Showing posts with label Capabilities. Show all posts
Showing posts with label Capabilities. Show all posts

June 23, 2019

Trying To Be A Plumber

It's wonderful when we try to help others.

Isn't that one of the reasons we're here? 

But sometimes we are trying to help and it's really something beyond our capabilities. 

My mother-in-law said something funny about this:
Sometimes you're an electrician, but you're trying to be a plumber. 

Isn't that true, we are really one thing, but we are often trying to be something else that we're really not. 

We can't help someone that needs a plumber, if we're an electrician. 

We have to know who we are and what we can do--as well as what we can't. 

No one can do everything, no matter how smart, strong, or able they think they are.  

Each person has strengths and weaknesses.  

We need an electrician and a plumber. 

And you can't be what you're not. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

April 6, 2018

Jack Of All Trades

I saw this quote hanging on the wall. 

It's by science fiction writer, Robert Anson Heinlein.
"A human being should be able to:
  • Change a diaper
  • Plan an invasion
  • Butcher a hog
  • Conn [control] a ship
  • Design a building
  • Write a sonnet
  • Balance account
  • Build a wall
  • Set a bone
  • Comfort the dying
  • Take orders
  • Give orders
  • Cooperate
  • Act alone
  • Solve equations
  • Analyze a new problem
  • Pitch manure
  • Program a computer
  • Cook a tasty meal
  • Fight efficiently
  • Die Gallantly
Specialization is for insects."

It's sort of fascinating all the things that are expected of people to be able to do. 

And this is a short list--I'm sure you can think of many, many more things that people have to be able to do to survive, to live, to thrive. 

What complex and magnificent creations of G-d we are! 

Not only in terms of our physiology, but also in terms of our cognitive, emotional, social, and spiritual capacities and desires. 

We are flesh and blood, but with a breath of life from the living G-d, and we are capable and can do so much. 

At the same time, we are imperfect, limited, fallible, and mortal. 

- Jack of all trades, and master of none. 

Expect the best, but plan for plenty of mistakes and disasters along the way. 

Live well, and return to the creator a better person. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

March 28, 2018

Technology and Human Capital--They Go Hand-In-Hand

So there are some mighty impressive places to work that really shine in terms of the technology they use and the constant desire to upgrade and improve their capabilities. 

Usually, these are also the places that value and respect their human capital because they view them as not just human pawns, but rather as strategic drivers of change. 

Then there are the places that are "so operationally focused" or just plain poorly run that they can't be bothered to think about technology much at all or the people that make up the organization and its fiber. 

In many cases, the wheel may be turning, but the hamster is dead: 

There is no real enterprise architecture to speak of. 

There are no IT strategic or operational plans. 

There are no enterprise or common solutions or platforms. 

There is no IT governance or project/portfolio management. 

Even where there are some IT projects, they go nowhere--they are notions or discussion pieces, but nothing ever rolls off the IT "assembly line."

How about buying an $800 software package to improve specific operations--that gets the thumbs down too. 

Many of these executives can't even spell t-e-c-h-n-o-l-o-g-y!

It's scary when technology is such an incredible enabler that some can't see it for what it is. 

Rather to them, technology is a distraction, a threat, a burdensome cost, or something we don't have time for.

Are they scared of technology?

Do they just not understand its criticality or capability?

Are they just plain stupid? 

Anyway, organizations need to look at their leadership and ask what are they doing not only operationally, but also in terms of technology improvement to advance the organization and its mission. 

Look to the organizations that lead technologically, as well as that treat their people well, and those are ones to ogle at and model after.  ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

April 8, 2016

Help Is Coming

So I used to have a boss who said something really funny.

He used to go, "Everybody says they want to help us" and then bemoaningly he would seem to repeat that a few times. 

The next part which he didn't need to explicitly say was that "But no one does!"

It was the words, but also much the tone--yes, the walls could be caving in, the ship could be sinking, everything going up in flames, and of course, everyone is there looking on, shaking their heads pitifully, and seemingly stretching out their hand in an offer of help. 

For this boss though, the help couldn't come fast enough or with enough resources to help resolve all the issues going on at the time. 

I suppose first and foremost, we have to help ourselves. 

Secondly, there needs to be a core understanding from the beginning of what is really doable and what is simply fantasy fare. 

Third, if help is on the way--great, but it's got to be timely enough and come with enough raw horsepower to make a genuine difference. 

Finally, sometimes miracles do happen and everything works out great--the day is saved--but even then so much underlying damage has been done that you need to rebuild from the core foundations again. 

And for the next time, you'll need to ensure capabilities beyond what was ever imagined before. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

January 3, 2013

Taking On The Predator

My colleague at work has an incredible mask of the Predator. 

Quite a frightening looking creature--that in Hollywood only Arnold Schwarzenegger could take on and defeat. 

When Predator, an extraterrestrial, comes to Earth with all sorts of high-tech weaponry to challenge humankind, Schwarzenegger, who leads an elite special forces team, manages to defeat the alien by using his wits to improvise weapons, traps, and tactics. 

In the real world, this mask is a great reminder that while technology is a tool that provides amazing capabilities, in the end, it is really our people's ability to adapt and innovate that makes the ultimate difference as to who succeeds and fails. 

The Predator mask is not only a great conversation piece, but Predator's looks and technology is not so scary when we realize that good, talented people can wield control over it. ;-)

(Source Photo: here with attribution to Robert Williams)

Share/Save/Bookmark

October 27, 2012

Robots: More Than A Technical Challenge


This is the DARPA Pet-Proto Robot (a predecessor to the Atlas model) showing some pretty cool initial operating capabilities for navigating around obstacles.

- Climbing over a wall
- Straddling a pit
- Going up a staircase
- Walking a plank

These things may seem simple to you and I, but for these robots, we are talking about their autonomously sensing what's around them, identifying and evaluating alternatives to overcome them, deciding on what to actually do, and then successfully executing on it.

Not bad for a machine (even if we are spoiled by the the great science fiction writers and special effects of Hollywood)!

We will be seeing a lot more progress in this area in the 27 months in response to the DARPA Robotics Challenge (DRC), where robots are being looked to "execute complex tasks" for "humanitarian, disaster relief, and related activities" in potentially "dangerous and degraded, and human-engineered" environments.

I'd say only another 15-20 more years and the robots will walking among us--but are we prepared for the significant shift about to occur. 

Think about it--these robots will be able to do a lot more of the physical work (construction, manufacturing, service, care-taking, even warfighting, and more), and while we will benefit from the help, jobs are going to continue to get a lot tougher to find if you are not in fields such as engineering, science, technology, design, and so on.

This is going to lead to continued, significant social, educational, and economic disruptions.

What is now a robotics challenge to meet certain performance benchmarks, may in the future become a human challenge to shift from a human-dominated world to one which is instead shared or commingled with machines. 

This means that we need to define the boundaries between man and machine--will we be working and playing side-by-side, how about loving or fighting each other, and is there the possibility that the machine will some day transcend the inventor altogether. 

I believe that we need significant more study and research into how robotics are going to transform the way we live, work, and interact, and how humanity will adapt and survive this new monumental opportunity, but also looming threat.

What is just an obstacle to overcome in a simulation chamber may one day become an urban battlefield where humans are not necessarily the clear winners.

While I love robotics and where it can take us, this cannot be a field limited to the study of hardware and software alone.

Share/Save/Bookmark

January 8, 2012

A Race To The Future

This last week, we learned of the new defense policy that shifts the U.S. from a full two war capability to a "win-spoil" plan, where we have the ability to fight one war, but still disrupt the military aspirations of another adversary elsewhere.
While we would all like to have unconstrained capabilities for both "guns and butter", budget realities do not permit limitless spending on anything or anytime.
The Wall Street Journal (7-8 January 2012) had an interesting editorial that cautioned against reduced military spending and latched on specifically to focusing too much on the Asia-Pacific region and somehow neglecting other danger spots around the globe.
Basically, the author says it is dangerous for us to put all our proverbial eggs in one basket. As he writes, this single-focus approach or "strategic monism" is predicated on our ability to accurately predict where the trouble spots will be and what defensive and offensive capabilities we will need to counter them.
In contrast, the author promotes an approach that is more multifaceted and based on "strategic pluralism," where we prepare ourselves for any number of different threat scenarios, with a broad array of capabilities to handle whatever may come.
What is compelling about this argument is that generally we are not very good at forecasting the future, and the author points out that "the U.S. has suffered a significant surprise once a decade since 1940" including Pearl Harbor (1941), North Korea's invasion of the South (1950), the Soviet testing of the Hydrogen bomb (1953), the Soviet resupply of Egypt in the Yom Kippur War (1973), the Iranian Shah's fall from power (1979), the Soviet Union collapse (1991), and the terrorist attacks of 9-11 (2001).
Similarly, Fortune Magazine (16 January 2012) calls out "the dangers inherent in...long-term forecasting" and points how almost comically "the 1899 U.S. patent chief declares that anything that can be invented has been."
The Fortune article goes on to say that a number of the experts interviewed for their Guide To The Future issue stated that "cyberterrorism, resource shortages, and political instability around the world are all inevitable."
In short, the potential for any number of catastrophes is no more relevant now in the 21st century, than at any other time in history, despite all our technological advances and maybe because of it.
In fact, Bloomberg Businessweek (19-25 December 2012) actually rates on a scale of low to high various threats, many of which are a direct result of our technology advancement and the possibility that we are not able to control these. From low to high risk--there is climate change, synthetic biology, nuclear apocalypse, nanotechnology weaponry, the unknown, and machine super intelligence. Note, the second highest risk is "unknown risks," since they consider "the biggest threat may yet be unknown."
So while risks abound and we acknowledge that we cannot predict them all or forecast their probability or impact accurately, we need to be very well prepared for all eventualities.
But unfortunately, being prepared, maintaining lots of options, and overall strategic pluralism does not come cheaply.
In fact, when faced with weapons of mass destruction, threats to our homeland, and human rights abuses is there any amount of money that is really enough to prepare, protect, and defend?
There is no choice but to take the threats--both known and unknown seriously--and to devote substantial resources across all platforms to countering these. We cannot afford to be caught off-guard or prepared to fight the wrong fight.
Our adversaries and potential adversaries are not standing still--in fact, they are gaining momentum, so how much can we afford to recoil?
We are caught between the sins of the past in terms of a sizable and threatening national deficit and an unpredictable future with no shortage of dangers.
While everyone has their pet projects, we've got to stop fighting each other (I believe they call this pork barrel politics) and start pulling for the greater good or else we all risk ending up on the spit ourselves.
There is no option but to press firmly on the accelerator of scientific and technological advancement and break the deficit bounds that are strangling us and leap far ahead of those who would do us harm.
(All opinions my own)
(Source Photo: here)

Share/Save/Bookmark

March 31, 2011

Evolving Capabilities To Meet The Times


Great question raised by ABC News on why can't we contact 911 using texting (except for Black Hawk County, Iowa--population 130,000!).
I would extend on the question and suggest that we be able to contact 911 by any number of ubiquitous technologies whether texting, instant messaging, email, or even potentially social media sites (e.g. 911 on Facebook).
Frankly, if someone is in trouble, they shouldn't have to get to a phone anymore, but rather they should simply be able to contact emergency services from wherever and whatever they are doing as long as they are connected--whether by desktops, laptops, tablets, and smartphones, help should be just a message away.
Moreover, by capturing photos, videos, and voice, we can send a more multimedia, data-rich stream of information to 911, enabling them to better assess and respond to the situation.
We owe it to both those in need of help and those emergency service providers to link them through more types of communications services and more information-rich media.
I believe that the excuse that people will make more mistakes texting doesn't ring true in an information economy where Americans send 5 1/2 billion text messages a day.
In fact, a mistaken text is better than no text!
The key is to evolve our capabilities and not stay static in 50 year old technology, just because.

Share/Save/Bookmark

January 9, 2011

The Center Of Gravity Is Information

Center of Gravity (COG) is a military concept that Dr. Joseph Strange defines as “primary sources of moral or physical strength, power, and resistance.” From a military perspective, this is where we should concentrate when attacking the enemy. As Prussian strategist Carl von Clausewitz states, “that is the point against which all our energies should be directed.”

In “Center of Gravity Analysis” (Military Review, July/August 2004), Army Colonel Dale Eikmeier describes the framework for COG and how an enemy (your threat) attempts to exploit them, as follows:

· Center of Gravity—the organizations that do the work (e.g. the military/industrial complex)

· Critical Capabilities (CC)—the strengths of the organization—its “primary abilities”

· Critical Requirements (CR)—the supplies that a COG use—the inputs that are their opportunities, if leveraged for future plans

· Critical Vulnerabilities (CV)—the vulnerabilities a COG has—e.g. exposed or unguarded critical infrastructure

From an enterprise architecture perspective, I greatly appreciate this analysis of COG as it aligns beautifully with Albert Humphrey’s famous Strenghts, Weaknesses, Opportunities, and Threats (SWOT) Analysis for organizational strategic planning.

Aside from typical SWOT analysis to develop your organization’s strategy, the COG analysis adds greater offensive analysis to SWOT--like the military, organizations using the COG model can disrupt competitors’ advantages by seeking to weaken them where they are most vulnerable.

For example, EA used in this fashion may lead a company to build a sophisticated online sales site that directs customers away from your competitor’s retail location. Similarly, acquiring a major supplier (i.e. vertically integrating) may disrupt a competitors’ supply capability, and so on. The point is that EA becomes a force for attack rather than a mere planning tool or information asset.

It is at this point that I disagree with the assertion in the article that “Information is not power; it is a tool, an enabler. It helps wield military or economic power. By itself, it is simply information.”

Far to the contrary, information is one of the greatest assets that we have. It is the way that an advanced, intellectually based society competes. Of note, our declining performance in Science, Technology, Engineering, and Mathematics (STEM), which is so greatly worrisome to our leadership, is of concern because it is directly a threat to our competitive advantage, both militarily and economically, in the global environment.

Information, as embodied by the Internet, is now the center of our society. With it, we perform critical tasks of information sharing, collaboration and education. Used effectively, our military has developed robust command, control, communications, computers, intelligence, reconnaissance, and surveillance (C4ISR)—all information-based. Similarly, our industry is highly competitive and advanced because of the engineering, innovation, and people behind it.

Enterprise architecture, once a small part of the IT infrastructure, can actually play a far greater role in the information society if we allow it to. We have morphed from the industrial age of the 18th and 19th centuries to a highly advanced information society that creates new sources of critical capability, but also new critical vulnerabilities that must be defended. And we must also leverage the vulnerability of our enemies in order to stay viable. Whether it’s cyber-warfare or economic survival, information is at the heart of everything we are successfully doing today.


Share/Save/Bookmark

March 6, 2010

Overcoming the Obstacles to Cyber Security

There continues to be a significant shortfall in our cyber security capabilities, and this is something that needs our determined efforts to rectify.

Often I hear a refrain from IT specialists that we can’t wait with security until the end of a project, but rather we need to “bake it into it” from the beginning. And while this is good advice, it is not enough to address the second-class status that we hold for IT security versus other IT disciplines such as applications development or IT infrastructure provision. Cyber Security must be elevated to safeguard our national security interests.

Here are some recent statements from some our most respected leaders in our defense establishment demonstrating the dire strait of our IT security posture:

· “We’re the most vulnerable, we’re the most connected, we have the most to lose, so if we went to war today in a cyber war, we would lose.”- Retired Vice Admiral Mike Mullen (Federal Computer Week 24 February 2010)

· The United States is "under cyber-attack virtually all the time, every day” - Defense Secretary Robert Gates: (CBS, 21 April 2009)

· “The globally-interconnected digital information and communications infrastructure known as “cyberspace” underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety, and national security. This technology has transformed the global economy and connected people in ways never imagined. Yet, cybersecurity risks pose some of the most serious economic and national security challenges of the 21st Century.” (White House CyberSpace Policy Review, 2009)

Further, the number of attacks is increasing; for example, SC Magazine 20 November 2009 reported that the number of cyber attacks against the Department of Defense was increasing year-over-year 2009 to 2008 by some 60%!

And the penetration of our critical systems spans our industrial, civilian, and defense establishment and even crosses international boundaries. Most recently reported, these included the following:

· F-35 Joint Strike Fighter $300B program at Lockheed Martin,

· The Space Shuttle designs at NASA

· The joint U.S. South Korean defense strategy

· The Predator feeds from Iraq and Afghanistan and more.

Thankfully, these events have not translated down en-masse and with great pain to the individuals in the public domain. However this is a double-edged sword, because on one had, as citizens we are not yet really “feeling the pain” from these cyber attacks. On the other hand, the issue is not taking center stage to prevent further and future damage.

This past week, I had the honor to hear Mr. James Gossler, a security expert from Sandia National Labs speak about the significant cyber security threats that we face at MeriTalk Innovation Nation 2010 on the Edge Computing panel that I was moderating.

For example, Mr. Gossler spoke about how our adversaries were circumventing our efforts to secure our critical cyber security infrastructure by being adept and agile at:

· Playing strength to weakness

· Developing surprising partners (in crime/terror)

· Changing the rules (“of the game”)

· Attacking against our defenses that are “naïve or challenged”

In short, Mr. Gossler stated that “the current state-of-the-art in information assurance [today] is significantly outmatched” by our adversaries.

And with all the capabilities that we have riding on and depending on the Internet now a days from financial services to health and transportation to defense, we do not want to be outgunned by cyber criminals, terrorists, or hostile nation states threatening and acting in ways to send us back to the proverbial “stone-age.”

Unfortunately, as a nation we are not moving quickly enough to address these concerns as retired Navy vice admiral Mike McConnell was quoted in Federal Computer Week: “We’re not going to do what we need to do; we’re going to have a catastrophic event [and] the government’s role is going to change dramatically and then we’re going to go to a new infrastructure.”

Why wait for a cyber Pearl Harbor to act? We stand forewarned by our experts, so let us act now as a nation to defend cyber space as a free and safe domain for us to live and thrive in.

There are a number of critical obstacles that we need to overcome:

1) Culture of CYA—we wait for disaster, because no one wants to come out first—it’s too difficult to justify.

2) Security is seen as an impediment, rather than a facilitator—security is often viewed by some as annoying and expensive with a undefined payback, and that it “gets in our way” of delivering for our customers, rather than as a necessity for our system to work

3) We’ve become immune from being in a state of perpetual bombardment—similar to after 9-11, we tire as human beings to living in a state of fear and maintaining a constant state of vigilance.

Moreover, to increase our cyber security capabilities, we need to elevate the role of cyber security by increasing our commitment to it, funding for it, staffing of it, training in it, tools to support it, and establishing aggressive, but achievable goals to advance our capabilities and conducting ongoing performance measurement on our initiatives to drive results.


Share/Save/Bookmark

March 4, 2010

Pushing Out The Edge


These are my remarks from the MeriTalk Innovation Nation 2010 Conference, "Edge Warrior" Panel today. I was the Moderator and this was my introduction to the discussion by the panelists on Edge Computing.

As I thought about the concept of edge computing an image came to my mind—of a cliff—, representing the limits of what is possible today. Then the cliff started to expand--to-grow in size- -with the edge constantly being pushed further out. This is a way to think about the future of technology. We want to be "leading edge,” and some may even want to be “bleeding edge, but we certainly don’t want to go “over-the-edge, so we need to expand and create new opportunities in our organizations.

Both the public and the private sectors are pushing into new frontiers in a variety of innovative technologies that take us to the edge, everywhere. We’re hearing about many of them today at the conference – cloud computing, social computing, mobile computing, green computing and more. And it’s exciting to think about what we can accomplish if we put promising new technologies to work for the government.

But, we must be careful not to fall into one of two extremes, either jumping in prematurely and making costly mistakes, or avoiding and resisting change in favor of the “tried and true” or what I would call the perpetual status quo and never growing to our true potential as individuals, agencies, and a nation.

To me, true leaders don’t fall into either extreme, but rather they brings both sides together to find a balanced approach to innovation, growth, change, and yes, even some elements of managed risk. In any organization, technology leadership is not about leading employees to the edge of the computing cliff, but rather about pushing out the edge so that their capabilities are constantly increasing, while the risks are also constantly being mitigated.

In fact, technology leadership is not very far from the vision that we saw on the show, Star Trek. The show pushed the boundaries of what was possible—going where no one had gone before, but always striving to keep the ship intact and the crew safe.

While we are the stewards to keep our agencies secure to serve the public, we must also acknowledge that we live in a dynamic, competitive, rapidly changing, and increasingly global environment and we cannot afford to stand still while others press ahead. To meet the challenges that face us, we must constantly seek out better ways of executing our mission, and new technologies are critically important in helping us to do this in all directions and at all the edges.

Finally, this is especially true in today’s world, when agency computing is no longer restricted to our brick and mortar office buildings but rather is ubiquitous. From the corner Starbucks to the most remote regions of Iraq, Afghanistan, and elsewhere, our customers demand to be productive everywhere, to carry out their mission.


Share/Save/Bookmark

February 8, 2010

From Planning to Practice

Real planning is hard work. I’m not talking about the traditional—get the management team together, offsite for a few hours or days and spell out a modified mission and vision statement and some basic goals and objectives—this is the typical approach. Rather, I am referring to thinking and planning about the future with a sense of urgency, realism, and genuine impact to the way we do our jobs.

In the traditional approach, the management team is focused on the planning session. They are engaged in the planning for a short duration, but when back in the office, they don’t go back in any meaningful way to either refer to or apply the plan in what they or their employees actually do. The plan in essence defaults to simply a paperwork exercise, an alignment mechanism, a check box for the next audit.

In contrast, in a comprehensive planning approach, the focus is not on the planning session itself, but on the existential threats and opportunities that we can envision that can impact on the organization and what we are going to do about it. We need to look at for example: What are our competitors doing? Are there new product innovations emerging? Are there social and economic trends that will affect how we do business? How is the political and regulatory environment changing? And so on. The important thing is to think through/ work through, the impact analysis and plan accordingly to meet these head-on.

This is similar to a SWOT analysis—where we evaluate our Strength, Weaknesses, Opportunities, and Threats, but it differs in that it extends that analysis portion to story planning (my term), where the results of SWOT are used to imagine and create multifaceted stories or scenarios of what we anticipate will happen and then identify how we will capitalize on the new situation or counter any threats. In other words, we play out the scenario —similar to simulation and modeling—in a safe environment, and evaluate our best course of action, by seeing where the story goes, how the actors behave and react, and introducing new layers of complexity and subtext.

Harvard Business Review (HBR), Jan-Feb 2010, has an article called “Strategy Tools for a Shifting Landscape” by Michael Jacobides that states “in an age when nothing is constant, strategy should be defined by narrative—plots, subplots, and characters---rather than by maps, graphs, and numbers.”

The author proposes the use of “playscripts” (his term), a scenario-based approach for planning, in which—“a narrative that sets out the cast of characters in a business, the way in which they are connected, the rules they observe, the plots and subplots in which they are a part, and how companies create and retain value as the business and the cast changes.

While I too believe in using a qualitative type of planning to help think out and flesh out strategy, I do not agree that we should discard the quantitative and visual analysis—in fact, I think we should embrace it and expand upon it by integrating it into planning itself. This way we optimize the best from both quantitative and qualitative analysis.

While numbers, trends, graphics, and other visuals are important information elements in planning, they are even more potent when added to the “what if” scenarios in a more narrative type of planning. For example, based on recent accident statistics with the car accelerators (a quantifiable and graphical analysis), we may anticipate that a major foreign car company will be conducting a major recall and that the government will be conducting investigations into this company. How will we respond—perhaps, we will we increase our marketing emphasizing our own car safety record and increase production in anticipation of picking up sales from our competitor?

Aside from being robust and plausible, the article recommends that playscripts be:

· Imaginative—“exploring all the opportunities that exist.” I would also extend this to the other relevant element of SWOT and include envisioning possible threats as well.

· Outward-facing—“focus on the links a company has with other entities, the way it connects with them and how others perceive it in the market.” This is critical to take ourselves out of our insular environments and look outside at what is going on and how it will affect us. Of course, we cannot ignore the inner dynamics of our organization, but we must temper it with a realization that we function within a larger eco-system.

To me, the key to planning is to free the employees to explore what is happening in their environment and how they will behave. It is not to regurgitate their functions and what they are working on, but rather to see beyond themselves and their current capabilities and attitudes. Life today is not life tomorrow, and we had better be prepared with open minds, sharpened skills and a broad arsenal to deal with the future that is soon upon us.


Share/Save/Bookmark

October 19, 2008

Balancing Strategy and Operations and The Total CIO

How should a CIO allocate their time between strategy and operations?

Some CIOs are all operations; they are concerned solely with the utility computing aspects of IT like keeping the desktops humming and the phones ringing. Availability and reliability are two of their key performance measurement areas. These CIOs are focused on managing the day-to-day IT operations, and given some extra budget dollars, will sooner spend them on new operational capabilities to deploy in the field today.

Other CIOs are all strategy; they are focused on setting the vision for the organization, aligned closely to the business, and communicating the way ahead. Efficiency and effectiveness are two of their key performance measurement areas. These CIOs are often set apart from the rest of the IT division (i.e. the Office of the CIO focuses on the Strategy and the IT division does the ops) and given some extra budget dollars, will likely spend them on modernization and transformation, providing capabilities for the end-user of tomorrow.

Finally, the third category of CIOs, balances both strategy and operations. They view the operations as the fundamentals that need to be provided for the business here and now. But at the same time, they recognize that the IT must evolve over time and enable future capabilities for the end-user. These CIOs, given some extra budget dollars, have to have a split personality and allocate funding between the needs of today and tomorrow.

Government Technology, Public CIO Magazine has an article by Liza Lowery Massey on “Balancing Strategy with Tactics Isn’t Easy for CIOs.”

Ms. Massey advocates for the third category, where the CIO balances strategy and operations. She compares it to “have one foot in today and one in tomorrow…making today’s decisions while considering tomorrow’s impacts.”

How much time a CIO spends on strategy versus operations, Ms. Massey says is based on the maturity of the IT operations. If ops are unreliable or not available, then the CIO goes into survival mode—focused on getting these up and running and stable. However, when IT operations are more mature and stable, then the CIO has more ability to focus on the to-be architecture of the organization.

For the Total CIO, it is indeed a delicate balance between strategy and operations. Focus on strategy to the detriment of IT operations, to the extent that mission is jeopardized, and you are toast. Spend too much time, energy, and resources on IT operations, to the extent that you jeopardize the strategy and solutions needed to address emerging business and end-user requirements, and you will lose credibility and quickly be divorced by the business.

The answer is the Total CIO must walk a fine line. Mission cannot fail today, but survivability and success of the enterprise cannot be jeopardized either. The Total CIO must walk and chew gum at the same time!

Additionally, while this concept is not completely unique to CIOs, and can be applied to all CXOs, CIOs have an added pressure on the strategy side due to the rapid pace of emerging technology and its effects on everything business.


Share/Save/Bookmark

August 3, 2008

Texting Gone Wild and Enterprise Architecture

Information availability and communication mobility is all the craze. We are connected everywhere we go. We have our phones, PDAs, and laptops as part of our everyday gear. We wouldn’t leave the house without one or more of them or a converged device like the iPhone or Sidekick. And people are walking and driving around yapping on the phone or typing out text messages. Evan at work, people are answering the phone and texting in the stall. What is it about being connected with these devices that we literally can’t let go?

The Wall Street Journal, 25 July 2008, reports that “Emailing on the Go Sends Some Users Into Harm’s Way.”

These multi-taskers “ram into walls and doorways or fall down stairs. Out on the streets, they bump into lampposts, parker cars, garbage cans, and other stationary objects.”

Are people getting hurt?

You bet. James Adams of Northwestern Memorial Hospital is Chairman of Emergency Medicine, and he states “he has treated patients involved in texting incidents nearly every day this summer.”

Things have gotten so out of control that one London company began “outfitting lampposts with padded bumpers in the in the East End to cut down on injuries to errant texters.”

The stories go on and on about texters who bump into brides at wedding, fall off of curb and into construction barricades, walk into two-by-fours toted by construction workers, knock into bikers, and fall down staircases.

As a student of organizational behavior and an enterprise architect, I ask myself what is going on that people feel such a compelling need to be in touch literally every second. Are people craving intimacy? Are they insecure? Do they get a high by connecting with others and just can’t stop? Is this good thing for society and our organizations?

Certainly, the ability to communicate anytime, anywhere is a good thing. It makes us more capable. It can make us more productive (if we don’t end up killing ourselves in stupid accidents doing it irresponsibly). But like all good things, we need to learn to control our appetite for them. It’s the difference between eating thoughtfully or eating thoughtless, like glutton. Or between taking medicine when needed to treat a legitimate medical condition or just using recklessly like an addict.

Part of good enterprise architecture is building balance into the organization. Architects introduce new technologies to enable performance, but should also help develop policies and ensure training for responsible usage.

It’s terrific to bring new capabilities to the organization and society, but our role as architects does not end there. The human capital perspective of the enterprise architecture comes into play and demands that we go beyond the pure business requirements and technology solutions, and explore the impact of the technology on the people who will use. The human capital perspective of the architecture provides a lens through which we can manage the integration of people and technology.

I’d believe that we should educate people to use technology more responsibly, rather than outfit every lamppost and tree with bumper pads!


Share/Save/Bookmark

July 10, 2008

IT Planning and Enterprise Architecture

Perhaps many of you have wondered what the relationship is between the IT Strategic Plan and the Enterprise Architecture Transition Plan? Why do you need both? Isn’t one IT plan just like another?

There are many different plans starting with the organization’s strategic plan that drives the IT plan and so forth. Each sequential layer of the plan adds another crucial dimension for the plan to enable it to achieve it ultimate implementation.

The various plans establish line of sight from the highest level plan for the organization to individual performance plans and the implementation of new or changes to systems, IT products and standards, and ultimately to the capabilities provided the end-user.

Here is my approach to User-centric IT Planning:

1. Organizational Strategic Plan—the highest level overall plan enterprise; it identifies the goals and objectives of the organization, and drives the IT Strategic Plan.

2. IT Strategic Pan—the IT Plan for the enterprise; it identifies the IT goals and objectives, and drives the IT Performance Plan.

3. IT Performance Plan—a decomposition of the IT Plan; it identifies IT initiatives and milestones, and drives the IT Roadmap and Individual Performance Plans.

4. IT Roadmap and Individual Performance Plans

a) IT Roadmap—a visual timeline of the IT Performance Plan; it identifies programs and projects milestones, and drives the Target Architecture and Transition Plan.

b) Individual Performance Plans—the performance plans for your IT staff; it is derived from the IT Performance Plan, and provides line of sight from the Organizational and IT Strategic Plans all the way to the individual’s performance plan, so everyone knows what they are supposed to do and why (i.e. how it fits into the overall goals and objectives.

5. Target Architecture and Transition Plan

a) Target Architecture—a decomposition of the IT Roadmap into systems and IT products and standards; it identifies the baseline (As-Is) and the target (To-Be) for new and major changes to systems and IT products and standards.

[Note: Target Architecture can also be used in more general terms to refer to the future state of the organization and IT, and this is how I often use it.]

b) Transition Plan—a visual timeline of the changes for implementing the changes to go from the baseline (As-Is) to the target (To-Be) state for systems and IT products and standards.

6. Capabilities—the target state in terms of business capabilities provided to the end-user derived from the changes to systems, IT products and standards, and business processes; it is derived from the Target Architecture and Transition Plan.

This planning approach is called User-centric IT Planning because it is focused on the end-user. User-centric IT Planning develops a plan that is NOT esoteric or shelfware, but rather one that is focused on being actionable and valuable to the organization and its end-users. User-centric IT plans have line of sight from the organization’s strategic plan all the way to the individual performance plans and end-user capabilities.

Now that’s the way to plan IT!


Share/Save/Bookmark

April 18, 2008

Requirements Management and Enterprise Architecture

Requirements management is critical to developing enterprise architecture. Without identifying, understanding, and rationalizing the organization’s requirements, no meaningful enterprise architecture planning can occur.

“The purpose of Requirements management is to manage the requirements of a project and to identify inconsistencies between those requirements and the project's plans and work products. Requirements management practices include change management and traceability.”

Traceability is the identification of all requirements back to the originator, whether it be a person, group, or legal requirement, or mandate. Traceability is important to ensure alignment of end products with the origination of the requirements, prioritization of requirements, and determining requirements’ value to specific users. Traceability should ensure that requirements align to the organization’s mission (intended purpose) and its strategic plan. (Wikipedia)

How is requirements management done?

  1. Stakeholders—identify program/project stakeholders.
  2. Requirements—capture, validate and prioritize stakeholder requirements.
  3. Capabilities—analyze alternatives and plan for capabilities to fulfill requirements.
  4. Resources—ascertain resource needs for capability development
  5. Activities—perform activities to develop the capabilities to meet the requirements.
  6. Measures—establish measures to demonstrate requirements have been met.

How does EA bridge requirements and capabilities?

Enterprise architecture captures strategic requirements—high-level mandates or needs. It uses this to establish an integrated set of functional requirements areas or cross-cutting categories of requirements. These drive strategic capability development to meet mission needs and achieve results of operation. Strategic capabilities are reflected in the enterprise architecture in the target and transition plan. This is used to evaluate proposed new IT projects, products, and standards to ensure that they align to and comply with the EA.

EA is the glue that binds sound IT investment decision making to strategic requirements and technical alignment.


Share/Save/Bookmark

December 21, 2007

Strategy and Enterprise Architecture

In the book Translating Strategy into Action, by Duke Corporate Education, the authors provide numerous insights into strategy development that are applicable to User-centric EA.

  • Strategy is hard—“As managers, the combination of more information, a faster pace, greater geographic reach, greater interdependence, and elevated scrutiny means the environment we manage and the problem we face are increasingly complex.” The EA strategy is hard to develop, but even harder for today’s overtaxed managers to quickly and simply execute.
  • Strategy is a differentiator—“Strategy is about being different and making choices…it outlines where and how a company will compete [or operate]…it provides direction, guidance, and focus when you are faced with choices.” The EA is a differentiator for where and how the organization will operate.
  • Strategy is purpose—“Creating strategic context for your team creates a greater sense of purpose by connecting what they are doing to the bigger picture.” The EA sets up an alignment between IT and business and establishes context and purpose.
  • Strategy must be adaptable—“Strategy will always be in a state of flux and should be adaptable to today’s fast-paced environment.” The EA must be flexible and adapt to a changing environment.
  • Information is king—“Implementing a strategy requires managers to move from data acquisition to insight. How managers make sense of information is what will set them and their companies apart.” In EA, information is captured, analyzed, and catalogued for developing strategy and enabling decision-making.
  • Always start with a baseline—“Strategy translation and execution always entails moving from where you are to where you want to be. Without an honest and incisive analysis of where you are, this journey begins on faulty ground.” In EA, you’ve got to have a baseline in order to get to your target.
  • Think capabilities—“The more important step is to focus on building the capabilities necessary to achieve these [strategic action] steps, and ultimately the intended vision.” EA should help you define and develop your operational and technical capabilities and competancies
  • Embrace change—“Get comfortable with change. Continue to learn how to adapt because the degree and pace of change is increasing. Your firm’s strategy will change, maybe not in major ways, but always in subtle and important ways.” EA requires that the enterprise is open to change, not for change’s sake, but for adapting to changes in our environment.

Enterprise architecture is a strategic, big picture endeavor. It involves developing the baseline, target, and transition plan. The EA is the enterprise strategy and blueprint for bridging information requirements with IT solutions. EA is the CIO’s strategy for meeting mission requirements.

Share/Save/Bookmark