Four Pillars: Snowballs

I look at every comment made on my blog. I try and find out who the commenter is. If someone links to me, I try and find out who it is and what they’re interested in.

Manual collaborative filtering. It’s not about ego. In fact, I don’t understand why someone would blog if that someone wasn’t interested in what other people said and what common AND different interests the others had.

It’s part of the point of blogging. Wisdom-of-crowds meets madness-of-crowds and  emergence and serendipity and network effects.

So this morning I walked over to Mind This, since I saw a link and a comment. Liked the commented story, added and improved on bits of my Opposable Thumbs post. Rolled a snowball away, I know not where. Thank you Lars.

And then I saw this post by Lars. Probably been done a million times before, but it was a eureka moment for me.

A marriage is a conference is a concert is a marketing event is a school play or sports day is a community ritual gathering is a rite of passage.

We don’t call the tools social software for nothing.

And it is in the socialising of social software that better social software will emerge. For new purposes. For unthought-of purposes.

“…..O frabjous day! Callooh! Callay!’ He chortled in his joy. From Jabberwocky by Lewis Carroll.

When I feel frabjous I feel very, very good indeed. Following up on something Clarence Fisher said about chess and 13-14-year-olds, I think Lewis Carroll is also a must for them. Pillow Problems and A Tangled Tale were seminal books for me.

Exchanging queens: Reducing complexity in IT

I love chess. And if there was a particular game that made me start loving it, it was this one:

laskera.gif

The game was between Edward Lasker and Sir George Thomas, London (Oct 29, 1912). It went as follows:

1.d4 f5 2.Nc3 Nf6 3.Nf3 e6 4.Bg5 Be7 5.Bxf6 Bxf6 6.e4 fxe4 7.Nxe4 b6 8.Bd3 Bb7 9.Ne5 O-O 10.Qh5 Qe7 11.Qxh7+ Kxh7 12.Nxf6+ Kh6 13.Neg4+ Kg5 14.h4+ Kf4 15.g3+ Kf3 16.Be2+ Kg2 17.Rh2+ Kg1 18.Kd2 mate
The diagram above picks it up at the end of move 10. A queen sacrifice starts an eight-move forced mate, gently urging the opponent’s king forward from Row 1 to Row 8, and having the option to deliver the coup de grace with a castling. Magical.

[If you want to play the whole game out on screen, then please follow this link from AJ Goldsby, who deserves much thanks].
And it was chess that taught me to look for ways to do the Einstein thing. Keep things as simple as possible, but no simpler.
I see four distinct ways we can reduce complexity in IT by taking “portfolio” approaches to the practice of IT management within the enterprise:

  • (a) in the investment appraisal and project initiation and shutdown processes
  • (b) in the declaration, evolution and adaptation of technology standards
  • (c) in managing inventory
  • (d) in assessing the value of what has been implemented, whether by build or by buy or even both

None of these is rocket science. They represent my attempts to mash up what I have learnt over the years, happily borrowing from others’ experiences and my mistakes. I will elaborate on them at a later date, this is just to assess reader interest.

_1174032_viswanath150.jpg

A complete aside, triggered by my experiencing the sheer beauty of the Lasker-Thomas game again. Some of you may know of an Indian cricketer named GR Viswanath. Coming off a Test sequence of 161, 44, 52, 131 and 96, he returned to the pavilion out for 7. And then 10. And as he entered the pavilion, someone asked him how come he was out that cheaply. His reply (apocryphal of course, you know my stories by now) : “The ball deserved it”.

A thing of beauty is a joy forever.

Thanks to the BBC for the photograph. I couldn’t be bothered using the Getty Images version, it required me to get explicit permission from them beforehand whatever my reason. Digital wrongs.

Four Pillars: On the record conversations

Have you ever been in a position where you had to say something was “off the record” to a journalist, and then worried about whether it would stay that way? And does it matter anyway?

Apocryphal story. Kenny Dalglish was at a press conference announcing the return of Ian Rush from Juventus to Liverpool. And one of the reporters asked him how come he managed to keep both Rush moves a secret, his going to Juventus and his returning to Liverpool. Kenny’s taciturn reply was pure Kenny. “Simple. I didn’t tell anyone.” You know, even if he didn’t say it, he should have.

My father was a financial journalist. And his father before him. He told me many stories, and the odd maxim. A few examples:

  • Nothing mechanical needs forcing.
  • If the only way to make contract is to assume a singleton spade queen on the left, then play for it.
  • We shall contrive.
  • There’s no such thing as off the record.

There’s no such thing as off the record.

And I used to ask him why this was the case.

His reply? If you need to say it, then you don’t have the trust and the relationship to request it, much less enforce it.

Many years later, as I became more and more involved in conversations with startups and VCs and the innovator community, I  saw a variant of this. The dreaded NDA. If you had to ask for one to be signed, you probably didn’t need to go any further. The request said it all.

And now, as we learn more about the impact of social software and modern web tools and IP telephony on mainstream media, I begin to wonder what happens next.

On the one hand, we have all the closed information drivers: privacy, secrecy, confidentiality, DRM, IPR. Roundly opposed by all the positive open information drivers: trust, transparency, collaboration; and some of the less positive:  “disclosure” and whistleblowers and leaks
Again, I haven’t quite been able to put my finger on it, but I think something about old media required this schizophrenic approach to information. We have information. And we have secret information, known to a favoured few.

And something about new media, the democratisation of conversation, tends to make this less possible.

I feel we are proceeding to a world where all conversations are on the record. Because they happened. The record cannot lie.

Record everything. Archive everything. Search everything. Retrieve everything.

Fossil files

I’m in the middle of moving offices, with all the packing/unpacking/throwing away it entails. There is a cathartic feel to it.

And, for an information ferret like me, there is enormous temptation to stop and read bits of things I have resolutely refused to throw away. Occasionally, I give in to that temptation. To read. Never to throw away.
This morning I came across an old New Yorker article by Malcolm Gladwell, one that I had filed for a different reason…… to remind me to order a copy of any book that contained the article “The  Dark Side of Charisma” by Hogan, Raskin and Fazzini.  Which I finally did today, nearly four years later, by ordering  Measures of Leadership by Kenneth E. Clark & Miriam B. Clark (Eds.)..

But I couldn’t help re-read the Gladwell article. And just loved the ending. I quote:

They [the consultants] were there looking for people who had the talent to think outside the box. It never occurred to them that, if everyone had to think outside the box, maybe it was the box that needed fixing. Fossilfool time again.

I think the same is true for walled-garden approaches to information and permissioning. In true sixties Suppose-They-Gave-A-War-And-Nobody-Came fashion, what happens if there are DRM/IPR walled gardens everywhere, but all the co-creation is taking place in the open spaces in between? We’re soon going to find out.

Four Pillars: Digital Equivalents of Opposable Thumbs

wren.thumbnail1.jpg

Over the last five years, my thoughts and actions have moved more and more into a community-driven, market-standard-based, opensource-influenced, platform-independent and device-agnostic IT world.

This was not always the case.

Originally I was comfortable with the notion that TCOs for enterprise IT were optimised by strategic vendor relationships, and that one could outsource many of the problems of software development, deployment and operations to specified vendors. The reasoning was simple: prevent undue proliferation of architectures, toolsets, standards and methodologies by sticking with one vendor, in effect leveraging that vendor’s “ecosystem”. Reduce EAI and regression testing costs as a result, improve time to market and use strategic procurement techniques to drive vendor costs down further.
This was seen as great from a control and governance perspective: it yielded readymade reams of stuff you could use for setting out source and target architectures, the roadmaps from source to target, the standards that drove people towards the target architecture, the strategic decisions underlying the roadmaps, and the detailed implementation plans that went with each piece. And the Control Gods looked at it and saw that it was good.

It was good. On paper. And probably very meaningful for environments that had all the following characteristics:

  • a stable 3-year business environment and outlook
  • a stable 3-year management environment and outlook
  • a technology environment that was largely homogeneous to begin with
  • a single-vendor “ecosystem” that covered a meaningful proportion of the technical needs
  • a complete lack of a blame culture amongst business sponsors, so that decisions could be reviewed and changed if needed
  • a complete lack of Not-Invented-Here amongst the inhouse developer community, so that tendencies to reinvent wheels and mousetraps were avoided

Reality tended to be slightly different from this, and as a result, the gains to be had from relatively narrow single-vendor-ecosystem strategies were not there. Enterprise application integration costs tended to skyrocket, either visibly through longer integration, regression and acceptance testing, or less visibly through high incidences of bugs and reduced systems availability. Problems were exacerbated by the existence of multiple proprietary architectures each hell-bent on non-cooperation with the rest.

As people recognised that hybrid environments were the norm and not the exception, we had to find ways of solving the EAI problem. So then we got comfortable with:

  • attempts at bus-based architectures and increased componentisation to simplify the technology foundations
  • attempts at use of rapid prototyping, RAD, XP, pair-programming to improve the quality of requirements capture;
  • attempts at use of time-boxing and time-placing to reduce scope creep;
  • attempts at use of options theory to augment classical DCF theory to improve IT investment appraisal
  • attempts at outsourcing, far-shoring, near-shoring and here-shoring to improve access to skills and reduce wage bills

These were different ways of ensuring we Did The Right Thing and drove the best value out of technology spend, but it failed to appease the control gods. Each of the techniques stated above placed some level of strain on the way we historically communicated on what we did. Architecture and standards and roadmaps and strategy papers and implementation plans became harder to maintain to any worthwhile accuracy. It did not mean that work was not being done, just that the reporting mechanisms of the past struggled with the present.

The static approaches could not cater for the repeated one-offs such as EMU and Y2K and Basle II and IAS and IFRS and US GAAP and Sarbanes-Oxley, to name but a few. Consultants understood this and exploited the opportunities to the full. And those that were left out of the first feeding frenzy focused hard on Six Sigma and Balanced Scorecard and Smartsourcing and EVA and BPM and and and, corrupting the difference between published and living reality even more. There were many emperors and many sets of new clothes.

Thankfully, Moore’s Law and Metcalfe’s Law and the consequent price-performance gains, coupled with the significant recessionary market pressures at the turn of the century, all this meant that real IT costs continued to fall, at least until the surpluses were eaten up doing “mandatory” consultant-generated programmes.

In the meantime, IT departments the world over learnt to make silk purses out of sows’ ears. They learnt to do more and more with less and less as business needs and markets became more volatile. They learnt to move painfully from raw inventory management through asset management to a portfolio-based approach to managing IT. They learnt that the complexity of their environments grew on a power law basis as everything became connected.
In the midst of all this, some good things happened. The opensource movement got some real traction, Doc Searls’ D-I-Y IT models were coming closer to reality. Tools to support Four Pillars became more readily available and more consistent. Telephony became software. Cool design became important again as a result of the iPod halo. Flash memory and NAND RAM began to drive the environment differently, just as virtualisation and service orientation were becoming reality.

A new set of ecosystems was also emerging. Ecosystems that weren’t single-vendor yet with reduced TCO. Ecosystems that were adaptive and responsive to external stimuli. Ecosystems built on community standards with market-driven principles. Four-pillar tools that supported search, syndication, fulfilment and conversation came from different vendors but worked together. That allowed information to move freely across their perceived boundaries, at the behest of the owner of the information. [Which was NEVER the vendor, anyway].

Which brings me to the point of this long post.

We are on the verge of a new digital revolution. As with the Industrial Revolution, this means we will need new sets of “machine tools”. Machine tools with a difference.

The Wikipedia definition of Machine Tool:

A machine tool is a powered mechanical device, typically used to fabricate metal components of machines by the selective removal of metal. The term machine tool is usually reserved for tools that used a power source other than human movement, but they can be powered by people if appropriately set up …[……]…. Devices that fabricate components by selective addition of material are called rapid prototyping machines.

The age we’re entering needs three types of “machine tool”:


  • Those that selectively remove information to create product, the “old way”
  • Those that selectively add information to create product, the “web” way
  • Those that selectively add information to co-create product, the “tomorrow” way

Man learnt to really use tools when he designed them to make use of his opposable thumbs.
We need to discover what the digital equivalents of the thumbs are, before we learn to use the tools properly.

And my hunch is that it is in the identity and authentication and permissioning space, to take our nascent machine tools to Main Street.