Front Andriole

Total Page:16

File Type:pdf, Size:1020Kb

Front Andriole The 2nd Digital Revolution Stephen J. Andriole Villanova University, USA CYBERTECH PUBLISHING Hershey • London • Melbourne • Singapore Acquisitions Editor: Mehdi Khosrow-Pour Senior Managing Editor: Jan Travers Managing Editor: Amanda Appicello Development Editor: Michele Rossi Copy Editor: Bernard Kieklak Typesetter: Cindy Consonery Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc. Published in the United States of America by CyberTech Publishing (an imprint of Idea Group Inc.) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.cybertech-pub.com and in the United Kingdom by CyberTech Publishing (an imprint of Idea Group Inc.) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 3313 Web site: http://www.eurospan.co.uk Copyright © 2005 by Idea Group Inc. All rights reserved. No part of this book may be repro- duced in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Library of Congress Cataloging-in-Publication Data Andriole, Stephen J. The 2nd digital revolution / by Stephen J. Andriole. p. cm. Includes bibliographical references and index. Summary: "This book tells readers how technologies and business models are converging, and looks at technology and business holistically, arguing that it's no longer possible to think about business or technology without simultaneously thinking about the other"--Provided by publisher. ISBN 1-59140-801-6 (hc) -- ISBN 1-59140-598-X (sc) -- ISBN 1-59140-599-8 (ebook) 1. Technological innovations--Management. 2. Business enterprises--Technological innovations. 3. Business planning. I. Title: Second digital revolution. II. Title. HD45.A644 2005 338'.064--dc22 2004028470 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. The 2nd Digital Revolution Table of Contents Preface ................................................................................ vi Chapter I. Who’s Here? .................................................... 1 Big Guns............................................................................ 3 Bean Counters................................................................... 5 Techies ............................................................................... 6 Hype-Sters ......................................................................... 7 Protection .......................................................................... 8 Consigliore ........................................................................ 8 Other Chiefs .................................................................... 10 Worker Bees..................................................................... 11 Constituents ..................................................................... 11 Herding Cats? ................................................................. 13 Chapter II. The Convergence Conversation – We’re Finally Ready ........................................................ 15 What Happened?............................................................. 16 Business Technology Convergence ................................ 28 Early Takeaways ............................................................. 42 Convergence Excellence ................................................. 43 Does This Make Any Sense? .......................................... 44 Chapter III. The Business Conversation – Where We’re Going...................................................................... 53 So What Do You Think? ................................................. 54 Inside/Outside Collaboration ......................................... 58 Supply Chain Planning And Management .................... 60 Customization And Personalization .............................. 64 Real-Time Analytics And Optimization ......................... 68 Automation ...................................................................... 70 Trust ................................................................................. 74 Business Convergence Scenarios ................................... 75 So What Does Everyone Think? .................................... 79 Chapter IV. The Technology Conversation – How The World Should Work ....................................... 84 What Do You Know? ...................................................... 85 Applications Integration And Interoperability .............. 88 Data Integration ............................................................. 98 Pervasive Communications .......................................... 103 Adaptive Infrastructures ............................................... 111 Security And Privacy .................................................... 116 Business Technology Convergence .............................. 121 Opinions? ...................................................................... 122 Chapter V. The Turf Conversation – Who Does What To Whom .......................................... 125 Watch Your Flanks ........................................................ 126 You Report To Who? ..................................................... 127 Organize – Because We Have To ................................ 128 The Special Case Of Innovation.................................. 137 Business Technology Organizational Convergence .... 141 Who Wants To Go First? .............................................. 142 Chapter VI. The Management Conversation – It Still Needs To Make Sense ........................................ 143 You Still Think So? ....................................................... 144 How Much Do You Know?........................................... 144 Variation’s Your Enemy ................................................ 152 Can We Really Do This? .............................................. 158 Who Gets The Check? .................................................. 167 Many Happy – And Miserable – Returns ................... 178 The Business Of Business Technology Cases ............. 180 Governance ................................................................... 188 Business Technology Management Convergence ........ 214 Anyone Want To Talk About All This?......................... 214 Chapter VII. The Tough Conversation – It’s Still (And Always) About People ........................... 217 Who Are These People? ............................................... 218 How’s The Team – Really? .......................................... 221 Stay Sharp ..................................................................... 229 They’re Alive, They’re Alive! ....................................... 232 Keepers .......................................................................... 235 Business Technology People Convergence.................. 238 Why Is Everyone So Quiet? ......................................... 247 Chapter VIII. There’s Just One More Thing ... .......... 250 How’d You Do? .............................................................. 251 What’s Not To Like About This Outcome .................... 252 About the Author ........................................................... 254 Index ................................................................................ 258 vi Preface In the 1990s I sat in the office of a CFO of what was then a Fortune 100 company. He was not happy about the annual technology bill. Back then – and for decades before – technology was tactical. He said something about technology being his last unmanaged expense. I gave him a list of 10 things we should do to improve the cost-effectiveness of our technology investments. He told me to come back when there were only three things on the list. There was no appetite for long discussions about what was wrong – or right – with technology, and there was an expectation that technology expenses could be reduced by focusing on the top three problems. The conversation was anything but strategic. It was about technology as real estate, or technology as furniture, something we had to have, a necessary evil, a cost incurred to support the transactions that made us money. The business itself was never discussed. It was almost as if technology existed indepen- dently of business models and processes. Is this episode representative of the tension that still exists between “business” and “technology” in many companies, and the lack of synergism between busi- ness and technology initiatives? Unfortunately, yes. But in order to be as fair as possible, let’s place such episodes in the context of the evolution of busi- ness technology. The 1970s, 80s and early 90s all constitute the 1st digital revolution, when enterprise computing and communications technologies were deployed within countless small, medium and large corporations. But since the mid-1990s, the capabilities and purpose of technology have evolved from the back office to the front office, from keeping the books to touching cus- tomers. The transition from “tactics” or “operations” to “strategy” marks the beginning of the 2nd digital revolution. vii The early e-business initiatives – the Web sites we all had to have in the mid- to late-1990s – were the result of creative thinking about how to reach cus- tomers through the connectivity enabled by the Internet. These
Recommended publications
  • Final Draft Fall 2004
    THE FINAL DRAFT VILLANOVA UNIVERSITY COLLEGE OF ENGINEERING SPRING 2004 ~ NEWSLETTER VOLUME 25 ISSUE 1 www.engineering.villanova.edu/newsletter EXCELLENCE INNOVATION INTEGRITY MESSAGE FROM THE DEAN - DR. BARRY JOHNSON As a new spring envelops us, the College con- Chrestay, Associate Dean for External Relations, Distance Education is a key component in our strat- tinues to strengthen and grow in many ways. College of Engineering; Donald Collins, Executive egy to increase graduate enrollment by providing Innovative academic programs are being intro- Director, NAVSEA Philadelphia Carderock Div.; M.S. degrees and customized educational programs duced, leading-edge research is expanding, and Kurt Conti, CE ’84, CEO, Conti Enterprises; on-line. Under Sean O’Donnell, Director of infrastructure is improving. I’m consistently Joseph Denny, EE ’68, Director of Strategic Distance Education, significant technical upgrades amazed and gratified at the talent, commitment and Initiatives, Liberty Property Trust; James Eastwood, have been made to our existing classroom in CEER productivity of our CE ’68, President & CEO, Granary Associates; Dr. 010 and two new state-of-the-art distance education students, faculty, staff Richard Emmert, retired Vice President, E.I. classrooms are under construction in CEER 312 and alumni. DuPont; Donald P. Fusilli, Jr., Esq., CE ’73, and 314. The first fully on-line M.S. degrees in In the last President & CEO, Michael Baker Corp.; William Civil and Environmental Engineering were offered Newsletter I men- O’Donnell, CE ’65, President, O’Donnell & in the fall of 2003. As a result of the favorable tioned that as we con- Naccarato; Thomas Portland, ChE ’69, retired Vice response, we will also be offering an on-line M.S.
    [Show full text]
  • Cutter IT Journal
    Cutter The Journal of IT Journal Information Technology Management Vol. 26, No. 10 October 2013 “With any substantial invest- ment in new technology The Value of Social Media comes the question of value. Is there enough value in the Data Analytics mountain of unstructured social media data to justify the expense and effort of Opening Statement by Matt Ganis and Avinash Kohirkar . 3 examining it?” — Matt Ganis and By the Numbers: Using Social Media Measurement to Drive Results by Jim Love . 6 Avinash Kohirkar, Creating Sustainable Value from Social Analytics Guest Editors by P Gopa Kumar, Girish Khanzode, and Mallika Bahety . 14 The Missing Link in Social Media Data Analytics by Thad Scheer . 22 Assessing the Value of Social Media Analytics by Nick Kadochnikov . 27 Social Media Due Diligence: Selecting the Right Social Listening Partner by Steve Andriole . 34 NOT FOR DISTRIBUTION For authorized use, contact Cutter Consortium: +1 781 648 8700 [email protected] Cutter IT Journal About Cutter IT Journal Cutter IT Journal® Cutter Business Technology Council: Part of Cutter Consortium’s mission is to Cutter IT Journal subscribers consider the Rob Austin, Ron Blitstein, Tom DeMarco, Lynne Ellyn, Israel Gat, Vince Kellen, foster debate and dialogue on the business Journal a “consultancy in print” and liken Tim Lister, Lou Mazzucchelli, technology issues challenging enterprises each month’s issue to the impassioned Ken Orr, and Robert D. Scott today, helping organizations leverage IT for debates they participate in at the end of Editor Emeritus: Ed Yourdon competitive advantage and business success. a day at a conference. Publisher: Karen Fine Coburn Cutter’s philosophy is that most of the issues Group Publisher: Chris Generali that managers face are complex enough to Every facet of IT — application integration, Managing Editor: Karen Pasley merit examination that goes beyond simple security, portfolio management, and testing, Production Editor: Linda M.
    [Show full text]
  • Governs the Making of Photocopies Or Other Reproductions of Copyrighted Material
    NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law. Cirrus: An automated protocol analysis tool Technical Report PCG-6 Kurt VanLehn and Steve Garlick Departments of Psychology and Computer Science Carnegie Mellon Unviersity Pittsburgh, PA 15213 U.S.A. Appears in P. Langley (ed.) Proceedings of the Fourth International Workshop on Machine Learning Los Altos, CA: Kaufman, 1987, pp. 205-217. This research was supported by Personnel and Training Research Programs, Psychological Sciences Division, Office of Naval Research, under Contract Numbers N00014-86-K-0349 and N00014-85-C-0688. Approved for public release; distribution limited. *««n. ., *•=*• c.3 REPORT DOCUMENTATION PAGE 1b. RESTRICTIVE MARKINGS Unclassified 3. DISTRIBUTION / AVAILABILITY OF REPORT 2a. SECJWTY OASS1«CATK>« Approved for public release; distribution 2b. 0€CLASSI*CAnON/0OWWG*A0lWG SCHCOuTF unlimited 4. PERFORMING ORGANIZATION «IPO«T NUM«€R(S) S. MONITORING ORGANIZATION REPORT NUMBER(S) PCG-6 PCG-6 NAM€ OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If tppiictbte) Personnel and Training Research Program Carnegie Mellon University Office of Naval Research (Code 442 PT) 6c AOORESS (Cry, Sratt, and ZIP Cod*) 7b AOORESS {City, Sut*. *nd ZIP Cod*) Psychology Department, BH 3351 Arlington, VA 22217 Schenley Park Pittsburgh, PA 15213 8a. NAME OF PUNOING/ SPONSORING 8b OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION Same as Monitoring Qrganizatior N00014-86-K-0349 and N00014-85-C-0688 8c.
    [Show full text]
  • Technology Due Diligence : Best Practices for Chief Information Officers, Venture Capitalists and Technology Vendors / Stephen J
    Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors Stephen J. Andriole Villanova University, USA INFORMATION SCIENCE REFERENCE Hershey • New York www.itdf.ir Acquisitions Editor: Kristin Klinger Development Editor: Kristin Roth Senior Managing Editor: Jennifer Neidig Managing Editor: Jamie Snavely Assistant Managing Editor: Carole Coulson Copy Editor: Jeannie Porter Typesetter: Amanda Appicello Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc. Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com/reference and in the United Kingdom by Information Science Reference (an imprint of IGI Global) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanbookstore.com Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or dis- tributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Andriole, Stephen J. Technology due diligence : best practices for chief information officers, venture capitalists and technology vendors / Stephen J. Andriole. p. cm. Includes bibliographical references and index.
    [Show full text]
  • About the Author
    254 About the Author About The Author Stephen J. Andriole, Ph.D. Steve Andriole’s career has focused on the development, application and management of information technology and analytical methodology to complex business problems. These problems have been in government and industry. Dr. Andriole has addressed them from academia, government, his own consulting company, a global insurance and financial services company, and from the unique perspective of a venture capitalist. Government Dr. Andriole was the Director of the Cybernetics Technology Office of the Defense Advanced Research Projects Agency (DARPA) where he managed a $50M program of research and development that led to a number of important scientific and technological advances in the broad-based informa- tion, decision and computing sciences. While at DARPA, Dr. Andriole supported the development of spatial data management and multimedia sys- tems, decision-support systems, computer-aided simulation and training sys- tems, and intelligent technology-based command & control systems. Dr. Andriole’s research program at DARPA seeded MIT’s Architecture Machine Group, which evolved into the internationally-known Media Lab. The program Copyright © 2005, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. About The Author 255 also contributed to the development of the ARPANET (which became today’s Internet & World Wide Web), interactive training simulations, such as SIMNET, and a whole host of artificial intelligence-based advances. Dr. Andriole has consulted with the National Academy of Sciences, the National Science Foundation, and various offices and agencies of the U.S. Department of Defense. Industry Dr.
    [Show full text]
  • AUTHOR Different Goals of Inquiry Teaching. Technical
    DOCUMENT RESUME ED 282 825 SP 028 803 AUTHOR Collins, Allan TITLE Different Goals of Inquiry Teaching. Technical Report. Report No. 6458. INSTITUTION BBN Labs, Inc., Cambridge, MA. SPONS AGENCY National Inst. of Education (ED), Washington, DC.; Office of Naval Research, Arlington, Va. Personnel and Training Research Programs Office. PUB DATE Sep 86 CONTRACT 400-81-0030; N00014-C-85-0026 NOTE 31p. PUB TYPE Reports Descriptive (141) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS *Cognitive Development; Cognitive Processes; Elementary Secondary Education; *Inquiry; *Learning Strategies; Metacognition; *Questioning Techniques; *Teaching Methods ABSTRACT Inquiry teaching forces students to actively engage in articulating theories and principles that are critical to understanding a domain. Inquiry teachers have three distinct goals: (1) to help students construct a given theory or set of principles; (2) to help students construct novel theories or principles; and (3) to teach students how to pose questions so they will have self-monitoring skills. Inquiry teaching should be considered one of the teaching methods that the effective teacher interweaves with other methods. This combination forces students to articulate their knowledge as strategies, principles, and theories that they can call upon in different contexts, and teaches students questioning skills so that they can learn new domains or solve novel problems on their own. Examples of teachers using this method and their strategies are given.(A personnel directory is appended). (CB) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** BBNLaboratories Incorporated A Subsidiary of Bolt Beranek and Newman Inc. Report No. 6458 Different Goals of Inquiry Teaching Technical Report Allan Collins September 1986 Approved for publication; distribution unlimited "PERMISSION TO REPRODUCE THIS MATERIAL HAS BEEN GRANTED BY U.S.
    [Show full text]
  • Governs the Making of Photocopies Or Other Reproductions of Copyrighted Material
    NOTICE WARNING CONCERNING COPYRIGHT RESTRICTIONS: The copyright law of the United States (title 17, U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. Any copying of this document without permission of its author may be prohibited by law. Towards a Theory of Impasse-driven Learning Technical Report PCG-1 Kurt VanLehn Departments of Psychology and Computer Science Carnegie-Mellon University, Schenley Park, Pittsburgh.PA 15213 U.S.A. February 12, 1987 To appear in H. Mandl & A. Lesgold (eds.) Learning Issues for Intelligent Tutoring Systems New York: Springer. Running Head: Impasse-driven learning This research was supported by the Personnel and Training Research Programs, Psychological Sciences Division, Office of Naval Research, under Contract No. N00014-86K-0349. Reproduction in whole or in part is permitted for any purpose of the United States Government. Approved for public release; distribution unlimited. OOfc/5 REPORT DOCUMENTATION PAGE 1«. REPORT SECURITY CLASSIFICATION 1b. RESTRICTIVE MARKINGS 2*. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION / AVAILABILITY OF REPORT Approved for public release; 2b. DECLASSIF1CATION / OOWNGRAOING 5CH6OUU Distribution unlimited 4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER(S) Same as Performing Organization PCG-1 6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If applicable) Personnel and Training Research Carnegie-Mellon University Office of Naval Research (Code 1142 PT) 6c. AOORESS (Gty, Staff, and ZIP Cod*) 7b AOORESS (City, State, and ZIP Cod*) Department of Psychology 800 N. Quincy St. Pittsburgh, PA 15213 Arlington, VA 22217-5000 8a. NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable) N00014r*86-K-0349 Same as Monitoring Organization 8c.
    [Show full text]
  • Globalization and Offshoring of Software a Report of the ACM Job Migration Task Forc E
    Globalization and Offshoring of Software A Report of the ACM Job Migration Task Forc e Association for Computing Machinery Advancing Computing as a Science & Profession The Association for Computing Machinery (ACM) is an educational and scientific society uniting the world’s computing educators, researchers, and professionals to inspire dialogue, share resources, and address the field’s challenges. ACM strengthens the profession’s collective voice through strong leadership, promotion of the highest standards, and recognition of technical excellence. ACM supports the professional growth of its members by providing opportunities for life- long learning, career development, and professional networking. For more information about ACM, visit http://www.acm.org For an electronic version of all or parts of this report, visit http://www.acm.org/globalizationreport Globalization and Offshoring of Software A Report of the ACM Job Migration Task Force William Aspray, Frank Mayadas, and Moshe Y. Vardi, Editors Association for Computing Machinery Advancing Computing as a Science & Profession Copyright © 2006 ACM 0001-0782/06/0200. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. The ACM Job Migration Task Force Alok Aggrawal (Founder and Chairman of Evalueserve) Frances E. Allen (Fellow Emerita at the T. J. Watson Research Center) Stephen J.
    [Show full text]