Ox Network:
An analysis of SAP in Australian energy infrastructure
In 2009 the Australian Government allocated $4.5 billion in support of renewable energy technologies with a target of 20% share of the entire energy market by 2020 (i.e. An increase from 20 terawatt hours to 60 terawatt hours). Ten years ago, during the nation's era deregulation, natural gas reserves were more than doubled from 19.4 trillion cubic feet (Tcf) in 1998 to 44.6 (Tcf) in 1999. At present, new liquefied natural gas (LNG) and gas-to-liquids (GTL) facilities, pipelines are core in national energy sales both in Australia and abroad. During the first several years, supplies of natural gas outpaced domestic demand. Much effort was put into enterprise systems (ES) as a strategy of change management, toward better operational control of facility and infrastructure as the industry ramped up to its present position in the energy market. Of particular utility was the development of optimized software application programs (SAP) integration into network systems management protocols employed to monitor and track reserve infrastructure.
Origin Energy, the leading Australian supplier of natural gas reserves is the subject of this enterprise systems investigation. A fossil fuel, natural gas is exceptional as a generator of volume baseload electricity with big environmental payoffs in an approximately 50% reduction to the greenhouse emissions. Natural gas incorporation into the national 'energy suite' is part of Origin Energy's lead partnership in the Australian government's policy of 'upstream developments, processing facilities and infrastructure' (Australian Competition and Consumer Commission 2010). A production, power generation and energy retailing company, Origin Energy's capacity to meet consumer demand as projected by national strategy is nothing short of a mega supply chain feat, as operations proving the 'cluster development' theory of risk; where companies are conjoined at certain nodes in the supply chain sharing infrastructure, power, and feed (Australia Daily). Performance to Origin Energy's efforts in these areas is evidenced in the Company's competitive market prospectus (Appendix A).
In the energy field, SAP is relevant to SCADA systems as software building blocks for control of industrial systems through remote sensing of raw data and commands out of control centers. Conduits for monitoring and sending commands to valves and switches, the data managed by these systems controls regulate flow rates and pressures in distribution. Analysis of data generated from SCADA operations feeds SAP databases at Origin; constituting a substantial IT systems activity in ES operations; instrumental to the integrated scope of service facilitation and operational oversight.
Where 'zero' inventory overload strategies are in effect, SAP has become inextricable in value to just-in-time delivery in the organizational supply chain. This is especially pertinent to energy supplier facility, as channel operations are at any time subject to a number of circumstantial or environmental hazards that can prove to be both costly and dangerous. Measures designed to handle automatic allocation of natural gas reserves, for example, do not account for interruptions in effluent cycles where chemical intrusions or technical errors are a factor. While risk assessment and management protocols may be standard in terms of industry specification, without SAP emergency control of such issues by companies like Origin at a systems operations level would be virtually impossible.
When Origin Energy's stakes in energy supply began to climb during the natural gas advancement in the Australian and global market, strategic renewal of older prospectus to systems management as a strategy for sustainable growth impacted decision making about the Company's future. Strategic renewal was found in the energy project integration management (PIM) concept of enterprise systems (ES) development or,
"large-scale, real-time, integrated application-software packages that use the computational, data storage, and data transmission power of modern information technology to support processes, information flows, reporting, and business analytics within and between complex organizations."
Definition of ES here references all application of strategic resources where a network benefits from the planning, implementation and execution of standard systems approaches. Those solutions include: enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), data warehousing, and software platforms on which those systems database applications are built (i.e. SAP). Legacy architecture existed at Origin and SAP useful in reconfiguration of ES networks to the extent that streamlined protocols; allowing new suppliers and systemic functions to be incorporated in response to technology updates and the Company's own service capacity increases.
Organizational leaders in the energy field look to Origin Energy's success, and ask: how did Australia's lead energy corporation know that an SAP-based renewal strategy was in order? Since the mid-twentieth century, organizational theorists have looked to strategists like Kurt Lewin (1951) whom articulated an early process model of change management. Lewin's dynamic still holds important insights for corporations like Origin Energy today, as they attempt to source issues impinging upon organizational growth, as illustrated in Table 1.
Table 1
Unfreeze
1. Determine what needs to change
Organizational Survey (SAP)
Understand why change has to take place.
2....
breakthroughs since the introduction of computers in our society is the development of network technology. Nowadays, almost all business and companies worldwide are implementing the state-of-the-art capabilities of computer networks. What is a Network? A Network is a collection of computers connected to each other enabling communication between each terminal. Through wires, cables, and devices such as network hubs and switches, computer terminals can form a group of connection which
Engineers should focus on the improvement of the performance of the economy. This relates to the transformation of the theories of controlling the world and adopting new frameworks in the operating in conjunction with the planet. New engineers need to adopt and implement new theories of focusing on the economic, social, and political concepts in relation to both technical and nontechnical disciplines (Cameron 2010 p.40). Leaders in British Engineering According to
Public Passions Shi Jianqiao became a media sensation in Nationalist China during the 1930s for shooting the ex-warlord Sun Chuanfang, a leading member of the Tianjin Qingxiu lay-Buddhist society (jushilin). She shot Sun three times on November 13, 1935 in prayer hall (congregation site) on Nanma Road. Although she was prosecuted for murder, the courts returned a controversial final verdict of judicial leniency, and the Nationalist (Guomindang) regime overturned this final
In the event that the analysis of records of telephone, e-mail and internet use was considered to amount to an interference with respect for private life or correspondence, the Government contended that the interference was justified. First, it pursued the legitimate aim of protecting the rights and freedoms of others by ensuring that the facilities provided by a publicly funded employer were not abused. Secondly, the interference had a
The report explains that these languages differ greatly depending on the neighbourhood or the area of the city. These differences exist because people from different countries of origin tend to settle in the same areas. For instance in a neighbourhood such as Harrow, with a large Asian population the top three non-English languages are Gujarati, Hindi/Urdu and Punjabi (Vertovec, 2006). On the other hand there are neighbourhoods in which
Critical Information Literacy: Tools for CourseworkToday, cyberattacks are disrupting and even destroying the computer operations of countless business of all sizes and types, and hackers appear capable of overcoming the latest protections that are available. Fortunately, there are some steps that business practitioners can take to protect their computer files from cyberattacks. To learn more about these, the purpose of this paper is to provide a review of selected resources
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now