Showing posts with label Business Process Improvement. Show all posts
Showing posts with label Business Process Improvement. Show all posts

August 10, 2016

Superman Leadership

This guy's socks were very cool.

If you can say that socks make the man then perhaps this is it.

Superman that is!

No special shirt, underwear, or cape required--the socks communicate it all. 

For the man of steel or one in the making (if worn at workout time).  

Then again, I was trying to imagine someone actually having the guts or nuttiness to wear these to the office.  

If they would, it probably be with the following in mind: 

I can do anything helpful to get the job done--

1) Rolling out cutting-edge systems and business process improvements faster than a speeding bullet

2) Creating positive change more powerful than a locomotive

3) Able to leap with integrity over organizational obstacles, red tape, and naysayers in a single bound

It's a change consultant. It's a corner office bureaucrat.  It's a "superleader!"

Up up and away...it can be done (even without the socks). ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

July 26, 2008

Lessons from GE and Enterprise Architecture

General Electric (GE) is one of the largest, most successful, and most respected companies in the world. What lessons can we learn from their CIO to more successfully architect and manage our enterprises?

Fortune Magazine, 21 July 2008, reports on an interview with Gary Reiner, the CIO of GE, who has been in his role for a dozen years and oversees a $4 billion IT budget.

Reverse auctions

In purchasing IT, a major corporate expense these days, buying on reverse auction can save your enterprise mega bucks. A reverse auction is one where the purchaser puts out the specs for what they are looking to buy, and sellers bid their lowest price they are willing to sell at. (This is the opposite of a traditional auction where a seller puts out their wares for buyers to bid their highest price they are willing to purchase at). You want to avoid selling on auction at the lowest price (by differentiating you product so it isn’t treated as a commodity), but you want to purchase on reverse auction to get the best price for your purchases. In our organizations, perhaps enterprise architecture can partner with procurement and finance to leverage reverse auctions in planning for and purchasing major IT investments to reduce total cost of ownership (TCO) thereby more effectively managing scarce IT resource dollars i.e. getting more modernization/transformation for the IT dollar.

Process Improvement

GE’s CIO is responsible for Six Sigma, driving down deviances and defects in its processes. GE’s CIO says that “Six Sigma is a wonderful tool, but it is [just] a tool. What we are talking about as a company is outcomes, and the two outcomes we really want are product reliability and customer responsiveness…on the responsiveness side, it’s often less about Six Sigma and more about getting the right people in the room to map out [the processes for] how long it takes for us to do something…[and] take out those things in the way of meeting customer needs responsibly.” From an enterprise architecture perspective this is closely aligned to the idea of IT as an enabler for business, but one where business process improvement and reengineering comes first.

Information-based business

GE businesses are information-based. “In every one of our infrastructure businesses, we do something called remote monitoring and diagnostics, where we attach sensors to our equipment. So there are sensors in every locomotive, every gas turbine, every aircraft engine, [and] every turbo compressor. We’ve got software that resides with our customer or in our shops…that analyzes that data and is able in many cases to predict problems before they occur. We can prevent outages from occurring.” This information-based approach is similar to enterprise architecture and IT governance. The enterprise architecture is the information-based planning for the organization’s business and IT. And the IT governance is the information-based management and monitoring for selecting, controlling, and evaluating investments. Together enterprise architecture and IT governance are our “sensors” for predicting/planning the change and preventing problems/ensuring more successful IT project delivery.

Emerging technologies

GE sees a number of emerging technologies as having a major impact in coming years. The first, man-machine interface will evolve from keyboards and mice to “multitouch gestures,” such as “the ability to use your hands directly on screens.” Secondly, organic light-emitting diodes (OLED), “extremely thin screens…so thin that you’ll be bale to roll them up and fold them and carry them…you’ll be carrying around your screen.” And third, is cloud-computing, ‘having all your applications centrally located…[with] almost every document you create is for collaboration” and built on the web. In short, it’s really all about increased mobility of communications and ubiquity of information. Enterprise architecture should help facilitate the adoption of these new technologies.

Innovation

At GE speed to market is critical to bringing new product innovations to market, providing value to customers, and maintain an edge on the competition. IT is an enabler for new product development processes. In enterprise architecture, innovation is critical to breaking old paradigms and thinking out of the box and making real change that has contributes to significant improvements in organizational results. In product development, for example, I believe this involves everything from next generation computer aided design and manufacturing tools (CAD/CAM) to business intelligence systems and fusion engines for analyzing your customers and market changes to advances in automation and robotics for speeding and improving the manufacturing process.

GE is helping lead the way building sound enterprise architectures in corporate America!


Share/Save/Bookmark

May 8, 2008

Business Process Management and Enterprise Architecture

Business process management is part of enterprise architecture. Enterprise architecture is often equated with IT architecture. This is incorrect; they are not the same. IT architecture is focused on IT solutions. Enterprise architecture is broader and encompasses engineering both business and IT sides of the organization.

There are two primary ways that enterprise architecture modernizes and transforms the organization. From the technology side, you can introduce new technologies to enable mission. From the business side, you can reengineer or improve existing business processes.

“Business process management (BPM) is a method of efficiently aligning an organization with the wants and needs of clients. It is a holistic management approach that promotes business effectiveness and efficiency while striving for innovation, flexibility and integration with technology.” (Wikipedia)

Where does BPM fit in with enterprise architecture?

To answer this we can look at guidance from The Office of Management and Budget (OMB). Particularly Circular A-11 provides guidance on the submission of federal budgets; Part 7 (Planning, Budgeting, Acquisition, and Management of Capital Assets) spells out the requirement that an Exhibit 300 be completed for all major investments.

Aside from extensive questions for justifying your budget in the Exhibit 300, there are what’s commonly called the “Three Pesky Questions.” The 3rd of the three pesky questions is as follows:

  • “Does the investment support work processes that have been simplified or otherwise redesigned to reduce costs, improve effectiveness, and make maximum use of commercial, off-the-shelf technology? If not, management should reengineer business processes first, then search for alternatives, or the agency may issue a very broad statement of the requirements in a solicitation to the private sector and allow the private sector to do the reengineering in proposed solutions. Management should also improve internal process through cutting red tape, empowering employees, revising or pooling existing assets within the agency or with other agencies, redeploying resources, or offering training opportunities.”

What’s key here is the requirements that before planning to acquire capital assets, such as new IT, we first look to reengineer the underlying business processes. Only once we have addressed the BPM, do we look to enable these processes with IT.

How do we reengineer our business processes?

DM Review, 18 April 2008, reports that “BPM includes the modeling, implementation, measurement and monitoring of business processes.”

Here is the way I see it:

  • Three types of models: Business process (or activity) models are the first step, supported by data models and systems models.
  • Decomposition and relationships: In these models, we decompose the business functions, processes, activities, and tasks; identify the relationships to the information required to perform the business processes, and the systems (manual or automated) that serve up the information.
  • Areas for Improvement/Reengineering: Through this decomposition and identification of relationship between business/data/systems, we are able to identify gaps, redundancies, roadblocks, and opportunities in doing our business efficiently and effectively. Once identified, we can then tweak or wholly reengineer the business processes, fill in gaps, eliminate unnecessary redundancies, and so on.

Similar to the OMB Exhibit 300 “Three Pesky Questions,” DM Review reminds us that we cannot just focus on systems to fix what’s wrong in our organizations.

  • “Keep in mind that for almost every process evolution exercise, there will be more than just systems change (IT change) required. Organizational needs and personnel skills must be accounted for. It the organizational dimension is ignored, there will be another story about failure in process management and business change.”

Business Process Management is essential to organizational change management.

  • If a business is to be responsive to change and remain competitive, its ammunition will come from its ability to inspect, analyze and forward-engineer its processes and its business…before its competition!

So whenever you think of enterprise architecture remember business + IT, and the business comes first!


Share/Save/Bookmark

April 30, 2008

Customer Experience Management and Enterprise Architecture

Customer service is so important. We need to architect it in every fiber of the organization. Good customer service is a critical differentiator for organizations and it offers a strategic competitive advantage to those enterprises that embrace it and make it central to their product offering.

DM Review, 25 April 2008, reports that “companies are under unprecedented pressure to optimize the customer experience.”

Customer Experience Management (CEM) is emerging as an increasingly important tool. CEM is the practice of actively listening to customers, analyzing what they are saying to make better business decisions and measuring the impact of those decisions to drive organizational performance and loyalty.”

CEM information should be considered an essential component of the business perspective of the enterprise architecture. CEM should be incorporated into EA planning and governance to accelerate and improve enterprise decision making such as “tailoring products to customer desires to save investment in unwanted innovations.” The overall goal is to provide the customer with world-class service and an overall high satisfaction interaction.

How are organizations achieving CEM?

  1. Chief Customer Officer (CCO)—establishing executive positions that are focused on the customer experience and on earning high marks for customer satisfaction.
  2. Measurement—“putting tools in place that measure the customer experience” and provide feedback to the organization. These tools include customer satisfactions surveys, focus groups, blogs, point-of-sale data/trends, and customer relationship management (CRM) systems that “hold valuable comments from emails, support cases, and online conversations between contact centers and customers.”
  3. Process improvement—using customer feedback and measurement to tune processes, streamline them, and eliminate defects.

Unfortunately, “still at many companies today, the potential of CEM remains untapped.” It behooves the enterprise architects to help drive CEM as a major source of business intelligence and for use in enterprise architecture planning and governance for new investments.

Ultimately, just like the EA end-user is the final arbiter for driving the development of the EA information products (so they are useful and usable), so too the customer is king when it comes to influencing the organizations’ future direction for product, process, technology, and service. If we’re not satisfying our customers, they will find a better supplier to give their business to.


Share/Save/Bookmark

April 17, 2008

Port Security and Enterprise Architecture

[This Blog is based entirely on public information and represents my views alone and not those of the U.S. Coast Guard, Department of Homeland Security, or other Federal agency.]

Maritime and port security is critical to this nation, particularly after the events we witnessed on 9-11.

The largest border for the United States is our coastline at 95,000 miles. Moreover, there are approximately 361 major ports (according to the Council on Foreign Relations). Securing the maritime border is the purview of the United States Coat Guard (USCG), for which I have the privilege to work, and securing the ports is a collaborative effort between the U.S. Coast Guard, Customs and Border Protection (CBP), Department of Justice, and state and local law enforcement.

National Defense Magazine, April 2008, reports that “under project SeaHawk [a pilot project], port security officials during the past three years have developed the software, sensors, and communications infrastructure needed to maintain a 24/7 watch on this regional port [Charleston, S.C.]—the sixth largest in the United States.”

From an enterprise architecture perspective, the keys to the success of SeaHawk are business process integration, information sharing and collaboration.

Before SeaHawk it wasn’t uncommon for the different agencies with jurisdiction in the port to duplicate their efforts, said CAPT Michael McAllistar, Coast Guard sector commander and Charleston’s captain of the port. “’My boarding teams would run into Custom’s boarding teams at the bow of a ship.’ Today, boardings are carried out in a more efficient manner that allows the different agencies to make better use of their limited resources.”

The Safe Port Act of 2006 calls “for the creation of similar operational centers at ‘high priority’ ports by October 2009.”

National Defense Magazine identifies the many components comprising the successful architecture for port security:

  • Advance Notice of Arrival— provides the captain of the port the information of ships due to arrive, their cargo, and their people 96 hours in advance.
  • Automated Identification System (AIS)—“is a beacon that transmits the ship’s identity and bearing.”
  • Radar—tracks the ship as it approaches.
  • Law Enforcement Dossier—law enforcementUSCG, CBP, and Immigrations and Customs Enforcement (ICE)—compile a dossier that identifies whether any of the crew have criminal records, “whether a ship recently changed ownership or flags, and whether it has been caught with contraband before.”
  • Risk Analysis—vessels of interest are color coded and tracked and decisions are made whether to conduct a boarding by USCG and/or CBP or “dispatch CBP canine units that specialize in either drugs or explosive detection.”
  • Cameras—“as the ship approaches the port, it is captured by long- and medium-range electro-optical and infrared cameras.”
  • Hawkeye System—“combines the data from cameras, radar, and AIS into a common operating picture [COP]. If the ship suddenly veers off course that would raise a red flag.
  • Wall of Knowledge--“like most modern operation centers, all these cameras, sensors, and tracking systems are displayed on a series of monitors spread across a wall”.
According to the article, one of the architectural challenges is standardizing the technologies and business processes for the various ports, given the challenge that “each port is different” in terms of geography and law enforcement risks (for example, some ports, like Charleston, emphasize port security while others, like in Florida, have a higher risk factors for drugs and illegal immigration). SeaHawk has been successful in this standardization with an 85% solution—“the information software portal has already been adopted by the Coast Guard’s captains of the ports.”

In the future, we can all look forward to seeing SeaHawk rolled out to other major ports, enhancing the security of our nation.


Share/Save/Bookmark

April 1, 2008

GPS To “Wrongwhere” and Enterprise Architecture

A good enterprise architecture is measureable in large part by results of operation or outcomes for the end-user such as cost-savings, cost avoidance, or performance improvements.

Well, when it comes to GPS, you’d imagine that the desired outcome would be getting from point A to point B in the quickest, simplest way (a performance improvement from taking a longer route or getting lost altogether).

According to the Wall Street Journal, 18 March 2008, if you follow GPS directions blindly, you may find yourself driving literally off a cliff.

“By blindly following the gadgets’ not-always-reliable directions, they’re [the drivers] are getting lost, hitting dead ends, and even swerving into oncoming traffic.”

With the price for GPS devices coming down to an average of $225 over the 2007 holiday season, there are now an “estimated 49 million navigation devices…in use in the U.S.”

“GPS technology was first designed by the Department of Defense in the early 1970s to improve precision weapon delivery, Today’s commercial devices receive information transmitted from a network of government satellites orbiting the Earth and can pinpoint a user’s location”—sounds like a great architecture plan that commercializes defense technology.!

So what goes wrong with GPS that results in the following types of mishaps:“

  • Truck drivers erroneously sent to residential streets have crashed into fences and damaged walls and trees on narrow roads.”
  • “”After a half-hour of hairpin turns…the road ended at a guardrail and a 200-foot cliff.”
  • “Sent Mr. Wright off the highway and onto a paved road. The road turned first into gravel and then into a dirt trail littered with boulder and covered with overhanging branches…he dutifully followed the direction, which turned into a three-hour detour.”

“Map data companies…have employees in the field recording everything from street names to lane counts and speed limits…they also rely on sources including transportation departments, building associations, and public records. But the information can become outdated quickly as business move or close shop, new roads are built, and old ones are closed for repairs. Sometimes addresses are just wrong.”

“Map data companies say ensuring that information is accurate and up-to-date is a constant battle.” For example, one vendor has “about 5.5 million U.S. streets in its database. About 3 million changes are made to the maps each month.”

Some map data companies are encouraging users to report errors, so they can be corrected faster.

So following GPS directions and getting nowhere or to “wrongwhere” (my term)—is that an enterprise architecture problem?

It sure is. While it’s not a technology problem per se, it is a business process issue. And if the business processes are not in place to ensure current, accurate, and complete mapping information then absolutely, there is an EA problem that needs to be addressed with business process improvement or reengineering. So be careful the next time you take that road trip!


Share/Save/Bookmark

March 28, 2008

Lean Six Sigma and Enterprise Architecture

Enterprise architecture is one way for an organization to drive business process improvement and technology enablement. Another way is through Lean Six Sigma.

Federal Computer Week, 3 March 2008, reports that “DoD rallies around Lean Six Sigma: The methodology has become the Defense Department’s ‘tool of choice’ for business transformation.”

“Lean Six Sigma is simply a process-improvement method for reducing variability and eliminating waste.” With Six Sigma (developed by Motorola), the idea is to make processes efficient and repeatable, so that there are fewer than 3.4 defects per 1 million. The Lean (developed by Toyota) concept refers to “eliminating any steps that don’t add value.”

In Lean Six Sigma, process improvement is enabled through the following steps:

  1. Define—identify problem and measures
  2. Measure—capture data points
  3. Analyze—discover areas for process improvement
  4. Improve—implement process changes
  5. Control—verify and validate that improvement is attained and sustained

In 2000, Deputy Defense Secretary Gordon England made Lean Six Sigma the foundation for DoD’s continuous process improvement program.

Currently, “about two-thirds of DoD organizations by some estimates are committed to Lean Six Sigma.”

DoD is training their people in Lean Six Sigma and intends to have 5% of its employees attain Green Belt (involves typically a week of training) and 1% reach Black Belt (typically involves approximately two years of training in math and statistics and several years experience working on projects as Green Belts).

However, DoD has been criticized by some for focusing more on the training, than on translating that training into practical on the job know-how to transform the Department.

Yet, by some measures DoD has made improvement. The Army claims to have “completed 770 Lean Six Sigma projects, from which it estimated savings of $1.2 billion in 2007.”

To me it seems like enterprise architects would do well to work in partnership with Lean Six Sigma professionals in order to understand the business processes, improve them, and identify requirements to technology enable those. In User-centric Enterprise Architecture, business drives technology rather than doing technology for technology’s sake. Lean Six Sigma can help business led the way for truly useable and usable technology solutions.


Share/Save/Bookmark

February 28, 2008

Bionic Eyes and Enterprise Architecture

Remember the TV shows The Bionic Man and Woman? These folks had implants that gave them amazing super-human strength, speed, hearing, and vision.

Bionics is a term which refers to flow of ideas from biology to engineering and vice versa…In medicine, Bionics means the replacement or enhancement of organs or other body parts by mechanical versions. Bionic implants differ from mere prostheses by mimicking the original function very closely, or even surpassing it. (Wikipedia)

Believe it or not, bionic eyes are now a reality, at least in a research stage.

MIT Technology Review, 25 January 2008, reports that “researchers have created an electronic contact lens that could be used as a display or medical sensor.”

Although, this bionic eye cannot see miles away like a telescope yet, it was created to see if it would be possible to fulfill two primary purposes:

  1. Augmented reality display—a “display that could superimporse images onto a person’s field of view, while allowing her to see the real world...soldiers could use the technology to see information about their environment, collected from sensors. Or civilians could use the electronic lens as a cell-phone display, to see who is calling and to watch videos during a commute.”
  2. Noninvasive medical monitor—“use the lens as a sensor that could monitor chemical levels in the body and notify the user if they indicate signs of disease...many indicators of health can be monitored from the surface of the eye. The live cells on the eye are in direct contact with blood serum, which contains biomarkers for disease."

How is the bionic eye made?

It “incorporates metal circuitry and light-emitting diodes (LEDs) into a polymer-based lens...a functional circuit that is biologically compatible with the eye.”

What are some of the challenges in making the bionic eye work in the real world?
  1. Heat—The bionic eye is a functioning circuit and could generate heat that could adversely affect the eye.
  2. Power—How will the contact lens be powered while worn?
  3. Size—To create a visible display, the LEDs will have to shrink in size and in the process not break in the lens-shaping process

From a User-centric EA perspective, bionics is one of those incredible fields where end-users really benefit in everyday functions, in life-altering ways. Bionics opens up possibilities for people with disabilities (due to illness or accident) that are nothing short of miraculous. Imagine people being able to walk, look, hear, and so on not only on par with healthy individuals, but maybe even with an edge. Of course, this could open up all sorts of ethical dilemmas. If we think Olympians taking steroids is an issue, we haven’t seen nothing yet. Bionics is a field that is only just beginning, but it will have enormous implications for process improvement and reengineering based on new incredible capabilities of those that have these implants. Bionics is an example par excellence of technology enabling process (in this case, the very elements of mechanical human processes).


Share/Save/Bookmark

February 22, 2008

Business Process Management and Enterprise Architecture

Modeling business processes, information flows, and the systems that serve up that information is core to developing enterprise architecture

DM Review Magazine, February 2008 reports that Business Process Management (BPM) changes the game for business performance through process innovation, creating a process-managed enterprise that is able to respond to changing market, customer, and regulatory demands faster than its competitors.”

How does BPM enable enterprise efficiency?

“It acts as the glue that ties together and optimizes existing attempts at employee collaboration, workflow, and integration. It drives efforts in quality improvement, cost reductions, efficiencies, and bottom-line revenue growth.”

BPM drives “the ability to design, manage, and optimize critical business processes.”

Essentially the decomposition of functions into processes, tasks, and activities along with linkages to the information required to perform those and the systems that provide the information enable the enterprise architect to identify gaps, redundancies, inefficiencies, and opportunities for business process improvement, reengineering, and the introduction of new technologies.

Business, data, and systems models are an important tool for architects to integrate and streamline operations.

How effective is BPM?

The Aberdeen Group reports “more than 50% of companies surveyed were expected to turn to BPM in 2007 to get the process right at the line-of-business level without having to throw out their expensive enterprise resource planning (ERP) or custom back-end applications investments.”

Similarly, Gartner reports that “organizations deploying BPM initiatives have seen more than 90 percent success rates on those projects.”

What are some critical success factors in BPM?

  1. Usability—“intuitive and flexible user interfaces.”
  2. Process analysis—“knowledge management, analytics, reporting, and integration functionality.”
  3. Collaborative—“portals, attached discussion threads, document management capabilities, and configurable task views.”
  4. Self-optimization—“ability to ‘self-optimize’ the process.”
  5. Focus on high-value areas first—“initial BPM project should include areas of medium-to-high business value combined with low process complexity…choose processes or business areas that have high visibility.”

From a User-centric EA perspective, modeling business, data, and systems is a key element at the segment and solutions architectures. These models enable the development of business requirements, information flows, and technology needs that help determine the ultimate solution design and line of business projects. These in turn feed the enterprise architecture target architecture and transition plan. So the food chain often starts with core modeling initiatives.


Share/Save/Bookmark

February 13, 2008

Fashion, Technology and Enterprise Architecture

I was a little surprised to read a blog in MIT Technology Review online from 31 January 2008 about “the melding of technology and fashion.”

What was surprising to me was not the concept that technology could be used to enhance fashion, because certainly we would expect that technology would enable faster, better, and cheaper processes for manufacturing garments, and perhaps even aid the development of garments from new high-tech materials that can protect from sunlight, remove sweat and odor, or wear better, last longer, and protect the wearer from any and all hazards (fire retardant, bullet proof, maybe even crash resistant).

However, this particular blog was not about any of those things. Rather, the blog was about “wearable technologies” demonstrated at the Seamless: Computational Coulture fashion show.

What types of fashion technologies are we talking about?

  1. Shape-changing dresses
  2. Music-playing sweaters
  3. Jackets that display text messages with light emitting diodes
  4. Glow in the dark clothes made from organic solar cells
  5. Skirts that use kinetic energy to power gadgets
  6. Rings that “display a wearer’s Google hits”
  7. Shirts that “reflects Wi-Fi strength

The end of the blog states, the fashion show was “entertaining and electrifying.”

The blog acknowledges that “many of these designs will never reach the market.” Yet, even the very concept of many of these wearable technologies seems useless, if not outright silly. And maybe that’s the point, silly gets attention and that is what fashion designers want.

From a User-centric enterprise architecture perspective give me the Star Trek uniform that can be worn in any weather, atmosphere, or on any planet in the solar system and I call that high-tech fashion. Beam me up Scotty.


Share/Save/Bookmark

January 28, 2008

HSPD-12 and Enterprise Architecture

Homeland Security Presidential Directive 12, 27 August 2004, is a “Policy for a Common Identification Standard for Federal Employees and Contractors.”

HSPD-12 establishes a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees).

The policy mandates promulgation and implementation of secure, reliable identification that covers Federally controlled facilities, Federally controlled information systems, and other Federal applications that are important for security. "Secure and reliable forms of identification" for purposes of this directive means identification that (a) is issued based on sound criteria for verifying an individual employee's identity; (b) is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation; (c) can be rapidly authenticated electronically; and (d) is issued only by providers whose reliability has been established by an official accreditation process. The Standard will include graduated criteria, from least secure to most secure, to ensure flexibility in selecting the appropriate level of security for each application.”

In Government Computer News, 27 October 2007, Jack Jones, the CIO of the National Institute of Health (and Warren Suss, contractor) discuss how NIH leveraged the mandates of HSPD-12 to not only implement the common identification standard for more than 18,000 federal employees [and another 18,000 part time employees, contractors, fellows, and grant reviewers] on its main campus in Bethesda, Md., and at satellite sites nationwide,” but also modified and improved it's business processes to ensure a holistic and successful architectural implementation.

What business modifications were involved?

HSPD-12 was a catalyst for change at the institutes. The NIH Enterprise Directory (NED), which automated the process for registering and distributing badges to new NIH employees, needed to be revised to comply with HSPD-12...the conversation led to a re-examination of the broader set of processes involved in bringing a new employee onboard. In addition to registering new employees and issuing badges, NIH, like other federal agencies, must assign e-mail addresses, add new employees to multiple agency mailing lists, order new phones, assign new phone numbers and update the phone directory.”

How did NIH address this using enterprise architecture?

NIH changed its enterprise architecture through a formal, facilitated business modeling process that involved all NIH stakeholder groups. The results included clarifications in the policies and procedures for processing new employees along with the transformation of NED into a significantly improved tool to support better communication and collaboration in the broad NIH community.”

From a User-centric EA perspective, this is a great example of EA supporting successful organizational change. NIH, like other federal agencies, was faced with the mandates of HSPD-12, and rather than just go out and procure a new system to meet the requirement, NIH used EA as a tool to look at its entire process for provisioning for new employees including policy. NIT EA modeled it business processes and made necessary modifications, and ensured a successful implementation of the identification system that is supported by sound business process and policy. Additionally, the CIO and the EA did not do this in some ivory tower, but rather in a collaborative “workshops with NIH stakeholder groups”. This collaboration with stakeholders hits on the essence of what User-centric EA is all about and how powerful it can be.



Share/Save/Bookmark

January 5, 2008

Immortality and Enterprise Architecture

In the book The Denial of Death by Ernest Becker, the author states: “Among all the animals, we alone are conscious of the fact that we will die, and we are obliged to spend our lives with knowledge of the paradox that while we may be capable of G-d-like spiritual transcendence beyond our bodies, our existence is dependent on a finite structure of flesh and bone that will ultimately wither away and disappear.” Becker believes that we deny the reality of death by pushing the fear of it into our deep unconscious.

Gareth Morgan, in the book Images of Organization, explains how the denial of death manifests itself not only in the individual, but also in the organization’s “quest for immortality.” “In creating organizations, we create structures of activity that are larger than life and that often survive for generations. And in becoming identified with such organizations, we ourselves find meaning and permanence.”

People and organizations want to “preserve the myth of immortality” by “creating a world that can be perceived as objective and real.” “This illusion of realness helps to disguise our unconscious fear that everything is highly vulnerable and transitory.”

How does EA deal with the “myth of immortality” of the organization?

Enterprise architecture is a forward looking discipline. EA takes the current state of the organization and develops a target and transition plan. However, when EA looks forward, does it acknowledge the ultimate mortality of the organization or does it seek to perpetuate the organization indefinitely?

Of course, as employees of the organization, our job is to do the best for the organization we work for: to plan and work for its survival, and more so, its growth, maturation, and ultimate competitiveness.

However, if as architects, we see that the organization will not be competitive and survive in its current form, then we need to acknowledge that reality. As architects, we are in a somewhat unique position to help remake and transform the organization so that it can live on and prosper. We can do this by envisioning a new state and planning for changes in what the organization does and/or how they do it. We can do this through process reengineering, new technologies, or a more drastic “organization makeover” in terms of a new/revised mission, strategy, leadership, and so on. Unlike a human being, whose life is fleeting, an organization can either die or be reborn again to live and compete another day.


Share/Save/Bookmark

January 3, 2008

Customization and Enterprise Architecture

While User-centric EA seeks to provide useful and useable products and services to the end-user, the heavy customization of major application systems to meet user needs is a huge mistake. Major customization of IT systems is a killer: it is a killer of the application and a killer of the underlying business processes.

What do I mean? When you heavily customize an application system (and I am not talking about changing settings), you do the following:
  • You greatly increase the implementation cost of the system, since you have now added all sorts of modifications to the system.
  • You greatly increase you maintenance burden, because new versions of the software often will need to be recoded.
  • You hamper the ability of the system to interoperate with other systems that it was designed to work with (even when it is built with open standards), since you have tinkered and tweaked away at it.
  • You missed one of the biggest opportunities to improve and reengineer your business processes; instead of aligning your business processes with those identified (by usually hundreds, if not thousands of other organizations) as best practices and written into the software, you have made your enterprise the odd man out and overwrote the best practices in the application system with your specific way of doing things. That’s a big no-no.

Let’s face it, most (and there are exceptions to every rule) organizations at their fundamental “business” (not mission) practices are often close to identical. Areas like finance, human capital, and even IT and considered utilities to the organization. These areas are often run in ways to exploit enterprise solutions for large organizations (for example, one timekeeping system, one payroll system, or one general ledger system ) and these functions are the first to be looked at for integration and downsizing on the corporate side during mergers and acquisitions.

Instead of insisting that your processes are so different, see why others are doing it another way and whether there is merit in it, before you go and customize and chip-away at the system—you may be doing yourself more harm than good. Generally (and there are exceptions to every rule), you’re better off changing business processes to meet widely used and verified software.


Share/Save/Bookmark

December 15, 2007

Monopoly and Enterprise Architecture

Monopoly─“a board game published by Parker Brothers, an imprint of Hasbro.…since Charles Darrow patented the game in 1935, approximately 750 million people have played the game, making it "the most played [commercial] board game in the world.” (Wikipedia)

Now according to The Washington Post, 15 December 2007, the classic board game is getting a technology makeover.

Monopoly “is one of the most popular games ever…its colored stacks of money─from the white $1 bills to the coveted bright orange $500 bills—have iconic status.”

Yet, even this classic game is being re-architected for the 21st century. In a new edition of Monopoly released this year, electronic bank cards replace colored money and the processes to track your game’s transactions has been reengineered and replaces good old-fashioned counting and scorekeeping.

The changeover in the game of Monopoly is mimicked in the new game of Life, Twists & Turns, and is a reflection of the change in society from being currency-based (with bills and change) to credit and debit cards. As a senior analyst at a consumer behavior research firm states: “I think this is a case of updating the game play/design to reflect the times.”

These days, “our wealth (or lack thereof) becomes just a number, printed on a bland receipt spit out from an ATM.” Moreover, “cash has become such a hassle that it is a nuisance even in our imaginations.” Imagine that: saying the cash is a nuisance (I bet that is a nuisance that a lot of people would like to get their hands on. J)

So Hasbro has reinvented the game to reflect changes in our society. This is a clear case of technology (electronic bank cards) being applied to a business problem (the out-datedness of the paper-based currency in the game). This is enterprise architecture and consumer marketing at work together and in tandem.

If even the Monopoly game that I used to play with as a kid can be refashioned with some good ‘ol doses of EA, imagine what EA can do for other businesses, products, and services. Reengineering business processes and applying technology to improve outcomes is a plus for board games, but an even stronger medicine for organizations and our economy.


Share/Save/Bookmark

November 13, 2007

UPS is Enterprise Architecture Fait Accompli

Fortune Magazine, 12 November 2007, has an amazing article about UPS ( a company which last year had $47.5 billion in revenue and 100,000 driving jobs)—they are a flawless example of the integration of people, process, technology, training, and a keen customer focus; a shining example of what enterprise architecture hopes to instill in the organization!

  1. People—“UPS drivers make an average of $75,000 a year, plus an average of $20,000 in health-care benefits and pension, well above the norm for comparable positions at other freight companies.”
  2. ProcessUPS relies on “human engineering” and has “’340 methods’, a detailed manual of rules and routines” that is taught to UPS’s legions of driver candidates. Moreover, detailed metrics are kept on trainees and throughout their professional career at UPS, so that “a supervisor meeting a new driver for the first time will know every single possible thing there is to know about him.”
  3. TechnologyUPS has the delivery information acquisition device (DIAD), their electronic clipboard, “which is GPS-enabled, plans drivers’ routes, records all their deliverables, and is said to rival the iPhone in capability.”
  4. TrainingUPS has opened a new full-service training center, a $34 million, 11,500 square-foot facility, called Integrad. “The facility and curriculum have been shaped over here years by more than 170 people, including UPS executives professors, and design students at Virginia Tech, a team at MIT, forecasters at the Institute for the Future, and animators at an Indian company called Brainvisa.” The facility even has a “slip-and-fall simulator” to safely prepare trainees bodies to be alert to falls, and a UPS “package car” with see-through sides, sensors to measures that forces on trainees joints, and videocameras to record their movements as they lift and lower packages.”
  5. Customer—“What’s new about the company now is that our teaching style matches your learning style. But we’re still taking care of the customer.” UPS is “the world’s largest package–delivery company…delivering an average of over 15 million packages a day.”

“While customers may be at the heart of UPSs business, it’s drivers who are at the heart of UPS itself…watch closely and those deliveries [are] an exhibition of routines so precise they never vary, limbs so trained they need no direction, and words so long remembered, they are like one’s own thoughts.”

UPS has mastered all of the following enterprise architecture aspects or perspectives:

  • BUSINESS—the precision of honed business processes (“340 methods”)
  • PERFORMANCE—the measurement of every critical management aspect, especially as it relates to their all important drivers and their deliveries.
  • INFORMATION—UPS is an information-driven company that captures information, analyzes information, and uses it to train and refine their personnel and operations.
  • SERVICES—business services such as delivery and training are best practice and tailored to meet customer and employee needs.
  • TECHNOLOGY—the UPS electronic clipboard enables the information capture and provision that is needed to continuously meet mission requirements.
While, I don’t love their brown uniforms (that is supposed to hide dirt), to me the successful integration and implementation by UPS of these core architecture factors makes it a case study for EA!
Share/Save/Bookmark

October 5, 2007

Use Cases and Enterprise Architecture

User-centric EA fulfills many different needs (as portrayed through Use Cases) in the enterprise.

In the Journal of Enterprise Architecture (JEA), August 2007, the authors of the article “Analysis and Application Scenarios of Enterprise Architecture: An Exploratory Study” (Winters, Bucher, Fischer, and Kurpjuweit) provide a variety of these “application scenarios” for EA.

Use Cases can help us understand the importance and benefits of Enterprise Architecture by showing its application to real-world scenarios. Below is a list of key use cases for EA (adapted from JEA):

  1. Adoption of Commercial and Government Off-The-Shelf Software (COTS/GOTS)—informs on enterprise IT products and technical standards for integration, interoperability, and standardization.
  2. Business Continuity Planning—identifying the dependencies between business processes, application systems, and IT infrastructure for continuity of operations.
  3. Business Process Optimization—reengineering or improving business processes based on modeling of the business processes, the information required to perform those, and the technology solutions to support those.
  4. Compliance Management—helps verify compliance with legal requirements such as privacy, FOIA, Section 508, records management, FISMA, and so on.
  5. Investment Management—supports Investment Review Board; determines business and technical alignment and architecture assessment of new IT investments.
  6. IT Business Alignment—aligning IT with “business, strategies, goals, and needs.”
  7. IT Consolidation—“reveals costly multi-platform strategies and wasted IT resources originating from personal preferences of certain IT stakeholders and/or a lack of enterprise-wide coordination.”
  8. IT Planning—develops target architecture and transition plan; develops or supports IT strategic plan and tactical plans.
  9. Performance Management—Management of IT Operations Costs through the development of IT performance measures to manage IT resources.
  10. Portfolio Management—categorizes IT investments into portfolios and prioritizes those based on strategic alignment to the target architecture and transition plan.
  11. Post Merger and Acquisition Integration—identifies gaps, redundancies, and opportunities in business processes, organizational structures, applications systems, and information technologies.
  12. Procurement Management—aids sourcing decisions; specifies standards, provides reviews of new IT investments.
  13. Project (Initialization) Management—specifies projects requirements, looks at the potential for existing systems to meet user needs, and avoids redundant development activities.
  14. Quality Management—document business processes, information requirements, and supporting IT; helps ensure performance.
  15. Risk Management—managing technology risks; understanding which technology platforms support which business processes.
  16. Security Management—documenting business and IT security and defining user roles and access rights.

When done right, EA helps to create “order out of chaos” for the execution of business and IT in the organization.


Share/Save/Bookmark