August 21, 2008

Microsoft, Jerry Seinfeld, and Enterprise Architecture

ComputerWorld, 21 August 2008 reports on a news article in the Wall Street Journal that “Microsoft hires Seinfeld to bite Apple.”

“Continually painted by Apple and other rivals as uncool and unsafe, Microsoft plans to spend $300 million on a new series of advertisements designed around its ‘Windows Not Walls’ slogan that will feature Seinfeld and Microsoft Chairman Bill Gates.”

“Microsoft is not only trying to turn around a stodgy corporate image, but also wants to reverse recent product misfires, including the Windows Vista Operating System and the Zune digital music player.”

“Apple has rubbed in Microsoft’s lack of success and highlighted its own winning streak in a series of ‘Mac vs. PC’ ads.”

Is the Seinfeld ad a good branding strategy?

Well as my wife said, “this is as close as Microsoft can get to cool.”

Seinfeld, while rated by TV Guide in 2002 as one of the greatest TV programs of all times, is at this point somewhat dated—having aired nine seasons between 1989 and 1998—so it was over ten years ago! (Wikipedia)

In perspective, Seinfeld was already off the air before Vista, Zune, or the iPhone was ever created.

Microsoft’s attempt at reversing their “stodgy corporate image” is a feeble attempt that in fact solidifies that very image. It is no wonder that Microsoft is enamored with the 1990’s when they were the king of the hill in corporate America and in the technology arena with the launch of Microsoft Office in 1989 (the same year Seinfeld episode 1 aired) and before Google was founded in 1998 (the last season Seinfeld aired).

The Wall Street Journal, 21 August 2008, reported that “Microsoft is a little like the General Motors of technology. The software giant is, of course, much more successful, financially and in market share, than the troubled auto maker. But as at GM, Microsoft’s very size—over 90,000 employees—and it bureaucratic structure often make the company seem more stolid and less innovative than smaller, nimbler rivals like Google and Apple.”

From an enterprise architecture perspective where is Microsoft going wrong?

Microsoft is still living in the past—hence, the choice of the historic Jerry Seinfeld as their new image maker. Rather than acknowledging their current architecture and looking to the future or target architecture and how to transition forward, Microsoft keeps looking in the rearview mirror at where they were 10, 15, 20 years ago.

Microsoft keeps trying to catch up to the new generation of innovators like Google and Apple by either trying to acquire the 2nd tier competition like Yahoo or developing copycat products like the Zune.

More recently, Microsoft has tried to become more agile and take advantage of smaller groups to break their bureaucratic and cultural logjam. One example is Live Labs, “a small operation that aims to turn technology theories into real, Web-based products relatively quickly. It has only about 125 employees, and even that modest number is broken up into smaller teams tackling specific projects.”

Even if Live Labs succeeds, what are the other 89,875 employees at Microsoft doing?

To really compete in the future, Microsoft needs better planning and governance and this is what enterprise architecture can bring them—a forward looking and improved decision making framework.


Share/Save/Bookmark

August 10, 2008

Man-Machine Interface and Enterprise Architecture

A critical component of User-centric Enterprise Architecture is designing technology solutions to meet end-user requirements, and this includes making the man-machine interface simple and user-friendly. Often, this is referred to as ergonomics, defined as “the applied science of equipment design intended to maximize productivity by reducing operator fatigue, safety and discomfort. “ (www.spyderco.com/edge-u-cation/glossary.php)

According to Federal Computer Week, 4 August 2008, “Air Force researchers aim to help pilots and others operate increasingly complex aircraft and mission support systems.”

Unfortunately, all too often, the man-machine interface is not dealt with up front. “Traditionally, the machine and the technology are designed first and then the pilot has to deal with what’s left over, usually through training,” says Maris Vikmanis of the Air Force Research Laboratory.

Not designing in ergonomics from the get-go is a failure to consider the human capital perspective of enterprise architecture and will result in technology solutions that are sub-optimal to the end users and to the performance of the mission.

Dan Goodard, chief of the directorate’s Warfighter Interface Division, states, “There’s now so much reconnaissance data flowing down into the AOC (Air Operations Center) that it’s information overload. You need a much better human-machine interface to be able to get actionable information out of this very quickly.

One example of enhancing man-machine interface is “deciding the best interface for people to use with onscreen data. A regular mouse turns out not to be so good for this; it would be better if someone could actually reach into the data to interact with it, which means devising more tangible interfaces.” (Remember the movie Minority Report…) I do not know if this type of 3-D data interface even has a name yet, but I would call it something like virtual data manipulation (VDM).

Another example goes beyond the senses of sight and touch to that of hearing. “Sound perception can play an equally important role in combat scenarios. On the battlefield, people often pick up aural cues about what’s happening before they see it. Developing technology that can take advantage of that is the goal of Battlespace Acoustics Branch of the Warfighter Interface Division.”

We’ve got to change from the “build it and they will come” mindset of the failed dot.com era to a more User-centric EA approach that demands that we design IT with the end-user in mind.

As Goodard summed up, “there’s been a lack of awareness about the importance of the man-machine interface in the early designs of weapons systems.” It’s certainly time to change that and not only for military and law enforcement systems, but for IT across the board.


Share/Save/Bookmark

August 9, 2008

IT Project Failures and Enterprise Architecture

Based on a number of studies done in the last 10 years (such as The KPMG Canada Study, The Chaos Report and others), it has been established that more than 50% of IT projects fail outright!

Why do IT projects fail? More often than not, it’s because managing IT has become a by the seat of the pants proposition—where things get decided by gut, intuition, politics, and subjective management whim. And we know that is not how to manage IT.

The way to make order out of IT project chaos is through enterprise architecture and IT governance.

EA is how we plan IT, synthesizing business and technology information, and driving business process reengineering, improvement, and the introduction of new technologies.

Governance is how we administer structured, consistent, and collaborative decision making, so managing IT is no longer a black box affair.

Together EA and IT governance provide for sound IT investment decision making, where EA serves as a strategic information asset to guide and influence capital planning and investment control activities of select-control-evaluate to ensure more successful IT project delivery.

Interestingly enough, Federal Times, 4 August 2008, corroborates the true high failure rate of IT projects.

According to the GAO, “Baseline adjustments hide the truth on OMB’s IT projects.”

“OMB considers a project to be over budget and off schedule [i.e. at risk] if it is projected to miss its targets by more than 10 percent.”

The reason though that all the IT projects missing the mark don’t show up on the OMB high-risk list is that “nearly half of the 180 IT projects surveyed by GAO have been rebaselined at least once. Of those, half were rebaselined twice and 11 percent were rebaselined four or more times,” according to David Powner GAO’s director of IT management issues.

What exactly does rebaselining mean?

“Nearly all of the rebaselined projects altered their cost and schedules because of changes in requirements or funding,” according to Karen Evans, OMB’s IT administrator.

So, if your changing the projected IT cost and schedule to match the actual—well then guess what? Naturally, more of your IT projects magically seem to meet their cost and schedule goals, and the true IT project failure rate is obscured.

Note that OMB is only looking at cost and schedule overruns and that doesn’t even take into account missing the mark on IT project in terms of performance parameters—one of the most important aspect of IT projects true success.

Perhaps, if we focus more on truly investing in better enterprise architecture and IT governance, then organizations wouldn’t need to rebaseline their cost and schedule projections to make for faux IT project success.



Share/Save/Bookmark

August 8, 2008

Prediction Markets and Enterprise Architecture

A very interesting article in ComputerWorld, 7 August 2008, called "Bet on it; Employee wagers help companies predict the future," shows how difficult planning can be and highlights the necessity of bringing stakeholders to the table to get better information (enterprise architecture) and better decisions (IT governance).

Google, for example, has for three years been using employee bets (over 80,000 so far) to predict market technology. “And Google has found that its employee bets are usually right.”

Forrester Research Inc. suggests that other companies can benefit from putting in place prediction markets to more effectively tap employee opinions on topics ranging from if a store will open on time to picking specific features for a new product.”

Oliver Young, a Forrester analyst, says that “One of the biggest struggles that most companies have—not surprisingly—is predicting the future. Simple things like project updates are full of politics, full of meetings. One of the biggest values of prediction markets is you get a lot more people looking at these major questions.”

Other companies like Best Buy, Corning, HP, and Qualcomm are using predictive markets for sales projects, product evaluations, estimating project delivery, and assessing market conditions.

In predictive markets (a.k.a. crowdsourcing), “employees operate as traders to earn points--and potential prizes and other recognition--for correctly predicting future events…for example, a person who has been good at predicting how new products will be received can be invited into meetings where new product designs are discussed.”

While betting is typically associated with greed and vice and people ending up losing their shirts, in predictive markets, employee betting is used in a positive way to capture information from a broad spectrum of people and thus, enable better governance/decision making.

Predictive markets are an affirmation of the need to bring people in the planning and decision making process. Information needs to be captured from across the enterprise , for example, using predictive markets or other collection techniques.

The more information served up in a user-centric way, the better the decisions.


Share/Save/Bookmark

August 3, 2008

Texting Gone Wild and Enterprise Architecture

Information availability and communication mobility is all the craze. We are connected everywhere we go. We have our phones, PDAs, and laptops as part of our everyday gear. We wouldn’t leave the house without one or more of them or a converged device like the iPhone or Sidekick. And people are walking and driving around yapping on the phone or typing out text messages. Evan at work, people are answering the phone and texting in the stall. What is it about being connected with these devices that we literally can’t let go?

The Wall Street Journal, 25 July 2008, reports that “Emailing on the Go Sends Some Users Into Harm’s Way.”

These multi-taskers “ram into walls and doorways or fall down stairs. Out on the streets, they bump into lampposts, parker cars, garbage cans, and other stationary objects.”

Are people getting hurt?

You bet. James Adams of Northwestern Memorial Hospital is Chairman of Emergency Medicine, and he states “he has treated patients involved in texting incidents nearly every day this summer.”

Things have gotten so out of control that one London company began “outfitting lampposts with padded bumpers in the in the East End to cut down on injuries to errant texters.”

The stories go on and on about texters who bump into brides at wedding, fall off of curb and into construction barricades, walk into two-by-fours toted by construction workers, knock into bikers, and fall down staircases.

As a student of organizational behavior and an enterprise architect, I ask myself what is going on that people feel such a compelling need to be in touch literally every second. Are people craving intimacy? Are they insecure? Do they get a high by connecting with others and just can’t stop? Is this good thing for society and our organizations?

Certainly, the ability to communicate anytime, anywhere is a good thing. It makes us more capable. It can make us more productive (if we don’t end up killing ourselves in stupid accidents doing it irresponsibly). But like all good things, we need to learn to control our appetite for them. It’s the difference between eating thoughtfully or eating thoughtless, like glutton. Or between taking medicine when needed to treat a legitimate medical condition or just using recklessly like an addict.

Part of good enterprise architecture is building balance into the organization. Architects introduce new technologies to enable performance, but should also help develop policies and ensure training for responsible usage.

It’s terrific to bring new capabilities to the organization and society, but our role as architects does not end there. The human capital perspective of the enterprise architecture comes into play and demands that we go beyond the pure business requirements and technology solutions, and explore the impact of the technology on the people who will use. The human capital perspective of the architecture provides a lens through which we can manage the integration of people and technology.

I’d believe that we should educate people to use technology more responsibly, rather than outfit every lamppost and tree with bumper pads!


Share/Save/Bookmark

August 2, 2008

Big Brother and Enterprise Architecture

When people work from home, should their employers simply set performance goals for them and then evaluate them based on whether or not they met these or should employers monitor employees work at home to ensure that employers are where they say they are and doing what they say there are doing?

The Wall Street Journal, 30 July 2008, reports that “companies are stepping up electronic monitoring and oversight of tens of thousands of home-based independent contractors.”

Home-based workers have been increasing steadily over the years, with over 16 million home-based workers now in the U.S. That is huge!

But work is not care-free for these home workers. They can’t be sitting around working in their underwear, watching YouTube, or playing Sudoku. Employers are more often monitoring their employees by “taking photos of workers’ computer screens at random, counting keystrokes and mouse clicks, and snapping photos of them at their computers.”

That’s the visual inspection going on; then there is the audio piece. Companies are “plying sophisticated technology to instantaneously detect anger, raised voices, or children crying in the background on workers’ home-office calls. Others are using Darwinian routing systems to keep calls coming so fast workers have no time to go the bathroom.”

Is this big brother watching mentality too invasive or is it appropriate when we’re on the clock?

Well even well intentioned monitoring of home employees can certainly be taken to an extreme. One company, Arise-com “keeps its 8,000 at home agents so tightly tethered to their phones that they have to go schedule unpaid time off to go to the bathroom.”

From an enterprise architecture perspective, I believe it’s important to consider not only the performance aspect to the organization in terms of productivity and cost-effectiveness of these workers, but also to look at from a human-capital perspective with respect to treating the employees with trust, respect, and integrity.

I believe that people should be given the benefit of the doubt and treated kindly and humanly and not subjected to undue and invasive monitoring like photographing them on a webcam. Instead, let’s set ambitious, but realistic performance goals for our employees. Most the time, work at home employees end up exceeding performance expectations. For those that don’t meet their goals, then additional monitoring is appropriate to further assess their performance and to decide whether the privilege of working at home should be continued or not.

Trust but verify. Let’s start off with a core dose of trust, but have the verify ready to go for those that abuse it.


Share/Save/Bookmark

August 1, 2008

Robot Soldiers and Enterprise Architecture

Enterprise architecture can plan, but it must also perform outreach to meet stakeholder requirements and get their buy-in and commitment. A plan without acceptance is shelf-ware.

National Defense Magazine, March 2008, reports on Robot Soldiers, where the technology now exists to make them autonomous and carry lethal weapons—a deadly combination—but the military is not ready to accept it (yet).

“An armed robot with body armor could walk into an ambush, ‘coolly find target, and prioritize them, without getting scared, without making a mistake…In a constricted environment you don’t want to go one on one with a computer controlled weapon system. You’re not going to win that one. The robot is going to get you before you get him.’”

These soldier robots have come a long way. In World War II, the Germans tele-operated 8,000 Goliath suicide robots to blow up bonkers or tanks. Now these robots are autonomous meaning they need little to no operator intervention. “A reconnaissance robot, for example, can be sent into a bunker without any radio link, and come out with a complete map populated with icons showing the location of people, weapons, or evidence of weapons of mass destruction.”

Additionally, robots can now carry lethal weapons, including guns and rocket launchers or non-lethal weapons such as pepper-ball guns, and they have various sensors “to help them navigate rooms and avoid obstacles,” and track friendly forces. They can protect themselves against tampering, conduct explosive ordnance disposal (such as in Iraq), patrol installations, and bring the fight to the enemy. The robot soldier can accompany a real-life soldier—it can follow and keep pace—and when the soldier picks up a weapon and points it at something, so does the robot. A handy companion indeed when you’re about to get into a firefight!

Yet, despite how capable these robot soldiers are, barriers to acceptance remain. Outfitting an autonomous robot with a lethal weapon to use against humans is a big step and one that many in the military establishment are not ready to accept. But is it just a matter of time, especially if our enemies are developing these capabilities too?

It’s interesting that technology can get ahead of our ability to accept it, integrate into our norms, cultures, and way of life. An enterprise architect’s job is not just to identify and introduce new technologies (and business process improvements) to the organization, but to actually help manage the change process and adapt the new technologies to meet the mission.

In the case of robot soldiers, the acceptance and culture change will need to be met with many safety precautions to ensure that even robots functioning autonomously can be managed safely.


Share/Save/Bookmark

July 27, 2008

Situational Awareness and Enterprise Architecture

EA is a tool for situational awareness and planning to drive modernization, transformation, and improved results. Enterprise architecture helps us as organizations to be more aware of our business and technology resources, desired outcomes, and ways to link resources/investments to results.

As far as mankind can remember, we have always looked to plan ahead to manage change and complexity. In the times of the pharaohs, people looked to the stars for a sign of what was to come. In past centuries, others have looked into the crystal ball to foretell events and plan accordingly. To many, these rudimentary methods were all they had to gain a semblance control over their lives and a world that probably felt very out of control much of the time.

Now the military has a crystal ball all of its own to deploy to the battleground to provide better situational awareness to our troops, and this is particularly helpful for identifying the enemy in close urban combat, as that which we find ourselves fighting in Iraq and Afghanistan, now-a-days.

National Defense Magazine, March 2008, reports that ODF Optronics, a technology company in Tel Aviv, Israel has developed an eye-ball surveillance system “which consists of a hardened sphere that houses a sophisticated camera system and comes with a wireless display unit. Durable eye ball can be thrown over walls, into streets, tunnels, houses, or any other place of interest. Once the sphere hits the ground it establishes a 360-degree video image of the surrounding area and feeds it to operators holding the small display unit. It also features audio and day/night sensors.”

Other models like the omni-directional system, “is a sensor platform that is housed inside a hardened pole that can be mounted on top of a vehicle. It provides a 360-degree field of view for the crew inside…A five camera system is housed inside the cylindrical structure that transmits video images to a rugged laptop sitting inside the vehicle.”

ODF is now working with the DoD technical support working group and DARPA developing new sensors, because they “understood that military forces need to see the world around them.” But the truth is with all need to see the world around us with ever more comprehensive views, better resolution and clarity of image, and enhanced processing to understand what we are seeing. Only with this type of situational awareness are we better able to plan and respond to the world around us.

Like the ODF eye-ball for high-tech military surveillance and reconnaissance, our organizations need the ability to capture and analyze information and develop what Danny Nadri, a retired Israeli Air Force captain calls “quick actionable information.” And enterprise architecture is one important tool to provide us this situational awareness and planning capability.


Share/Save/Bookmark

July 26, 2008

Lessons from GE and Enterprise Architecture

General Electric (GE) is one of the largest, most successful, and most respected companies in the world. What lessons can we learn from their CIO to more successfully architect and manage our enterprises?

Fortune Magazine, 21 July 2008, reports on an interview with Gary Reiner, the CIO of GE, who has been in his role for a dozen years and oversees a $4 billion IT budget.

Reverse auctions

In purchasing IT, a major corporate expense these days, buying on reverse auction can save your enterprise mega bucks. A reverse auction is one where the purchaser puts out the specs for what they are looking to buy, and sellers bid their lowest price they are willing to sell at. (This is the opposite of a traditional auction where a seller puts out their wares for buyers to bid their highest price they are willing to purchase at). You want to avoid selling on auction at the lowest price (by differentiating you product so it isn’t treated as a commodity), but you want to purchase on reverse auction to get the best price for your purchases. In our organizations, perhaps enterprise architecture can partner with procurement and finance to leverage reverse auctions in planning for and purchasing major IT investments to reduce total cost of ownership (TCO) thereby more effectively managing scarce IT resource dollars i.e. getting more modernization/transformation for the IT dollar.

Process Improvement

GE’s CIO is responsible for Six Sigma, driving down deviances and defects in its processes. GE’s CIO says that “Six Sigma is a wonderful tool, but it is [just] a tool. What we are talking about as a company is outcomes, and the two outcomes we really want are product reliability and customer responsiveness…on the responsiveness side, it’s often less about Six Sigma and more about getting the right people in the room to map out [the processes for] how long it takes for us to do something…[and] take out those things in the way of meeting customer needs responsibly.” From an enterprise architecture perspective this is closely aligned to the idea of IT as an enabler for business, but one where business process improvement and reengineering comes first.

Information-based business

GE businesses are information-based. “In every one of our infrastructure businesses, we do something called remote monitoring and diagnostics, where we attach sensors to our equipment. So there are sensors in every locomotive, every gas turbine, every aircraft engine, [and] every turbo compressor. We’ve got software that resides with our customer or in our shops…that analyzes that data and is able in many cases to predict problems before they occur. We can prevent outages from occurring.” This information-based approach is similar to enterprise architecture and IT governance. The enterprise architecture is the information-based planning for the organization’s business and IT. And the IT governance is the information-based management and monitoring for selecting, controlling, and evaluating investments. Together enterprise architecture and IT governance are our “sensors” for predicting/planning the change and preventing problems/ensuring more successful IT project delivery.

Emerging technologies

GE sees a number of emerging technologies as having a major impact in coming years. The first, man-machine interface will evolve from keyboards and mice to “multitouch gestures,” such as “the ability to use your hands directly on screens.” Secondly, organic light-emitting diodes (OLED), “extremely thin screens…so thin that you’ll be bale to roll them up and fold them and carry them…you’ll be carrying around your screen.” And third, is cloud-computing, ‘having all your applications centrally located…[with] almost every document you create is for collaboration” and built on the web. In short, it’s really all about increased mobility of communications and ubiquity of information. Enterprise architecture should help facilitate the adoption of these new technologies.

Innovation

At GE speed to market is critical to bringing new product innovations to market, providing value to customers, and maintain an edge on the competition. IT is an enabler for new product development processes. In enterprise architecture, innovation is critical to breaking old paradigms and thinking out of the box and making real change that has contributes to significant improvements in organizational results. In product development, for example, I believe this involves everything from next generation computer aided design and manufacturing tools (CAD/CAM) to business intelligence systems and fusion engines for analyzing your customers and market changes to advances in automation and robotics for speeding and improving the manufacturing process.

GE is helping lead the way building sound enterprise architectures in corporate America!


Share/Save/Bookmark

July 20, 2008

A Net-centric Military and Enterprise Architecture

Information is central to the Department of Defense’s arsenal for fighting and defeating our enemies and the ability to share information across interoperable systems in the way ahead.

National Defense, March 2008 reports that while a net-centric military is our goal, the transformation is a work in progress.

Brig. Gen. David Warner, director of command and control at DISA stated: “in this war, information is truly our primary weapon. You can’t move, you can’t shoot, if you can’t communicate.”

Yet, “the Defense Department continues to acquire stovepiped systems…the requirements change, the system grows, and then there are cost overruns. One of the first items to cut from the budget is interoperability.”

Air Force Gen. Lance L. Smith says, “the dream of a truly net-centric U.S. military will not happen overnight. But progress could be achieved within the next five to 10 years, It will be a matter of waiting for the stovepiped legacy systems to come to the end of their lifespan. If the services get onboard and stop building non-interoperable technologies now, then the new generation of net-centric communications can take over and become the norm.”

This sounds to me like the problem isn’t limited to legacy systems, but that there are still cultural, project management, and change management issues that are obstacles to achieving the net-centric goal.

The challenges are even greater and more complex when it comes to sharing information with “federal civilian agencies and foreign allies…NATO, for example, has no mechanism to ensure its members are interoperable with each other.”

Today the normal way to do business is to ‘exchange hostages’ which means sending personnel from one service, agency, or coalition partner to each other’s command centers so they can verbally relay information.” This typically takes the form of interagency operation command center, and is not very net-centric.

So we continue to have stovepipes for “communications or data sharing systems built by different agencies, armed services, or coalition partners that cannot link to each other…[yet] the U.S. military is trying to make itself more lethal, faster, and more survivable. [And] the key to doing that is the ability to share information.”

Net-centricity, interoperability, and information sharing are true cornerstones to what enterprise architecture is about, and it is where we as architects are needed to take center stage now and in the years ahead in the war on terrorism and the other challenges we will face.

From an EA perspective, we need to ensure that all of our agencies’ targets, transition plans, and IT governance structures not only include, but emphasize net-centricity and enforce it through the EA review processes and the investment review board. There is no excuse for these stovepipes to persist.
Share/Save/Bookmark

July 18, 2008

To Be A CIO and Enterprise Architecture

Public CIO Magazine, June/July 2008, has some interesting articles on what it takes to be a next generation CIO (and many of these have to do with enterprise architecture).

Here are some tips (adapted from Public CIO):

  • Develop your EA and IT Governance Capabilities—one of the first moves of Michael Locatis, the CIO of Colorado, was “hiring an enterprise architecture team leader and the development of new governance structures.” This is critical in effectively planning and change managing the consolidation of IT. In Colorado it means uniting “20 disparate IT departments into a single citywide Technology Services Division.”
  • Be a strategist—Liza Massey, CEO of The CIO collaborative, a Las Vegas-based consultancy believes that a “CIO needs to make the leap from being a technologist to being a strategist [what EA planning is all about!]…’you have to be seen as a peer working for the good of the organization, not as the chief geek.’” She says, “if you know the version number of the operating system running on your mainframe, you’re probably not a CIO.”
  • Understand that mission drives technology—Pat Schambach, retired CIO of the Secret Service, ATF, and the TSA said “it was his ability to understand his organization’s business imperatives that made him CIO material.” Pat states about the Service, “they wanted someone who knew the mission well and could bring technology to bear against that mission.” Again, this is good EA and IT governance in practice: where business drives technology and not doing technology for technology’s sake.
  • Focus on business processes—Vivek Kundra, the CTO of Washington DC believes that “The key is to focus on the business process.” He stated, “My approach is to go after the core of the problem, to look at how the employees do their jobs and then look for how we can affect change.” Again, this is EA synthesizing business and technology to satisfy mission and end-user needs and requirements.
  • “Behave like an enterprise”—Dave Wennergren, Deputy CIO for the Department of Defense and prior CIO of the Navy, said “we have to behave like an enterprise. We don’t need 50 smart card solutions or 50 collaboration tools.” He believes “the enterprise can be responsible for tools everyone uses, freeing up agency developers to work on tools specific to their needs.” In other words, we can leverage enterprise architecture and IT governance to develop enterprise solutions that are cost effective and efficient, but at the same time remain nimble in meeting niche or localized needs.
  • Be able to translate business to technology and vice versa—Alan Shark, executive director for the Public Technology Institute said, “I’m seeing a big shift from issues that were purely technology to issues have much more to do with IT governance and leadership—being a translator between the technologists who work in the trenches and the politicians or the [higher-level] people who just want to hear the facts.” Again, EA plays a critical role here in synthesizing business and technology to enable better IT decision making for the mission/business.
  • Leadership skills—In the latest survey of the National Association of State CIOs, the traits that rose to the top for CIO success: “communication skills, negotiation skills, being able to collaborate and work across the agencies, to work with their executive team.” Laura Fucci, the CIO of Clark County Nevada (home to the Las Vegas strip) echoes these sentiments for a CIO and talks in terms of team building [and networking], being a consensus builder, improving customer service (ITIL), studying metrics, and good project management.

A few other traits worth mentioning from David Wennergren, from DoD, is continuous learning and studying and driving best practices. This again ties strongly to enterprise architecture which builds the target architecture, transition plan, and IT strategic plan, bringing together the best practices from inside and outside the organization to move it steadily forward.

Clearly, the enterprise architecture is the foundation for a successful CIO and the organization he/she serves.


Share/Save/Bookmark

Learning from the Private Sector and Enterprise Architecture

There is a terrific article in ComputerWorld, 17 July 2008, called “Pentagon’s IT unit seeks to borrow tech ideas from Google, Amazon, other companies.”

Defense Information Systems Agency (DISA) provides IT solutions to the Department of Defense. So what DISA does has to be state-of-the- art and best practice 24x7x365. Their mission depends on it!

To keep ahead of the curve, John Garing, DISA’s CIO and a retired Air Force colonel has been visiting with top tier private sector companies like Google, Amazon, UPS, Sabre, and FedEx to identify their best practices and incorporate them.

What has DISA learned from the private sector?

1. Cloud Computing

According to Garing, cloud computing is “going to be the way—it has to be. We have to get to this standard environment that is provisionable and scalable.”

To this end, “DISA has begin deploying a system [Rapid Access Computing Environment (RACE)] that is similar architecturally to Amazon’s Elastic Compute Cloud (EC2) technology, a web-based computing service that enables users to quickly scale up their processing capabilities.”

Using RACE, a soldier in the field will be able to use a client device (like a PDA) with web support and “dynamically access a wide range of information sources and meld together data,” such as blue force tracking, mapping of combatant locations, identification of aid stations, fuel and ammunition supplies, and so forth.

2. Elastic and flexible

DISA has to be prepared to handle the unexpected and this means they need to be able to flexible to meet a mission need or fight a war or two. Garing has found that companies like Amazon and Sabre have built their IT infrastructures to enable “elasticity and flexibility.”

3. Competing for business

Like the private sector that competes for market share, DISA sees itself and operates “like a business and produce[s] an attractive offering of IT services at a competitive price. They recognize that they “compete for the business it gets from other military agencies, which in some cases have options to use private-sector IT service providers.”

4. Process-driven and Speedy

Like enterprise architecture, which looks at both business processes and technology enablement, Garing is “interested in the processes that companies use to deploy technology, not just their technology itself.” DISA wants to learn how to speed an idea to a service in just a few months as opposed to the years it often takes in DoD.

DISA is learning that cloud computing will enable increased standardization through a “standard suite of operating platforms” as well as increased “deployment speed and agility.”

By being open to learning from the private sector, Garing is leading an enterprise architecture that is making for a better and more capable DoD.

Job well done DISA and a shining example for the rest of the federal space!

Finally, learning is not a one-way street and surely the interchange between the public and private sector can lead to improvements for all.


Share/Save/Bookmark

July 14, 2008

Gobbledygook and Enterprise Architecture

The premise of User-centric Enterprise Architecture is to transform traditional EA, which is often user-blind, and which develops “artifacts” that are difficult for the end user to understand and apply, and to instead produce truly useful and usable information products and governance services.

User-centric EA is about taking the gobbledygook out of architecture and making it clear and simple for the end user to understand.

The User-centric EA approach has a lot in common and is consistent with the drive to make federal communications, in general, more straightforward and understandable.

Government Executive magazine, July 2008 reports that “Congress is on a crusade to clean up the language in federal documents.”

The Plain language in Government Communications Act covers benefit and tax forms, letters, publications, notices and instructions sent to the public. Under best practices mandated by the bill, federal document drafters would have to tailor communications to targeted readers, employ personal pronouns, offer examples, and use the active voice.

Spread government wide, such fixes would save agencies, citizens, and businesses billions of dollars in time and effort, backers say. The prospect of simplified interaction with the government has won the proposed legislation backing from influential organizations such as AARP and the National Small Business Association.”

The goal of the “plain language” legislation is to kill off the “clause-ridden federal guidance that former vice President Al Gore used to deride as ‘gobbledygook’ [in exchange for]…lean prose and declarative sentences.”

Oh, music to my ears and eyes!

Unfortunately, there are still quite a few naysayers out there when it comes to making things easy.

So, “by design the plain language legislation is modest. The bill exempts internal communications. And to avoid opposition from agency lawyers, it does not cover federal regulations.”

Why would anyone want to make things more difficult or NOT User-centric?

Frankly and with all due respect, the explanations I read—about plain language causing existing policy to become muddled or about having a one-size-fits-all policy not working—sounded like more gobbledygook.

Some people argue that by “oversimplifying” documents, you are leaving out important information or missing shades of meaning. However, it’s the job of professionals to communicate effectively regardless of the complexity. Put simply, how can taxpayers comply with laws and regulations if they don’t understand them?

Plain language and user-centric is the way to go in serving our citizens and our organizations.

P.S. Hats off to Annetta Cheek, chairwoman of the Center for Plain Language.


Share/Save/Bookmark

July 13, 2008

Secure Border Initiative and Enterprise Architecture

The enterprise architecture change process starts with requirements generation and management. Requirements become business cases and business cases become decision requests for new or changes to IT projects, products, and standards that go before the enterprise architecture board (EAB) and ultimately to the IT investment review board (IRB). The decision requests get vetted against the architecture for business alignment and technical compliance by the EAB. The IRB takes the findings of the EAB and also looks at return on investment and risk management. Approved changes to the IT environment get added to the enterprise architecture.

So mission-business requirements from the program sponser/end user are the starting point for changes to the EA.

What happens though when requirements are unclear?

Obviously, if the requirements are unclear, then proposed changes to the enterprise are sort of like shooting in the dark, and the ability to develop viable technical solutions is a guessing game.

An article on Secure Border Initiative in National Defense Magazine, July 2008, demonstrated how the architecture does not add up, when the “Border Calculus” is a big question mark.

After 9/11, securing the border became a more publicized issue. With the formation of DHS, the Secure Boarder Initiative (SBI) was set up in 2005.

SBI is supposed to secure the border, okay. But secure it against what is the question. What are the requirements for securing it?

  1. Illegal immigrants—“For many Americans—especially these who don’t live near the border—illegal immigration is what prompts their calls for a beefed up border.” While some say that “the U.S. economy depends on cheap labor…others claim illegal immigrants are a drain on the economy.”
  2. Terrorism—“For the Department of Homeland Security, charged with protecting the nation, keeping weapons of mass destruction out of the United States is the priority.”
  3. Drugs—“for many who live north and south of the four states that border Mexico, the real threat is narcotics.”

Each of these purposes, changes the equation. If the primary purpose you are securing the border is to protect against a genuine threat of weapons of mass destruction, then some may argue for highly secure border, one that is truly non-porous, without regard to cost. However, if the goals are more for controlling illegal immigration, perhaps a less perfect and less costly border security solution is acceptable. And if drugs are the issue, then maybe the money is better spent going after the source, rather than building fences that can be circumvented.

So understanding and building consensus on the true requirements are critical to developing a business case and a technical solution.

As it stands now, SBI is going in two directions:

  1. Physical fence—“to stop those on foot or on vehicles.” Estimates by the Congressional Research Service “say that maintaining those fences may cost up to $49 billion.” While critics say that these physical barriers “only delay an illegal crosser three to four minutes,” so is this worth it?”
  2. Virtual fence—“Sensors, cameras, improved communication systems and unmanned aerial vehicles.” According to the article, “no one seems know how much it will cost to set up and maintain these high-tech systems throughout their lifespan.”

Additionally, “plans call for doubling the number of border patrol agents.”

I guess without a clear consensus on what we’re trying to accomplish, any solution will get us there or not. Isn’t this what an enterprise architecture is supposed to help with—establishing a clear roadmap or blueprint? Of course, but it’s got to start with the requirements generation process and with the business owners.


Share/Save/Bookmark

July 12, 2008

Global Innovation and Enterprise Architecture

For architecting the enterprise, we need good ideas to mature, evolve, and innovate. And good ideas can come from literally anywhere, so we should not limit ourselves to looking for them in-house, in our industry, locally, regionally, or nationally. Good ideas are global and we need to reach out for these ideas, adopt them, and make them our own, regardless of where they originate.

National Defense Magazine, July 2008 reports that “technology flows freely across national borders and the United States depends on foreign technology to secure its military edge, says a new study by the Center for Strategic and International Studies.”

In fact, “many of the greatest achievements in U.S. weaponry were made possible by foreign technologies, ‘whether that is nuclear weapons thanks to German Jewish scientists, whether it is space, thanks to German scientists…whether it is armored vehicles, a British invention, or airpower, also a British invention. Stealth technology was actually a Russian algorithm that Northrop Grumman scientists happened to see at a conference that told them how to calculate the bouncing of radio waves,” says Pierre Chao a defense industry analyst.

Remember, while the U.S. populace has many advantages including being diverse, highly educated, relatively affluent, and having the freedom to pursue and express new ideas, we represent only 4.5% of the world population. So we do not have a monopoly on science, engineering, and innovation.

Actually, “by 2010, if current trends continue, more than 90 percent of all scientists and engineers will be living in Asia,” according to Mario Mancuso head of the bureau of industry and security at the Department of Commerce.

Additionally most of our military technologies come from abroad. “In the past, approximately two-thirds of our nation’s military technologies were developed in a defense R&D setting, with the remaining third coming from adaptations of commercial, off-the-shelf technologies. Today, those proportions have been almost exactly reversed.”

Even our most advanced new jet fighter, the Joint Strike Fighter, is a global initiative, “with hundreds of contractors across many borders.”

There is an old saying that there is strength in numbers. The world is 6.7 billion in number and growing fast; the U.S., while a superpower is only a small part of the whole world. Therefore, we need to embrace innovation from everyone that can contribute positively. Innovation is incremental; we can learn from others, build on it, improve on it, and integrate it with our own creativity. Then we are architecting our enterprises with the added force of globalization.

While it would be good if the U.S. could retain its leadership in innovation, the reality is that we can no longer afford to be an island of excellence. The main thing is to harvest ideas wherever they come from and leverage them in ways that help us maintain our technological edge, promote economic prosperity and support the wellbeing of our nation.


Share/Save/Bookmark

July 10, 2008

IT Planning and Enterprise Architecture

Perhaps many of you have wondered what the relationship is between the IT Strategic Plan and the Enterprise Architecture Transition Plan? Why do you need both? Isn’t one IT plan just like another?

There are many different plans starting with the organization’s strategic plan that drives the IT plan and so forth. Each sequential layer of the plan adds another crucial dimension for the plan to enable it to achieve it ultimate implementation.

The various plans establish line of sight from the highest level plan for the organization to individual performance plans and the implementation of new or changes to systems, IT products and standards, and ultimately to the capabilities provided the end-user.

Here is my approach to User-centric IT Planning:

1. Organizational Strategic Plan—the highest level overall plan enterprise; it identifies the goals and objectives of the organization, and drives the IT Strategic Plan.

2. IT Strategic Pan—the IT Plan for the enterprise; it identifies the IT goals and objectives, and drives the IT Performance Plan.

3. IT Performance Plan—a decomposition of the IT Plan; it identifies IT initiatives and milestones, and drives the IT Roadmap and Individual Performance Plans.

4. IT Roadmap and Individual Performance Plans

a) IT Roadmap—a visual timeline of the IT Performance Plan; it identifies programs and projects milestones, and drives the Target Architecture and Transition Plan.

b) Individual Performance Plans—the performance plans for your IT staff; it is derived from the IT Performance Plan, and provides line of sight from the Organizational and IT Strategic Plans all the way to the individual’s performance plan, so everyone knows what they are supposed to do and why (i.e. how it fits into the overall goals and objectives.

5. Target Architecture and Transition Plan

a) Target Architecture—a decomposition of the IT Roadmap into systems and IT products and standards; it identifies the baseline (As-Is) and the target (To-Be) for new and major changes to systems and IT products and standards.

[Note: Target Architecture can also be used in more general terms to refer to the future state of the organization and IT, and this is how I often use it.]

b) Transition Plan—a visual timeline of the changes for implementing the changes to go from the baseline (As-Is) to the target (To-Be) state for systems and IT products and standards.

6. Capabilities—the target state in terms of business capabilities provided to the end-user derived from the changes to systems, IT products and standards, and business processes; it is derived from the Target Architecture and Transition Plan.

This planning approach is called User-centric IT Planning because it is focused on the end-user. User-centric IT Planning develops a plan that is NOT esoteric or shelfware, but rather one that is focused on being actionable and valuable to the organization and its end-users. User-centric IT plans have line of sight from the organization’s strategic plan all the way to the individual performance plans and end-user capabilities.

Now that’s the way to plan IT!


Share/Save/Bookmark

July 9, 2008

DARPA and Enterprise Architecture

As a discipline enterprise architecture strives to move the organization into the future—that is what EA planning and IT governance is all about—and that is also what an organization like DARPA is about.

“The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of new technology for use by the military. DARPA has been responsible for funding the development of many technologies which have had a major impact on the world, including computer networking [the Internet]DARPA’s original mission, established in 1958, was to prevent technological surprise like the launch of Sputnik, which signaled that the Soviets had beaten the U.S. into space. The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies. DARPA is independent from other more conventional military R&D and reports directly to senior Department of Defense management. DARPA has around 240 personnel (about 140 technical) directly managing a $3.2 billion budget.” (Wikipedia)

National Defense Magazine, November 2007, states that DARPA “has a reputation for taking on challenges that sometimes seem to defy the laws of physics—or at least common sense.”

“’DARPA Hard’ refer to problems its researchers attempt to solve...’Please tell us that it’s something that can’t be done. It’s science fiction. That is a challenge we can’t resist,’” says Brett Giroir, director of the defense sciences office.

Here are some interesting target architectures that DARPA has set out to tackle:

  • Transparent walls—“DARPA wants to defeat rock, concrete and plaster walls—not by blowing them up—but rather by making them transparent. The agency is creating a suite of sensors to map the inside of buildings, tunnels, caves, and underground facilities.” The Visi-building project ,for example, uses radar to detect the inside of buildings, and then DARPA is exploring how to penetrate and destroy without resorting to nukes.
  • Inner Armor—“the objective is to fortify the entire soldier against attack from the enemy of the environment.” This includes environmental hardening to “protect soldiers from extreme heat, cold, and high altitudes,” and kill proofing “to protect soldiers from chemical and radiological threats,” as well as safeguarding them from deadly diseases. It’s a comprehensive protection package. DARPA for example envision “universal immune cells that are capable of making anti-bodies that neutralize…hundreds of threat agents.”
  • Chemical mapping—“there are about 80,000 commercially available chemicals, and many of them are toxic, DARPA wants to create a map showing where and if they appear in a given area.” This would show forces where chemical labs or weapons caches are. One idea is to use “replace sensors with nano-technology-based samplers that extract chemicals…[and that have ] a GPS device attached [that] could be placed on helicopters, military vehicles, or secretly placed on delivery trucks making rounds through a city”

These are great! You have got to love the “know no bounds” attitude of DARPA. They are truly innovators, and are a model for the rest of government and industry in defining problems and actually solving them.

In enterprise architecture, it is one thing to set targets that are incremental, non-monumental, and the same as everyone else is doing (like moving to Microsoft Vista). But it is an altogether different thing to set targets that are groundbreaking in terms of business process engineering and technology innovation.

While not all our targets can be revolutionary, perhaps a subset of them should be to keep us really innovating and not just copycatting the competition. We need to bring innovation back to the forefront of what we believe, how we think, what we do, and how we compete.


Share/Save/Bookmark

July 7, 2008

The Virtuous Cycle and Enterprise Architecture

To move the enterprise into the future, organizations need leaders who have the skills and abilities to generate genuine improved results for the organization. These leaders are not afraid of change, embrace new ways of doing things, and are generally speaking, growth oriented.

The Wall Street Journal, 7 July 2008, identifies the effective leadership traits of those who “demonstrate a virtuous cycle of beliefs and behaviors.” Here is my cut at them:

  1. Outlook on change—it starts with their outlook on life; effective leaders see “life as a journey of learning, [and] therefore embrace uncertainty, seek new experiences, [and] broaden [their] repertoire. This is in contrast to managers who follow the “vicious cycle” with an outlook that “life is a test,… [they] fear uncertainty, avoid new experiences, [and] narrow [their] repertoire. Leaders rich in experience often either come up the ranks, having been trained and worked in various diverse jobs internally or having worked in a multitude of external organizations in similar or different industries, but in either case, these leaders have been tested time again and have a developed a history of success in the face of constant or frequent change.
  2. Customer view—effective leaders “understand customers as people” (versus seeing them only as data points), and they are thus, better able to detect new growth opportunities. This reminds me of the user-centric approach in enterprise architecture that I espouse. If we focus on the end-user/customer, and take an thoughtful approach to genuinely satisfying their needs, rather than just trying to make a sale, then we will always be working to do things better, faster, and cheaper. This is a long-term growth approach, rather than a short-term market share or stock price watcher view.
  3. Action-orientation—virtuous leaders manage risk through action instead of through analysis paralysis, and they place “small bets quickly” rather than big bets slowly. One manager at a confectionary company put it this way, “get the products into the marketplace, and then start to understand what works and doesn’t work. If it doesn’t work, either take another shot at it or cut your losses.” That’s the price of learning. While this approach seems a little too loosey goosey; I do see the value of cutting off the analysis phase at a reasonable point, making a decision, and then following through with corrective action as needed.
  4. Agility—great leaders are agile and believe that “abilities are malleable” and with change can come growth, as opposed to believing that “abilities are immutable” and leaders being fixed in their way of doing things. There is a need for entrepreneurial leaders who while not risk seekers, are able to take calculated risks. They change as often as necessary to remain agile, growing their own and their organization’s capabilities in meeting customers’ needs, but they do not change for changes sake alone.

What interesting is that each and every trait identified here for effective leadership centers around change—embracing it, acting on it, managing it, and remaining nimble in the face of ever changing circumstance. This is highly consistent with the enterprise architecture view of identifying the baseline, target, and transition plan and moving the enterprise ever forward in the face of constant change.


Share/Save/Bookmark

July 6, 2008

Biometrics and Enterprise Architecture

Biometrics is “the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.” (Wikipedia)

Biometrics is crucial for identifying and taking out of play enemy combatants, terrorists, and criminals or for providing access to trusted employees or partners in public or private sector organizations, like the intelligence community, defense, security, and various sensitive industries like financial, telecommunications, transportation, energy, and so forth.

National Defense Magazine, November 2007 has an article on the significant advances being made in biometric technologies and their applications to our organizations.

According to “’The National Biometrics Challenge,’ a report produced by the Office of the President’s National Science and Technology Council…’a tipping point in the maturation of the technology has been reached.’

Both the FBI’s Information Services Division and The Department of Defense Biometric Fusion Center are leading the way in this field.

Currently, identity is established based on the trinity: “something you know (such as a password), something you have (like an identity card), or something you are, which is where biometrics comes in.”

Biometrics includes technologies for recognizing fingerprints, facial features, irises, veins, voices, and ears, and even gait.

But these are technologies identification means are not fool-proof: remembering multiple complex passwords can be dizzying and identity cards can be lost, stolen, or forged. So biometrics becomes the cornerstone for identity management.

However, even biometrics can be spoofed. For example, fake rubber fingers have been used in lieu of a real fingerprint (although now there are ways with living flesh sensors to protect against this). So therefore, biometrics is evolving toward “multi-modial” collection and authentication. This could involve using 10 fingerprints versus one or combing fingerprint, iris scans, and digital mugshots (called the “13 biometrics template” and used to gain access in U.S. managed detention centers in Iraq) or some other combination thereof.

Biometrics has advanced so much so that an Iris scan system from Sarnoff Corp. of Princeton NJ “can scan and process 20 people per minute from distances of about 10 feet away, even those who are wearing glasses.”

The keys to further enterprise application of these technologies in our enterprises are the following:

  1. Lowering the cost (especially to make it available to local law enforcement agencies)
  2. Making it rugged enough for extreme environments for the military
  3. Making it portable so that it can be used for a variety of law enforcement and defense operations
  4. Reengineering business processes so that measurements are captured, stored, accessible, and readily available for making a match and generating a decision on someone’s identity in real-time
  5. Developing policies that “effectively govern the proper use of the data” and ensure adequate protection for civil liberties and privacy.

Overall, biometrics has moved from emerging technology to applied technology and needs to be planned into your identity management architectures.


Share/Save/Bookmark

July 5, 2008

The Three I’s and Enterprise Architecture

One question that is frequently asked in enterprise architecture is whether new technologies should be adopted early (more cutting edge) or later (more as quick followers). Of course, the third course of action is to close ones eyes or resist change and simply “stay the course.”

The advantages to bleeding edge technology adoption is having the early advantage over competitors in the marketplace (this head start provides the ability to incorporate innovation into products early and capture a hefty market share and quite possibly dominance), while the advantage to quick followers being learning from mistakes of others, building from their initial investments and a more mature technology base (for example, with software, one where the bugs have been worked out) thereby potentially enabling a leapfrog effect over competitors. The advantage to staying the course is organizational stability in the face of market turmoil; however, this is usually short lived, as change overwhelms those resistant, as the flood waters overflow a levee.

The Wall Street Journal 5-6 July 2008 has an interview with Theodore J. Frostmann, a billionaire private-equity businessman, who tells of Warren Buffet’s “rule of the three ‘I’s,” which is applicable to the question of timing on technology adoption.

“Buffet once told me there are three ‘I’s in every cycle. The ‘innovator,’ that's the first ‘I’. After the innovator comes the ‘imitator.’ And after the imitator in the cycle comes the idiot. So when…we’re at the end of an era it’s another way of saying…that the idiots have made their entrance.”

I relate the innovator and the early adopter in their quest for performance improvement and their sharing the early competitive advantage of innovation.

Similarly, I associate the imitator with the quick followers in their desire to learn from others and benefits from their investments. They recognize the need to compete in the marketplace with scarce economic resources and adapt mindfully to changes.

Finally, I relate the idiots that Warren Buffet refers to with those that ignore or resist change. Often these organizations mistake their early market success for dominance and in their arrogance, refuse to cede to the need to adjust to changing circumstance. Alternatively, these enterprises are truly ignorant of the requisite to adapt, grow, mature, and transform over time, and they mistakenly believe that simply sitting behind the cash register and waiting for customers is the way to run a business (versus a Costco whose warehouse, wholesale model has turned the nature of the business on its head).

In architecting the enterprise, innovation and imitation, while not without cost and risk, will generally speaking be highly rewarded by superior products and services, greater market share and more loyal customers, and a culture of success in the face of constant change. You don't need to look far for examples: Apple, 3M, P&G, Intel, Toyota, Amazon, and more.


Share/Save/Bookmark

July 3, 2008

Earned Value Management and Enterprise Architecture

“Earned Value Management (EVM) is a project management technique used for measuring project progress in an objective manner. EVM combines measurements of technical performance (i.e., accomplishment of planned work), schedule performance (i.e., behind/ahead of schedule), and cost performance (i.e., under/over budget) within a single integrated methodology. When properly applied, EVM provides an early warning of performance problems.” (Wikipedia)

There is a terrific article on EVM called “If the Pharaoh Had Only Used An Earned Value System in Building the Pyramids,” by Lt. Col. William Neimann USAF (Ret.) Lt. Col. Neimann demonstrates very effectively how to use EVM (a scary topic to many) in a humorous scenario of ancient Egypt and the building of the pyramids.

The article starts as follows:

"The developer of the great pyramid of Egypt might be looked upon as the father of program management. He had one of the first programs in recorded history that required a great deal of integration and coordination (i.e. program management). He did not, however, have the relatively new concept of "earned value" to assist in the management of this ambitious program. An "earned value" concept is the heart of all defense contractor management information systems, which comply with DoD Instruction 5000.2 concerning the earned value management control system (EVMCS). But let's go back nearly 5,000 years to the construction of the pyramids to see if "earned value" would have been of any utility in managing that program.”

So what are the key measures in EVM for identifying cost and schedule variances?

(Positive is favorable, Negative is unfavorable)

  • Cost Variance (CV) = Budgeted Cost for Work Performed (BCWP) - Actual Cost for Work Performed (ACWP)

So, if the Pharaoh’s project manager budgeted 14 million shekels for the pyramid construction, but actual cost came in at 13 million shekel, then the project has a positive or favorable cost variance of 1 million shekels. The pyramids are under budget.

  • Schedule Variance (SV) = Budgeted Cost for Work Performed (BCWP) – Budgeted Cost for Work Scheduled (BCWS)

So, if Pharaoh’s project manager calculates that work performed was budgeted at $10 million shekels, but was scheduled to be 14 million shekels complete, then the project has a negative or unfavorable schedule variance of 4 million shekels. In other words, the pyramid builders have performed 4 million less work than planned. The pyramids are that behind schedule.

To calculate the overall project status at any given time:

  • % Schedule = (Budgeted Cost for Work Scheduled (BCWS)/Budget At Completion (BAC)) * 100
  • % Complete = (Budgeted Cost for Work Performed (BCWP)/Budget At Completion (BAC)) * 100
  • % Spent = (Actual Cost for Work Performed (ACWP)/Budget At Completion (BAC)) * 100

How efficient is the project?

Greater than 1 is favorable, less than 1 us unfavorable:

  • Cost efficiency = Budgeted Cost for Work Performed (BCWP)/Actual Cost for Work Performed (ACWP)
  • Schedule efficiency = Budgeted Cost for Work Performed (BCWP)/Budgeted Cost for Work Scheduled (BCWS)

(Adapted from Earned Value Management Gold Card, Defense Acquisition University)

There are a number of other measures, but you get the idea.

EVM is important to Enterprise Architecture, why?

Enterprise architecture planning and IT governance is all about making order out of chaos in managing IT. By setting strategic direction with the architecture and enforcing it with sound governance, we set the stage for more successful IT project delivery. EVM is a way to measure IT projects success in terms of cost, schedule, and performance. Through EVM, we can measure our IT projects to ensure that we are meeting our EA plan and making course corrections as necessary through the governance process.

EA, IT governance, and EVM are ways to ensure that we no longer manage IT by the “seat of our pants” approach (gut, intuition, politics, and subjective management whim). We now have tools to plan, govern, and measure transformation.


Share/Save/Bookmark

July 2, 2008

Always Forward and Enterprise Architecture

ComputerWorld Magazine, 26 June 2008, has a terrific interview with Loraine Rodgers, formerly Xerox CIO, Citibank senior VP, city of Phoenix CIO, and American Express director.

Her early years…

Ms Rodgers found out at 16 that she was adopted and was “so angry at being lied to I threw away my merit scholarship and refused to go to college. But I took a programmer aptitude test and I aced it, so I started in IT as a programmer. I started in the weeds.”

Over the years, “I always volunteered for seemingly thankless jobs—challenging assignments that nobody wanted.”

Here’s the best part of what she said and I believe very inspirational…

“I am self-propelled, driven, excited about life, love to learn. I got my undergraduate degree at age 40, and my MBA at 42—all working full time. I move forward always—not necessarily in a straight line, but always forward. I have been fired once, laid off twice and promoted over 27 times. I repackage myself regularly and keep moving forward. I perceive the possibilities. I am not hindered by obstacles. There are no obstacles. Some things just take longer.”

WOW!

Ms. Rodgers is inspirational on an individual and organizational/enterprise architecture level.

Ms. Rodgers story is one of overcoming life’s challenges to succeed beyond probably her wildest dreams and most of ours. To succeed individually or as an organization, there are always challenges. Life is not a straight line upward, but is marked by up and downs, hopefully like Ms. Rodgers professional life, it has generally more ups then downs, and going always in an upward pattern.

Ms. Rodgers idea of always repackaging herself and constantly moving forward is terrific and in EA can be associated with an organization continually looking to reengineer and improve their processes and introduce new technologies to enable the mission and results of operation. The key is to always being grateful for what we have been granted, yet to always strive to improve things one step further: never to be satisfied with status quo or mediocrity.

Similarly, architecting the organization is not a one-time event; rather, it is an ongoing cycle of planning, governing, and transforming. Wash, rinse, repeat.

Whether on an individual or organizational level, we must learn to “move forward always—not necessarily in a straight line, but always forward!"


Share/Save/Bookmark

July 1, 2008

Online Medical Data and Enterprise Architecture

We all need access to information. In our personal lives, what’s more important than easy access to our financial and medical records?

In the case of financial records, these are generally all maintained online now. From your banking to your brokerage, from the online deposit of your paycheck to online bill pay. However, what about our medical records?

Generally speaking medical records are not available online and not easy to access. But why are medical records lagging behind financial ones in terms of their technology enablement? Is it that there is not bona fide need? Or is it that the technology is immature?

MIT Technology Review, July/August 2008, reports that “Google and Microsoft are offering rival programs that let people manage their own health information.”

Google Health (released in May) and Microsoft HealthVault (launched in October) “allow consumers to store and manage their personal medical data online. Users will be able to gather information from doctors, hospitals, and testing laboratories and share it with new medical providers, making it easier to coordinate care for complicated conditions and spot potential drug interactions or other problems.”

However, based on a 2007 poll “just 2 percent of all respondents said they had created and maintained medical records on their own computers, and just 1 percent reported using a ‘personal health record that is stored on the Internet.”

So the issues are?

  1. New software—Google Health and Microsoft HealthVault are relatively new and haven’t caught on yet.
  2. Paper records—“many doctors still do not use electronic records and others are unwilling or unable to transfer data to patients in electronic form.”
  3. Privacy—online medical data services are “not covered by the Health Insurance Portability and Accountability Act (HIPAA), under which hospitals, doctors, and third-party payers typically cannot release information without a patient’s consent.”
  4. Sensitivity—“medical information—histories of mental illness, paternity tests, genetic information—can be far more sensitive than browsing histories or even financial records.”

From an enterprise architecture standpoint, these issues really do not make a whole lot of sense to me as being showstoppers to moving medical records online.

Firstly, there is a genuine need for medical records to be digitized and made more accessible and easy to use by patients and medical providers. Just think about being wheeled into an emergency room (possibly unconscious); wouldn’t it be nice if the emergency room physician could access your medical records before they start treating you from a pretty much blank state?

Also, have you ever wondered about the archaic paper filing system your doctor uses—you know the oodles of forms you have to fill out every time you go to a new doctor, the indecipherable notes your doctors jots down on freebee paper from the pharmaceutical companies (with their logos on it), the file folders with the colored stickers that office administers attach to them for tracking purposes, and the double and triple deep, wall to ceiling file shelves on rollers that they manipulate to store and access the records. Talking about crazy!

Further, the technology solutions are available. If we can manage the bits and bytes of our financial records discretely and securely, surely the same can be said of medical records.

I’ve got to conclude that there is a cultural issue here that is impeding the transformation to online medical records, and I don’t believe that the reluctance is coming from the patients’ side, because we are living and breathing digital information transformation daily and for the most part, we are addicted to it and love it. People are still screaming for more.

We’ve got to get the medical community to get off the dime; so that they recognize the importance to the consumer of their medical information and that they treat that information as belonging to the patient as opposed to being owned by them. Whether the medical community is holding back because they want to maintain the aura of medical mystery to what they do (have you ever tried to tell your doctor that you looked up something medical on the internet and see their reaction?) or that they want to hold onto their patients by controlling their medical records—either way we are not providing the patient/consumers the service they want and deserve, particularly when health and life are at stake.

Medical records are a prime area for transformation and they need a desperate dose of enterprise architecture to transform the sad state of affairs.


Share/Save/Bookmark