen, Yuexiao Lin, Wei Subedi, Suman Dang, Phuong Member Suri, Kumar Gaurav Chitrakar, Sumita Liu, Meng Takalkar, Abhijeet Balkrushana Das, Sandipan Keskar, Pratik Taleghani, Roya Connell, Allan Maxwell Liu, Yilun Tang, Yanheng Duraisamy, Praveen Kumar Tatwani, Vikas Chandler Crowne, Keith Lu, Yuqing Thapa, Rupak Durrani, Haris Subscriber Taylors, James Dangol, Sibesh Maharjan, Sagar Tjahjadi, David Lohardi Dwyer, Kevin Floyd, Jackson Te, Jasmine Dangol, Mukesh Maharjan, Dinesh Upadhyay, Charu Edgar, Janelle Overseas Group Thakur, Anjali Delwer, Rokeshana Maharjan, Rabin Vangapally, Prathima Gunn, Alison Thomas, Rachel Deng, Jiandong Maharjan, Rajeev Vyas, Mihirkumar Bharatkumar Hart, Sam Associate Thompson, Malcolm DeSilva, Malluwawadu Imesha Mai, Le Trung Wen, Yang Harvey, Toby Abou Hamra, Maissoun Timalsina, Saroj Dulani Malik, Sharad Woodland, Adam Helsby, Anthony Ageva, Naona Tin, April Dhakal, Dipendra Moon, Seung Hwan Xu, Laishuang Hipolito, Alexandra Al-Hadi, Khalid Torres, Effren Jr Diaz, Manuel Jr Nguyen, Hoang Nam Anh Xuan, Xiangkai Immidi, Anna Alibikq, Elias Trifonov, Lyubomir Downing, Steven Oktaria, Lenny Xue, Jianfei Jaganathan, Lakshminarayanan AlSallout, Mohammed Tulloch, Angela El Chahrouk, Farhat Ottal, Parminder Kaur Yan, Cheng Jamhour, Nicole Attard, Mario Velasco, Reg Gandhi, Vandish Palanchoke, Rasna Yuchi, Zhiyun Kadaparthi, Prashanth Balakrishnan, Deepa Vemuri, SriRanjita Gao, Yi Palikhe, Bishal Shankar Zhang, Yan Krishnamoorthy, Anantharaman Cacao, Jonathan Verma, Anup Kumar Gao, Xinjie Pande, Jnanendra Zhang, Xiao Kulkarni, Ravindra Chan, Hing Wai Visvanathan, Lal Gatadi, Ganga Sagar Pandey, Mohit Zhang, Yang Lohit, Shantala Chen, Xufeng Wan, Shenjie Gautam, Dipesh Patel, Hardikkumar Babubhai Zhang, Weina Lopez, Ben Cheng, Yang Wang, Fung Avery Fork Gill, Bikramjit Singh Paul, Raj Zheng, Xiaotian Luu, Thu-Van Choyal, Rahul Williams, Ethan Giri, Sabin Petros, Kossey Zhou, Junyan Manchanda, Mohit Christian, Martin Wolfe, Michael David Gordon, Caroline Pham, Hoang Zhou, Yongquan Mangalath, Shankar Entrada, Dyan Dezi Wong, Jessica Gorova, Nataliia Pham, Anh Tuan MIchael, Joseph Gabriel, Mark Angelo Senior Member Wu, Jiahao Govender, Susheila Polavarapu, Sri Harsha Mishra, Itishree Gil Lara, Anayantcy Barry, Anand Xu, Yun Gupta, Roshan Pothamshettyyegna, Kiran Muthukrishnan, Ramesh Krishnan Goonetilleke, Lahiru Crossley, Alex Yadav, Akshat Gupta, Mohit Poudyal, Pramod Nair, Jayan Grogan, Benjamin Dodds, Reece Yee, Edwin Gurung, Suman Quddus, Md. Mahfujul Negus, Daniel Gurry, Daniel Fernando, Franklyn Zhang, Jian Hua (George) Gyawali, Vabesh Ranjit, Manjil Ng, Jimmy Hamed, Layth Martelozzo, Michael Zhang, Chad Han, Jinlei Rinku, Anowarul Haq Ozer, Heval Haque, Ijazul Morgan, Lisa Zheng, YuDong Haque, Ehateshamul Sajjan, Vipin Kumar Pallapotu, Kamalesh Helmy, Khaled Ramaswamy, Vijaya Zhu, Ci Yi Hogan, Dale Samarajeewa, Gayan Pearsall, Sascha Hotta, Nikun Sale, Gordon Zhu, Cici Horner, Owen Sangba Tamang, Ambeer Pearson, Amy Huaraka, Sandile Setchell, Mark Zovaro, Jim Hua, Yin Sarthak Priyavadan Aka Jugalkishor, Porter, Martin Jaboon, Fidelis Smolenski, Luke Huang, Mian Sarthak Priyavadan Aka Rasmussen, Celine Jaspal, Ankit Fellow Sulikowski, Vanessa Husain, Mohammed Aijaz Jugalkishor Saladi, Jeevan Tej Jayawardena, Henry Mohana Sparkes, Lawrence W Thomas, Mathew Huynh, Thuy Nhi Sehgal, Sumit Kumar Sarlas, Suzy Jose Macedo, Marcelo Member Jain, Ankit Shafaat, Mohammadamin Subscriber Schofield, Julie Ellen Jothipragash, Velu Abidi, Syed Muhammad Baqar Jariwala, Dhawal Rajesh Shah, Saurinkumar Aguilar, Luis Sheather, Briony Karim, Syed Jawad Amin, Milindbhai Bhupendrakumar Jiang, Mian Shakya, Rashmi Akurathi, Anil Kumar Sheedy, Damien Kariyawasam, Majuwana Gamage Ankur, Ankur Joshi, Hitesh Kiran Sharma, Dibesh Alibrandi, Robert Shelley, Brad Manoj Kumara Recently graded members of the ACS Information Age December/January 2014 | 66

Karnam Lakshmikanth, Guruprasad Qurusu, Samson Rowe, Cameron Carroll, Brendan Zheng, Chen Chung, Carol Karunarathna, Tharaka Salceda, Leslei Simondson, Warren Chow, Chung Apollo Cole, Julian Member Kong, Siong Sirisooriya, Ambanage Shantha Srinivasan, Radhika Dasgupta, Tania Cornwall, Jason Aitha, Srikanth Kumar, Ashwin Smirnov, Yaroslav Antonovich Szymanski, Eugene D’ercole, Anthony Coulter, Alan Gallagher, Matthew Kutzner, Nina Sabine Elisabeth Suraweera, Suraweera Thomas, Ryan Duldig, Peter Cumming, Kieran Stevanz, Justin Lam, Tsz Wai Muhamdiramge Don Asanka Thompson, Troy Eshagh, Ali Khan Da Silva, Darren Zheng, Haozheng Langton, Stephen Sanjaya Trewavas, Jared Farrugia, Karen Darghouth Moghrabi, Mohamad Lau, Kiew Peng Troncan, Cosmin Ushay, Stevan Gandotra, Nakul Senior Member Najib Le Roux, Andre` Vincent Zafar, Usman White, Adam Goonasekera, Arielle B C Stevens, Richard De Vries, Rob Lu, Yunjia Whitford, Mark Green, Jordan Ding, Choon Ken Senior Member TASMANIA Luo, Guoqing Willis, Andrew Han, Ruxin Dodanwela Perera, Amila Vasilopoulos, Christos Mansoor, Samra Younger, Michael He, Xiaobin Associate Madhumini Kumari Manulit Rodrigo, Sonia QUEENSLAND Zanchetta, Ryan Hou, Rijia Bragg, Scott Douglas, Jarrod Mikhailov, Dmitry Associate Zhao, Wenjing Jaiswal, Shubham Cooper, Cameron Duenas, Maria Elena Mohamed, Umar Alvis, Monique Zhao, Shaojun Johnson Manicka Rajan, Sam Frith, Greg Duryea, John Nikitenko, Oleg Holliday, John Anderson, Sina Fellow Christopher Duraisingh Elbert, Elbert Olurotimi, Akinluyi Schmid, Roy Antonini, Val Denham, David Roger Karasev, Ilya Fernando, Suranjith Omidiora, Adekunle Arnett, Mark Stefan, Alexander Kelly, Rowan-Marie Member Fitzgerald, Edward Padero, Kathrine Bailey, Scott Kolisz, Michael Liang, Yulu Forder, Matt Palihawadana, Jagath Barron, Marcus Member Kumar, Dhruv Forster, Yvonne Peedikayil George, Renjith Blin, Darren Butina, Milan Lertanuntasuk, Mekin VICTORIA Gagali, Tarik Perekhodko, Anatolii Charaniya, Manish Velji Chalmers, Peter Li, Hai Associate Gakhal, Navjot Kaur Ramalingam, Nithyanandan Ducrocq, Nicolas Chandra, Avinesh Mathew, Mithun Afzal Ahmed, Mohammed Gan, Kok Chun Ranasinghe, Dhanuka Ellis, Gavin Cooper, Benjamin Mehta, Arun Albuquerque, Adrian Ganja, Shyam Seale, Christopher Kaur, Ramandeep Cresswell, Emma Miller, Daniel Anderson, Ian Ganja, Shyam Shelkovnikov, Artem Lee, Yougnmin Duraiswamy, Arunkumar Mohan, Naveen Arsenius, Noel Gao, Yang Shi, Ziwei Meyer, Christian Fiedler, Steve Olssen, James Aziz, Farah Gatala, Naresh Tah, Ai Sher Mohammad Ismail, Farizatul Ezanie Fonte, Bruno Padhye, Aditya Babu, Vinay Narendra George, Geethu Tan, Yue Yik Mullins, Renata Gamble, Alan Panchal, Nilay Badawi, Rania Gogna, Nisha Tang, Ka Wing Panchi, Javier Grant, Jennifer Patag, Celine Ma. Cecilia Bailey, Warren Goh, Tiffany Tinio, Pamela Kristine Patel, Ghanshyambhai.jayantibhai Hilkemeijer, Michael Patil, Rucha Balic, Zvonko Gopalakrishnan, Kumarakkrishnan Tiwari, Avneel Krishan Patel, Sunny Bhikhubhai Hilkemeijer, Michael Perimal-Lewis, Lua Ball, Christopher Peter Griffith, Bradley Uy, Dick Ilagan Piran, Kawes Jessani, Amir Popovich, Sabian Baltrusaitis, Bernard Grigoriou, Tass Viljoen, Marthinus Gerhardus Pukallus, Douglas Karakheti, Ramesh Puri, Varun Benson, Jonathan Grigoriou, Tass Wallin, Magnus Taylor, Brinley Khan, Muhammad Ismail Zeb Ravi, Manoj Bhat, Ramanand Grillis, Kos Wang, Haibo Wang, Haoxing Lees, Dane Rich, Emily Billington, Michael Gronlund, Rowan Whittle, Martin Wang, Jue Leon Moreno, Ingrid Lorena Ruse, Karen Birch, Katherine Gunn, Malcolm Woruba, Russell Yankov, Ivan Lugtu, Leonardo Sattler, Corey Blanco, Maricelys Guntor, Eka Yemeni, Omar Marbell, Steven Senior Member Shao, Han-Wei Blizard, Tim Gupta, Saptarshi Zheng, Yiming Mau, Vandy Garske, Tom Clifford Shi, Qifan Bolton, Danielle Gurung, Janesh Man Member McIntosh, Jeremy Gorse, Alain-Dominique J P Su, Zhiwei Bratuva, Nicolae Haazunga, Percy Abeyratna, Ravindra Molloy, Matthew Myers, Trina Thakkar, Meet Brooker, Daniel Harrison, Samuel Muir, Peter Tiu, Richard Shannon Harrison, Gabrielle Adedeji, Kazeem Adediran SOUTH AUSTRALIA Cabrejos, Renzo Alkhafaf, Ahmad Mustafa, Yasir Viteri, Ivan Carter, Adrian Hiremath, Raveendraswamy Altlawi, Mohand Neupane, Arjun Associate Wang, Rui Cavey, Kerry Hodgson, Nicholas Anwar Basha, Mohamed Sheik Parker, Darryn Abella, Jeffrey Wang, Zhimin Chan, Harvin Holden, Lyn Ameer Prince, Stan Aburumman, Ala’ White, Isaac Chen, Xiang Hu, Conghan Batara, Al Rahdjin Qin, Li Al-Ohali, Abdulaziz Wong, Nicholas Siew Lee Cheng, Chanel Huang, Cong Cataquiz, Catherine Rahardjo, Justin Arora, Vivek Xu, Congyu Cheng, Jessica Wai Yan Huang, Ning Kang Hussain, Nargis Ramsay, Megan Bardhan, Partho Sarathi Xue, Qingqing Chhour, Amy Idris, Syed Kumar, Anand Richards, Paul Batra, Smriti Yang, Xinghui Chockalingam, Selvi Izadi, Venus Luo, Tao Rickwood, Casey Bhangale, Nikhil Yang, Liu Choong, Alvin Jadwani, Yagnik Ghanshyambhai Noble, Braganza Sam Roberts Robins, Maria Bhargava, Aakriti Yang, Zhen Christie, Nick Jafarizadeh, Farzard Osman, Mohamed Rodrigues, Merwyn Prem Bhasin, Shubhang Zhang, Yi Christodoulakis, Antonios Javed, Muhammad Sheharyar Pacis, Maynard John Rowan, David Boora, Gagandeep Zhang, Feng Chung, Jilian Jayasinghe, Gayan Recently graded members of the ACS Information Age December/January 2014 | 67

Jiang, Jing Paton, Ian Williams, Ebenezer Rogers Le, Hoang Nam Zhang, Chao Lim, Alex Chen Hung John, Meljo Phu, Khiah Wilson, Adrian Lei, Danping Zhang, Chi Lin, Gongqi Joselin, Erin Piner, Bradley Wilson, Kimiko Leung Shum Kwong, Eric Zhang, Ning Madurawalage, Dimuth Joshi, Abhishek Piper, Matt Wojnarowski, Steven Li, Peng Zhang, Qian McCrann, Stephen Kadel, Atama Ram Pitman, Nikola Wong, Stansom Li, Ding Zheng, Man McDonald, Mark Kamal, Joarder Pizarro, Alex Wu, Hongtao Li, Li Zhu, Jianlong Mueller, Christian Kandappu, Sribalan Plastow, Kevin-Ronan Wu, Wenting Li, Yuanwen Natarajan, Bhasker Senior Member Kaole, Parag Plotnikova, Svetlana Xavier, Jithin Liu, Xiao Nan Nayaka Wahyu, Matahari Dong, Ningwei Kaur, Kanwerdeep` Podduturi, Vishruthreddy Yin, Lucina Lu, Shaoqing Parekh, Harsh English, David John Khalil, Wassim Podduturi, Vishruthreddy Zabala, Michael Lu, Xiancai Pearce, Matthew McDonald, Peter Khan, Waqas Protopopov, Daniel Zhang, Shaohui Machiwalla, Mohamed Aadil Prajapati, Bhaveshkumar Puah, Tze Lye Khan, Abu Sadid Md Aslam Rangarajan, Harini Zhang, Ying Majeed, Adnan Rastegari, Samaneh Stubbs, Joanne Khanina, Iraida Rivera, Mauricio Zhong, Yi Wei Maragani, Saketh Goud Roberts, Evan Vu, Terry Khin Thar, Moe Rodriguez, Francisco Zimler, Zsolt Laszlo Mohammed, Miskeen Shareef Russell, Lydia Kollu, Nagendra Babu Rojas, Erick Zyla, Michael Naismith, Benjamin Subscriber Samarasekara, Himal Koneru, Abhinesh Rollins, Matthew Nguyen, Thanh Vandekolk, Alison Schlipalius, Christopher Honorary Member Kotehal Jayadevappa, Parimala Rong, Yadong Parmar, Manishaben Shintani, Augusto Barnes, Pam WESTERN AUSTRALIA Kunchandy Ninan, Alex Sakhshi, Sakhshi Patel, Nikhar Kanaiyalal Skelcher, Jennifer Sly, Susan Kung, James Sapkota, Pradeep Patel, Arpita Mahendrakumar Associate Spinks, Glenn Lam, Hoi Kit Goodwin Scarsella, Adrian Member Patel, Dhaval Bharatkumar Allingham, Tim Straker, Tom Lee, Patrick Schofield, Daniel Ai, Qun Phogat, Sunita Arnold, David Thomas, Aji Lempereur, Paul Shen, Hui Asghar, Sahar Rai, Shikhar Ashredawi, Metham Tolliday, Craig Ley, Shane Shrivastava, Vishal Athar, Muhammad Rakurty, Naga Venkata Sunil Kumar Bahreini, Marzieh Van Wyk, Constant Li, Mingyu Siason, Myra Jill Barnes, Brendan Ranjit, Omkar Baraza, Paul Vidler, Macgregor Lim, Tom Silva, Kaluhandilage Sanjaya Bhatti, Imtiaz Nazir Rebbas, Ravinder Batchelor, Joshua Wangai, Eva Lu, Jinming Singh, Satwant Bloomfield, Nathan Ruan, Chao Batchelor, Luke Wilson, Elizabeth Lucas, Paul Singh, Dillon Boulton, Anthony Sayeed, Qaium Mohammed Abdul Bhatt, Mishalkumar Anilkumar Wong, Ken Madurapperuma, Tharanga Sinha, Randip Calleja, Daniel Selvaraja, Vidhyaa Bhiamvarapu, Jeevan Reddy Wyatt, Kevin Maloney, Heather Smets, Yaou Castelan Lucio, Isabel Sarahid Shalabh, Animesh Brand, Murray Zafari, Basir Mason, Travis Smith, Murray Chavda, Dhaval Maheshkumar Sharma, Milan Bhattacharya Carton, Samuel Zikic, Veroslav Matthews, Catherine Sohail, Salman Chen, Chuan Shen, Runfu Chakor, Kavita Member Mbuta, David Song, Cuiwei Cheng, Maobing Shi, Chao Chou, Yen Chen Alvarado, Jose McCarthy Tindall, Samuel Stephen, Kirk Connors, Philip Singh, Jasvinder Cowling, Courtney Aryal, Ujjwal Medicherla, Avinash Sumner, Sharon Dang, Hoang Khanh Subedi, Amrit Damaraju, Veenadhari Bezuidenhout, Matthys Mellas, Kon Surana, Aasish De Silva, Ganhewage Rukshan Sui, Jian De Beer, Brett Coldham, George Millar, Ian Talasila, Pradeep Chinthaka Sun, Enning De Souza, Nicole Coso, Suzana Mohanasundaram, Vickram Tangjaturasopon, Waranchanu Devnani, Rohit Sun, Xin Dowling, William Crew, Bradley Mundy, Thomas Taylor, Scott Dinh, Van Thao Tai, Yining Duong, Helen Griffiths, Marc Murray, Thomas Thakkar, Bimalswaroop Dong, Congying Tam, Chun Yu Ellement, Marcus Kazangarare, Munashe Mwangi, Brian Ting, Daniel Gill, Anmoldeep Thanavanichkul, Thanaporn Ellerton, Jennifer Simmons, Trevor Naimo, Dominic Ting, Daniel Gottapu, Vamsi Sri Sai Ram Timilsina, Sangita Emami, Marjan Tien, Jason Nair, Sachin Tomy, Sarath Gundapaneni, Upendra Trivedi, Parthiv Upendrabhai Esguerra, Jose Fernando Alvarado Vaddepally, Satish Nambirajan, Deepa Uber, David Guo, Jiong Vala, Jaydev Ravatbhai Fogarty, Sarah Wang, Qin Nelson, Dylan Van Mullem, Matthew Halim, Vincent Vatta, Monika Garlapati, Revanth Welikadaarachchi, Harinda Nette, Andrew Vangala, Amarnath Reddy Hameed, Fahad Vellingiri, Barathkumar Glasgow, Chris Ngo, Dyung Vasanth, Ashwin Haycroft, Michael Voigt, Lyndon Harrington, Philip Senior Member Nguyen, James Alan Veerabhardra Sarma, Nemani Herlambang, Patricia Wang, Hanxiao Ibrahim, Ahmed Gill, Harinderjit Singh Nguyen, Vu Ngoc Anh Visser, Noel Hui, Yanlin Wang, Chao Kalda, Elar Lavender, Andy Nguyen, Kim Lily Vo, Katrina Hussain, Muhammad Nassar Wang, Xuankai Kaur, Antardeep Wingett, Scott Nishida, Iori Waldron, Sally Jin, Xinghai Wang, Wen Kim, Donghwi Nolton, Marnie Walker, Callum Kannangara, Charith Prasanga Xian, Yinyin Klimczak, Dean Nunn, Rohan Wang, Sijie Kaur, Sandeep Xie, Hang Lambert, Paul Pascoe, Shannon Webb, Christopher Khan, Mohd Jibran Yap, Shyan Jen Larson, Alex Patel, Krunal West, Craig Kovuru, Soumya Yatawara, Janitha Lee, Poh Ling Pathak, Ananta (Raj) Whykes, Matt Kunreddy, Chandankumar Reddy Zeng, Su Li, Chenyang Australian answers Information Age December/January 2014 | 68

Students create device to digitise mileage recording

By Nermin Bajric

group of students from the University of Sydney led by computer science undergraduate Jenna Ber- Ameister won this year’s Telstra Machine to Machine (M2M) University Challenge for its InGear product, tying first with a group from La Trobe University. The annual Telstra challenge requires contestants to come up with an idea to exploit the Telstra NextG function. The current prototype uses a vehicle’s cigarette on-board diagnostics grow in adoption, and is interested network for M2M applications. lighter socket. in making InGear available for company car management InGear is a mobile device that logs learner driver According to Bermeister, the group decided its main systems where logbooks are commonly used. mileage. It is designed to make the Road and Traffic source of information for logging trips would be through The members of the co-winning La Trobe team, Aiden Authority’s (RTA) pen and paper tracking system less the GPS unit and accelerometer sensors within the device. Nibali, Adrian Clark, Michael Jenkins, Alice Beckett and tedious by storing all data recorded by the digital device “We did look into pulling data from a car’s sensors, team captain Siwit Techathawiekul, developed a new online. but decided that it complicated set up and maintenance, home monitoring system called the Home Guardian. The Current legislation requires learner drivers to record at and limited the amount of cars our device could be used system implements an ingenious way of using wide-angle least 120 hours of supervised driving before attempting in,” she says. motion sensors to be installed in the houses of people – the driving test and graduating to a Provisional 1 licence. The group plans to research ways to gain more accurate mainly the elderly and those with a disability – who are The InGear device requires only a power supply to and comprehensive information about driving habits as living on their own and need monitoring.