Monday 10 September, 2007

Interesting Videos at MIT World

Today I spent time in watching videos hosted by MIT World. The first one was an interview of Prof Henry Mintzberg by Ricardo Semler (President, Semco S/A). Prof Henry Mintzberg is Cleghorn Professor of Management Studies at McGill University and is considered to be one of the Gurus in the area of Strategy. This session was however related to Prof Mintzberg's latest book titled, Managers Not MBAs. In his interview, Prof Mintzberg made very strong point that MBAs don't make managers. Business schools such as Harvard do teach business skills such as marketing and financial analysis but do not make tomorrow's managers or leaders. He asserted that management is more of a craft and hence can be learn only by being on the job. He talked about the program he is running for practicing managers and how the approach is different there. It was quite interesting to listen to Prof Mintzberg's provocative opinions and also the thoughtful and relevant questions asked by Ricardo Semler.

Second video that I watched was a Q&A with Jack Welch in which questions were asked by Alex D’Arbeloff (Professor of Practice, MIT Sloan School of Management) and some time directly by audience. Jack Welch in his characteristic style answered all questions while offering his wisdom as shared in his book titled "Winning". His answers for questions related to firing of employees, work-life balance and telecommuting were quite interesting and provocative. While I have read Winning and knew most of what Jack Welch said in this session, watching him speaking was indeed a treat!

The third and last video that I saw was a speech of Tim Berners-Lee. He started with talking about emerging technologies and how standards are important for emerging technologies. Later he shared his vision about semantic web and talked about RDF. After his (fast-paced!) speech, Bob Metcalfe (Founder, 3Com) asked him very interesting questions. One of the interesting questions was which browser does Tim use!

There are few more interesting videos that I wish to watch now. But now it's time to go to bed!

Sunday 9 September, 2007

MIT CISR Research on IT Portfolios, IT Savvy and Firm Performance

While waiting for my next flight to Houston at Atlanta airport, I read the Research Briefings published by MIT CISR on their research on IT portfolios, IT Savvy and Firm Performance. The points that I found useful for my work, are noted below.

The investment in IT by firms can be viewed using the portfolio concept. MIT CISR has identified four asset classes in which firms make their IT investments. Based on their research, they have also given the breakup of IT investment across these asset classes for an average firm as per data collected in year 2005. The first asset class is Infrastructure, which typically accounts for 46% of total IT investment. Infrastructure systems provide IT capability to support the applications. The second asset class is Transactional, which accounts for 26% of average IT investment. Transactional systems utilize the infrastructure and are used to cut cost or increase throughput for the same cost. The third asset class, Informational accounts for 17% of average IT investment. The Informational systems typically summarizes the transactional systems and provide information for any purpose including to account, control, report, communicate, collaborate or analyze. They make use of both infrastructure and transactional systems. The final asset class, Strategic, accounts for 11% of average IT investment. Like Informational systems, Strategic systems use both infrastructural and transactional systems and are used for gaining competitive advantage or position in market place.

Beyond providing overall average figures, the research briefing also provides the average figures for industries. So if we know these figures for a particular firm, we can compare them with the industry average to gain some useful insights. The research briefing also provides average figures for firms having different business strategies such as cost focused, agility focused and balancing cost and agility.

Another interesting finding from MIT CISR research is that firms with more firm-wide IT savvy have better pay-off associated with all their IT investments. The IT savvy is defined as a set of practices and competencies that add value to each IT dollar invested. The researchers have identified five characteristics of such firms. The first three characteristics are practices related to IT use while the last two are the competencies needed for high IT savvy.
  1. More IT use for internal and external communication and work practices.
  2. More business transactions digitized.
  3. More use of Internet and open standards.
  4. Higher IT skills of both business and IT employees.
  5. More senior management and business unit involvement in IT decisions.
The research briefing provides one-page questionnaire for IT savvy self-assessment.

Obviously, this research briefing has many more interesting points to know and understand. But right now I am going to stop here because I am picking up only those points that are apparently useful for my work. On top of that, the departure time of my flight is coming nearer. -:) Anyway, if you wish to read the entire research briefing, then you can find it from the web site of MIT CISR.

Friday 7 September, 2007

The Art of Standards Wars

Today I enjoyed reading the article, titled "The Art of Standards Wars". This article was published in Winter 1999 issue of California Management Review. Unlike the famous book titled "The Art of War", this article is quite readable! It contains very pertinent advice to the technology companies, which are involved in the standards wars. It talks about strategies and tactics with quite a few examples from field.

The article begins with a discussion of the historic examples: North vs South in railroad gauges, Edison vs Westinghouse in electric power and RCA vs CBS in color television. Besides telling the stories, this section also draws the learnings from these examples. Then the authors go on describing the types of standards wars. They have identified three types: Rival Evolutions, Rival Revolutions and Revolution vs Evolution. The terms evolution and revolution refers to the backward compatibility (and lack of it, respectively) of new technologies.The authors have then identified seven key assets, ownership of which could indicate strength for waging in the standards war:
  1. Control over an installed base of customers - can be used to block cooperative standard setting and also to block rivals from offering compatible products.
  2. Intellectual Property Rights (IPR)
  3. Ability to innovate
  4. First-mover advantages
  5. Manufacturing capabilities - cost advantage is important!
  6. Strength in complements
  7. Reputation and brand name
In next section, the authors have identified two crucial marketplace tactics: preemption and expectations management. There are multiple ways to preempt. One simple way is to be first to market. Secondly, you should aggressive early on to build an installed base of customers. Penetration pricing can be used to build such installed base of customers. For expectations management, vaporware is a classic way: announcing an upcoming product so as to freeze rival's sales. But perhaps the most direct way to manage expectations is by assembling allies and by making grand claims about product's current and future popularity.

Finally, the authors have given advice to both winners and losers. The advice for winners is as follows:
  1. Stay on guards and let not rigidity due to early move constrain you for brining in improvements.
  2. Offer customers a migration path so that newer versions of products can be brought out without worrying about supporting the older versions.
  3. Commoditize complementary products so as to maintain a competitive market.
  4. Competing against your own installed base
  5. Protecting your position by offering ongoing attractive terms to important complementers and by taking steps to avoid being held up by others who claim that your product infringes their patents or copyrights.
  6. Leveraging your installed base by carefully expanding in adjacent space and/or by expanding geographically.
  7. Staying a leader by means such as developing proprietary extensions to otherwise open standards and by allowing complementers and even rivals to participating in developing standards under your terms (Thinking of Sun's JSRs!)
The advice for losers for recovery is as follows:
  1. Add an adapter or somehow interconnect with a larger network.
  2. Resist from offering survival pricing as it signal weakness.
  3. If all else fails, sue!
Although written for technology companies engaged in standards wars, this article is a good read for anybody interested in knowing how standards get established and in knowing the political side of standards-setting.


Monday 3 September, 2007

To dream the possible dream

Some days back, Ram, my senior colleague at L&T Infotech, had emailed me the Turing Award Speech of Dr Raj Reddy, as published in May'96 issue of Communications of the ACM. It remained on my reading wish-list for these many days and finally today I got chance to read it. And I wondered why didn't I read it before!

The key message of Dr. Reddy's speech is that Artificial Intelligence (AI) is not only a possible dream but rather it has been a reality, which has been demonstrating results for last 40 years.

In this speech, what I liked the most is the answer given to the often-asked question, can AI equal human intelligence? The answer given is, AI can be both more and less than human intelligence. And this answer is illustrated well by two analogies. Firstly, it's just like an electronic book is more and less than a real book. While you can't do all those things such as reading it in a bed, electronic books allow you something that real books can't; e.g., search for words in text, open the right page, change the font size and so on. Similarly, visiting an electronic mall can't give you same experience as that of visiting a real mall, but can give you convenience that real malls can't. The bottom line is AI systems will enhance and not replicate the mental capabilities of human being.

The speech touches upon many points and is a good read for anybody who is generally interested in the area of AI.

Introducing Service Component Architecture (SCA)

David Chappell has written an excellent introduction to SCA in a whitepaper hosted on his site. Let me share my notes on this whitepaper in this blog.

SCA defines an approach for creating components and for describing how these components can work together to develop an application. There are three primary constructs in SCA: component, composite and domain. The components can be combined into a composite and a aggregation of composites makes a domain.

Components are the atoms from which an SCA application is created. It is an instance of an implementation, which is appropriately configured. The implementation may be in Java or in BPEL or in any other programming language. The configuration is expressed as XML in the language called as Service Component Description Language (SCDL).

Each component comes with a set of services, references, properties and sometimes bindings. It implements some business logic, which gets exposed as one or more services. To provide the necessary functionality, it invokes references, which are nothing but services of other components. Components can also make use of properties, the values it can read from SCDL configuration file when it gets instantiated. A binding needs to be specified for a component when it needs to communicate with a non-SCA application or with a component from another domain. the kinds of bindings include web services binding, JMS binding and EJB Session Bean binding.

Composites can be said to be molecules of SCA applications. The SCA Assembly Model specification defines how components can be wired to make up composites. While developers can use the GUI-based tools to wire together the components, ultimately these wirings get expressed as XML in SCDL configuration file.

SCA Policy Framework specification is used to define two categories of policies. Interaction policies can be defined by developers to modify how a component interacts with another components, in terms of security and reliability requirements. The Implementation policies are to be specified to modify how the component behaves locally.

While specifications provide a starting point, what is required for adoption are developer tools and runtime. While almost all vendors except Microsoft are gearing up for providing both developer tools and runtime, we will also have open source alternatives. While Apache Tuscany and Fabric3 from codehaus represent open-source options for runtime, Eclipse SOA Tools Platform (STP) Project is engaged in developing SCA tools for developers.

It's very unlikely that organizations can start using SCA now. I feel SCA will be considered by user organizations for adoption only after ratification of SCA specification by OASIS. Till then, we will need to watch its evolution as it indeed provides a latest state-of-the-art approach for software application development.

Sunday 2 September, 2007

What are the business models of US Firms?

What are the business models of US Firms?

This is indeed an interesting question. And the answer has come from MIT. The Social and Economic Explorations of Information Technology (SeeIT) Project at MIT Sloan School of Management, has undertaken research to develop frameworks for analyzing and classifying
business models and to use these frameworks to empirically classify the business
models of substantial numbers of companies. Also the project aims to use the empirical data for formulating and testing hypotheses about the distribution,
performance and evolution of different business models.

So let's get back to the question. But before that let's see the definition given by the MIT researchers. At the broadest level, business model may be defined as how business appropriate value for the products or services they create. More specifically, the business model is defined as a description of the activities that a company performs to generate revenue or other benefits, and the relationships, information and product flows a company has with its customers, suppliers and complementers.

Now comes the taxonomy of business models. The classification scheme consists of four-by-four matrix, giving 16 types of business models. The two axes represent asset types and asset rights. The four asset types include financial, physical, intangible and human resources (HR) (actually the time and knowledge of human resources). The four types of asset rights include Creator, Distributor, Landlord and Broker. Now that gives 16 types though only some of them matter.

When the revenue data of publicly traded US firms over eight years (1997-2004) was analyzed, seven models were found to be common. They included Manufacturer (creator of physical assets), Wholesale/Retail (distributor of physical assets), Financial Landlord, Contractor (landlord of human resources), Physical Landlord, IP Landlord and Financial Broker.

Now while these findings answer the question, there are some more interesting findings from this research. Let me cover that at some later date. Now let me sleep. -:)

Business agility explored

While discussing SOA adoption, we believe that SOA is needed for achieving business agility. However, at the same time, we find our understanding of business agility is limited. We understand that business agility means the ability of business to respond quickly to the ever changing needs of environment in which it operates. It also means how quickly the business can launch new products, enter new markets or respond to new regulations. However, beyond this understanding of business agility, we stop to explore.

An article from the Research Briefing 2006 of MIT Sloan CISR would perhaps help us in understanding more about business agility. In this article, authors Jeanne W Ross and Cynthia M Beatch, have defined agility as the set of possible business initiatives a firm can readily implement leveraging pre-determined competencies with managed cost and risk. Based on their research, the authors have identified seven types of business agility, which they have grouped into three categories. These categories and the types are as given below:
  • Business Efficiency: Continuous improvement and Scalability
  • Market Responsiveness: Product innovation, Process re-engineering and New business model
  • Boundary Spanning: Acquisitions and Partnerships

Business Efficiency agility
attempts to identify repetitive processes and extract unnecessary cost and time. The continuous improvement agility is more found with commodity businesses such as consumer product manufacturers. Such organizations are required to implement continuous improvement initiatives for accelerating profitability while reducing business risks. Scalability agility is the ability to rapidly scale up and down in response to changing business volumes. This kind of agility is almost must for companies from the Property and Casualty (P&C) Insurance industry as they would experience extraordinary demand for claim processing after natural disasters. The key organizational characteristics that would help to achieve the Business Efficiency agility include the following:
  • Standardized IT environment
  • Standardized operations processes, systems and data
  • Enterprise-wide process design
  • Strong metrics and
  • Shared services

The speed with which organizations are required to respond to new customer demands and competitive challenges have gained increased importance for market responsiveness agility. Unlike Business Efficiency agility, Market Responsiveness agility disrupts, builds and reuses core capabilities. Interestingly, even if processes must change, companies benefit from developing clearly defined, standard operations processes and related data. Standardized IT Environment also helps in providing the foundation for new processes and interactions. Most notably, matrixed management structure helps companies introducing new capabilities without discarding old capabilities.

Organizations with boundary spanning agility have competencies enabling profitable growth through their acquisitions and partnerships. The key organizational capabilities that enable Boundary Spanning agility include aligned incentives, strong metrics and individual heroics. Interestingly, the key organizational capability for other two categories of agility, the Standardized IT Environment is actually found to be negatively correlated with profitable acquisitions. On the other hand, while the heroic actions of individuals enable boundary spanning agility, it gets highly discouraged for achieving other two categories of agility.

While some organizational characteristics would help for more than one categories of agility, there would involve some trade-offs if an organization attempts to achieve agility in multiple categories.

This kind of understanding of business agility would definitely help in planning for SOA adoption. Let's hope to receive even more understanding about business agility from MIT CISR. We will then be more wise while discussing the need of SOA for achieving business agility.

Checklist for developing a strategy for web services

In his book titled Loosely Coupled, Doug Kaye has offered a checklist for developing a strategy for web services. After going through it, I found it useful as a starting point for making road-map for SOA adoption. This checklist has got more than 80 items grouped into into four categories: Inventory, Project Requirements, Planning and Evangelism. You can find this checklist as a free chapter download (without giving out email address!) from the book web site.

Operatinal Excellence, Product Leadership or Customer Intimacy?

One of my favorite management concepts is the one from a book titled, The Discipline of Market Leaders: Choose Your Customers, Narrow Your Focus, Dominate Your Market, by Michael Treacy and Fred Wisrsema. This book describes three types of "value discipline":
  • Operational Excellence
  • Product Leadership
  • Customer Intimacy
The Operational Excellence is an approach to the market, dedicated to providing the lowest cost goods and services, while at the same time minimizing problems for the customer. The basic philosophy is about the low or lowest price and hassle-free service. The examples of companies following this value discipline could be Walmart and McDonalds.

The Product Leadership is an approach to the market, dedicated to providing the best possible products from the perspective of the features and benefits offered to the customer. The basic philosophy is about the products that push performance boundaries. The examples could be Intel, Nike and 3M.

Finally, the Customer Intimacy is an approach to the market that involves the selection of one or few high-value customer niches, followed by an obsessive effort at getting to know these customers in detail. The basic philosophy is about delivering what specific customers want. The examples could be Airborne Express and Nordstrom.

It is typically said that a company can excel in at the most two value disciplines but not all. Actually it is advised to focus only on one value discipline. I agree that focus on only one of these value disciplines would help it achieve market leadership.

MIT case study on Air Deccan

Today it was a pleasant surprise for me to see a case study on Air Deccan coming from MIT Sloan Center for Information Systems Research (CISR). Available as a working paper on the web site of CISR, this case study primarily focuses on how Information Technology (IT) has been playing an important role in the business of Air Deccan. Written by Jeffrey L Sampler in Nov 2006, it helps in understanding the big picture of aviation industry, the business model of Air Deccan and the role of IT at Air Deccan.