Feeds

CIO says Telstra becoming 'best IT shop in APAC'

Agile methodologies and 'fail wall' changing culture

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Telstra’s CIO has boldly claimed that the carrier’s ongoing Agile IT transformation will soon be one of the most successful stories of enterprise Agile at scale in the world.

Speaking at the Agile Australia 2012 conference in Melbourne, Telstra CIO Patrick Eltridge said that his team was also “busy building the best IT shop in Asia Pacific.” Since being appointed to the CIO hot seat 18 months ago, Eltridge has been actively dedicated to turning Telstra’s IT systems into a fertile Agile hub.

Last year Eltridge went on an intense recruitment drive for Agile coaches as part of a large-scale change management program. The Agile approach serves to accelerate collaboration on projects between IT and the business units, improving speed to market and delivering value all the way through a project lifespan.

Telstra took on the Agile methodology for its IT and software development as part of the consultation process over its $11.9 billion transformation. Eltridge said that Telstra was going Agile out of competitive market necessity. “Because we the need the capabilities of an agile organisation. With the advent of NBN and the rapid change that we are seeing in consumer technology we have no hope of thriving in the 21st unless we become much more adaptable and are able to respond faster than our competitors to meeting customer demands.”

Eltridge views Agile as not just a software developer methodology but a “way of working that drives a more productive and enjoyable experience.” While admitting that the change process has been long, he said that it is currently in acceleration mode. “The ox is slow but the earth is patient ... changing culture is a gradual process and can seem glacial to those in it.”

As part of the Agile deployment, Eltridge said that Telstra staff were continually being trained in Agile fundamentals and has implemented a feedback system that allows for accountability and transparency between the team and its leaders. The IT group has established a fail wall where team members can publicly ‘out‘ their failures and share what they have learnt from them. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.