tag:blogger.com,1999:blog-35834957318965768272024-03-05T20:51:04.550-08:00Jai Krishna Ponnappan WebRead Real World Expertise and Analysis on Business, Technology, and Information Management Authored by Jai Krishna Ponnappan.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comBlogger89125tag:blogger.com,1999:blog-3583495731896576827.post-4327367095630038382022-09-14T04:20:00.010-07:002022-09-20T23:20:16.889-07:00Data Governance, Ethics, And Trust. <p style="text-align: center;"> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhR_q_VSHoev8K4UaGYhVT2Jnla9upz--HCnyv8anETXzpYNewtWOk70_emsT4WDXevFjBgkYNatWWplJOfFtcsBLfA8Vop0yBbdcEi3s1MDXQalA1zq-y67SvgnA9doPHRSV2dROSk8AuNUp3PdcpJ7sUZd8rDyLQl3l5HwawNdqP1NtBXeWzjlPES" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="660" data-original-width="699" height="378" src="https://blogger.googleusercontent.com/img/a/AVvXsEhR_q_VSHoev8K4UaGYhVT2Jnla9upz--HCnyv8anETXzpYNewtWOk70_emsT4WDXevFjBgkYNatWWplJOfFtcsBLfA8Vop0yBbdcEi3s1MDXQalA1zq-y67SvgnA9doPHRSV2dROSk8AuNUp3PdcpJ7sUZd8rDyLQl3l5HwawNdqP1NtBXeWzjlPES=w400-h378" width="400" /></a></div><br /><p></p><p><br /></p><h3 style="text-align: left;"><b>We have a basic understanding of the data we have access to, where we could get it, and what we can do with it once we have it, we need to consider how to prevent it from becoming a liability. </b></h3><p>Data is more and more likely to rank among a company's most valuable assets. </p><p>However, we must never lose sight of the fact that it has two sides to it. </p><p>If you handle it appropriately, it will help you get the necessary insights. </p><p><br /></p><p><b>However, if you don't handle it respectfully, you may easily cut yourself! </b></p><h3 style="text-align: left;"><b>Nearly as many negative effects result from bad data management and planning as there are possible advantages. </b></h3><p>They include things like higher expenses and overhead, a decline in consumer confidence, the development of a negative public image about your firm's ethics or environmental impact, as well as very harsh penalties that might put your company out of business. </p><p>Here we'll examine the critical elements that must be taken into account to make sure your data policy doesn't put you at odds with your clients, the law, or the line between right and wrong. </p><p><br /></p><h3 style="text-align: left;"><b>We will discuss some of the risks and problems that must be avoided, such as privacy, prejudice, and the effects of AI and technology on the environment. </b></h3><p><b><br /></b></p><p></p><ol style="text-align: left;"><li><a href="https://www.jaikrishnaponnappanweb.com/2022/09/understanding-evolving-ai-ethics.html"><span style="font-size: large;">Understanding Evolving AI Ethics</span></a></li><li><a href="https://www.jaikrishnaponnappanweb.com/2022/09/the-significance-of-clean-data-and-bias.html"><span style="font-size: large;">The Significance of "Clean" Data And Bias. </span></a></li><li><span style="font-size: large;"><a href="https://www.jaikrishnaponnappanweb.com/2022/09/keeping-data-within-bounds-of-law.html">Keeping Data Within The Bounds Of The Law.</a> </span></li><li><a href="https://www.jaikrishnaponnappanweb.com/2022/09/implementing-effective-data-governance.html"><span style="font-size: large;">Implementing Effective Data Governance.</span></a></li></ol><p></p><p><br /></p><p><b>Additionally, we'll examine specific circumstances in which failing to act might result in a violation of our moral and ethical duties to society and our clients. </b></p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><div><br /></div><div><br /></div><h2>References And Further Reading</h2><h2><div style="font-size: medium; font-weight: 400;"><br /></div><div style="font-size: medium; font-weight: 400;"><span><p></p><ol><li>Roff, HM and Moyes, R (2016) Meaningful Human Control, Artificial Intelligence and Autonomous Weapons, Briefing paper prepared for the Informal Meeting of Experts on Lethal Autonomous Weapons Systems, UN Convention on Certain Conventional Weapons, April, article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf (archived at <a href="https://perma.cc/LE7C-TCDV">https://perma.cc/LE7C-TCDV</a>)</li><li>Wakefield, J (2018) The man who was fired by a machine, BBC, 21 June, www.bbc.co.uk/news/technology-44561838 (archived at <a href="https://perma.cc/KWD2-XPGR">https://perma.cc/KWD2-XPGR</a>)</li><li>Kande, M and Sönmez, M (2020) Don’t fear AI. It will lead to long-term job growth, WEF, 26 October, www.weforum.org/agenda/2020/10/dont-fear-ai-it-will-lead-to-long-term-job-growth/ (archived at <a href="https://perma.cc/LY4N-NCKM">https://perma.cc/LY4N-NCKM</a>)</li><li>The Royal Society (2019) Explainable AI: the basics, November, royalsociety.org/-/media/policy/projects/explainable-ai/AI-and-interpretability-policy-briefing.pdf (archived at <a href="https://perma.cc/XXZ9-M27U">https://perma.cc/XXZ9-M27U</a>)</li><li>Hao, K (2019) Training a single AI model can emit as much carbon as five cars in their lifetimes, MIT Technology Review, 6 June, www.technologyreview.com/2019/06/06/239031/training-a-single-ai-model-can-emit-as-much-carbon-as-five-cars-in-their-lifetimes/ (archived at <a href="https://perma.cc/AYN9-C8X9">https://perma.cc/AYN9-C8X9</a>)</li><li>Najibi, A (2020) Racial discrimination in face recognition technology, SITN Harvard University, 24 October, sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ (archived at <a href="https://perma.cc/F8TC-RPHW">https://perma.cc/F8TC-RPHW</a>)</li><li>McDonald, H (2019) AI expert calls for end to UK use of ‘racially biased’ algorithms, Guardian, 12 December, www.theguardian.com/technology/2019/dec/12/ai-end-uk-use-racially-biased-algorithms-noel-sharkey (archived at <a href="https://perma.cc/WX8L-YEK8">https://perma.cc/WX8L-YEK8</a>)</li><li>Dastin, J (2018) Amazon scraps secret AI recruiting tool that showed bias against women, Reuters, 11 October, www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G (archived at <a href="https://perma.cc/WYS6-R7CC">https://perma.cc/WYS6-R7CC</a>)</li><li>Johnson, J (2021) Cyber crime: number of breaches and records exposed 2005–2020, Statista, 3 March, www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (archived at <a href="https://perma.cc/BQ95-2YW2">https://perma.cc/BQ95-2YW2</a>)</li><li>Palmer, D (2021) These new vulnerabilities put millions of IoT devices at risk, so patch now, ZDNet, 13 April, www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/ (archived at <a href="https://perma.cc/RM6B-TSL3">https://perma.cc/RM6B-TSL3</a>)</li></ol><p></p></span></div></h2><div><span><p style="color: black; font-weight: 400;"><br /></p></span></div>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-29308144997277578092022-09-14T04:17:00.023-07:002022-09-20T23:29:54.058-07:00Implementing Effective Data Governance.<p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEj5SYAiXJPzLmxsIzwOnReJwaDGVgRS3qqeuaEbrq-ktyjuT1xCq3Zzf2J7F8aXPZjLbWTHxCx7hWX28R5oQxZ0soonqj0InR8TkBlBV7U8F2t_q_QILj4xV_oSjv3KY8P2zO14rZuLCnyNsS2_OO6hzDsV93ZKStqby7brTFERZ0w71YrOBtFelf0p" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="424" data-original-width="401" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEj5SYAiXJPzLmxsIzwOnReJwaDGVgRS3qqeuaEbrq-ktyjuT1xCq3Zzf2J7F8aXPZjLbWTHxCx7hWX28R5oQxZ0soonqj0InR8TkBlBV7U8F2t_q_QILj4xV_oSjv3KY8P2zO14rZuLCnyNsS2_OO6hzDsV93ZKStqby7brTFERZ0w71YrOBtFelf0p=w378-h400" width="378" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>As you've probably inferred from reading the material we've discussed so far, the most important lesson to learn from this is the need of a complete and comprehensive data governance policy. </b></h3><p>We've addressed all the important topics that must be taken into consideration while developing your plan, including data bias and quality, legal and regulatory issues, data security, and, of course, the ethical issues you must address. </p><p>Your strategy will help you arrive at a set of rules that you can use to manage and maintain your data and analytics technology infrastructure overall by taking all of these factors into consideration. </p><p>Data governance refers to accepting responsibility for the moral and legal obligations you have as an individual engaged in the process of releasing the immense power buried inside information. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgdUPqT3Aiv1wWPz7YELrjAj6h7g_5ds2XctaHcPoaSbOxbz7yTvEdU1QhG2fqfPAyFqdxTCiGvoyJcnQ8yGHO_DwqC_55ZJnuZxHIOY_fxbo76JelfnTasvmS7J3iyiGf-zTovXILFLrRGquSBVPoQvlu4TZjMkyIAz92tfr40hOh3JqjoWHepEqQk" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="376" data-original-width="512" height="294" src="https://blogger.googleusercontent.com/img/a/AVvXsEgdUPqT3Aiv1wWPz7YELrjAj6h7g_5ds2XctaHcPoaSbOxbz7yTvEdU1QhG2fqfPAyFqdxTCiGvoyJcnQ8yGHO_DwqC_55ZJnuZxHIOY_fxbo76JelfnTasvmS7J3iyiGf-zTovXILFLrRGquSBVPoQvlu4TZjMkyIAz92tfr40hOh3JqjoWHepEqQk=w400-h294" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>It's important to ensure that you are following all applicable laws, have the appropriate permissions and security in place, and have a clear knowledge of who is in charge of maintaining the security, reliability, and correctness of your data. </b></h3><p>Much of this depends on how well you implement a data culture inside your business; given how crucial excellent data governance is to preserving consumer trust, it should be taught in everyone engaged as a fundamental value. </p><p>It should be clear to everyone how important it is to the business and how carefully it should be handled. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEh4HOeLPIXBu1Hy8ON22jJIwImUGl9TaVtr_e_X89GApOQJNe0RmscE5XuHKcKhz7zB3Ks6dJg-7fC3R8Yk_GXJ01F2bvRTGvyKyx4_I8ew_KlHRjmM5q-vZ1miAnNdbR5xrJvL8KohOFOaYDgQ_U4xUa2UXzcEmw0MNEPIFLlJQ2zgVwpht0sv8Gk2" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="1200" data-original-width="1200" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEh4HOeLPIXBu1Hy8ON22jJIwImUGl9TaVtr_e_X89GApOQJNe0RmscE5XuHKcKhz7zB3Ks6dJg-7fC3R8Yk_GXJ01F2bvRTGvyKyx4_I8ew_KlHRjmM5q-vZ1miAnNdbR5xrJvL8KohOFOaYDgQ_U4xUa2UXzcEmw0MNEPIFLlJQ2zgVwpht0sv8Gk2=w400-h400" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>Naturally, your data governance plan should include the steps you will take to make sure you are in compliance with all applicable laws, including frequent audits of these processes that are owned by a designated individual. </b></h3><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEh-Q-LWbHIrzVc37kLcWC9P65wGAkOMNYkX8f5t573hAdJf5dastzoLgm_Nn9K9S8p2pARkg5zDO0zo5BRG9Sz0zXBNbKEWEaOqyReJv_lzdfYp1hXsV-N5QKVnlCnccntZJNYC3jfooUeAP4nzYCFm5NLwxQcc_fsiPb-4JJKYZAkNJNBpe_CIj0qq" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="535" data-original-width="570" height="375" src="https://blogger.googleusercontent.com/img/a/AVvXsEh-Q-LWbHIrzVc37kLcWC9P65wGAkOMNYkX8f5t573hAdJf5dastzoLgm_Nn9K9S8p2pARkg5zDO0zo5BRG9Sz0zXBNbKEWEaOqyReJv_lzdfYp1hXsV-N5QKVnlCnccntZJNYC3jfooUeAP4nzYCFm5NLwxQcc_fsiPb-4JJKYZAkNJNBpe_CIj0qq=w400-h375" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;">It also explains how permission to use personal data is requested, where these records are kept, and how they can be kept up to date in the event that permission is revoked or new requirements for data use arise that fall outside the scope of previously granted permissions. </h3><p></p><ul style="text-align: left;"><li>If you deploy CCTV cameras, there should be signs in place informing people that recordings are being produced and explaining why. </li><li>If you use Bluetooth or RFID to collect information from consumers' mobile devices while they are on or near your property, you must ensure that contracts are in place that clearly state how the information will be used. </li><li>Because you are now accountable for it, if you purchase data from third-party vendors, you must ensure that your uses are consistent with the rights granted when the source gathered the data. </li></ul><p></p><p><b>Data governance is really about managing data as the important company asset that it is. </b></p><p>The same should be true for your data, just as you have procedures and systems in place to make managing your personnel easier. </p><p>A successful and secure usage of data may be achieved by putting a solid data governance structure in place as part of a larger overall data strategy.</p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><div><br /></div><div><h2>References And Further Reading</h2><h2><div style="font-size: medium; font-weight: 400;"><br /></div><div style="font-size: medium; font-weight: 400;"><span><p></p><ol><li>Roff, HM and Moyes, R (2016) Meaningful Human Control, Artificial Intelligence and Autonomous Weapons, Briefing paper prepared for the Informal Meeting of Experts on Lethal Autonomous Weapons Systems, UN Convention on Certain Conventional Weapons, April, article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf (archived at <a href="https://perma.cc/LE7C-TCDV">https://perma.cc/LE7C-TCDV</a>)</li><li>Wakefield, J (2018) The man who was fired by a machine, BBC, 21 June, www.bbc.co.uk/news/technology-44561838 (archived at <a href="https://perma.cc/KWD2-XPGR">https://perma.cc/KWD2-XPGR</a>)</li><li>Kande, M and Sönmez, M (2020) Don’t fear AI. It will lead to long-term job growth, WEF, 26 October, www.weforum.org/agenda/2020/10/dont-fear-ai-it-will-lead-to-long-term-job-growth/ (archived at <a href="https://perma.cc/LY4N-NCKM">https://perma.cc/LY4N-NCKM</a>)</li><li>The Royal Society (2019) Explainable AI: the basics, November, royalsociety.org/-/media/policy/projects/explainable-ai/AI-and-interpretability-policy-briefing.pdf (archived at <a href="https://perma.cc/XXZ9-M27U">https://perma.cc/XXZ9-M27U</a>)</li><li>Hao, K (2019) Training a single AI model can emit as much carbon as five cars in their lifetimes, MIT Technology Review, 6 June, www.technologyreview.com/2019/06/06/239031/training-a-single-ai-model-can-emit-as-much-carbon-as-five-cars-in-their-lifetimes/ (archived at <a href="https://perma.cc/AYN9-C8X9">https://perma.cc/AYN9-C8X9</a>)</li><li>Najibi, A (2020) Racial discrimination in face recognition technology, SITN Harvard University, 24 October, sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ (archived at <a href="https://perma.cc/F8TC-RPHW">https://perma.cc/F8TC-RPHW</a>)</li><li>McDonald, H (2019) AI expert calls for end to UK use of ‘racially biased’ algorithms, Guardian, 12 December, www.theguardian.com/technology/2019/dec/12/ai-end-uk-use-racially-biased-algorithms-noel-sharkey (archived at <a href="https://perma.cc/WX8L-YEK8">https://perma.cc/WX8L-YEK8</a>)</li><li>Dastin, J (2018) Amazon scraps secret AI recruiting tool that showed bias against women, Reuters, 11 October, www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G (archived at <a href="https://perma.cc/WYS6-R7CC">https://perma.cc/WYS6-R7CC</a>)</li><li>Johnson, J (2021) Cyber crime: number of breaches and records exposed 2005–2020, Statista, 3 March, www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (archived at <a href="https://perma.cc/BQ95-2YW2">https://perma.cc/BQ95-2YW2</a>)</li><li>Palmer, D (2021) These new vulnerabilities put millions of IoT devices at risk, so patch now, ZDNet, 13 April, www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/ (archived at <a href="https://perma.cc/RM6B-TSL3">https://perma.cc/RM6B-TSL3</a>)</li></ol><p></p></span></div></h2><div><span><p><br /></p></span></div></div>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-80487310587581534232022-09-14T04:17:00.022-07:002022-09-20T23:28:40.988-07:00 The Significance of "Clean" Data And Bias. <p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgzRdQWhf4i-9tfgBlc5YgjYQvCWtE1nTl6cjSRUen_qE14HVJHlSQehNQ0uDVV-eYaNZGWjqwzIxlD_G9-uUE8WdkrSEOj4HhMAzRDF14XCzrVmcm44vjsi3auvmdZjFfblXDDbaLtOId5ufLrQyBH7D2SxB_VTi5Yu7gMnPwXT4iNK4A50VPN0mT7" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="471" data-original-width="850" height="221" src="https://blogger.googleusercontent.com/img/a/AVvXsEgzRdQWhf4i-9tfgBlc5YgjYQvCWtE1nTl6cjSRUen_qE14HVJHlSQehNQ0uDVV-eYaNZGWjqwzIxlD_G9-uUE8WdkrSEOj4HhMAzRDF14XCzrVmcm44vjsi3auvmdZjFfblXDDbaLtOId5ufLrQyBH7D2SxB_VTi5Yu7gMnPwXT4iNK4A50VPN0mT7=w400-h221" width="400" /></a></div><br /><br /><p></p><p><br /></p><p>Algorithms for machine learning are only as good as the data used to train them.</p><p>Making sure the data you are using is as clean as possible is a crucial aspect of governance. </p><p>We typically refer to data as being "clean" when it is both of high quality and bias-free. </p><p><br /></p><h2 style="text-align: left;">Data Integrity.</h2><p><br /></p><h3 style="text-align: left;"><b>Quality refers to a set of measures that may be used to judge whether data is appropriate for the purpose for which you want it. </b></h3><p>To make sure you're meeting all the requirements for data quality, each of these factors should be examined since they are all equally significant. </p><p><b>Consistency is the first one. This indicates that a dataset's data was all collected and recorded in the same manner. </b></p><p>For instance, if a record has numerous fields, each record should have each field filled in. </p><p>In order to always be able to utilize the data together, fields should be used consistently across all records and if we "know" anything about one item of information in the dataset, we should also "know" it about all other pieces of information. </p><p><b>On to accuracy. This only indicates that the data is devoid of errors. </b></p><p>The tools or sensors that have been used to gather or input the observations and measurements must be audited and shown to be operating properly for the observations and measurements to be considered accurate. </p><p>We must make sure that stakeholders who are responsible for data entry are taught and aware of all the governance standards since mistakes may still happen when data is entered by humans. </p><p><br /></p><h3 style="text-align: left;"><b>Another crucial measure is uniqueness, which simply refers to the absence of duplicate entries. </b></h3><p>When processing data, it's highly probable that your database may start to become inaccurate if the same piece of information is stored more than once in different entries. </p><p><b>Validity is a metric for determining whether each record or piece of information in a database is appropriate for the use for which it is intended. </b></p><p>For instance, are dates kept consistently and are all numbers stored consistently—as integers or rounded up or down to a certain decimal place? Timeliness evaluates how probable it is for your data to be relevant given the period it was obtained. </p><p>Some processes, like the movement of glaciers, may be monitored and understood with just sporadic measurements. </p><p>Others need measurements to the millionth of a second, such the locations of protons and electrons in a subatomic structure. </p><p><br /></p><h3 style="text-align: left;"><b>Measurements must be collected and recorded with a delay that is as near to zero as is possible for procedures that call for real-time datasets. </b></h3><p>Last but not least, completeness measures how much of the entire amount of data that is available on a topic is represented in your dataset. </p><p>Make sure every item you carry in your inventory is reflected in the database if you're utilizing a database of your items and pricing to determine which are the most popular. </p><p>It would not be possible to capture the whole information for other uses, such as tracking animal migration routes, thus a sample would be selected for tracking and analysis. </p><p>However, your insights will be more realistically based the more full your collection is. </p><p><b>Data governance requires auditing your data using metrics that monitor these parameters in order to confirm that you are dealing with high-quality data. </b></p><p><br /></p><p><br /></p><h2 style="text-align: left;">Biased Data.</h2><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgGTz68DXotJpqfGwgSGHuPO7tPjIJX2bdxbRxOqNsh8aaRyQfjM58zy63qygTd9MOQAN4G0MMyv84MwrxWntvVTo9_wiKkXD1fRlBQr3DmBM0ycyOy2mq3O0DH62E52LWDjY_QAX0uwKdi-zcymcO8sCeuVTiKE3f_BieHhjKFHgi2ummHJkMEg1P1" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="429" data-original-width="685" height="250" src="https://blogger.googleusercontent.com/img/a/AVvXsEgGTz68DXotJpqfGwgSGHuPO7tPjIJX2bdxbRxOqNsh8aaRyQfjM58zy63qygTd9MOQAN4G0MMyv84MwrxWntvVTo9_wiKkXD1fRlBQr3DmBM0ycyOy2mq3O0DH62E52LWDjY_QAX0uwKdi-zcymcO8sCeuVTiKE3f_BieHhjKFHgi2ummHJkMEg1P1=w400-h250" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>Bias is the second component of "clean data." Data that is biased is not accurately reflective of the data topic. </b></h3><p>Typically, this is caused by elements innate to the method of data collection. </p><p>For instance, your data would be intrinsically skewed if you use feedback forms to gauge customer happiness and only distribute them to clients who have given favorable evaluations. </p><p><b>Bias may always come in because of the enormous and intricate datasets utilized in AI and machine learning projects. </b></p><p>The fact that skewed data implies your insights won't be based on objective truth is a significant hurdle for many data endeavors. </p><p>In fact, if the promise of AI is to be fulfilled, experts in the area of AI believe that one of the main problems society will have to solve is eliminating prejudice (or at least decreasing the harm it may bring). </p><p><br /></p><h3 style="text-align: left;"><b>As mentioned above, biased data may be the consequence of poor data quality, but bias can also appear when your data is of high quality overall. </b></h3><p>This is due to the fact that bias might exist even whether the data is correct, distinctive, reliable, or current. </p><p>It indicates that you aren't casting your net far enough to collect data from a range of sources or perspectives. </p><p>As a consequence, the simulations and models you create won't accurately reflect reality. </p><p><br /></p><h3 style="text-align: left;">Data bias has some extremely dangerous consequences. </h3><p>When face recognition technologies used by police forces to locate criminals in crowds in the US were audited, it was shown that young, female, black citizens were considerably more likely to be incorrectly identified than those of any other age category. </p><p><b>The algorithm's accuracy rate was determined to be 34% lower for this population when used in comparison to other groups. </b></p><p>This may undoubtedly result in more erroneous arrests, stops, or searches of persons in this demographic if allowed uncontrolled. </p><p>Recruitment is another instance where data bias might really be problematic. </p><p>The datasets utilized by recruiting algorithms that Noel Sharkey has investigated are so rife with bias that they simply shouldn't be used unless they can be controlled and reviewed with the same level of rigors as is required for data used in pharmaceutical trials, according to Sharkey. </p><p><br /></p><h3 style="text-align: left;"><b>After realizing that a machine learning algorithm used by Amazon to evaluate job applications was essentially sexist, the company ceased using it in 2018. </b></h3><p>The dataset that the algorithm used was found to discriminate against women, passing them over for opportunities for no reason other than the fact that it did not have enough data on female applicants for these roles because far fewer women than men had applied to work for the company over the previous 10 years. </p><p>The fact that it may sometimes be appropriate to purposely add bias into a system in order to make up for societal elements that tend towards injustice or intolerance complicates matters even more. </p><p><br /></p><p><b>Microsoft and IBM both introduced AI-powered chatbots during the previous decade, but they eventually needed to be modified (or, in Microsoft's case, deleted) to prevent them from behaving in an offensive and bigoted way. </b></p><p>This was due to the fact that they were developing their communication skills based on social media conversations, which are of course sometimes racist or hostile in nature. </p><p>This entailed informing the bot that it shouldn't be learning from racist or abusive material, which necessitated injecting a deliberate bias aspect into the system. </p><p>Of course, this obviously results in less realistic data being used to train the bots. </p><p>There weren't many options, but it's obviously inappropriate for a computer speaking for a business like IBM to use racial slurs and quote Hitler. </p><p><br /></p><p><b>Another crucial step in the governance process is to balance the damage that might result from using biased data against the harm from omitting it. </b></p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><b style="color: #ffa400;"><br /></b></p><p><b style="color: #ffa400;"><br /></b></p><div><h2>References And Further Reading</h2><h2><div style="font-size: medium; font-weight: 400;"><br /></div><div style="font-size: medium; font-weight: 400;"><span><p></p><ol><li>Roff, HM and Moyes, R (2016) Meaningful Human Control, Artificial Intelligence and Autonomous Weapons, Briefing paper prepared for the Informal Meeting of Experts on Lethal Autonomous Weapons Systems, UN Convention on Certain Conventional Weapons, April, article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf (archived at <a href="https://perma.cc/LE7C-TCDV">https://perma.cc/LE7C-TCDV</a>)</li><li>Wakefield, J (2018) The man who was fired by a machine, BBC, 21 June, www.bbc.co.uk/news/technology-44561838 (archived at <a href="https://perma.cc/KWD2-XPGR">https://perma.cc/KWD2-XPGR</a>)</li><li>Kande, M and Sönmez, M (2020) Don’t fear AI. It will lead to long-term job growth, WEF, 26 October, www.weforum.org/agenda/2020/10/dont-fear-ai-it-will-lead-to-long-term-job-growth/ (archived at <a href="https://perma.cc/LY4N-NCKM">https://perma.cc/LY4N-NCKM</a>)</li><li>The Royal Society (2019) Explainable AI: the basics, November, royalsociety.org/-/media/policy/projects/explainable-ai/AI-and-interpretability-policy-briefing.pdf (archived at <a href="https://perma.cc/XXZ9-M27U">https://perma.cc/XXZ9-M27U</a>)</li><li>Hao, K (2019) Training a single AI model can emit as much carbon as five cars in their lifetimes, MIT Technology Review, 6 June, www.technologyreview.com/2019/06/06/239031/training-a-single-ai-model-can-emit-as-much-carbon-as-five-cars-in-their-lifetimes/ (archived at <a href="https://perma.cc/AYN9-C8X9">https://perma.cc/AYN9-C8X9</a>)</li><li>Najibi, A (2020) Racial discrimination in face recognition technology, SITN Harvard University, 24 October, sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ (archived at <a href="https://perma.cc/F8TC-RPHW">https://perma.cc/F8TC-RPHW</a>)</li><li>McDonald, H (2019) AI expert calls for end to UK use of ‘racially biased’ algorithms, Guardian, 12 December, www.theguardian.com/technology/2019/dec/12/ai-end-uk-use-racially-biased-algorithms-noel-sharkey (archived at <a href="https://perma.cc/WX8L-YEK8">https://perma.cc/WX8L-YEK8</a>)</li><li>Dastin, J (2018) Amazon scraps secret AI recruiting tool that showed bias against women, Reuters, 11 October, www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G (archived at <a href="https://perma.cc/WYS6-R7CC">https://perma.cc/WYS6-R7CC</a>)</li><li>Johnson, J (2021) Cyber crime: number of breaches and records exposed 2005–2020, Statista, 3 March, www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (archived at <a href="https://perma.cc/BQ95-2YW2">https://perma.cc/BQ95-2YW2</a>)</li><li>Palmer, D (2021) These new vulnerabilities put millions of IoT devices at risk, so patch now, ZDNet, 13 April, www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/ (archived at <a href="https://perma.cc/RM6B-TSL3">https://perma.cc/RM6B-TSL3</a>)</li></ol><p></p></span></div></h2><div><span><p><br /></p></span></div></div>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-47999729225548794242022-09-14T04:17:00.021-07:002022-09-20T23:26:57.153-07:00Understanding Evolving AI Ethics<p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEid-jmPlyK3bRh5VGjolLX1mUGobEpK-S96-NF3LA15Zixo53-Y5P_m2Ky9u2KBokWbeE6EIxVTwJaUnUU54OaWyJe6rfMEAEZBbHwXgaABnjS3vDJ1-_u4Yi4N_DhGqTAHl05C6EATI9MtT4SLeu5pKREA3c56KPlRlDaxMPHgQst2oQg5ZnDRNMOC" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="2043" data-original-width="2043" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEid-jmPlyK3bRh5VGjolLX1mUGobEpK-S96-NF3LA15Zixo53-Y5P_m2Ky9u2KBokWbeE6EIxVTwJaUnUU54OaWyJe6rfMEAEZBbHwXgaABnjS3vDJ1-_u4Yi4N_DhGqTAHl05C6EATI9MtT4SLeu5pKREA3c56KPlRlDaxMPHgQst2oQg5ZnDRNMOC=w400-h400" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>AI really has the power to transform business and larger society in ways that are now unthinkable. </b></h3><p>The basic shift we're seeing is that rather than only following predetermined, programmed instructions, robots are now able to make their own judgments. </p><p>Computers will increasingly be utilized for activities that involve decision-making, rather than just doing repetitive chores like applying formulae to numbers in a spreadsheet (which they currently excel at). </p><p>This will inevitably contain choices affecting people's lives. </p><p><br /></p><h3 style="text-align: left;"><b>The fact that Amazon is known to have fired human workers using AI algorithms. </b></h3><p>In such instance, it was discovered that robots handled the whole process of overseeing and firing employees. </p><p>Beyond that, we are aware that AI has been used to the creation of weapons to produce tools that can decide whether to murder people (currently the UN states that it is unacceptable for them to be allowed to do this ). </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi9L6zeFNDgpxqaT_5SpP-8F_d-TY_MNGIM7H7vb0bzQCkAkp8v7K2DRto_2nFk5k4Qr_41vR1NqtvE4KqA_pF1Ui1gMf7lcAGLteliFnkwAdOJ6_cvV_roC8hicddUj4D_uxgkAkbScPLk8nkUMQfQZh1JUwtBKxBbEgiY9Y6ee15SO5aNz4bHTqck" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="244" data-original-width="561" height="174" src="https://blogger.googleusercontent.com/img/a/AVvXsEi9L6zeFNDgpxqaT_5SpP-8F_d-TY_MNGIM7H7vb0bzQCkAkp8v7K2DRto_2nFk5k4Qr_41vR1NqtvE4KqA_pF1Ui1gMf7lcAGLteliFnkwAdOJ6_cvV_roC8hicddUj4D_uxgkAkbScPLk8nkUMQfQZh1JUwtBKxBbEgiY9Y6ee15SO5aNz4bHTqck=w400-h174" width="400" /></a></div><br /><br /><p></p><p><b><br /></b></p><h3 style="text-align: left;"><b>What about circumstances in which robots are forced to kill? </b></h3><p>How should a self-driving vehicle behave while deciding whether to collide with a pedestrian or a brick wall is a typical scenario used when debating AI ethics (potentially injuring its own driver). </p><p>These are extreme instances, but they are pertinent to any ethical decisions you would need to make if you're in charge of deploying AI-powered, automated decision making at any firm. </p><p>The most promising AI technologies all have extremely strong potential benefits, but if they are handled improperly, they might also have very strong potential drawbacks. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjD55mSpIIWrIo8PMI2-A5k2IBzBroDhdHGvcqlGdRuG4jrAu_CURnE4OI7syTB29jrrfVdij9rhG9QGZR49_7mnyzyIfLDKAW5XLcsd-stsx6jZ9WETBFJb4Re-Zmcj6fJ2zJerMALLrZ2N5vGTLgKd-vkplem4l50jMjsV_PZOfOaN30E7MRd4YDZ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="460" data-original-width="1100" height="134" src="https://blogger.googleusercontent.com/img/a/AVvXsEjD55mSpIIWrIo8PMI2-A5k2IBzBroDhdHGvcqlGdRuG4jrAu_CURnE4OI7syTB29jrrfVdij9rhG9QGZR49_7mnyzyIfLDKAW5XLcsd-stsx6jZ9WETBFJb4Re-Zmcj6fJ2zJerMALLrZ2N5vGTLgKd-vkplem4l50jMjsV_PZOfOaN30E7MRd4YDZ" width="320" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>In medical imaging, machine vision can identify malignant growths, but it may also be employed by authoritarian governments to monitor their population. </b></h3><p>It is now simpler than ever to communicate with robots, and natural language processing can scan social media postings for indications that someone could be suicidal or depressed. </p><p>By pretending to be someone else, it may also be utilized to plan frauds and phishing assaults. </p><p>And although we may use intelligent robots to investigate the ocean below or the universe, aid the disabled, and clean up the environment, they are also being created for use as lethal weapons. </p><p><br /></p><h3 style="text-align: left;"><b>It's crucial that we consider where our own implementations of AI fall on this spectrum. </b></h3><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiKJNG04kSj6S_n0TeVwusN8wu5Z1a4vAtfsIJ7P4En0IWvby-JjAdJhMIZLQNgFneYYnm-KWv-qX0ZsyTvXUvFrNG0U2H0Ao8Uq2GuPOZf4kxc8lfI9JsBHHvzdVfm2RBZAKmhtFSRzpzG6HIOOcxN2QYV0TCwnkVb3lZ5ttHwadcPg-Dx5vb4Z7Yw" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="373" data-original-width="620" height="241" src="https://blogger.googleusercontent.com/img/a/AVvXsEiKJNG04kSj6S_n0TeVwusN8wu5Z1a4vAtfsIJ7P4En0IWvby-JjAdJhMIZLQNgFneYYnm-KWv-qX0ZsyTvXUvFrNG0U2H0Ao8Uq2GuPOZf4kxc8lfI9JsBHHvzdVfm2RBZAKmhtFSRzpzG6HIOOcxN2QYV0TCwnkVb3lZ5ttHwadcPg-Dx5vb4Z7Yw=w400-h241" width="400" /></a></div><br /><br /><p></p><p><b>Can we be certain that a concept like, for instance, the data-driven customer segmentation in our ice cream parlor would lie on the correct side of the moral divide? </b></p><p>Hopefully no one reading this book is intending on using it to harm anybody. </p><p>In such case, concerns about permission and privacy would be the main issues. </p><p><br /></p><h3 style="text-align: left;"><b>It follows that it is unethical to gather, utilize, or distribute anyone's personal data without their consent if we recognize that individuals have a right to privacy. </b></h3><p>Therefore, getting agreement for any work we undertake with clients' private data is a crucial first step. </p><p>Of course, this is now a legal necessity in many areas.</p><p>However, when it comes to the governance of your data or AI initiatives, ethics and law must both be handled separately. </p><p>For instance, it's unlikely that Amazon's automatic termination of workers is against the law. </p><p><br /></p><p><b>On the other hand, it's pretty simple to construct a compelling case for it being immoral since it includes giving robots the authority to make decisions that may have a significant influence on people's lives. </b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhpvh1iWxvhjOkdUSmj-91TOQYjxhJ5WDq8G1s5GDoenB1i96fwDKmJ8bRawfyRh6kZ5CSi0GoEnz3APV9vVAd96q4OXAeQm1qCDpKqemAZm1MJ_NCIv9LIu8wVLtSYT8KS4FQdwObsPXvnOCp7herUwtXEO6e7IIphB3aRS6BIwbyOHi4dA9jWZ4fq" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="405" data-original-width="735" height="220" src="https://blogger.googleusercontent.com/img/a/AVvXsEhpvh1iWxvhjOkdUSmj-91TOQYjxhJ5WDq8G1s5GDoenB1i96fwDKmJ8bRawfyRh6kZ5CSi0GoEnz3APV9vVAd96q4OXAeQm1qCDpKqemAZm1MJ_NCIv9LIu8wVLtSYT8KS4FQdwObsPXvnOCp7herUwtXEO6e7IIphB3aRS6BIwbyOHi4dA9jWZ4fq=w400-h220" width="400" /></a></div><br /><br /><p></p><p>Furthermore, it's far from certain that the people involved ever agreed to give the robots this level of control over their lives. </p><p>Even if you are just using computers to execute processes more effectively rather than to make such life-altering choices, caution must be taken. </p><p><br /></p><h3 style="text-align: left;"><b>In 2018, IT contractor Ibrahim Diallo discovered he couldn't enter his Los Angeles workplace because his security permit had been suspended. </b></h3><p>After gaining entry, he was unable to enter into any of the systems he needed to use for his profession, and soon after that, security personnel showed up to take him out of the facility. </p><p>Also terminated was his salary. </p><p>His boss and any other senior employees were unaware of what had occurred, but after being compelled to work from home for three weeks, they discovered that an HR error had incorrectly indicated that he had been fired. </p><p>At that moment, automatic systems started running and there was no way to manually override them. </p><p>He had to quit the organization and look for employment elsewhere because of the stress and his supervisors' inability to take any action. </p><p><br /></p><h3 style="text-align: left;"><b>What happens if workers are dismissed but not because of AI? </b></h3><p><b>According to some sources, IBM's staff headcount decreased by 25% between 2012 and 2019, and many of the tasks performed by individuals who departed were replaced by machines. </b></p><p>There are undoubtedly compelling arguments that AI creates jobs rather than eliminates them for human workers. </p><p>In addition, the types of jobs that it creates, such as those for engineers, scientists, data storytellers, and translators, are probably more satisfying than the jobs that are lost. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjoyI8JvMQnDckHaiidd7s70-8tRXeFFIYmgJ3aQCo7f2f-WwYauYhmFXbjKXS0AN9XEWV53N8D7DpBCyEDlNARn6-zjwJSnZnnS9j0g1K0DwIpEJk_nYZs_F2Bz0KGmQKM7AH04yWou9F3wcEge7ZLZITjw0I8OweH2KmUxe7HHNYqxT23HexCinyN" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="534" data-original-width="1063" height="201" src="https://blogger.googleusercontent.com/img/a/AVvXsEjoyI8JvMQnDckHaiidd7s70-8tRXeFFIYmgJ3aQCo7f2f-WwYauYhmFXbjKXS0AN9XEWV53N8D7DpBCyEDlNARn6-zjwJSnZnnS9j0g1K0DwIpEJk_nYZs_F2Bz0KGmQKM7AH04yWou9F3wcEge7ZLZITjw0I8OweH2KmUxe7HHNYqxT23HexCinyN=w400-h201" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>According to the World Economic Forum, 85 million human jobs would have been replaced by automation by 2025. </b></h3><p>On the other hand, 97 million new jobs will be created within the same time period as a result of the rise in AI and other sophisticated, automated technologies. </p><p>Does it imply that, in terms of replacing human labor, automation is not ethically problematic? Well, not really, I'd say! </p><p><br /></p><h3 style="text-align: left;"><b>This implies that you must carefully examine how your own AI, automation, and data projects will affect your human workforce. </b></h3><p></p><ul style="text-align: left;"><li>Is there a possibility that someone may develop redundancy? </li><li>If so, might they be given additional jobs in accordance with their talents and responsibilities, but with an emphasis on using the human traits that computers still lack, such as creativity, empathy, and communication? </li><li>Most importantly, is there a chance that they may lose importance regardless of whether you use your initiative? </li><li>If you didn't implement it, for instance, would it affect your company's ability to compete in the market, making it impossible for you to continue paying them? </li></ul><p></p><p>Further reason for worry comes from an AI technique known as a generative adversarial network (GAN), which enables the creation of uncannily realistic representations of actual individuals as well as text and language. </p><p>This is what causes the "deepfake" pictures that have proliferated online. </p><p>This has the potential to cause a great deal of harm to both individuals and society. </p><p>For instance, it is very easy to find fake pornographic images of just about any celebrity online. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgzD-AfqNCTXDd8xPUPjMqWPr-t5pESwhuQZJ391R9Ak9RTbJ5uzsy32aIbQYgSm6jlpTNuIrJK8ZSbo3UyQMXU8hXEzJsXERrJnxgaAvxmzfYjXtTxuVlq-F6qB9cWU5XKgP3vl5MkIbVc-Dgt3fCABjqxXYLD9FFfQN0GynbALGfV1geXusVyXRak" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="719" data-original-width="1000" height="288" src="https://blogger.googleusercontent.com/img/a/AVvXsEgzD-AfqNCTXDd8xPUPjMqWPr-t5pESwhuQZJ391R9Ak9RTbJ5uzsy32aIbQYgSm6jlpTNuIrJK8ZSbo3UyQMXU8hXEzJsXERrJnxgaAvxmzfYjXtTxuVlq-F6qB9cWU5XKgP3vl5MkIbVc-Dgt3fCABjqxXYLD9FFfQN0GynbALGfV1geXusVyXRak=w400-h288" width="400" /></a></div><br /><br /><p></p><p><br /></p><h3 style="text-align: left;"><b>It has also been used for political purposes to create images of politicians and world leaders saying or acting in ways that they would never do in real life. </b></h3><p>This may exacerbate the issues brought on by false information and the simplicity with which false or misleading information may be disseminated online, thereby undermining the democratic process. </p><p>The generation of "synthetic data," and text-to-image systems, which essentially allow us to make pictures by describing what they look like, are just two of the many valid and totally ethical reasons a corporation would wish to employ GAN technology. </p><p>The ethical risk is that they may also be used to produce anything that aids in the dissemination of incorrect information or results in the misrepresentation of specific persons or groups of people. </p><p>Once again, if you use this technology, you need to be aware of the hazards and know where your beliefs fall in terms of ethics. </p><p>From an ethical perspective, recommendation technology could appear like a secure use of AI, but there are also risks. </p><p>We are given additional stuff to look at that is comparable to the content we have already looked at through systems that provide content, like Facebook's algorithms. </p><p><br /></p><p><b>This might result in "filter bubbles"; for instance, if you start reading the many conspiracy theory websites discussing topics like whether 9/11 was a "inside job" or the more current QAnon conspiracy, you will soon notice that similar items are starting to appear in your news feed. </b></p><p>The same holds true whether you lean heavily to the left or right and often read news articles that support their viewpoints. </p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhjeFCeUH3k67-SRuzeaylm9a3hFcS5gfQ0IOhZLUGxIZGmQXgFWtxDzNIekO8sccVu4yEQXMcjw9LVqgV6e9Vi-buQTYzEDaoXIkYHfo22RIIBBXq5poxgW-0Ou94ScpaLhVxcKEqXB4XKmeFqbNjoMfM5hl3db-bXdjFg77wxXN8Mjsgs_lYNN5wU" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="655" data-original-width="597" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEhjeFCeUH3k67-SRuzeaylm9a3hFcS5gfQ0IOhZLUGxIZGmQXgFWtxDzNIekO8sccVu4yEQXMcjw9LVqgV6e9Vi-buQTYzEDaoXIkYHfo22RIIBBXq5poxgW-0Ou94ScpaLhVxcKEqXB4XKmeFqbNjoMfM5hl3db-bXdjFg77wxXN8Mjsgs_lYNN5wU" width="219" /></a></div><br /><br /><p></p><p>The information you have accessible to support your own thoughts and beliefs may eventually become imbalanced if you only see tales that match that certain narrative. </p><p>Again, this might have extremely negative effects on the democratic process by creating the echo-chamber effect. </p><p>The need of transparency is still another problem. </p><p>If you're going to place humans in a situation where robots control their lives, you should at the very least be able to describe how the machines make decisions. </p><p><br /></p><h3 style="text-align: left;"><b>We've previously discussed the "black box" issue with AI, which arises from the fact that the algorithms may get so complicated that it is extremely challenging for humans to fully comprehend why they function in a certain way. </b></h3><p>This is made worse by the fact that some AI is purposefully opaque in order to deter easy duplication by those who sell it. </p><p>Ethics are a personal matter that each individual must consider for himself, but you could discover that you agree with the majority of people who believe that actions that have an influence on people's lives should be explicable. </p><p>It's interesting to note that some people think AR and VR might be useful in this situation by enabling us to study and question algorithmic operations in ways that aren't achievable by merely looking at computer code on a screen or even 2D representations of the operations. </p><p>The OECD's Principles for AI include transparency as one of its primary needs (more on this below). </p><p>Ethical issues are also brought up by AI's effects on the environment. </p><p><br /></p><h3 style="text-align: left;"><b>According to estimates, the amount of carbon produced by training certain NLP machine learning models is equivalent to the yearly carbon emissions of 17 Americans. </b></h3><p>All that computing power uses quite a lot of energy. </p><p>This is equivalent to around 283.048 kg (626,000 pounds) of CO2. </p><p>Due to their offsetting methods, some AI providers, like Google, claim that they are carbon neutral, while others, like Microsoft, won't be until years or decades from now. </p><p><b>Of course, AI has the ability to increase operational efficiency in many sectors, which may reduce the effect on the environment. </b></p><p>For instance, both the network-wide strategies utilized by power and utility companies and the smart home thermostats are focused on utilizing energy more effectively and reducing emissions. </p><p>There is no clear-cut answer to the question "Is AI good or bad for the environment?" because it depends on individual applications, which means that each application needs to be evaluated on its own merit for environmental impact. </p><p>This is similar to the ethics of particular AI capabilities like facial recognition and natural language, and the implications on jobs. </p><p>Given all the worries, it shouldn't be shocking that the AI business and larger society organizations are beginning to take the question of advanced technology ethics seriously. </p><p><br /></p><h3 style="text-align: left;"><b>The Organization for Economic Co-operation and Development (OECD) has released its AI Principles, which include the following: </b></h3><p>AI development should be done in a way that respects the law, human rights, democracy, and diversity; it should be transparent to allow it to be understood and challenged; and organizations should be held responsible for the results of their AI initiatives. </p><p><br /></p><h3 style="text-align: left;"><b>Google, too, has put forth its own standards of ethical AI usage. </b></h3><p>These include demands that AI apps be ethical, impartial, trustworthy, and considerate of users' privacy. </p><p>Additionally, the business has said that it would seek to prevent hazardous or abusive implementations of AI. </p><p>Additionally, Microsoft has a program called AI for Good that encourages the use of AI to address issues related to the environment, society, healthcare, and humanitarianism. </p><p><br /></p><p><b>The underuse of AI is my last point for this section, which I really believe needs thorough study. </b></p><p><br /></p><h3 style="text-align: left;">Simply said, there are numerous circumstances when avoiding AI is a bad idea from an ethical standpoint. </h3><p></p><ul style="text-align: left;"><li><b>Doesn't that imply we have an ethical obligation to employ AI if there are problems in our business, society, or the world at large that might be solved with it but we choose not to - possibly because of other factors we've covered here, such the effect on the environment or transparency concerns? </b></li></ul><ul style="text-align: left;"><li><b>Is it appropriate, for instance, to use facial recognition technology to locate someone who may be in danger even if they haven't given their consent to be followed in this way? </b></li></ul><p></p><p><br /></p><p>Police have used it to locate persons who have gone missing in China and the UK. </p><p>My suggestion is that any company intending to use AI take the step of establishing some kind of "ethical committee," similar to what Google and Microsoft have done. </p><p>Of course, depending on the size of the company, your council's scope, size, and resources will vary. </p><p><b>However, it's crucial to have someone in charge of taking into account all the concerns brought up here and how they affect our activities. </b></p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><div><br /></div><div><h2>References And Further Reading</h2><h2><div style="font-size: medium; font-weight: 400;"><br /></div><div style="font-size: medium; font-weight: 400;"><span><p></p><ol><li>Roff, HM and Moyes, R (2016) Meaningful Human Control, Artificial Intelligence and Autonomous Weapons, Briefing paper prepared for the Informal Meeting of Experts on Lethal Autonomous Weapons Systems, UN Convention on Certain Conventional Weapons, April, article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf (archived at <a href="https://perma.cc/LE7C-TCDV">https://perma.cc/LE7C-TCDV</a>)</li><li>Wakefield, J (2018) The man who was fired by a machine, BBC, 21 June, www.bbc.co.uk/news/technology-44561838 (archived at <a href="https://perma.cc/KWD2-XPGR">https://perma.cc/KWD2-XPGR</a>)</li><li>Kande, M and Sönmez, M (2020) Don’t fear AI. It will lead to long-term job growth, WEF, 26 October, www.weforum.org/agenda/2020/10/dont-fear-ai-it-will-lead-to-long-term-job-growth/ (archived at <a href="https://perma.cc/LY4N-NCKM">https://perma.cc/LY4N-NCKM</a>)</li><li>The Royal Society (2019) Explainable AI: the basics, November, royalsociety.org/-/media/policy/projects/explainable-ai/AI-and-interpretability-policy-briefing.pdf (archived at <a href="https://perma.cc/XXZ9-M27U">https://perma.cc/XXZ9-M27U</a>)</li><li>Hao, K (2019) Training a single AI model can emit as much carbon as five cars in their lifetimes, MIT Technology Review, 6 June, www.technologyreview.com/2019/06/06/239031/training-a-single-ai-model-can-emit-as-much-carbon-as-five-cars-in-their-lifetimes/ (archived at <a href="https://perma.cc/AYN9-C8X9">https://perma.cc/AYN9-C8X9</a>)</li><li>Najibi, A (2020) Racial discrimination in face recognition technology, SITN Harvard University, 24 October, sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ (archived at <a href="https://perma.cc/F8TC-RPHW">https://perma.cc/F8TC-RPHW</a>)</li><li>McDonald, H (2019) AI expert calls for end to UK use of ‘racially biased’ algorithms, Guardian, 12 December, www.theguardian.com/technology/2019/dec/12/ai-end-uk-use-racially-biased-algorithms-noel-sharkey (archived at <a href="https://perma.cc/WX8L-YEK8">https://perma.cc/WX8L-YEK8</a>)</li><li>Dastin, J (2018) Amazon scraps secret AI recruiting tool that showed bias against women, Reuters, 11 October, www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G (archived at <a href="https://perma.cc/WYS6-R7CC">https://perma.cc/WYS6-R7CC</a>)</li><li>Johnson, J (2021) Cyber crime: number of breaches and records exposed 2005–2020, Statista, 3 March, www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (archived at <a href="https://perma.cc/BQ95-2YW2">https://perma.cc/BQ95-2YW2</a>)</li><li>Palmer, D (2021) These new vulnerabilities put millions of IoT devices at risk, so patch now, ZDNet, 13 April, www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/ (archived at <a href="https://perma.cc/RM6B-TSL3">https://perma.cc/RM6B-TSL3</a>)</li></ol><p></p></span></div></h2><div><span><p><br /></p></span></div></div>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-72638068373048699642022-09-14T04:17:00.016-07:002022-09-20T23:19:49.847-07:00Keeping Data Within The Bounds Of The Law. <p><br /></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgCCWjfO0gQ_TayzMzMZ8bvZVbjlKfM9qULm_CmbOLJT5oDp59q2wisjYFY-e6Hi3YdyPKxnR6YVKcxcNvOJLSGj5SuiaA2Gat-d_P45gBRFeuGg3OSVqIKvbejx7O8FNiJTXpJQjQOIrJUQaaR-9RYmgs1pAmlDJbTNDLtGEpb7Zf3-U5w6qNlYVQV" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="720" data-original-width="960" height="300" src="https://blogger.googleusercontent.com/img/a/AVvXsEgCCWjfO0gQ_TayzMzMZ8bvZVbjlKfM9qULm_CmbOLJT5oDp59q2wisjYFY-e6Hi3YdyPKxnR6YVKcxcNvOJLSGj5SuiaA2Gat-d_P45gBRFeuGg3OSVqIKvbejx7O8FNiJTXpJQjQOIrJUQaaR-9RYmgs1pAmlDJbTNDLtGEpb7Zf3-U5w6qNlYVQV=w400-h300" width="400" /></a></div><br /><br /><p></p><p><br /></p><h3 style="text-align: left;"><b>Legislation is gradually catching up to the rapid speed of technical advancement, which has made a great deal of previously unthinkable things conceivable. </b></h3><p>As a result of the General Data Protection Regulation's adoption in Europe, privacy laws are becoming more stringent globally. </p><p>Despite the absence of a similarly broad US counterpart, several states are seeking to enact their own laws, such as the California Consumer Privacy Act (CCPA), rather than waiting for changes to occur at the federal level. </p><p>China is also working to implement the Personal Information Protection Law (PIPL), which will restrict what businesses can do with personal data they don't have permission to process. </p><p><br /></p><h3 style="text-align: left;"><b>People in the West frequently have the misconception that data privacy is not regarded as a protected asset in China. </b></h3><p>From the perspective of governance, the main issues revolve on ensuring that we have authorization to use the data we wish to gather and compliance with any broad rules like GDPR, CCPA, or PIPL that are in existence in the territories we're operating in. </p><p>Courts and legislators are becoming more conscious of the onerous needs of reading and comprehending reams of documents linked to whatever services we choose to use, so businesses can no longer hide behind T&Cs. </p><p>Simply stated, they know that no one will read them, therefore the fact that you have waivers and disclaimers buried deep inside the tiny print is less and less likely to provide you a strong enough defense if someone thinks you are using their data for a purpose for which you are not authorized. </p><p><br /></p><p><b>It is no longer sufficient that data subjects have not yet exercised their right to opt out of having their personal information processed for certain purposes in order to be in compliance with various regulations, including GDPR. </b></p><p>Hello Barbie, a range of natural-language-powered talking Barbie dolls manufactured by Mattel, had to be discontinued because of concerns that children's data was being processed and stored without their legal parents' permission. </p><p><br /></p><h3 style="text-align: left;"><b>The question of IP ownership and rights must also be taken into account. </b></h3><p>Whether you are using algorithms with a license or because you created and own them completely, you must be certain that you have the right to do so. </p><p>You should also be mindful of the legal standing of any output that comes from your AI and machine learning. </p><p>As an example, algorithms exist that can produce creative pieces of art, poetry, and journalism, as we've seen before. </p><p><br /></p><h3 style="text-align: left;"><b>The algorithms behind this were developed after researching millions of other works of literature, poetry, and journalism. </b></h3><p></p><ul style="text-align: left;"><li>Can we think of the AI as merely drawing inspiration from its training data, much as Van Gogh did when drawing inspiration from his contemporaries and other great artists? </li><li>Or is it more likely that the AI is dissecting already-created pieces of art and utilizing them to make new ones? </li></ul><p></p><p>This hasn't yet, as far as I know, been put to the test in a court of law, but it's definitely something to keep in mind as a potential obstacle down the road. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">Safeguarding your Data. </h2><p><br /></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjgGz-ziEMNPpB6AydxZVKF3tmLCjomNcDEvz2VjN0_Uwm9sNeaETs9jnY9GXCQCLU6jGWqpTS_YC-gcZJfm3QWvu-PECb1S0-vZ_t-piQWT5y57olNx_ofNd5gDFBjb8BCCmiZWNztK-kA8GiVPvudy5g6N8CfIRQPb5EpV9RdGACNW-p8B7fKUzMD" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="331" data-original-width="1200" height="110" src="https://blogger.googleusercontent.com/img/a/AVvXsEjgGz-ziEMNPpB6AydxZVKF3tmLCjomNcDEvz2VjN0_Uwm9sNeaETs9jnY9GXCQCLU6jGWqpTS_YC-gcZJfm3QWvu-PECb1S0-vZ_t-piQWT5y57olNx_ofNd5gDFBjb8BCCmiZWNztK-kA8GiVPvudy5g6N8CfIRQPb5EpV9RdGACNW-p8B7fKUzMD=w400-h110" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>The criteria to keep your data secure from unintentional loss or malicious data breach are at the center of data protection.</b> </h3><p>Both of these may have legal repercussions under regulations like the GDPR, but they are also crucial factors in any data governance strategy that deals with personal data.</p><p><b>Companies that handle personal data have the most governance requirements. </b></p><p>This is likely to refer to any businesses who are serious about their data strategy, since this is often the most valuable data. </p><p>But there are methods to lessen your responsibilities, and one of the best is to use a data reduction technique. </p><p>In the past, it would have been considered strategically sound to gather every single item that is possible to gather in case we discover a purpose for it (Amazon's Jeff Bezos is credited as saying, "We never throw anything away"). </p><p>Those times are long gone as a result of the enormous number of data nowadays as well as the increasing quantity of law and regulation. </p><p><br /></p><h3 style="text-align: left;"><b>According to the GDPR, gathering personal information shall only be "minimum essential" to carry out the tasks for which you have been granted permission. </b></h3><p>Steps may be taken to break the connection, producing data that is still relevant for analysis but (ideally) doesn't meet the definition of "personal data," which is any data that can be connected to a live person. </p><p>I use the word "ideally" since it has repeatedly been shown that many of the methods used to anonymize or de-identify data aren't entirely reliable. </p><p>Even if you exclude all names from your records, a someone with the necessary skills and resources could be able to link your data to particular people. </p><p>For instance, if you have information on every resident of a street but no names, you may be able to pinpoint a specific person based on their age range, work status, or marital status - especially if it's a very small street. </p><p><b>Your non-personal information becomes personal information when it is in this manner associated with a living person, for whom you are accountable. </b></p><p><br /></p><p><br /></p><h2 style="text-align: left;">Breach of Data.</h2><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgaeYvH3Y6qxb5gqZtufP_wvNyIS4SD3jnQ-11HlbepI4tuox2eRCf1xQHKrbrXLbhGdZIupVJne86mwunCcqBIC1kWFbVUzdiTFhJk3vwoAzEzIjUOtQKljKvxFsX6YpmIs6dUNRxt8dmntt7S02rnZPZRWO42MlJQz1Suhag6NlQGDIbIQa3m5fnQ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="224" data-original-width="447" height="200" src="https://blogger.googleusercontent.com/img/a/AVvXsEgaeYvH3Y6qxb5gqZtufP_wvNyIS4SD3jnQ-11HlbepI4tuox2eRCf1xQHKrbrXLbhGdZIupVJne86mwunCcqBIC1kWFbVUzdiTFhJk3vwoAzEzIjUOtQKljKvxFsX6YpmIs6dUNRxt8dmntt7S02rnZPZRWO42MlJQz1Suhag6NlQGDIbIQa3m5fnQ=w400-h200" width="400" /></a></div><br /><br /><p></p><p><br /></p><h3 style="text-align: left;"><b>The danger of data breaches to company is becoming more and more common. </b></h3><p>Businesses that experienced data breaches in 2019 paid an average cost of $8.19 million. </p><p>But in addition to the significant financial cost, there may be reputational effects that may quickly put an end to a corporation. </p><p>However, there are some indications that firms are becoming better at avoiding them, as the number somewhat decreased between 2018 and 2020. </p><p>They are growing larger and more frequent. Nevertheless, they pose a significant risk, and any governance approach should include measures to reduce the risks. </p><p>Authorization is a key concept to include in your approach. </p><p>This is a definite permissioning system that establishes who has access to each specific collection of data. </p><p>Only those who need access to it in order to complete the task for which the data is needed should have access to it. </p><p><br /></p><h3 style="text-align: left;"><b>The usage of encryption is another. If data is encrypted, somebody attempting to steal it would find it much less valuable. </b></h3><p>As with any security measures, there will always be some friction when used for proper reasons, but there are now several systems that efficiently manage encryption and decryption on the fly, in a manner that is imperceptible to the data customer. </p><p>Both the HTTPS protocol for transmitting online pages to your browser and the automated encryption employed by messaging services like WhatsApp are excellent examples of this. </p><p>Your data may be encrypted just while it is being held in cold storage, encrypted only when it is being transported, encrypted constantly, or encrypted continuously and decrypted only when it is being utilized. </p><p><br /></p><h3 style="text-align: left;"><b>Homomorphic encryption is another another choice that may be taken into account. </b></h3><p>Even the analytical algorithms cannot "see" the unencrypted data since the data is encrypted in this case so that it may be analyzed while staying in its encrypted form. </p><p>People with the necessary rights may even change the data in the cloud without exposing the unencrypted data to the cloud servers. </p><p>Homomorphic encryption is somewhat constrained by the computing power you have at your disposal. </p><p>Partially homomorphic encryption and relatively homomorphic encryption are the two types of homomorphic encryption now in use, and both of them restrict the ability to alter the encrypted data. </p><p>Although "fully homomorphic encryption" is not constrained in this manner, it does demand a lot of processing power and will unavoidably take longer. </p><p>There is a trade-off between speed and security in any encryption. </p><p>Masking and tokenization are two further methods that may be used to de-identify data. </p><p><br /></p><h3 style="text-align: left;"><b>Masking is the process of obscuring sensitive data from the unencrypted data with similar-type data while maintaining the integrity of other parts. </b></h3><p>This may include, for example, changing every city field's data to reflect a different city. </p><p>The data is only visible to those with the proper permissions, yet it is nevertheless helpful for many applications. </p><p><b>Tokenization is similar, except it substitutes randomized, anonymous tokens for important or delicate portions of the dataset. </b></p><p>Contrary to encryption, there is no mathematical method to reconstruct the original data from the concealed data (which is possible with huge amounts of computing power with many forms of encryption). </p><p>This is due to the fact that the tokens are chosen at random rather than being calculated from the initial data. </p><p>Additionally, although tokenization (and masking) are frequently performed to certain fields inside the record, encryption is typically applied to the whole record. </p><h3 style="text-align: left;"><b>In conclusion, it's important to keep in mind that data security is a highly specialized topic, thus you should definitely seek the advice of specialists when creating your data plan. </b></h3><p><br /></p><p><br /></p><h2 style="text-align: left;">Threats posed by IoT.</h2><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiS_Q19IPIOaOOoo4dL6R0nZsyyt9p1wTl-u96dWu6NkmaHfthv5MXiHk54vGbrmXI3cm2-5m-k_acRH0NyQUWqQqS93nGsC3nDQtD8AD4ezR7yYgW6ayM0AtKoFeQnTt3ANGnkFCMzDOsV1IiZYiV70uwOK51Oyfm7hmAFAvsZNcAJei6xOEjmX_nc" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="372" data-original-width="681" height="219" src="https://blogger.googleusercontent.com/img/a/AVvXsEiS_Q19IPIOaOOoo4dL6R0nZsyyt9p1wTl-u96dWu6NkmaHfthv5MXiHk54vGbrmXI3cm2-5m-k_acRH0NyQUWqQqS93nGsC3nDQtD8AD4ezR7yYgW6ayM0AtKoFeQnTt3ANGnkFCMzDOsV1IiZYiV70uwOK51Oyfm7hmAFAvsZNcAJei6xOEjmX_nc=w400-h219" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><b>Hackers now have more options for attack due to the ever-growing number of linked gadgets and "things" we've let into our personal and professional life. </b></h3><p>A recent study found that 10 million IoT devices contain security flaws that might be used to get unauthorized access to data. </p><p>Consider each networked linked device as a "door" into your business that has to be maintained closed and protected from intruders, just like any other door. </p><p>Even your grandma definitely knows the value of firewalls and virus scanners on her home computer, but it's unlikely she's aware of the possible risk presented by her microwave, refrigerator, or smart toothbrush at the moment. </p><p><br /></p><h3 style="text-align: left;"><b>Simply put, more gadgets equal more potential points of entry for hackers after your data. </b></h3><p>Even while it may not be immediately clear why a hacker would want to get access to your smart refrigerator, the basic plan is to exploit it to gain access to other devices where the actual jackpot would be located. </p><p>Attacks might seem as fictitious faults or requests for patches or upgrades, which provide a back door for the attacker into your network. </p><p>Sometimes they'll just try to get you to phone a "customer service" number so they can try to scam you out of money! It has been shown that connected toys, automobiles, and even medical equipment are all attackable, and new flaws are discovered daily, as rapidly as manufacturers can fix them. </p><p>Given this, it should be obvious that any business working with IoT-related devices must take security seriously. </p><p>As many IoT devices are often exploited in this manner, changing any default passwords or login credentials is a crucial practical first step. </p><p><br /></p><h3 style="text-align: left;"><b>Make sure your customers are encouraged to do the same if you provide IoT devices. </b></h3><p>It's another another situation in which adopting a "minimization" philosophy might be beneficial. </p><p>Do you really need your equipment to be able to connect and interface with a large number of other devices when there may not be a clear benefit to the user in having them talk to each other? Of course, most devices need to interface with a smartphone or computer app so they can be controlled by the user. </p><p>Another essential element of any data governance policy is an audit of all IoT and connected devices. </p><p>Make sure you know precisely "what is talking to what" and "what they are talking about" on your network. </p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><div><br /></div><div><h2>References And Further Reading</h2><div><br /></div><div><span><p></p><ol style="text-align: left;"><li>Roff, HM and Moyes, R (2016) Meaningful Human Control, Artificial Intelligence and Autonomous Weapons, Briefing paper prepared for the Informal Meeting of Experts on Lethal Autonomous Weapons Systems, UN Convention on Certain Conventional Weapons, April, article36.org/wp-content/uploads/2016/04/MHC-AI-and-AWS-FINAL.pdf (archived at <a href="https://perma.cc/LE7C-TCDV">https://perma.cc/LE7C-TCDV</a>)</li><li>Wakefield, J (2018) The man who was fired by a machine, BBC, 21 June, www.bbc.co.uk/news/technology-44561838 (archived at <a href="https://perma.cc/KWD2-XPGR">https://perma.cc/KWD2-XPGR</a>)</li><li>Kande, M and Sönmez, M (2020) Don’t fear AI. It will lead to long-term job growth, WEF, 26 October, www.weforum.org/agenda/2020/10/dont-fear-ai-it-will-lead-to-long-term-job-growth/ (archived at <a href="https://perma.cc/LY4N-NCKM">https://perma.cc/LY4N-NCKM</a>)</li><li>The Royal Society (2019) Explainable AI: the basics, November, royalsociety.org/-/media/policy/projects/explainable-ai/AI-and-interpretability-policy-briefing.pdf (archived at <a href="https://perma.cc/XXZ9-M27U">https://perma.cc/XXZ9-M27U</a>)</li><li>Hao, K (2019) Training a single AI model can emit as much carbon as five cars in their lifetimes, MIT Technology Review, 6 June, www.technologyreview.com/2019/06/06/239031/training-a-single-ai-model-can-emit-as-much-carbon-as-five-cars-in-their-lifetimes/ (archived at <a href="https://perma.cc/AYN9-C8X9">https://perma.cc/AYN9-C8X9</a>)</li><li>Najibi, A (2020) Racial discrimination in face recognition technology, SITN Harvard University, 24 October, sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/ (archived at <a href="https://perma.cc/F8TC-RPHW">https://perma.cc/F8TC-RPHW</a>)</li><li>McDonald, H (2019) AI expert calls for end to UK use of ‘racially biased’ algorithms, Guardian, 12 December, www.theguardian.com/technology/2019/dec/12/ai-end-uk-use-racially-biased-algorithms-noel-sharkey (archived at <a href="https://perma.cc/WX8L-YEK8">https://perma.cc/WX8L-YEK8</a>)</li><li>Dastin, J (2018) Amazon scraps secret AI recruiting tool that showed bias against women, Reuters, 11 October, www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G (archived at <a href="https://perma.cc/WYS6-R7CC">https://perma.cc/WYS6-R7CC</a>)</li><li>Johnson, J (2021) Cyber crime: number of breaches and records exposed 2005–2020, Statista, 3 March, www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (archived at <a href="https://perma.cc/BQ95-2YW2">https://perma.cc/BQ95-2YW2</a>)</li><li>Palmer, D (2021) These new vulnerabilities put millions of IoT devices at risk, so patch now, ZDNet, 13 April, www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/ (archived at <a href="https://perma.cc/RM6B-TSL3">https://perma.cc/RM6B-TSL3</a>)</li></ol><p></p><p><br /></p></span></div></div>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-18323215653948959612022-04-04T04:25:00.009-07:002022-04-06T06:01:11.789-07:00Role Of Artificial Intelligence In Ecommerce.<script type="application/ld+json">{"@context":"https://schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","name":"How is artificial intelligence (AI) affecting the e-commerce industry?","acceptedAnswer":{"@type":"Answer","text":"eCommerce sites may build customized online experiences and propose items that are tailored to each buyer using AI. Companies like Amazon and Netflix, who were early users of AI, have had success with personalized marketing utilizing the technology."}},{"@type":"Question","name":"What are some instances of artificial intelligence in e-commerce applications?","acceptedAnswer":{"@type":"Answer","text":"The Top AI Applications in E-Commerce and Retail Purchasing Recommendations Shopping assistants that respond to voice commands. E-commerce purchasing experiences that are tailored to you. Warehouse \"pickers\" using artificial intelligence For ads, image and video recognition is used. Methods of payment based on facial recognition."}},{"@type":"Question","name":"What are the advantages of artificial intelligence in the field of e-commerce?","acceptedAnswer":{"@type":"Answer","text":"Voice Commerce Virtual Assistants Personalization in e-commerce. eCommerce Automation using Searchandising (Smart Search). Prospective Customers are being retargeted. CRM allows for a more efficient sales process."}},{"@type":"Question","name":"Which of the following is the most popular AI application in eCommerce?","acceptedAnswer":{"@type":"Answer","text":"One of the most promising applications of AI technology in eCommerce is assisting customers in finding items more quickly. It can be done using chatbots or by making textual search more meaningful, but visual search with picture recognition is one of the most promising technologies."}},{"@type":"Question","name":"In e-commerce, how does AI affect consumer satisfaction?","acceptedAnswer":{"@type":"Answer","text":"Customer support for ecommerce shops is improved by artificial intelligence in the form of chatbots. Chatbots answer quickly and may deliver replies that are tailored to the individual consumer. As a result, the user experience in the shop is smooth."}},{"@type":"Question","name":"What influence does Artificial Intelligence have in the internet business world?","acceptedAnswer":{"@type":"Answer","text":"By automating and optimizing common procedures and activities, you may save time and money. Boost productivity and efficiency in your operations. create quicker business choices based on cognitive technology outputs."}},{"@type":"Question","name":"How can artificial intelligence (AI) enhance the consumer experience?","acceptedAnswer":{"@type":"Answer","text":"You can use AI to boost consumer engagement, foster brand loyalty, and increase retention. While technology isn't a substitute for real humans, it may assist enhance productivity and remove low-hanging fruit off your customer support employees' plates, such as addressing commonly requested inquiries."}},{"@type":"Question","name":"What role does artificial intelligence play in increasing client loyalty?","acceptedAnswer":{"@type":"Answer","text":"The most significant advantage of AI is that it enables organizations to process massive volumes of data in real time. Brands can take use of its capacity to make good use of this data for loyalty marketing and to favorably influence consumer behavior."}},{"@type":"Question","name":"What impact does AI have on how companies and organizations connect with their customers?","acceptedAnswer":{"@type":"Answer","text":"Conversational AI has made the communication space more fluid for both customers and companies, providing quick results for customers and making it easier for enterprises to pay attention to everyone who needs it."}},{"@type":"Question","name":"What impact will artificial intelligence have on the corporate world in the future?","acceptedAnswer":{"@type":"Answer","text":"Artificial intelligence enables company owners to provide their clients a more tailored experience. AI is much more efficient at analyzing large amounts of data. It can swiftly spot patterns in data, such as previous purchase history, preferences, credit ratings, and other similar threads."}}]}</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.jaikrishnaponnappanweb.com/2022/04/role-of-artificial-intelligence-in-ecommerce.html"},"headline":"Role Of Artificial Intelligence In Ecommerce.","description":"Apart from product suggestions, online merchants are using artificial intelligence in the Ecommerce business to provide chatbot services, analyze client feedback, and provide tailored services to online customers. Companies participating in e-commerce undertake a variety of business procedures such as marketing, purchasing, selling, and servicing items and services .","image":["https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLA02A-hQssDC5AOW0Trf2GTR_zA3kYoetxXerMVF-feCeWWB4w7VVGUqZx2wY2R9rXRQOH77KuikKA3t_q8jmYOR16Oj6uebLBFVDCKWVOGOk3ysGj9zx_FyFGm53MQziRFtcwz48FZw9n3f3eIj6GXY7jv-dxWx8q5ThHbeE1U9PskKRMlf8_ySu/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-3.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6A4Di885fJ9FsMHpWIzPDKDRjac5n8rVIZ6Nc5K5STC-LT3APLwr7I_BdTnCVubgzyg_0kV2lq6-tsSwV1JJpdDLAgEWteEmrRZK0rECaNom7AjMPTdRtfa9sqpXawjE_cusYkNUCHqVYdsszwibL_8Kn6zs5skSCRacs3BBZW2zVhQJgNq1ge8U/w400-h225/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-6.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtnNB27j7WJoTHlRa_K64bgazzXcz9tct0yTedH0V2v4PGqLsKvRkAWCoqzHiOrxpl-kI6TkwDmmmoPBJpv-rCAIeyp_vFJTMVFWvhGLENl1OZlHjWO-Fq677r-BvwZegtC9ojutcnhOwHWWX8Gj7YKhQz0okq7x3_jmyNQb3jHw7BuBKoXBLZPSb/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-11.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4YtYKwLIiM-DoSOJiCSnN7oPm3HzlEv9sw5IWi6O5LJq5dHPBWUOLSOZRM-TPkFEoVFhliF3v2d1zwC3ZDL1NQbpgBzY3LAKtD705mBD7cHGEEQw28NoZIEMAY2-AhMJX039PR8CThAwjlsaTKJa2j8YQhRlyZulz3EHLzROhnsww0FDlzlJ782sk/w400-h101/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-1.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPLLGfPwIr7rY8Jc2yAkn3f4IHXU0IRuidHXSsZy5GCsL9oXduWsF0J7pqfD9DUMH3yGxz96A0x8Sciplig3IwSXfNZhiEGB1ANJ3XRDg7WD7rrDgIl4khMK87WK3ipNaH_pKEgO6Jcikh1bKjSxAdicguRLpMEJV11PDSdhigN7TDUekR0lOYDNl/w400-h280/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-8.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh26qU8aJtpEBdzywwLaT6pmW2B8bayYY3bvp4pbY060KU5IPE6xaCY_7VVYwkubujRvtQhOA_psKD5A_2Vp-5Ep2hu7eVjYDSqmn8LVb77Jwg7_ZU9cD05zEXohKnGYvidNiSoIL9FNMBfHvsS3rJXbdnjZDLcGbjU-pdFmTzVfWLrROwgY6GJH1Pt/w400-h209/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-2.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnYK-LYGT6qCCdVH2lSHHsmQp2nGINoxEmqb7toSW-9ccKnvF3jqzfDe-A09285b6GaYpa8YO3dLOMuUhzzoPWErscBcK__DtQtb2fG0kYIQxrCDvCltdw-9AWhmOtOVX5MnH_73BJpNgoqM7CqsD4A7SnQHdxnloo4VWlRneIOjqXhse2dohwQ31S/w400-h234/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-5.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY-YvZUHQ8_Uc6HIF3J-ztVkXZ93YR6oVQaRCjx3enLwe_J9RBGfrUSsaniIKahDC7aqamR6PDKOl-43HGWbcR680iYLT-pJ2zbg4EPqTMR5-SubNEZfH7i3uIivW1_i2PqoKbLn8GX1mV3JideMjcINgixHnBTiHxo_bcmt1gJBL04Jw6xEJwytqV/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-7.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcs1NTGTJAw9Ek-Tjbz7DeKtT5C4ed2HnZ-b99ZOhyApE9vwMz-k6uJTkQA3G7qAl1ZgAIaKRtc9BwV2gkeDgPd2zJU5KRnzuZpQCY5TwKQ4eSR3TjYIoZo5lDSo-GX9iUw7XPDYrfF7HR1HGw5K6lUAu5C53m2jEG8stGmdxEMxZtD5lGYnnxfil/w400-h353/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-9.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcRbpFf7r7RjTn6cn7b59qg-kUxlQdKic8uI43WApyGmMcNIWR5HEiQfJAXfxIPtEdM4QDrQa1Gq43cv_VRoAku8k1kxG59iC-4jywHpt8NwkG8gNhvTCrdfUwLkJmXrKDP_yOiUwViiTdcrzTX13TsoYtgIw88tmvjhtJomHnPhJt5JVUUdZF8d5/w400-h280/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-4.jpg"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.jaikrishnaponnappan.com/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":""}</script><div class="mbtTOC"> <button onclick="mbtToggle()">Table Of Contents</button> <ul id="mbtTOC"></ul> </div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLA02A-hQssDC5AOW0Trf2GTR_zA3kYoetxXerMVF-feCeWWB4w7VVGUqZx2wY2R9rXRQOH77KuikKA3t_q8jmYOR16Oj6uebLBFVDCKWVOGOk3ysGj9zx_FyFGm53MQziRFtcwz48FZw9n3f3eIj6GXY7jv-dxWx8q5ThHbeE1U9PskKRMlf8_ySu/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-3.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLA02A-hQssDC5AOW0Trf2GTR_zA3kYoetxXerMVF-feCeWWB4w7VVGUqZx2wY2R9rXRQOH77KuikKA3t_q8jmYOR16Oj6uebLBFVDCKWVOGOk3ysGj9zx_FyFGm53MQziRFtcwz48FZw9n3f3eIj6GXY7jv-dxWx8q5ThHbeE1U9PskKRMlf8_ySu/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-3.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">Context - AI In Ecommerce.</span></h2><p><br /></p><h3 style="text-align: left;">Information and communication technologies, machine learning, digitalization, robotics, and artificial intelligence, according to researchers, will fuel the fourth industrial revolution (AI). </h3><p><br /></p><p>Decisions will be made by machines, which will have a significant influence on corporate marketing strategies and society (Syam and Sharma 2018; Dwivedi et al. 2019). </p><p>The AI revolution will have a larger effect than the industrial and digital revolutions combined in the next 20 years (Makridakis 2017). </p><p>According to studies, the advent of intelligent goods and services is not only a fad, but they have the potential to revolutionize the world (Sonia et al. 2020). </p><p><br /></p><p><br /></p><p><b>Researchers are confident in AI's origins, which have previously been through two "hype cycles," namely the first in 1950–1983, a revival in 1983–2010, and the second in 2011–2017. </b></p><p><br /></p><p>Artificial intelligence (AI) will now be the future of brains, minds, and machines (2018–2035). (Aggarwal et al., 2018; Simon et al., 2019). </p><p>According to Frey and Osborne (2017), AI will have a big influence on sales, marketing, and customer service, and 47 percent of US occupations might be automated by 2033. </p><p>Experts expect that AI will have a significant impact on three industries: retail, education, and health care (Ostrom et al. 2018). </p><p><br /></p><p><b>With a large share of human effort and poor profit margins, the retail business, particularly e-commerce, is a perfect match for AI applications (Weber and Schütte 2019). </b></p><p><br /></p><p>AI is often used by e-commerce companies to personalize webpages and provide product suggestions (Netflix). </p><p>Amazon.com and other tech and retail giants are aggressively investing in research and development to advance AI applications such as Alexa, voice-powered assistants (Echo), and the Prime Air drone effort, among others. </p><p>In reality, Amazon's cloud platform (AWS) provides AI and machine learning capabilities to other businesses (Weber and Schütte 2019). </p><p>This paper will discuss AI and its applications in different business processes involved in an e-commerce firm to better understand the function and value of AI in e-commerce. </p><p>But, before we begin, we must first grasp the notion of AI, which is covered in depth in the next section. </p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">WHAT IS ARTIFICIAL INTELLIGENCE AS APPLIED TO E-COMMERCE? </span></h2><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6A4Di885fJ9FsMHpWIzPDKDRjac5n8rVIZ6Nc5K5STC-LT3APLwr7I_BdTnCVubgzyg_0kV2lq6-tsSwV1JJpdDLAgEWteEmrRZK0rECaNom7AjMPTdRtfa9sqpXawjE_cusYkNUCHqVYdsszwibL_8Kn6zs5skSCRacs3BBZW2zVhQJgNq1ge8U/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-6.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="344" data-original-width="612" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6A4Di885fJ9FsMHpWIzPDKDRjac5n8rVIZ6Nc5K5STC-LT3APLwr7I_BdTnCVubgzyg_0kV2lq6-tsSwV1JJpdDLAgEWteEmrRZK0rECaNom7AjMPTdRtfa9sqpXawjE_cusYkNUCHqVYdsszwibL_8Kn6zs5skSCRacs3BBZW2zVhQJgNq1ge8U/w400-h225/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-6.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><p>Before considering AI, it's important to define "intelligence," which is defined as a person's capacity to learn, comprehend, or cope with new circumstances; think abstractly; and influence one's environment using knowledge (Merriam-Webster.com 2020). </p><p>Intelligence is defined as the ability to acquire and apply memory, knowledge, experience, reasoning, imagination, judgment, opinions, facts, skills, calculations, information, and language in order to calculate, classify, generalize, and perceive relationships; solve problems; plan and think abstractly; comprehend complex ideas; learn quickly; overcome obstacles; and adapt efficiently to new situations, either by changing oneself or by changing one's environment (Legg and Hutter 2006; Paschen et al. 2019). </p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Does AI Mimic Human Intelligence?</span></h2><p><br /></p><h3 style="text-align: left;">Machine learning is used in artificial intelligence to replicate human intellect. </h3><p></p><ul style="text-align: left;"><li>The computer must learn how to react to certain activities, so it creates a propensity model using algorithms and historical data. </li></ul><ul style="text-align: left;"><li>After that, propensity models will begin to make predictions (like scoring leads or something).</li></ul><p></p><p><br /></p><p><b>The origins of AI may be traced back to questions about how far a computer can partly or entirely replace humans in work performance (Weber and Schütte 2019). </b></p><p>As a result, AI is defined in terms of human intelligence in marketing literature. </p><p><br /></p><p></p><ul style="text-align: left;"><li>Researchers, for example, describe AI as a system that demonstrates features of human intelligence (Huang and Rust 2018), mimics intelligent human behavior (Syam and Sharma 2018), or mimics nonbiological intelligence (Syam and Sharma 2018). (Tegmark 2017). </li></ul><ul style="text-align: left;"><li>According to McCarthy (2007), AI is "the science and engineering of creating intelligent devices, particularly clever computer programs." </li></ul><ul style="text-align: left;"><li>AI is akin to the goal of utilizing computers to comprehend human intellect, but it does not have to be limited to physiologically observable ways." </li></ul><ul style="text-align: left;"><li>Because of these definitions, AI is reliant on human intellect (Bock et al. 2020). </li></ul><p></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtnNB27j7WJoTHlRa_K64bgazzXcz9tct0yTedH0V2v4PGqLsKvRkAWCoqzHiOrxpl-kI6TkwDmmmoPBJpv-rCAIeyp_vFJTMVFWvhGLENl1OZlHjWO-Fq677r-BvwZegtC9ojutcnhOwHWWX8Gj7YKhQz0okq7x3_jmyNQb3jHw7BuBKoXBLZPSb/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-11.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtnNB27j7WJoTHlRa_K64bgazzXcz9tct0yTedH0V2v4PGqLsKvRkAWCoqzHiOrxpl-kI6TkwDmmmoPBJpv-rCAIeyp_vFJTMVFWvhGLENl1OZlHjWO-Fq677r-BvwZegtC9ojutcnhOwHWWX8Gj7YKhQz0okq7x3_jmyNQb3jHw7BuBKoXBLZPSb/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-11.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">Can AI Supersede Human Intelligence?</span></h2><p><br /></p><p><br /></p><p>Because of constrained rationality deriving from limited knowledge, cognitive capacities, and short time to make judgments, people sometimes engage in actions that may not lead to the optimal end outcome (Kahneman and Tversky 1979). (Dawid 1999). </p><p>According to some scientists, robots may demonstrate human-like intelligence in two ways: behaving intelligently (performing activities such as remembering, learning, reasoning, perceiving, and problem-solving toward a goal-directed action) and rationality (doing the "correct thing" under ambiguity) (Paschen et al. 2019). </p><p><br /></p><h3 style="text-align: left;">AI can discern inclinations, intentions, and patterns that are beyond the intellectual capabilities of a human brain using Big Data and deep learning. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>The human brain can only evaluate and draw conclusions from limited data; robots, on the other hand, can comprehend billions of data points. </li></ul><ul style="text-align: left;"><li>AI has progressed through "four intelligence stages" (i.e., from analytical to emotional) to gain sophisticated skills such as reasoning, planning, conceptual learning, creativity, common sense, cross-domain thinking, and even self-awareness (Huang and Rust 2018). (Bock et al. 2020). </li></ul><ul style="text-align: left;"><li>In this case, Kaplan and Haenlein's (2019) definition of AI, which defines AI as "a system's capacity to properly read external input, to learn from such data, and to employ those learnings to fulfill specified objectives and tasks via flexible adaptation," seems more relevant. </li></ul><p></p><p><br /></p><p><br /></p><p><br /></p><p> </p><h2 style="text-align: left;"><span style="font-size: x-large;">HOW IS ARTIFICIAL INTELLIGENCE USED IN E-COMMERCE BUSINESS PROCESSES?</span></h2><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4YtYKwLIiM-DoSOJiCSnN7oPm3HzlEv9sw5IWi6O5LJq5dHPBWUOLSOZRM-TPkFEoVFhliF3v2d1zwC3ZDL1NQbpgBzY3LAKtD705mBD7cHGEEQw28NoZIEMAY2-AhMJX039PR8CThAwjlsaTKJa2j8YQhRlyZulz3EHLzROhnsww0FDlzlJ782sk/s904/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-1.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="229" data-original-width="904" height="101" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4YtYKwLIiM-DoSOJiCSnN7oPm3HzlEv9sw5IWi6O5LJq5dHPBWUOLSOZRM-TPkFEoVFhliF3v2d1zwC3ZDL1NQbpgBzY3LAKtD705mBD7cHGEEQw28NoZIEMAY2-AhMJX039PR8CThAwjlsaTKJa2j8YQhRlyZulz3EHLzROhnsww0FDlzlJ782sk/w400-h101/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-1.jpg" width="400" /></a></div><br /><p><br /></p><p>Apart from product suggestions, online merchants are using artificial intelligence in the Ecommerce business to provide chatbot services, analyze client feedback, and provide tailored services to online customers.</p><p><br /></p><p><b>Companies participating in e-commerce undertake a variety of business procedures such as marketing, purchasing, selling, and servicing items and services . </b></p><p><br /></p><p></p><ul style="text-align: left;"><li>To carry out marketing, discovery, transaction processing, and product and customer services, these enterprises totally rely on e-commerce apps and internet-based technology. </li></ul><ul style="text-align: left;"><li>E-commerce websites use the Internet to conduct interactive marketing, ordering, payment, and customer service activities. </li></ul><p></p><p><br /></p><p><b>E-commerce also includes processes related to e-business, such as suppliers and customers using extranets to access inventory databases (transaction processing), sales and customer service representatives using the internet to access customer relationship management (CRM) systems (service and support), and customers participating in product development via email and social media (marketing/discovery) (O'Brien and Marakas 2011). </b></p><p><br /></p><p></p><ul style="text-align: left;"><li>AI, according to researchers, may boost corporate performance since AI solutions are quicker, cheaper, and less prone to human errors (Huang and Rust 2018; Canhoto and Clear 2020). </li></ul><ul style="text-align: left;"><li>As a result, we will attempt to comprehend how AI contributes to different e-commerce business operations in the following parts. </li></ul><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Used In Marketing?</span></h2><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPLLGfPwIr7rY8Jc2yAkn3f4IHXU0IRuidHXSsZy5GCsL9oXduWsF0J7pqfD9DUMH3yGxz96A0x8Sciplig3IwSXfNZhiEGB1ANJ3XRDg7WD7rrDgIl4khMK87WK3ipNaH_pKEgO6Jcikh1bKjSxAdicguRLpMEJV11PDSdhigN7TDUekR0lOYDNl/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-8.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="428" data-original-width="612" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEPLLGfPwIr7rY8Jc2yAkn3f4IHXU0IRuidHXSsZy5GCsL9oXduWsF0J7pqfD9DUMH3yGxz96A0x8Sciplig3IwSXfNZhiEGB1ANJ3XRDg7WD7rrDgIl4khMK87WK3ipNaH_pKEgO6Jcikh1bKjSxAdicguRLpMEJV11PDSdhigN7TDUekR0lOYDNl/w400-h280/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-8.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><p></p><ul style="text-align: left;"><li><b>Marketers may use AI to better understand their consumers and enhance their experiences. Marketers may use AI-powered marketing to generate a predictive customer analysis and construct a more focused and individually designed customer journey, effectively increasing ROI on each customer encounter. </b></li></ul><ul style="text-align: left;"><li>AI is often utilized in marketing campaigns when speed is critical. AI systems learn how to effectively engage with consumers based on data and customer profiles, then give them personalised messages at the perfect moment without the need for marketing staff involvement, guaranteeing optimal productivity.</li></ul><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How is Artificial Intelligence Used In Market Research?</span></h2><p><br /></p><p><br /></p><h3 style="text-align: left;">Marketing Businesses exclusively employed information technology for data processing and transmission until the third industrial revolution. </h3><p><br /></p><p>The fourth industrial revolution, on the other hand, will enable computers to make suitable and trustworthy judgments (Syam and Sharma 2018). </p><p>Large organizations that fail to use cutting-edge technologies such as AI, according to researchers, will be washed away in the face of competition (Stone et al. 2020). </p><p><br /></p><h3 style="text-align: left;"><b>The basic goal of market research is to identify the most accurate client groupings. </b></h3><p><br /></p><p>To provide items to consumers via an acceptable distribution plan, selected segments are targeted with appropriate products, supplied at appropriate pricing, and supported with reasonable promotional and communication tactics (Syam and Sharma 2018). </p><p>Previously, segmentation was based on either "classic" approaches (such as cluster analysis (for clustering) or "more contemporary" techniques (such as hidden Markov models, support vector machines, artificial neural networks (ANN), classification and regression trees (CART), and genetic algorithms). </p><p><br /></p><p><br /></p><h3 style="text-align: left;">The new century's machine learning capabilities have improved the efficiency of these segmenting algorithms. </h3><p><br /></p><p>For example, AI-enabled ANN models may help B2B e-commerce enterprises solve marketing difficulties (Wilson and Bettis-outland 2020). </p><p>Marketers have access to vast amounts of data, which they may use to segment large amounts of unstructured data (Big Data) using unsupervised neural networks (Hruschka and Natter 1999). </p><p>Profitability or customer lifetime value (CLV) segments may now be found using decision trees driven by machine learning (Florez-lopez and Ramon-jeronimo 2009). </p><p>AI can sift through a massive volume of written and unwritten user-generated information on social media sites to uncover user requirements, preferences, attitudes, and behaviors. </p><p>For instance, IBM Watson AI can recognize psychographic features represented in text to provide marketers with important insights for new product development or innovation (IBM 2020). </p><p><br /></p><h3 style="text-align: left;">To understand the user experience, AI can discover themes and patterns in users' postings, and the knowledge may be utilized to create strategies to improve the user experience. </h3><p><br /></p><p>It also aids in the collection, sorting, and analysis of external market information, or intelligence about external market factors and players that may impact consumer preferences and actions. </p><p>For example, AI systems driven by machine learning and natural language processing algorithms can detect false news from a large number of blog posts, social media posts, and other sources (Berthon and Pitt 2018). </p><p>Similarly, competitive intelligence may be derived from unstructured data (news, social media, website content, etc.) by recognizing themes or keywords. (2019, Paschen et al.) </p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh26qU8aJtpEBdzywwLaT6pmW2B8bayYY3bvp4pbY060KU5IPE6xaCY_7VVYwkubujRvtQhOA_psKD5A_2Vp-5Ep2hu7eVjYDSqmn8LVb77Jwg7_ZU9cD05zEXohKnGYvidNiSoIL9FNMBfHvsS3rJXbdnjZDLcGbjU-pdFmTzVfWLrROwgY6GJH1Pt/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="319" data-original-width="612" height="209" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh26qU8aJtpEBdzywwLaT6pmW2B8bayYY3bvp4pbY060KU5IPE6xaCY_7VVYwkubujRvtQhOA_psKD5A_2Vp-5Ep2hu7eVjYDSqmn8LVb77Jwg7_ZU9cD05zEXohKnGYvidNiSoIL9FNMBfHvsS3rJXbdnjZDLcGbjU-pdFmTzVfWLrROwgY6GJH1Pt/w400-h209/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-2.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">Artificial Intelligence For Market Stimulation.</span></h2><p><br /></p><p><br /></p><p>Market stimulation happens at the same time as marketing, which is defined as "the activity, collection of institutions, and procedures for producing, conveying, delivering, and exchanging offers that have value for consumers, clients, partners, and society as a whole" (American Marketing Association 2017). </p><p><br /></p><p><b>It usually consists of four distinct but interconnected components:</b></p><p></p><ol style="text-align: left;"><li>product, </li><li>pricing, </li><li>location, and </li><li>marketing (McCarthy 1960). </li></ol><p></p><p><br /></p><p>However, the concept of marketing has evolved to the point where technological adaptation is required, and the impact of AI on each marketing mix component, namely, product (hyper-personalization, new product development, automatic recommendations, etc. ), price (price management, personalized dynamic pricing, etc. ), place (convenience, speed, simple sales process, 24/7 chatbot support, etc. ), and promotion (personalized communication, unique user identifiers, etc). (Jarek et al. 2019; Dumitriu and Popescu 2020). </p><p><br /></p><p><b>The first three AI categories (picture recognition, text recognition, decision-making, speech recognition, and autonomous robots and vehicles) are heavily employed in marketing. </b></p><p>Because of the expense and unpredictability associated with AI technologies, marketers are hesitant to deploy them. </p><p>Large IT giants such as Google, Amazon, Microsoft, and Apple, on the other hand, are investing in AI areas such as speech recognition and self-driving robots and vehicles (Jarek et al. 2019). </p><p>As a result, AI has had a significant impact on modern marketing practices; for example, routine, time-consuming, and repeatable jobs (data collection, analysis, image search, processing) have been automated; strategic and creative activities to build a competitive advantage are emphasized; and business enterprises are designing innovative ways to deliver customer value. </p><p><b>It has also created a marketing environment in which companies that provide AI solutions are in high demand (Jarek et al. 2019). </b></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Transaction Processing?</span></h2><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnYK-LYGT6qCCdVH2lSHHsmQp2nGINoxEmqb7toSW-9ccKnvF3jqzfDe-A09285b6GaYpa8YO3dLOMuUhzzoPWErscBcK__DtQtb2fG0kYIQxrCDvCltdw-9AWhmOtOVX5MnH_73BJpNgoqM7CqsD4A7SnQHdxnloo4VWlRneIOjqXhse2dohwQ31S/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-5.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="357" data-original-width="612" height="234" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnYK-LYGT6qCCdVH2lSHHsmQp2nGINoxEmqb7toSW-9ccKnvF3jqzfDe-A09285b6GaYpa8YO3dLOMuUhzzoPWErscBcK__DtQtb2fG0kYIQxrCDvCltdw-9AWhmOtOVX5MnH_73BJpNgoqM7CqsD4A7SnQHdxnloo4VWlRneIOjqXhse2dohwQ31S/w400-h234/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-5.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Terms Negotiation?</span></h2><p><br /></p><p><br /></p><h3 style="text-align: left;">Negotiation is an art (rather than a science) of getting what you want via bargaining or a one-on-one contact. </h3><p><br /></p><p>In an e-commerce transaction, the majority of interactions are electronic, such as through email, social media, text chat, or phone. </p><p><br /></p><p><b>AI may be used as a functional science in this situation to offer a competitive edge in the negotiating process (Mckendrick 2019). </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li>Negotiation is similar to a persuasive debate in which a proponent and an opponent iteratively provide a sequence of reasons, and both give counter arguments to disprove the other's point (Huang and Lin 2005). </li></ul><ul style="text-align: left;"><li>Scientists are teaching their chatbots and virtual assistants to anticipate many steps ahead and analyze how saying certain things may influence the result of the negotiation based on the components of negotiations (i.e., negotiation set, protocol, collection of tactics, and rule of deal) (Reynolds 2017). </li></ul><ul style="text-align: left;"><li>These AI negotiation bots may work on behalf of an e-retailer 24 hours a day, 7 days a week to seek consumers and automatically negotiate the best terms based on the administrator's requirements or even market circumstances (Krasadakis 2017). </li></ul><p></p><p><br /></p><p><br /></p><h3 style="text-align: left;">It is very difficult for internet retailers to recruit, service, and keep consumers by communicating via graphical user interfaces (websites). </h3><p><br /></p><p>Customers, meanwhile, have no opportunity to bargain for a better value (Huang and Lin 2005). </p><p><br /></p><p><b>Natural language interfaces for human–computer interaction, on the other hand, may successfully tackle this challenge (Jusoh 2018). </b></p><p>E-commerce is a fast-paced sector where prices fluctuate often. </p><p><br /></p><p><b>E-commerce enterprises are utilizing AI to dynamically price their products and services, modifying prices in real time based on market circumstances (demand–supply) (Kephart et al. 2000). </b></p><p><b> </b></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Order Prioritization and Order Selection?</span></h2><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY-YvZUHQ8_Uc6HIF3J-ztVkXZ93YR6oVQaRCjx3enLwe_J9RBGfrUSsaniIKahDC7aqamR6PDKOl-43HGWbcR680iYLT-pJ2zbg4EPqTMR5-SubNEZfH7i3uIivW1_i2PqoKbLn8GX1mV3JideMjcINgixHnBTiHxo_bcmt1gJBL04Jw6xEJwytqV/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-7.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY-YvZUHQ8_Uc6HIF3J-ztVkXZ93YR6oVQaRCjx3enLwe_J9RBGfrUSsaniIKahDC7aqamR6PDKOl-43HGWbcR680iYLT-pJ2zbg4EPqTMR5-SubNEZfH7i3uIivW1_i2PqoKbLn8GX1mV3JideMjcINgixHnBTiHxo_bcmt1gJBL04Jw6xEJwytqV/w400-h266/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-7.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><h3 style="text-align: left;"><b>Alibaba has released Fashion AI technology in order to enhance sales. </b></h3><div><b><br /></b></div><p></p><ul style="text-align: left;"><li>Customers may submit photos of products they want to purchase to the Taobao e-commerce site, and the system will automatically look for comparable items for sale (Simon 2019). </li></ul><ul style="text-align: left;"><li>Similarly, AI may gather real-time data by following a customer's online behavior on their or a competitor's website to determine whether to provide a price reduction or search the company's database to see whether earlier product suggestions were rejected or accepted (Canhoto and Clear 2020). </li></ul><div><br /></div><div><br /></div><div><br /></div><p></p><h3 style="text-align: left;"><b>Resupply optimization is another key AI application. </b></h3><div><b><br /></b></div><p></p><ul style="text-align: left;"><li>By calculating the best time and amount for placing an order with the central warehouse and suppliers, AI can cut inventory expenses (Stone et al. 2020). </li></ul><ul style="text-align: left;"><li>This may help with a variety of concerns, including reducing the quantity or amount of unsold items, optimizing warehouse shelf space, and increasing cash flow. </li></ul><ul style="text-align: left;"><li>Individual order and delivery (personalization) may be optimized using AI algorithms (Zanker et al. 2019), and complicated jobs like same-day delivery can be simplified (Kawa et al. 2018). </li></ul><p></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Order Receipt? </span></h2><p><br /></p><p><br /></p><p><b>AI can use predictive systems to evaluate prospects (customers) based on their propensity to buy (high-quality leads) (Järvinen and Taiminen 2016), use emotional AI to answer common questions and overcome customer objections (Paschen et al. 2019), and automate and speed up the checkout process (Paschen et al. 2019). </b></p><p><br /></p><p>Amazon and other leading e-commerce businesses have launched language-assisted ordering (Amazon Echo) (Holmqvist et al. 2017). </p><p>For sales forecasting (Dwivedi et al. 2019), shop assortments (Shankar 2018), and customizing searches, suggestions, pricing, and promotions, complex AI models are deployed (Montgomery and Smith 2009). </p><p><b>On a range of devices, AI can automate service interactions and provide individualized and relevant information (Bock et al. 2020). </b></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Order Billing/Payment Management?</span></h2><p><br /></p><p><br /></p><h3 style="text-align: left;">Invoicing, payment optimization, and fraud detection are three areas where AI can assist e-commerce businesses (Mejia 2019). </h3><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcs1NTGTJAw9Ek-Tjbz7DeKtT5C4ed2HnZ-b99ZOhyApE9vwMz-k6uJTkQA3G7qAl1ZgAIaKRtc9BwV2gkeDgPd2zJU5KRnzuZpQCY5TwKQ4eSR3TjYIoZo5lDSo-GX9iUw7XPDYrfF7HR1HGw5K6lUAu5C53m2jEG8stGmdxEMxZtD5lGYnnxfil/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-9.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="539" data-original-width="612" height="353" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDcs1NTGTJAw9Ek-Tjbz7DeKtT5C4ed2HnZ-b99ZOhyApE9vwMz-k6uJTkQA3G7qAl1ZgAIaKRtc9BwV2gkeDgPd2zJU5KRnzuZpQCY5TwKQ4eSR3TjYIoZo5lDSo-GX9iUw7XPDYrfF7HR1HGw5K6lUAu5C53m2jEG8stGmdxEMxZtD5lGYnnxfil/w400-h353/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-9.jpg" width="400" /></a></div><br /><p><br /></p><p><br /></p><p>The most difficult and time-consuming jobs in company are billing and invoice processing. </p><p><b>AI applications, on the other hand, may assist firms in matching client invoices to payments received (Dwivedi et al. 2019). </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li>Manual and semi-automated billing procedures cannot manage a large number of customer payments, but AI-enabled billing systems can handle a large volume of data and eliminate abnormalities, inconsistencies, and discrepancies in the bills (Bajpai 2020). </li></ul><ul style="text-align: left;"><li>One of the most convenient methods to make a payment using a computer and the internet is to conduct an online transaction. </li></ul><ul style="text-align: left;"><li>Customers may use their e-wallets to make purchases (Kalia 2016; Kalia et al. 2017a). </li></ul><ul style="text-align: left;"><li>Regardless of the security precautions in place, every online transaction has the risk of fraud (Papadopoulos and Brooks 2011). </li></ul><div><br /></div><div><br /></div><p></p><p><b>By activating the autonomous decision-oriented and advanced fraud detection system, AI-powered billing software may prevent fraud from happening in the first place (Khattri and Singh 2018). </b></p><p>Fraudster, for example, detects payment fraud using past data connected to transactions, billing, shipping addresses, and IP connection (Canhoto and Clear 2020). </p><p> </p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Support and Service?</span></h2><p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcRbpFf7r7RjTn6cn7b59qg-kUxlQdKic8uI43WApyGmMcNIWR5HEiQfJAXfxIPtEdM4QDrQa1Gq43cv_VRoAku8k1kxG59iC-4jywHpt8NwkG8gNhvTCrdfUwLkJmXrKDP_yOiUwViiTdcrzTX13TsoYtgIw88tmvjhtJomHnPhJt5JVUUdZF8d5/s612/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-4.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="428" data-original-width="612" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcRbpFf7r7RjTn6cn7b59qg-kUxlQdKic8uI43WApyGmMcNIWR5HEiQfJAXfxIPtEdM4QDrQa1Gq43cv_VRoAku8k1kxG59iC-4jywHpt8NwkG8gNhvTCrdfUwLkJmXrKDP_yOiUwViiTdcrzTX13TsoYtgIw88tmvjhtJomHnPhJt5JVUUdZF8d5/w400-h280/AI%20-Ecommerce-Jai-Krishna-Ponnappan-Web-Media-4.jpg" width="400" /></a></div><br /><p><br /></p><p> </p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Order Fulfillment/Order Scheduling?</span></h2><p><br /></p><p><br /></p><p>Order scheduling and fulfillment include responsibilities such as picking up or delivering items and services in the correct amount and quality at the proper time and location (Weber and Schütte 2019). </p><p><b>The e-commerce sector need exceptionally efficient fulfillment operations due to erratic order patterns, limited order processing time, and short-term delivery schedules (Leung et al. 2018). </b></p><p><br /></p><p><br /></p><h3 style="text-align: left;">Here, AI systems may actively monitor and improve these operations by taking into account elements such as order demand and product characteristics to automate the ideal logistics plan (Lam et al. 2015; Paschen et al. 2019). </h3><p><br /></p><p></p><ul style="text-align: left;"><li>According to researchers, sustainable supply chains and reverse logistics are the most important subjects for current and future AI research (Dhamija and Bag 2019). </li></ul><ul style="text-align: left;"><li>As a result, top e-commerce corporations such as Amazon.com are investing in robots and space-age fulfillment technology (order delivery through drones) (Dirican 2015). </li></ul><p></p><p><br /></p><h3 style="text-align: left;">Reverse logistics, in addition to fulfillment, is a difficulty. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>Products are often returned without their original packaging, as well as seasonal collections, and product similarities may make the procedure more difficult. </li></ul><ul style="text-align: left;"><li>These returns may be compared to catalogue photographs to categorize the goods using AI-powered automated image recognition (Kumar et al. 2014). </li></ul><p></p><p> </p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">How Is Artificial Intelligence Being Used For Support and Customer Service? </span></h2><p><br /></p><h3 style="text-align: left;">Service quality may be a game changer in the e-commerce market (Kalia et al. 2016, 2017b; Kalia 2017a, b). </h3><div><br /></div><div><br /></div><p></p><ul style="text-align: left;"><li>Customer service and support may benefit from AI by boosting satisfaction, building relationships, customizing help, and providing recovery in the event of service failures. </li></ul><ul style="text-align: left;"><li>It's known as "service AI," and it's defined as "the configuration of technology to provide value in the internal and external service environments through flexible adaptation enabled by sensing, learning, decision-making, and actions," according to the researchers (Bock et al. 2020). </li></ul><ul style="text-align: left;"><li>As a result, service AI is more than just making preprogrammed decisions; it also has the ability to learn (Makridakis 2017). </li></ul><p></p><p><br /></p><p><b>Because AI-based services are more dependable, of high quality, consistent, continuously available (24/7), and less susceptible to human errors arising from fatigue and bounded rationality, they can affect customer satisfaction (Huang and Rust 2018). </b></p><p><br /></p><p><br /></p><h3 style="text-align: left;">Similarly, it is simpler for e-commerce businesses to engage in marketing operations in order to build, grow, and retain client connections (Lo and Campos 2018). </h3><p><br /></p><p></p><ul style="text-align: left;"><li><b>Virtual assistants, for example, can send out notifications to millions of customers</b>, analyze their purchases, returns, and loyalty card information, and deliver services that are beyond human capability. </li></ul><ul style="text-align: left;"><li>Using structured and unstructured data related to their psychographic, demographic, and webographic characteristics, as well as online buying behavior (frequency, recency, type, and size of past purchases), AI-enabled systems can create comprehensive profiles of current or potential customers, which can then be processed using machine learning and predictive algorithms to strengthen customer relationship efforts and prospecting of potential customers (Lo and Campos 2018; Paschen et al. 2019). </li></ul><div><br /></div><div><br /></div><p></p><p><b>By learning to talk in different languages, recognizing consumers' emotional states, and retrieving information for them, AI can give a high-quality tailored experience to customers. </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li>A disgruntled consumer might disseminate unfavorable information. </li></ul><ul style="text-align: left;"><li>Firms, on the other hand, may use the high-quality consumer feedback to design service recovery plans (Lo and Campos 2018). </li></ul><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="font-size: x-large;">Ending Remarks.</span></h2><p><br /></p><p><br /></p><h3 style="text-align: left;">In many segments/processes of e-commerce business companies, AI plays a significant and important role. </h3><p><b><br /></b></p><p><b>The role of AI in e-commerce business processes such as market research, market stimulation, terms negotiation, order receipt, order selection and priority, order billing/payment management, order scheduling/fulfillment delivery, and customer service and support has been detailed in order to achieve this goal. </b></p><p><br /></p><p>We discovered that AI has a wide range of potential applications in marketing, transaction processing, and e-commerce service and support. </p><p>At the present rate of technological advancement, AI will go from a data and information processing tool (weak AI) to a self-contained system capable of making human judgments (strong AI).</p><p><br /></p><p><b><span style="font-family: arial; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><b style="color: #ffa400;"><span style="font-family: arial; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://href.li/?http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://t.umblr.com/redirect?z=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjaikrishnaponnappan%2F&t=OTIxZjBkZTY3OTlkMTI3YzdmY2ZlNmM3Yzk1ZDMzYTk4N2U3ODUxMCxabUs3cWpaOA%3D%3D&b=t%3ATN94RBMrvL2v43TUBoflDw&p=https%3A%2F%2Fblog.commentarybyjaikrishnaponnappan.com%2Fpost%2F678148755345883136%2Fafter-ukraine-the-united-states-must-rebuild-its&m=1&ts=1646733695" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://href.li/?https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><span style="font-family: arial; font-size: medium;"><br /></span></p><p><a href="https://www.technologistsinsync.com/p/artificial-intelligence.html" target="_blank"><span style="font-family: arial; font-size: medium;"><b>You may also want to read more about Artificial Intelligence here.</b></span></a></p><p><br /></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><u>FREQUENTLY ASKED QUESTIONS:</u></h2><p><br /></p><p><br /></p><h2 style="text-align: left;">How is artificial intelligence (AI) affecting the e-commerce industry? </h2><p><br /></p><p>eCommerce sites may build customized online experiences and propose items that are tailored to each buyer using AI. </p><p>Companies like Amazon and Netflix, who were early users of AI, have had success with personalized marketing utilizing the technology. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">What are some instances of artificial intelligence in e-commerce applications? </h2><p><br /></p><p>The Top AI Applications in E-Commerce and Retail Purchasing Recommendations Shopping assistants that respond to voice commands. </p><p>E-commerce purchasing experiences that are tailored to you. Warehouse "pickers" using artificial intelligence For ads, image and video recognition is used.</p><p>Methods of payment based on facial recognition. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">What are the advantages of artificial intelligence in the field of e-commerce? </h2><p><br /></p><p></p><ol style="text-align: left;"><li>Voice Commerce</li><li>Virtual Assistants </li><li>Personalization in e-commerce. </li><li>eCommerce Automation using Searchandising (Smart Search). </li><li>Prospective Customers are being retargeted. CRM allows for a more efficient sales process. </li></ol><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;">Which is the most popular/trending AI application in eCommerce? </h2><p> </p><p>One of the most promising applications of AI technology in eCommerce is assisting customers in finding items more quickly. </p><p>It can be done using chatbots or by making textual search more meaningful, but visual search with picture recognition is one of the most promising technologies. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">In e-commerce, how does AI affect consumer satisfaction? </h2><p><br /></p><p>Customer support for ecommerce shops is improved by artificial intelligence in the form of chatbots. </p><p>Chatbots answer quickly and may deliver replies that are tailored to the individual consumer. </p><p>As a result, the user experience in the shop is smooth. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">What influence does Artificial Intelligence have in the internet business world? </h2><p><br /></p><p>By automating and optimizing common procedures and activities, you may save time and money. </p><p>Boost productivity and efficiency in your operations. create quicker business choices based on cognitive technology outputs </p><p><br /></p><p><br /></p><h2 style="text-align: left;">How can artificial intelligence (AI) enhance the consumer experience? </h2><p><br /></p><p>You can use AI to boost consumer engagement, foster brand loyalty, and increase retention. </p><p>While technology isn't a substitute for real humans, it may assist enhance productivity and remove low-hanging fruit off your customer support employees' plates, such as addressing commonly requested inquiries. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">What role does artificial intelligence play in increasing client loyalty? </h2><p><br /></p><p>The most significant advantage of AI is that it enables organizations to process massive volumes of data in real time. </p><p>Brands can take use of its capacity to make good use of this data for loyalty marketing and to favorably influence consumer behavior. </p><p><br /></p><h2 style="text-align: left;">What impact does AI have on how companies and organizations connect with their customers? </h2><p><br /></p><p>Conversational AI has made the communication space more fluid for both customers and companies, providing quick results for customers and making it easier for enterprises to pay attention to everyone who needs it. </p><p><br /></p><h2 style="text-align: left;">What impact will artificial intelligence have on the corporate world in the future? </h2><p><br /></p><p>Artificial intelligence enables company owners to provide their clients a more tailored experience. </p><p>AI is much more efficient at analyzing large amounts of data. </p><p>It can swiftly spot patterns in data, such as previous purchase history, preferences, credit ratings, and other similar threads.</p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;">REFERENCES</h2><p><br /></p><p><br /></p><p>Aggarwal A (2018) Resurgence of AI during 1983–2010. <a href="https://www.kdnuggets.com/2018/02/resurgence-ai-1983-2010.html">https://www.kdnuggets.com/2018/02/resurgence-ai-1983-2010.html</a>. Accessed 16 May 2020.</p><p>American Marketing Association (2017) Definitions of marketing. <a href="https://www.ama.org/the-definition-of-marketing-what-is-marketing/">https://www.ama.org/the-definition-of-marketing-what-is-marketing/</a>. Accessed 17 May 2020.</p><p>Bajpai K (2020) Artificial intelligence in billing and invoice processing: The future is here! <a href="https://www.elorus.com/blog/artificial-intelligence-billing-invoice-processing/">https://www.elorus.com/blog/artificial-intelligence-billing-invoice-processing/</a>. Accessed 16 May 2020.</p><p>Berthon PR, Pitt LF (2018) Brands, truthiness and post-fact: Managing brands in a post-rational world. J Macromarketing 38:218–227.</p><p>Bock DE, Wolter JS, Ferrell OC (2020) Artificial intelligence: Disrupting what we know about services. J Serv Mark. doi: 10.1108/JSM-01-2019-0047.</p><p>Campbell C, Sands S, Ferraro C, et al. (2020) From data to action: How marketers can leverage AI. Bus Horiz 63:227–243. doi: 10.1016/j.bushor.2019.12.002.</p><p>Canhoto AI, Clear F (2020) Artificial intelligence and machine learning as business tools: A framework for diagnosing value destruction potential. Bus Horiz 63:183–193 doi: 10.1016/j.bushor.2019.11.003.</p><p>Dawid H (1999) Bounded rationality and artificial intelligence. In: Adaptive Learning by Genetic Algorithms. Springer-Verlag, Berlin, Heidelberg. doi: 10.1007/978-3-642-18142-9_2.</p><p>Dhamija P, Bag S (2019) Role of artificial intelligence in operations environment: A review and bibliometric analysis. TQM J. doi: 10.1108/TQM-10-2019-0243.</p><p>Dirican C (2015) The impacts of robotics, artificial intelligence on business and economics. Procedia Soc Behav Sci 195:564–573. doi: 10.1016/j.sbspro.2015.06.134.</p><p>Dumitriu D, Popescu MA (2020) Artificial Intelligence solutions for digital marketing. Procedia Manuf 46:630–636 doi: 10.1016/j.promfg.2020.03.090.</p><p>Dwivedi YK, Hughes L, Ismagilova E, et al. (2019) Artificial intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. Int J Inf Manage 101994. doi: 10.1016/j.ijinfomgt.2019.08.002.</p><p>Florez-lopez R, Ramon-jeronimo JM (2009) Marketing segmentation through machine learning models: An approach based on customer relationship management and customer profitability accounting. Soc Sci Comput Rev 27:96–117.</p><p>Frey CB, Osborne MA (2017) The future of employment: How susceptible are jobs to computerisation? Technol Forecast Soc Change 114:254–280. doi: 10.1016/j.techfore.2016.08.019.</p><p>Holmqvist J, Van Vaerenbergh Y, Grönroos C (2017). Language use in services: Recent advances and directions for future research. J Bus Res 72:114–118. doi: 10.1016/j.jbusres.2016.10.005.</p><p>Hruschka H, Natter M (1999) Comparing performance of feedforward neural nets and K-means for cluster-based market segmentation. Eur J Oper Res 114:346–353.</p><p>Huang M, Rust RT (2018) Artificial intelligence in service. J Serv Res 21:155–172. doi: 10.1177/1094670517752459.</p><p>Huang S, Lin F (2005) Designing intelligent sales-agent for online selling. In: Proceedings of the 7th International Conference on Electronic Commerce. Association for Computing Machinery, New York, NY/Xi’an, China, pp. 279–286.</p><p>IBM (2020) Getting started with natural language understanding. <a href="https://cloud.ibm.com/docs/services/natural-language-understanding?topic=natural-language-understanding-getting-started#analyze-phrase">https://cloud.ibm.com/docs/services/natural-language-understanding?topic=natural-language-understanding-getting-started#analyze-phrase</a>. Accessed 17 May 2020.</p><p>Jarek K, Kozminskiego AL, Mazurek G (2019) Marketing and artificial intelligence. Cent Eur Bus Rev 8:46–55 doi: 10.18267/j.cebr.213.</p><p>Järvinen J, Taiminen H (2016) Harnessing marketing automation for B2B content marketing. </p><p>Ind Mark Manag 54:164–175. doi: 10.1016/j.indmarman.2015.07.002.</p><p>Jusoh S (2018) Intelligent conversational agent for online sales. In: 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, Iasi, Romania, pp. 1–4.</p><p>Kahneman D, Tversky A (1979) Prospect theory: An analysis of decision under risk. Econometrica 47:263–292.</p><p>Kalia P (2016) Tsunamic e-commerce in India: The third wave. Glob Anal 5:47–49.</p><p>Kalia P (2017a) Service quality scales in online retail: Methodological issues. Int J Oper Prod Manag 37:630–663. doi: 10.1108/IJOPM-03-2015-0133.</p><p>Kalia P (2017b) Webographics and perceived service quality: An Indian e-retail context. Int JServ Econ Manag 8:152–168. doi: 10.1504/IJSEM.2017.10012733.</p><p>Kalia P, Arora R, Kumalo S (2016) E-service quality, consumer satisfaction and future purchase intentions in e-retail. e-Service J 10:24–41. doi: 10.2979/eservicej.10.1.02.</p><p>Kalia P, Kaur N, Singh T (2017a) E-commerce in India: Evolution and revolution of online </p><p>retail. In: Khosrow-Pour M (ed) Mobile Commerce: Concepts, Methodologies, Tools, and Applications. IGI Global, Hershey, PA, pp. 736–758.</p><p>Kalia P, Law P, Arora R (2017b) Determining impact of demographics on perceived service quality in online retail. In: Khosrow-Pour M (ed) Encyclopedia of Information Science and Technology, 4th edn. IGI Global, Hershey, PA, pp. 2882–2896.</p><p>Kaplan A, Haenlein M (2019) Siri, Siri, in my hand: Who’s the fairest in the land? On the interpretations, illustrations, and implications of artificial intelligence. Bus Horiz 62:15–25. doi: 10.1016/j.bushor.2018.08.004.</p><p>Kawa A, Pieranski B, Zdrenka W (2018) Dynamic configuration of same-day delivery in e-commerce. In: Sieminski A, Kozierkiewicz A, Nunez M, Ha QT (eds) Modern Approaches for Intelligent Information and Database Systems. Springer, Berlin, pp. 305–315.</p><p>Kephart JO, Hanson JE, Greenwald AR (2000) Dynamic pricing by software agents. ComputNetw 32:731–752.</p><p>Khattri V, Singh DK (2018) Parameters of automated fraud detection techniques during online transactions. J Financ Crime 25:702–720. doi: 10.1108/JFC-03-2017-0024.</p><p>Krasadakis G (2017) AI buyer/seller negotiation agents. <a href="https://medium.com/innovation-machine/artificial-intelligence-negotiation-agents-49d666cd9952">https://medium.com/innovation-machine/artificial-intelligence-negotiation-agents-49d666cd9952</a>. Accessed 16 May 2020.</p><p>Kumar DT, Soleimani H, Kannan G (2014) Forecasting return products in an integrated forward/reverse supply chain utilizing an ANFIS. Int J Appl Math Comput Sci 24:669–682. doi: 10.2478/amcs-2014-0049.</p><p>Lam HY, Choy KL, Ho GTS, et al. (2015) A knowledge-based logistics operations planning system for mitigating risk in warehouse order fulfillment. Int J Prod Econ 170:763–779. doi: 10.1016/j.ijpe.2015.01.005.</p><p>Legg S, Hutter M (2006) A collection of definitions of intelligence. In: Advances in Artificial General Intelligence: Concepts, Architectures and Algorithms. IOS Press, Amsterdam, pp. 17–24.</p><p>Leung KH, Choy KL, Siu PKY, et al. (2018) A B2C e-commerce intelligent system for re-engineering the e-order fulfilment process. Expert Syst Appl 91:386–401. doi: 10.1016/j.eswa.2017.09.026.</p><p>Lo FY, Campos N (2018) Blending Internet-of-Things (IoT) solutions into relationship marketing strategies. Technol Forecast Soc Change 137:10–18. doi: 10.1016/j.techfore.2018.09.029.</p><p>Makridakis S (2017) The forthcoming artificial intelligence (AI) revolution: Its impact on society and firms. Futures 90:46–60. doi: 10.1016/j.futures.2017.03.006.</p><p>McCarthy EJ (1960) Basic Marketing: A Managerial Approach. Richard D. Irvin, Inc., Homewod, IL.</p><p>McCarthy J (2007) What is artificial intelligence? <a href="https://www-formal.stanford.edu/jmc/whatisai/node1.html">https://www-formal.stanford.edu/jmc/whatisai/node1.html</a>. Accessed 17 May 2020.</p><p>Mckendrick J (2019) Now, AI can give you an edge … in negotiations. <a href="https://www.rtinsights.com/now-ai-can-give-you-an-edge-in-negotiations">https://www.rtinsights.com/now-ai-can-give-you-an-edge-in-negotiations</a>. Accessed 16 May 2020.</p><p>Mejia N (2019) Artificial intelligence in payment processing – Current applications. <a href="https://emerj.com/ai-sector-overviews/artificial-intelligence-in-payment-processing-current-applications/">https://emerj.com/ai-sector-overviews/artificial-intelligence-in-payment-processing-current-applications/</a>. Accessed 16 May 2020.</p><p>Merriam-Webster.com (2020) Definition of intelligence. <a href="https://www.merriam-webster.com/dictionary/intelligence">https://www.merriam-webster.com/dictionary/intelligence</a>. Accessed 17 May 2020.</p><p>Montgomery AL, Smith MD (2009) Prospects for personalization on the Internet. J Interact Mark 23:130–137. doi: 10.1016/j.intmar.2009.02.001.</p><p>O’Brien JA, Marakas GM (2011) Management Information System, 10th edn. McGraw-Hill/ Irwin, New York, NY.</p><p>Ostrom AL, Fotheringham D, Bitner MJ (2018) Customer acceptance of AI in service encounters: Understanding antecedents and consequences. In: Maglio PP, Kieliszewski CA, Spohrer JC, et al. (eds) Handbook of Service Science. Springer Nature, Cham, pp. 77–103.</p><p>Papadopoulos A, Brooks G (2011) The investigation of credit card fraud in Cyprus: reviewing police “effectiveness.” J Financ Crime 18:222–234. doi: 10.1108/13590791111147442.</p><p>Paschen J, Kietzmann J, Kietzmann TC (2019) Artificial intelligence (AI) and its implications for market knowledge in B2B marketing. J Bus Ind Mark 34:1410–1419. doi: 10.1108/JBIM-10-2018-0295.</p><p>Reynolds M (2017) Chatbots learn how to negotiate and drive a hard bargain. NewScientist 234:7. doi: 10.1016/S0262-4079(17)31142-9.</p><p>Shankar V (2018) How artificial intelligence (AI) is reshaping retailing. J Retail 94:vi–xi. doi: 10.1016/S0022-4359(18)30076-9.</p><p>Simon JP (2019) Artificial intelligence: Scope, players, markets and geography. Digit Policy Regul Gov 21:208–237. doi: 10.1108/DPRG-08-2018-0039.</p><p>Sonia N, Sharma EK, Singh N, Kapoor A (2020) Artificial intelligence in market business: From research and innovation to deployment market. Procedia Comput Sci 167:2200–2210. doi: 10.1016/j.procs.2020.03.272.</p><p>Stone M, Aravopoulou E, Ekinci Y, et al. (2020) Artificial intelligence (AI) in strategic marketing decision- making: A research agenda. Bottom Line. doi: 10.1108/BL-03-2020-0022.</p><p>Syam N, Sharma A (2018) Waiting for a sales renaissance in the fourth industrial revolution: Machine learning and artificial intelligence in sales research and practice. Ind Mark Manag. 69:135–146. doi: 10.1016/j.indmarman.2017.12.019.</p><p>Tegmark M (2017) Life 3.0: Being Human in the Age of Artificial Intelligence. Alfred A. Knopf, New York, NY.</p><p>Weber FD, Schütte R (2019) State-of-the-art and adoption of artificial intelligence in retailing. Digit Policy Regul Gov 21:264–279. doi: 10.1108/DPRG-09-2018-0050.</p><p>Wilson RD, Bettis-outland H (2020) Can artificial neural network models be used to improve the analysis of B2B marketing research data? J Bus Ind Mark 35:495–507. doi: 10.1108/JBIM-01-2019-0060.</p><p>Zanker M, Rook L, Jannach D (2019) Measuring the impact of online personalisation: Past, present and future. J Hum Comput Stud 131:160–168. doi: 10.1016/j.ijhcs.2019.06.006.</p><p><br /></p><p><br /></p> <script>mbtTOC();</script>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-27435569025218586222022-04-02T15:27:00.001-07:002022-04-02T15:31:33.380-07:00Nanotechnology And Artificial Intelligence.<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.jaikrishnaponnappanweb.com/2022/04/Nanotechnology-Artificial-Intelligence.html"},"headline":"Nanotechnology And Artificial Intelligence.","description":"The concept of combining bioscience, artificial intelligence (AI), and nanotechnology will usher in yet another revolution in science and technology, one that has been in the works for more than a decade.","image":["https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQl3RYfiUehJuCMEfAD2c1nqFUJu8cM5_SFZMZTYqMgb39_SqPbM082m0VqGmEzUbCwO3nbGqnjEWQG9pXdP_IB9BfbUvmH36WhPP3TYX58z11x5b0IqQBfR1PNpstJ4EOywDm98rM6lOQ_cGRLVu43JRr_WcgbDNJXSK8TZmFOGGozV6_qUY02y0c/w400-h260/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-3.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-eJzbtd_DqzNC1VAbYwpGWxhyXmjpWIcB1fzsV0JrOuYWTPcod8eUqyVGbTQ6hCFIOpMa88pduUq3i8YLs4R3Osxg_3nBfyP4Lq41jORFlBKtManuE3vONxEkCatL6qX1S-xP_MWY0q6F3Jioj3ax8Tf1wNtbqopc3hOkAamQrEw9RvR9VISvFHP7/w400-h300/Nanotech-Compressed%20Light%20Breakthrough-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.gif","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVouRk28InqMf5MuEFpvngYaEkNBC9Q7DUZ9LYXh67bkBg2ZG7Bhrw_sOs78m-Cx8qhGz74WEQL7OrCb6yF451fdqj-y1ibpmVxpGB4unP7EpQNDwr-LiwtI8POkH4zO5qsg6Y5ZMVy3Kk-tX2UTDwF5F60dsc6b-KEsvmpJ1mHuZBg1cfJI9w_jkS/w400-h181/Nanotech-Nanoscale-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-1.png","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXZ6WShpow_D7je5Ihd2Nm7JgegPXUcxCUSuVVQWEprRbiIE55awdjxCJxtBZI88DqbQciXmfYErAbzh2V3RqZH1JZA9K51CCd_wip3AiPMchUANrKTVL1iKkYM85E8lOeLQz7g6I6lymSzggWUuVlFLTAn0kT4XlGQH6E-smrtVYDvyP4RuoRBUVw/w400-h225/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.jpg"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.jaikrishnaponnappan.com/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":""}</script><div class="mbtTOC"> <button onclick="mbtToggle()">Table Of Contents</button> <ul id="mbtTOC"></ul> </div><p> <br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQl3RYfiUehJuCMEfAD2c1nqFUJu8cM5_SFZMZTYqMgb39_SqPbM082m0VqGmEzUbCwO3nbGqnjEWQG9pXdP_IB9BfbUvmH36WhPP3TYX58z11x5b0IqQBfR1PNpstJ4EOywDm98rM6lOQ_cGRLVu43JRr_WcgbDNJXSK8TZmFOGGozV6_qUY02y0c/s612/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-3.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="397" data-original-width="612" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQl3RYfiUehJuCMEfAD2c1nqFUJu8cM5_SFZMZTYqMgb39_SqPbM082m0VqGmEzUbCwO3nbGqnjEWQG9pXdP_IB9BfbUvmH36WhPP3TYX58z11x5b0IqQBfR1PNpstJ4EOywDm98rM6lOQ_cGRLVu43JRr_WcgbDNJXSK8TZmFOGGozV6_qUY02y0c/w400-h260/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-3.jpg" width="400" /></a></div><br /><br /><br /><p></p><p><br /></p><h2 style="text-align: left;">Context - Is Nanotechnology Used In Artificial Intelligence?</h2><p><br /></p><p><br /></p><h3 style="text-align: left;">Biotechnology, information technology, and <a href="https://www.technologistsinsync.com/2021/09/nanotechnology-historical-perspective.html">nanotechnology </a>are three technologies that are increasingly reliant on current technical and scientific advancement. </h3><p><br /></p><p><b>The concept of combining bioscience, <a href="https://www.technologistsinsync.com/p/artificial-intelligence.html">artificial intelligence</a> (AI), and <a href="https://www.technologistsinsync.com/p/nanotechnology.html">nanotechnology </a>will usher in yet another revolution in science and technology, one that has been in the works for more than a decade. </b></p><p>Nonetheless, the anticipated interdisciplinary research integration is still in the works. </p><p><br /></p><p></p><ul style="text-align: left;"><li><b>Nanotechnology combines engineering and physical sciences knowledge</b>; it is one of the most significant developing technological sectors, with applications in medical, engineering, and agricultural. </li></ul><ul style="text-align: left;"><li>AI is a method of incorporating human-like reasoning into any technological device. This is a study of how the human brain thinks, learns, chooses, and functions as it tries to solve issues.</li></ul><p></p><p> </p><p><br /></p><p></p><p><br /></p><h3 style="text-align: left;">For the construction of common and most successful models, such as artificial neural networks (ANNs) and other similar algorithms, it is largely influenced by biological anatomy. </h3><p></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><br /><p></p><p><b>Improved machine functions linked to human intellect, such as reasoning, thinking, and problem solving, is an important AI aim. </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li>AI is being used in a growing number of disciplines, not just within AI itself, where machine learning, deep learning, and ANNs are increasingly effective approaches in their own right, but also in the number of domains and businesses where it now reigns supreme. </li></ul><ul style="text-align: left;"><li>AI, in conjunction with the Internet of Things (IoT) and other emerging sectors, has already changed many production and monitoring processes across a variety of industries, and the trend is continuing. </li></ul><p></p><p><br /></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-eJzbtd_DqzNC1VAbYwpGWxhyXmjpWIcB1fzsV0JrOuYWTPcod8eUqyVGbTQ6hCFIOpMa88pduUq3i8YLs4R3Osxg_3nBfyP4Lq41jORFlBKtManuE3vONxEkCatL6qX1S-xP_MWY0q6F3Jioj3ax8Tf1wNtbqopc3hOkAamQrEw9RvR9VISvFHP7/s367/Nanotech-Compressed%20Light%20Breakthrough-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.gif" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="275" data-original-width="367" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-eJzbtd_DqzNC1VAbYwpGWxhyXmjpWIcB1fzsV0JrOuYWTPcod8eUqyVGbTQ6hCFIOpMa88pduUq3i8YLs4R3Osxg_3nBfyP4Lq41jORFlBKtManuE3vONxEkCatL6qX1S-xP_MWY0q6F3Jioj3ax8Tf1wNtbqopc3hOkAamQrEw9RvR9VISvFHP7/w400-h300/Nanotech-Compressed%20Light%20Breakthrough-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.gif" width="400" /></a></div><br /><p></p><p><br /></p><h3 style="text-align: left;">Nanotechnology is largely made up of sophisticated systems that aren't always compatible with certain parts of AI. </h3><p><br /></p><p><b>Nanotechnology, on the other hand, is thought to be a technique that AI will employ to converge to oneness. </b></p><p>Though such a picture may still seem futuristic, existing technology has begun to show signs of a similar harmonization. </p><p><br /></p><p></p><ul style="text-align: left;"><li>From fast-paced AI-assisted nanotechnology research to generating state-of-the-art materials to expanding the application area of AI utilizing nanotechnology-based computing devices, combining these two technologies may result in significant advances. </li></ul><ul style="text-align: left;"><li>A combined research may not only merge the two technologies, but it can also offer a boost to research in each area, perhaps leading to a slew of new techniques for gathering information and communication technologies. </li></ul><ul style="text-align: left;"><li><a href="https://www.technologistsinsync.com/2021/06/when-biotechnology-and-nanotechnology.html">Biotechnology</a>, <a href="https://www.technologistsinsync.com/2022/01/artificial-intelligence-what-is.html">cognitive </a>studies, nanotechnology, <a href="https://www.technologistsinsync.com/2022/03/artificial-intelligence-robot-ethics.html">robotics</a>, AI, information and communication technology (ICT), and the sciences dealing with such issues are all exposed to larger political and societal debates. </li></ul><ul style="text-align: left;"><li>Meanwhile, AI has been used in<a href="https://www.technologistsinsync.com/2021/09/nanotechnology-and-nanoscience.html"> nanoscience research </a>for a variety of purposes, including analyzing exploratory procedures and assisting in the creation of novel nanodevices and nanomaterials. </li></ul><p></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><p></p><h3 style="text-align: left;">There are various reasons why AI paradigms are used in nanoresearch. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>Nanotechnology is afflicted by the natural limits of size; the governing physical rules are vastly different from those that apply in other situations. </li></ul><ul style="text-align: left;"><li>As a result, one of the flaws that nanotechnology must solve is the right explanation of the consequences obtained from any such system (Ly et al. 2011). </li></ul><ul style="text-align: left;"><li>To make matters worse, the signal is highly influenced by numerous components in many systems. </li></ul><ul style="text-align: left;"><li>In these instances, developing theoretical approximations is difficult, hence simulation approaches have been used to achieve exact elucidations of the investigative outcomes. </li></ul><p></p><p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVouRk28InqMf5MuEFpvngYaEkNBC9Q7DUZ9LYXh67bkBg2ZG7Bhrw_sOs78m-Cx8qhGz74WEQL7OrCb6yF451fdqj-y1ibpmVxpGB4unP7EpQNDwr-LiwtI8POkH4zO5qsg6Y5ZMVy3Kk-tX2UTDwF5F60dsc6b-KEsvmpJ1mHuZBg1cfJI9w_jkS/s561/Nanotech-Nanoscale-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="254" data-original-width="561" height="181" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVouRk28InqMf5MuEFpvngYaEkNBC9Q7DUZ9LYXh67bkBg2ZG7Bhrw_sOs78m-Cx8qhGz74WEQL7OrCb6yF451fdqj-y1ibpmVxpGB4unP7EpQNDwr-LiwtI8POkH4zO5qsg6Y5ZMVy3Kk-tX2UTDwF5F60dsc6b-KEsvmpJ1mHuZBg1cfJI9w_jkS/w400-h181/Nanotech-Nanoscale-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-1.png" width="400" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><p></p><h3 style="text-align: left;">Various AI machine learning paradigms may be used to generate research results as well as produce nanoapplications in the future. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>These strategies are particularly useful when dealing with a large number of connected factors at the same time, and they may effectively express and simplify complex/unknown data or functions (Mitchell 1997; Bishop 2006). </li></ul><ul style="text-align: left;"><li>Machine learning methodologies such as ANNs, a collection of weighted linked nodes, and link weights are used to investigate these types of functions, which will be quite valuable, utilizing the monitored or unmonitored algorithm. </li></ul><p></p><p><br /></p><h3 style="text-align: left;">Other AI approaches can tackle a variety of optimization and search challenges. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>There are various machine learning approaches that may be used in nanotechnology research for complex categorization, prediction, correlation, data mining, clustering, and other control issues. </li><li>These techniques include decision trees, support vector machines, Bayesian networks, and others. </li><li>A few studies have also been conducted on how AI techniques can take advantage of the computational power boost offered by future nanomaterials developed by <a href="https://www.technologistsinsync.com/2021/09/nanotechnology-and-nanoscience.html">nanoscience </a>and used for fabricating nanodevices, and nanocomputing will provide powerful dedicated architectures for applying machine learning techniques. </li></ul><p></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;">UTILITY OF ARTIFICIAL INTELLIGENCE. </h2><p><br /></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXZ6WShpow_D7je5Ihd2Nm7JgegPXUcxCUSuVVQWEprRbiIE55awdjxCJxtBZI88DqbQciXmfYErAbzh2V3RqZH1JZA9K51CCd_wip3AiPMchUANrKTVL1iKkYM85E8lOeLQz7g6I6lymSzggWUuVlFLTAn0kT4XlGQH6E-smrtVYDvyP4RuoRBUVw/s612/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="344" data-original-width="612" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXZ6WShpow_D7je5Ihd2Nm7JgegPXUcxCUSuVVQWEprRbiIE55awdjxCJxtBZI88DqbQciXmfYErAbzh2V3RqZH1JZA9K51CCd_wip3AiPMchUANrKTVL1iKkYM85E8lOeLQz7g6I6lymSzggWUuVlFLTAn0kT4XlGQH6E-smrtVYDvyP4RuoRBUVw/w400-h225/Nanotech-Nanoscience-Technologistsinsyns-Jai-Krishna-Ponnappan-Media-2.jpg" width="400" /></a></div><br /><p></p><p><br /></p><h3 style="text-align: left;">The following section explores the bidirectional link between AI and nanotechnology via a variety of examples and applications. </h3><p><br /></p><p><br /></p><h2 style="text-align: left;">AI IN SCANNING PROBE MICROSCOPY</h2><p><br /></p><h3 style="text-align: left;">In the nanoworld, scanning probe microscopy (SPM) is the most widely used imaging technology. </h3><div><br /></div><p></p><ul style="text-align: left;"><li>This notion encompasses a variety of methods for obtaining pictures via the interaction of a pattern and a probe. </li></ul><ul style="text-align: left;"><li>The tunneling current between the pattern and the probe is used to characterize the pattern topography via their interaction. </li></ul><ul style="text-align: left;"><li>After the creation of the nanoscope, other strategies were created by altering the contacts between the tip and the sample. </li></ul><p></p><p><br /></p><h3 style="text-align: left;">SPM may also be used to manipulate atoms on a smaller scale. </h3><p><br /></p><p>Despite numerous attempts to improve the judgment and the ability to control atoms, there are still challenges with the interpretation of tiny information. </p><p>The probe–sample interactions are difficult to understand and are influenced by a variety of factors. </p><p><br /></p><h3 style="text-align: left;">AI solutions might be a lifesaver in resolving such problems. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>In recent years, advances in multimodal SPM imaging for acquiring more complementary information (approximately the pattern) have created a massive quantity of data, making it even more difficult to understand individual sample attributes. </li></ul><ul style="text-align: left;"><li>To address this problem, a technique known as functional identification imaging (FR-SPM) has been developed, which seeks a direct identity of local behaviors detected from spectroscopic responses using neural networks trained on examples supplied by an expert. </li></ul><ul style="text-align: left;"><li><b>The cellular<a href="https://www.technologistsinsync.com/2022/03/artificial-intelligence-in-medicine.html"> genetic algorithm</a> (cGA</b>), a Gas subclass, is based entirely on the evolutionary optimization method and is used to automate the imaging operation in SPM using software capable of enhancing the probe's exact state and related control parameters. </li></ul><ul style="text-align: left;"><li>As a result, superior atomic resolution images may be acquired with no human involvement other than the preparation of samples and tips (Huy et al. 2009; Woolley et al. 2011). </li></ul><ul style="text-align: left;"><li>ANNs are widely utilized for categorizing numerous behavioral, structural, and physical aspects of nanomaterials on the <a href="https://www.technologistsinsync.com/2021/09/making-appearance-at-nanoscale.html">nanoscale</a>, which are employed in a wide range of applications, including carbon nanotubes, quantum-dot semiconductor optics and devices, chemical technology, and manufacturing. </li></ul><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">NANOSYSTEMS </a>DESIGN</h2><p><br /></p><h3 style="text-align: left;">ANNs have recently been employed to investigate the nonlinear connection between input factors and output responses in the transparent conductive oxide deposition process. </h3><div><br /></div><p></p><ul style="text-align: left;"><li>In optoelectronic devices such as solar cells, organic LEDs, and flat-panel displays, this kind of thin film is now utilized as an electrode (Bhosle et al. 2006). </li></ul><ul style="text-align: left;"><li>Better nanoantenna shapes were also developed through evolutionary optimization, outperforming the best existing radio-wave type of reference antennas. </li></ul><ul style="text-align: left;"><li>The fittest antenna shape among the linear dipole antennas, according to GA, combines the properties of the split-basic ring's magnetic resonance with the electrical one (Feichtner et al. 2012). </li></ul><ul style="text-align: left;"><li>By thoroughly researching the working principles of the generated geometries, this strategy will develop nanoantenna structures for unique uses and appropriately supply novel layout techniques. </li></ul><ul style="text-align: left;"><li>GAs have also been detected in the area of nano-optics. </li></ul><ul style="text-align: left;"><li>A careful design of nanoparticle mild concentrators will have a significant influence on a variety of nanooptics applications, including optical manipulators, solar cells, plasmon-enriched photodetectors, modulators, and nonlinear optical devices. </li></ul><p></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;">AI AND NANOSCALE SIMULATION.</h2><p><br /></p><p> </p><p><b>One of the primary challenges that scientists encounter while working at the <a href="https://www.technologistsinsync.com/2021/09/nanoscale-surface-to-volume-ratio.html">nanoscale </a>is the tool simulation that is being investigated, since genuine optical photographs at the <a href="https://www.technologistsinsync.com/2021/09/nanoscale-surface-to-volume-ratio.html">nanoscale </a>are not possible. </b></p><p><br /></p><h3 style="text-align: left;">At this scale, images must be interpreted, and numerical simulations are sometimes the best method for obtaining an exact scheme of what is there in the picture. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>Nonetheless, they are difficult to use in many situations, and numerous factors must be considered in order to get an acceptable system representation. </li></ul><ul style="text-align: left;"><li>AI can help here by improving simulation performance and making data collection and interpretation easier. </li></ul><ul style="text-align: left;"><li>When functioning at the <a href="https://www.technologistsinsync.com/2021/09/nanoscale-surface-to-volume-ratio.html">nanoscale</a>, the use of ANNs in numerical simulations has been shown to be useful in a variety of ways. </li></ul><ul style="text-align: left;"><li>To begin, the software program may be manually modified to maintain the stability of numerical exactness and physical implications. </li></ul><ul style="text-align: left;"><li>Another use of ANNs in simulation software is to reduce the complexity of associated settings (Castellano-Hernández et al. 2012). </li></ul><p></p><p><br /></p><p><br /></p><h2 style="text-align: left;">AI AND NANO COMPUTING</h2><p><br /></p><p><br /></p><h3 style="text-align: left;">The combination of AI with existing and emerging nanocomputing technologies yields a wide range of applications (Service 2001; Bourianoff 2003). </h3><p><br /></p><p></p><ul style="text-align: left;"><li>Since the inception of nanocomputers, <a href="https://www.technologistsinsync.com/2022/02/artificial-intelligence-machine.html">AI paradigms</a> have been utilized for different degrees of modeling, developing, and building prototypes of nanocomputing devices. </li></ul><ul style="text-align: left;"><li>Machine learning techniques applied to semiconductor-based hardware with the help of nano-hardware may also offer a basis for a new less expensive and portable age of computing that can include high overall performance computing, including programs, sensory data processing, and control activities (Uusitalo et al. 2011; Arlat et al. 2012). </li></ul><ul style="text-align: left;"><li>The highest hopes for <a href="https://www.technologistsinsync.com/2021/06/quantum-computing-and-digital-evolution.html">nanotechnology-enabled quantum computing</a> and storage are that it will significantly improve our ability to solve the very difficult NP-whole optimization problem. </li></ul><p></p><p><br /></p><h3 style="text-align: left;">Such challenges emerge in a variety of situations, but primarily with Big Data, which necessitates "computational intelligence" (Ladd et al. 2010; Maurer et al. 2012). </h3><p><br /></p><p>In this context, natural computing is usually done using several methodologies. </p><p></p><ul style="text-align: left;"><li>Apart from various natural computing approaches, techniques such as DNA computing or <a href="https://www.technologistsinsync.com/2021/06/quantum-computing-and-digital-evolution.html">quantum computing </a>are now being thoroughly investigated (Darehmiraki 2010; Razzazi and Roayaei 2011; Ortlepp et al. 2012; Zha et al. 2013). </li></ul><ul style="text-align: left;"><li>Many variables are used in DNA computing. This is an example of how DNA computing <a href="https://www.technologistsinsync.com/2022/02/artificial-intelligence-generative.html">AI methodologies</a> may be used to purchase a final result from a little preliminary data collection, avoiding the need of all possible solutions. </li></ul><p></p><p>Other approaches to examine are evolutionary and GAs. </p><p><br /></p><p><b>Eventually, nanocomputing systems—of which only a handful are bioinspired—will include a broad range of new nanotechnologies. </b></p><p>These technologies will be able to leverage new data versions to apply machine learning paradigms in order to solve complicated issues in a broad range of applications when new physical working bases, reconfigurable architectural storage, and computational methods accumulate. </p><p><br /></p><p><br /></p><h2 style="text-align: left;">AI AND NANO TECHNOLOGY APPLICATIONS IN FOOD SCIENCE.</h2><p><br /></p><h3 style="text-align: left;">Food science is rapidly evolving in tandem with nanotechnology. </h3><div><br /></div><p></p><ul style="text-align: left;"><li><a href="https://www.technologistsinsync.com/p/nanotechnology.html">Nanotechnology </a>is the solution to the food market's desire for technology that is critical to maintaining market leadership within the food processing business in order to generate dependable, appropriate, and tasty fresh food items. </li></ul><ul style="text-align: left;"><li>Preservatives and wrapping are both done using nanoparticles ("nano inside," "nano outside"). </li></ul><ul style="text-align: left;"><li><a href="https://www.technologistsinsync.com/2021/09/nanoscale-surface-to-volume-ratio.html">Nanoscale </a>food additives may be utilized to affect product flavor, nutritional content, shelf life, and texture; they may even be used to detect infections; and they may serve as quality indicators. </li></ul><ul style="text-align: left;"><li>Nanotechnology opens up a wide range of possibilities for new product development and food system applications. </li></ul><ul style="text-align: left;"><li>Research & development opportunities for food additives and packaging are aided by AI tactics. </li></ul><p></p><p><br /></p><p><br /></p><p><br /></p><h2 style="text-align: left;">THE USE OF <a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">NANOBOTS </a>IN MEDICINE.</h2><p><br /></p><p><br /></p><h3 style="text-align: left;"><b>It has been demonstrated that a large number of <a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">nanosystems </a>are capable of interacting with living neurons. </b></h3><div><br /></div><p></p><ul style="text-align: left;"><li>Because the detectors are threshold devices similar to spiking neurons, a few CNT features enable us to set down nanotube detectors that could assist implement the pulse-train neural network function (Lee et al. 2003). </li></ul><ul style="text-align: left;"><li>The identification of unstable chemical compounds using CNT-covered acoustic and visual sensors is a promising application of ANN algorithms. </li></ul><ul style="text-align: left;"><li>It is concluded that a first-rate categorization exchange may be realized by combining multiple modules of auditory and optical sensors, which is the state of affairs in which ANNs can fully realize their potential (Penza et al. 2005). </li></ul><ul style="text-align: left;"><li>On the domain of pharmacology and nanomedicine, ANNs have been deemed a well-known device for nanoparticle training analysis and modeling, with a high ability effect in chronic disease (Zarogoulidis et al. 2012). </li></ul><p></p><p><br /></p><p><br /></p><h3 style="text-align: left;"><a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">Nanobots </a>developed by researchers at the University of California, San Diego (UCSD) are capable of purifying the blood of toxins produced by bacteria. </h3><p><br /></p><p><b>These <a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">nanobots </a>are roughly a quarter of the width of a human hair and can move 35 meters per second by "swimming" through the blood while being propelled by ultrasound. </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li><a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">Nanobots</a> developed by MIT researchers in 2018 are so small and light that they might float through the air. </li></ul><ul style="text-align: left;"><li>Linking 2D electronic additives to minute particles measuring between one billionth and one millionth of a meter may make this nanotechnology feasible. </li></ul><div><br /></div><p></p><p><b>The ultimate product is a robot that is about the size of an ovum or a grain of sand. </b></p><p><b><br /></b></p><p></p><ul style="text-align: left;"><li>The combination of photodiode <a href="https://www.technologistsinsync.com/2021/06/microelectronics-to-nanoelectronics.html">semiconductors</a>, which can detect radiation from an optical region and convert it to an electrical signal, allows for a constant supply of power to the environmental sensors installed in these robots. </li></ul><ul style="text-align: left;"><li>The modest electrical fee created is sufficient to allow this technology to function without the need of a battery. </li></ul><p></p><p><br /></p><p><b>When it comes to the value of these <a href="https://www.technologistsinsync.com/2021/06/Nanomachine-Manufacture--A-World-Made-of-DustNano-Assemblers.html">nanobots</a>, the researchers want to send them on missions to faraway regions to expose things like pipelines and the human digestive system. </b></p><p><br /></p><p>This minuscule emissary may be released into the opening, allowed to flow in the pipe's direction, and then retrieved at the pipe's exit. </p><p>The data acquired by its sensors, which include the spatiotemporal attention of positive chemical compounds such as hormones and enzymes, may then be downloaded and considered once harvested. </p><p> </p><p><br /></p><h2 style="text-align: left;">Conclusion.</h2><p><br /></p><h3 style="text-align: left;">Many difficulties that arise in the research of nanotechnology might be solved using AI. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>The usage of ANNs and GAs has been investigated in a variety of scenarios, ranging from data interpretation in a microscope scanning probe to the characterization and classification of <a href="https://www.technologistsinsync.com/2021/09/nanoscale-surface-to-volume-ratio.html">nanoscale </a>fabric characteristics. </li></ul><ul style="text-align: left;"><li>It has also looked at numerous initiatives to build nano-machines and utilize them to implement cutting-edge synthetic intelligence paradigms. </li></ul><ul style="text-align: left;"><li>These ground-breaking initiatives call for a true confluence of nanotechnology and artificial intelligence in high-performance computer systems enabled by biomaterial-based nanocomputing devices. </li></ul><p></p><p><br /></p><p><br /></p><h3 style="text-align: left;">Finally, the considerable capacity effect on the usage of AI techniques has been shown. </h3><p><br /></p><p></p><ul style="text-align: left;"><li>Nanotechnology, on the other hand, has been applied in biomedical research, therapeutic applications, and food science. </li></ul><ul style="text-align: left;"><li>Nanotechnology focuses on bottom-up design, while AI research usually takes a top-down approach to solving problems. </li></ul><ul style="text-align: left;"><li>The merging of those areas will create approaches for a variety of complex problems that need several layers of explanation and relationships. </li></ul><ul style="text-align: left;"><li>As previously said, nanotechnology and artificial intelligence (AI) may assist in this attempt to revive.</li></ul><p></p><p><br /></p><p><br /></p><p><b><span style="font-family: arial; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><b style="color: #ffa400;"><span style="font-family: arial; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://href.li/?http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://t.umblr.com/redirect?z=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjaikrishnaponnappan%2F&t=OTIxZjBkZTY3OTlkMTI3YzdmY2ZlNmM3Yzk1ZDMzYTk4N2U3ODUxMCxabUs3cWpaOA%3D%3D&b=t%3ATN94RBMrvL2v43TUBoflDw&p=https%3A%2F%2Fblog.commentarybyjaikrishnaponnappan.com%2Fpost%2F678148755345883136%2Fafter-ukraine-the-united-states-must-rebuild-its&m=1&ts=1646733695" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://href.li/?https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><span style="font-family: arial; font-size: medium;"><br /></span></p><p><a href="https://www.technologistsinsync.com/p/artificial-intelligence.html" target="_blank"><span style="font-family: arial; font-size: medium;"><b>You may also want to read more about Artificial Intelligence here.</b></span></a></p><p><b><a href="https://www.technologistsinsync.com/p/nanotechnology.html" target=""><span style="font-family: arial; font-size: medium;">You May Also Want To Read More About Nano Technology here.</span></a></b></p><p><br /></p><p><br /></p><h2 style="text-align: left;">REFERENCES</h2><p><br /></p><p>Arlat, Jean, Zbigniew Kalbarczyk, and Takashi Nanya. “Nanocomputing: Small devices, large dependability challenges.” IEEE Security & Privacy 10, no. 1 (2012): 69–72.</p><p>Bhosle, V., A. Tiwari, and J. Narayan. “Metallic conductivity and metal-semiconductor transition in Ga-doped ZnO.” Applied Physics Letters 88, no. 3 (2006): 032106.</p><p>Bishop, Christopher M. Pattern Recognition and Machine Learning. Berlin: Springer (2006).</p><p>Bourianoff, George. “The future of nanocomputing.” Computer 36, no. 8 (2003): 44–53.</p><p>Castellano-Hernández, Elena, Francisco B. Rodríguez, Eduardo Serrano, Pablo Varona, and Gomez Monivas Sacha. “The use of artificial neural networks in electrostatic force microscopy.” Nanoscale Research Letters 7, no. 1 (2012): 1–6.</p><p>Darehmiraki, Majid. “A semi-general method to solve the combinatorial optimization problems based on nanocomputing.” International Journal of Nanoscience 9, no. 5 (2010): 391–398.</p><p>Feichtner, Thorsten, Oleg Selig, Markus Kiunke, and Bert Hecht. “Evolutionary optimization of optical antennas.” Physical Review Letters 109, no. 12 (2012): 127701.</p><p>Huy, Nguyen Quang, Ong Yew Soon, Lim Meng Hiot, and Natalio Krasnogor. “Adaptive cellular memetic algorithms.” Evolutionary Computation 17, no. 2 (2009): 231–256.</p><p>Ladd, Thaddeus D., Fedor Jelezko, Raymond Laflamme, Yasunobu Nakamura, Christopher </p><p>Monroe, and Jeremy Lloyd O’Brien. “Quantum computers.” Nature 464, no. 7285 (2010): 45–53.</p><p>Lee, Ian Y., Xiaolei Liu, Bart Kosko, and Chongwu Zhou. “Nanosignal processing: Stochastic resonance in carbon nanotubes that detect subthreshold signals.” Nano Letters 3, no. 12 (2003): 1683–1686.</p><p>Ly, Dung Q., Leonid Paramonov, Calvin Davidson, Jeremy Ramsden, Helen Wright, Nick Holliman, Jerry Hagon, Malcolm Heggie, and Charalampos Makatsoris. “The matter compiler-towards atomically precise engineering and manufacture.” Nanotechnology Perceptions 7, no. 3 (2011): 199–217.</p><p>Maurer, P.C., G. Kucsko, C. Latta, L. Jiang, N.Y. Yao, S.D. Bennett, F. Pastawski, D. Hunger, N. Chisholm, M. Markham, and D.J. Twitchen. “Room-temperature quantum bit memory exceeding one second.” Science 336, no. 6086 (2012): 1283–1286.</p><p>Mitchell, Tom M. Machine Learning. Maidenhead: McGraw Hill (1997).</p><p>Ortlepp, Thomas, Stephen R. Whiteley, Lizhen Zheng, Xiaofan Meng, and Theodore Van Duzer. “High-speed hybrid superconductor-to-semiconductor interface circuit with ultra-low power consumption.” IEEE Transactions on Applied Superconductivity 23, no. 3 (2012): 1400104.</p><p>Penza, M., G. Cassano, P. Aversa, A. Cusano, A. Cutolo, M. Giordano, and L. Nicolais. “Carbon nanotube acoustic and optical sensors for volatile organic compound detection.” Nanotechnology 16, no. 11 (2005): 2536.</p><p>Razzazi, Mohammadreza, and Mehdy Roayaei. “Using sticker model of DNA computing to solve domatic partition, kernel and induced path problems.” Information Sciences 181, no. 17 (2011): 3581–3600. </p><p>Service, Robert F. “Nanocomputing. Assembling nanocircuits from the bottom up.” Science 293, no. 5531 (2001): 782.</p><p>Uusitalo, Mikko A., Jaakko Peltonen, and Tapani Ryhänen. “Machine learning: How it can help nanocomputing.” Journal of Computational and Theoretical Nanoscience 8, no. 8 (2011): 1347–1363.</p><p>Woolley, Richard A. J., Julian Stirling, Adrian Radocea, Natalio Krasnogor, and Philip Moriarty. “Automated probe microscopy via evolutionary optimization at the atomic scale.” Applied Physics Letters 98, no. 25 (2011): 253104.</p><p>Zarogoulidis, Paul, Ekaterini Chatzaki, Konstantinos Porpodis, Kalliopi Domvri, Wolfgang Hohenforst-Schmidt, Eugene P. Goldberg, Nikos Karamanos, and Konstantinos Zarogoulidis. “Inhaled chemotherapy in lung cancer: Future concept of nanomedicine.” International Journal of Nanomedicine 7 (2012): 1551.</p><p>Zha, Xinwei, Chenzhi Yuan, and Yanpeng Zhang. “Generalized criterion for a maximally multi-qubit entangled state.” Laser Physics Letters 10, no. 4 (2013): 045201.</p><p><br /></p><p><br /></p><script>mbtTOC();</script>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-3946263278016060892021-05-23T10:11:00.007-07:002021-05-23T10:29:17.307-07:00Applied Artificial Intelligence for a Post COVID-19 Era<p><span style="font-family: helvetica;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: helvetica;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBXq8Q61sGH5YBuNxR_-Sq00Oe1kbPKUowSGyBPTDs2hHaO8LdP1-U4Nc_NgH335i-zi1g0iqErJijCfAICPRALVCCmXqKUPonMtml0ewDoa4i4KD1t_1Oy1vE9GDeSP-OanKmy9vL3dE/s509/COVID-19-Artificial-Intelligence-Technology-Jai-Krishna-Ponnappan-1.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="339" data-original-width="509" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBXq8Q61sGH5YBuNxR_-Sq00Oe1kbPKUowSGyBPTDs2hHaO8LdP1-U4Nc_NgH335i-zi1g0iqErJijCfAICPRALVCCmXqKUPonMtml0ewDoa4i4KD1t_1Oy1vE9GDeSP-OanKmy9vL3dE/w400-h266/COVID-19-Artificial-Intelligence-Technology-Jai-Krishna-Ponnappan-1.jpg" width="400" /></a></span></div><span style="font-family: helvetica;"><br /></span><p></p><p class="MsoNormal"><span style="font-family: helvetica;">In the post-COVID-19 era, businesses will use artificial
intelligence (AI) in a variety of ways, according to this article. We
demonstrate how AI can be used to create an inclusive paradigm that can be
applied to companies of all sizes. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">Researchers may find the advice useful in
identifying many approaches to address the challenges that businesses may face
in the post-COVID-19 period. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Here we examine a few key global
challenges that policymakers can remember before designing a business model to
help the international economy recover once the recession is over. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Overall, this article aims to improve business stakeholders'
awareness of the value of AI application in companies in a competitive market
in the post-COVID-19 timeframe.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The latest COVID-19 epidemic, which began in December in
Wuhan, China, has had a devastating effect on the global economy. </span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><b><span style="font-family: helvetica; font-size: medium;">It is too
early to propose a business model for businesses that would be useful until the
planet is free of the COVID-19 pandemic during this unparalleled socioeconomic
crisis for business. </span></b></p><p class="MsoNormal"><span style="font-family: helvetica;">Researchers have begun forecasting the effects of COVID-19
on global capital markets and its direct or indirect impact on economic growth
based on current literature on financial crises or related exogenous shocks. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Following the failure of Lehman Brothers in, a body of
literature has emerged that focuses on the application of emerging technology
such as artificial intelligence to the ‘Space Economy' (AI). Existing AI
research demonstrates the AI's applicability and usefulness in restructuring
and reorganizing economies and financial markets around the world. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">The implementation of this technology is extremely important
in academia and practice to kick-start economic growth and reduce inequalities
in resource distribution for stakeholders' development. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Based on the topic
above, the aim of this article is to determine the extent of AI use by
companies in the post-COVID-19 crisis era, as there are few comprehensive
studies on the effect of using AI to resolve a pandemic shock like the one we
are witnessing at the start of the year. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">To the best of our understanding, this
is the first report to demonstrate the potential for AI use by businesses in
the COVID-19 recovery process.</span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><o:p></o:p></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">Advantages in Using AI Until COVID-19 Is Over.</span></h3><div><span style="font-family: helvetica;"><br /></span></div>
<p class="MsoNormal"><span style="font-family: helvetica;">Companies may increase the value of their
businesses by lowering operational costs. According to Porter COVID-19, firms
use their sustainability models to gain a comparative edge over their
competitors. Dealing with big data generated by fast knowledge traffic across
the Internet has been one of the biggest problems faced by businesses over the
last decade. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">To fix this problem, businesses have begun to use artificial
intelligence (AI) to boost the global economy COVID-19. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Small to medium-sized
businesses, including large corporations, benefit from government interventions
that force them to think creatively. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Furthermore, when implementing AI, these
firms make some disruptive improvements to their operations. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The construction of such infrastructure by large, medium,
and small businesses has a positive effect on many countries' jobs, GDP, and
inflation rates, to name a few. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Furthermore, the use of a super-intelligent device opens new possibilities for
businesses of all sizes, allowing for the transfer of critical data in a matter
of nanoseconds. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">As a result, the economy's growth is noticeable because
businesses of all sizes, especially in advanced countries, can use this
sophisticated and effective business model built on advanced technology like
AI. </span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><b><span style="font-size: medium;">Big data processing enables businesses to reduce the percentage of error in
their business models. </span></b><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><b><br /></b></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Furthermore, the deployment of these emerging technologies
has expanded global collaboration and engagement as awareness and research and
development (R&D) continue to spread globally from one country to another. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Competition among rivals in the same market, as well as between large and small
companies, influences competition in the search for a long-term business model. </span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">By incorporating user-friendly technology into everyday life, AI-based models
allow businesses to enter rural or underdeveloped areas. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">In the absence of a person, a digital-biological converter,
for example, will render a variety of copies of flu vaccines remotely to
benefit the local health system. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">As a
result, different sectors such as health, transportation, manufacturing, and
agriculture contribute to the growth of the country's economy, which has an
impact on the global economy. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">During the financial crisis of 2008, businesses' use of AI
remained relatively constrained. Companies are now attempting to use a hybrid
Monte Carlo decision-making method in the increasingly unstable
post-coronavirus timeframe due to rapid technological advancements. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Companies
must understand the extraordinary harm inflicted by the novel coronavirus
before adapting AI-based models to stabilize the economy from the current
recession, which is not equivalent to past financial crises, such as the crash
of Lehman Brothers.<o:p></o:p></span></p>
<p class="MsoNormal"><o:p><span style="font-family: helvetica;"> </span></o:p></p><p class="MsoNormal"><o:p><span style="font-family: helvetica;"><br /></span></o:p></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">AI for Global Development in the Post-COVID-19 Era</span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">One of the main environmental problems of recent decades has
been to limit global warming below 2 degrees Celsius in order to minimize the
chance of biodiversity loss. The human and animal kingdoms' livelihoods are
also at risk because of accelerated climate change. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">According to several reports (<a href="https://www.eauc.org.uk/">https://www.eauc.org.uk/</a>),
failing to protect biodiversity can pose a challenge to humans. Furthermore,
modern business practices affect the climate, and may cause a dangerous virus
to take up residence in a human being. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">As a result, biodiversity
conservationists must maintain a broad archive related to industry that is
impossible to obtain manually. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">Businesses must first find ecosystems to
preserve before establishing wildlife corridors, which are extremely important
biologically. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Consider the states of Montana and Idaho in the United States. The AI-assisted device is being used by wild animal
conservation scientists to monitor and document the movements of wild animals.
As a result, the organization will use AI embedded technology to reduce
biodiversity threats and continue to focus on sustaining climate change
throughout the post-COVID-19 pandemic era.</span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica; font-size: medium;"><b>The vast application of AI can be seen in the healthcare
industry, which is a major problem for all countries. During the recent
pandemic, we saw the relevance of active learning and cross-population test
models, as well as the use of AI-driven methods. </b><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><b><br /></b></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">For example, robotics can clean hospitals to aid health
workers, D printers can produce personal protective equipment (PPE) for health
workers in hospitals and nursing homes, and a smartphone-enabled monitoring
device can detect close contact between infected people, to name a few
examples. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">We can see an introduction of AI among healthcare businesses in the
past decades, like the COVID-19 pandemic. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">For example, IBM Watson Health's AI scheme has been used in
conjunction with Barrow Neurological Institute to coordinate the study of
several trials to draw conclusions regarding the genes linked to Amyotrophic
Lateral Sclerosis (ALS) disorder. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Furthermore, only modern equipment allows for remote
treatment without endangering the health care provider's safety. As a result,
after we've recovered from the recession, businesses will need to analyze a
massive amount of data from any impacted country using their AI-based
forecasting model. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">This will help to reduce the chances of another pandemic
occurring in the future. In recent days, we've seen a massive investment in
renewable energy from both the public and private sectors in both developed and
developing countries (Bloomberg NEF). </span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><br /></p><h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">With the assistance of AI-based
technologies, businesses will start using their invested capital and produce
more units of renewable energy (or green energy) in the post-COVID-19 period. </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Quantum computing, for example, will cause a plasma reaction in a nuclear
fusion reactor, reducing the use of fossil fuels and producing renewable
energy. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Companies may also rely on assisting major companies in
finding a technology-enhanced way to manage the expense of the cooling system
in the big data center. Deep mind is an example of cost-effective, smarter
energy used by large corporations such as Google. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">We may observe a dead subjectivity in metaphysical zombies
(p-zombies) generated by non-self-improving AI. Companies can solve complex
issues using biological or artificial neural networks COVID-19, or they can use
AI that does not self-improve even when communicating with government systems,
by integrating AI with current technologies. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Industry should concentrate on a
limited time span to develop an accurate early forecasting model with a
specific dataset to test the suitability of an AI program. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">If companies will learn how to reduce the cost of AI
application, how to integrate AI with time COVID-19, and how to manage
different parameters of global issues using AI COVID-19, they can be more
effective. As a result, the global control mechanism would be able to implement
a small superintelligence for the good of humanity. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">An Investigation into the Use of Artificial Intelligence in
Cryptocurrency Forecasting </span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">Let's look at an example of AI in action with
real-time details. In this part, we demonstrate how artificial intelligence can
be used in time-series forecasting, specifically using an artificial neural
network (ANN). <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The ANN is made up of a vast number of strongly integrated
processing components, like how human brains function. The use of neural
networks in natural language processing and computer data visioning is now
considered one of the most advanced approaches for natural language processing
and computer data visioning. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">For example, the ANN algorithm outperforms several single or
hybrid classical forecasting techniques such as ARIMA and GARCH in a study on
bank and company bankruptcy prediction. In this short experiment, we forecast a
sample using a mixture of well-known neural network algorithms including long
short-term memory (LSTM), time-lagged neural network (TLNN), feed-forward
neural network (FNN), and seasonal artificial neural network (SANN)
(time-series). We measure the monthly average closing price in each year from
the regular observations to make our study straightforward. We use a percentage
of this data as research data and a percentage of this data as training data. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The four models listed above use this training approach to
try to recognize regularities and trends in the input data, learn from
historical data, and then provide us with generalized forecast values based on
previously established knowledge. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">As a result, the system is self-adaptive and
non-linear. As a result, it defies a priori statistical distribution
assumptions. Our experiment shows that the LSTM model is a safer approach for
forecasting bitcoin market movement based on the optimum parameters—such as
root mean square errors (RMSE). <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">It shows that the price of cryptocurrencies has been
declining since January of this year. However, as transaction costs and other
financial or environmental exogenous shocks, such as economic lockout due to
COVID-19, are factored in, the model becomes more complicated. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">Note that the
aim of the above-mentioned experiment is to demonstrate the applicability of
ANN rather than to draw policy conclusions from the findings.<o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">The Difficulties in Using AI Since the COVID-19 Crisis Has
Ended.</span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The AI ushers in a new era in the global economy. However,
several reports, such as Roubini COVID-19 and Stiglitz COVID-19, pose
significant concerns about the use of AI in the World Economic Forum (WEF).
They state that a significant amount of money and R&D is needed to invest
in AI-enabled robots that can perform complex tasks. <a href="http://www.cryptydatadownload.com">www.cryptydatadownload.com</a>
provided the details. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">In the rising economy, there is a limited potential to
incorporate both small and large enterprises in the same model, which might not
be viable. According to current research, a large work loss will stifle
economic growth COVID-19. As businesses are
willing to use alternate digital money such as cryptocurrencies, the economy's
uncertainty may increase. <o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<p class="MsoNormal"><span style="font-family: helvetica; font-size: medium;"><b>A lack of resources for small businesses can
result in a wider performance gap between the public and private sectors, or
between small and large businesses. </b><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><b><br /></b></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">This could limit the reliability and precision of big data
processing and the implementation of a universal business model. The ability of
a small group of businesses to use AI to their advantage could stifle global
economic growth. Furthermore, there is the possibility of a disastrous AI risk.
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">The problems associated with AI protection or alignment can
be a major source of concern for businesses, particularly in the aftermath of
the Coronavirus outbreak, where there could be a shortage of qualified
personnel. Companies should rely on forward thinking taxonomy because it is
difficult to be positive of potential uncertainty. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">For example, a bio hacking company might use AI to decipher
reported genomes, potentially causing a multi-pandemic COVID-19, and such a
business model could build neural interfaces that negatively impact human
brains. As a result, it's also unclear to what degree businesses will be able
to use AI efficiently and successfully after the global economy has recovered
from the COVID-19 pandemic.<o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p>
<h3 style="text-align: left;"><span style="font-family: helvetica; font-size: medium;">We discuss a few challenges and major benefits that any
company can take advantage of in the post-COVID-19 timeframe.</span></h3><div><span style="font-family: helvetica;"><br /></span></div><p class="MsoNormal"><span style="font-family: helvetica;">However, we recognize that we face enormous
problems, and policymakers from all over the world should work together to
address these concerns. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">One of the key challenges facing policymakers is determining
how to incorporate responsible commercial practices in order to safely transfer
data so that it can be analyzed by AI-based technologies for the good of
society. Local and foreign decision-makers must express their experience in
order to inform the general public about technologies and reduce the chance of
job loss. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: helvetica;">Furthermore, by developing COVID-19 for "Artificial
Intelligence Marketing," the world's economic growth can be restructured
if regulators enable businesses to use AI to improve production-led
profitability and mitigate risk through creative methods. </span></p><p class="MsoNormal"><span style="font-family: helvetica;">We expect AI-led
businesses to outperform all human tasks as soon as the global economy recovers
from the COVID-19 pandemic, based on other studies' forecasts. </span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><b><span style="font-size: medium;">In a nutshell,
AI technologies in the post-COVID-19 period will allow individuals and
businesses to collaborate for accelerated global growth by outweighing the
negative aspects of technology use in society.</span></b><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: helvetica;"><br /></span></p><p class="MsoNormal"><b><a href="https://www.jaikrishnaponnappanweb.com/p/covid-19.html"><span style="font-family: helvetica;">You may also like to read more analysis about applied technology during the COVID-19 pandemic here</span></a>.</b></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><br /></p><p class="MsoNormal"><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-2274845409679453852016-11-07T08:57:00.000-08:002020-07-31T07:03:57.267-07:00Software Development - Science, Engineering, Art, or Craft<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span>An opinionated look at our trade</span></b><br />
<span><br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" /></span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="442" data-orig-width="800" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="581" data-orig-height="442" data-orig-width="800" src="https://68.media.tumblr.com/789e172fd44f359784c5506ee40c378f/tumblr_inline_oga6mjRDI51qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
Introduction</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >There is general consensus that the software development process is imperfect, sometimes grossly so, for any number of human (management, skill, communication, clarity, etc) and technological (tooling, support, documentation, reliability, etc) reasons. And yet, when it comes to talking about software development, we apply a variety of scientific/formal terms:</span></div>
<ol style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 38px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Almost every college / university has a Computer Science curriculum.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >We use terms like "software engineer" on our resumes.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >We use the term "art" (as in "art of software development") to acknowledge the creative/creation process (the first volume of Donald Knuth's The Art of Computer Programming was published in 1968)</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >There is even a "<a href="http://manifesto.softwarecraftsmanship.org/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">Manifesto for Software Craftsmanship</a>" created in 2009 (the "<a href="http://manifesto.softwarecraftsmanship.org/#/en/reading" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">Further Reading</a>" link is a lot more interesting than the Manifesto itself.)</span></li>
</ol>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >The literature on software development is full of phrases that talk about methodologies, giving the ignorant masses, newbie programmers, managers, and even senior developers the warm fuzzy illusion that there is some repeatable process to software development that warrants words like "science" and "engineer." Those who recognize the loosey-goosey quality of those methodologies probably feel more comfortable describing the software development process as an "art" or a "craft", possibly bordering on "witchcraft."</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >The Etymology of the Terms we Use</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >By way of introduction, we'll use the etymology of these terms as a baseline of meaning.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Science</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >"what is known, knowledge (of something) acquired by study; information;" also "assurance of knowledge, certitude, certainty," from Old French science "knowledge, learning, application; corpus of human knowledge" (12c.), from Latin scientia "knowledge, a knowing; expertness," from sciens (genitive scientis) "intelligent, skilled," present participle of scire "to know," probably originally "to separate one thing from another, to distinguish," related to scindere "to cut, divide," from PIE root *skei- "to cut, to split" (source also of Greek skhizein "to split, rend, cleave," Gothic skaidan, Old English sceadan "to divide, separate;" see shed (v.)).</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >From late 14c. in English as "book-learning," also "a particular branch of knowledge or of learning;" also "skillfulness, cleverness; craftiness." From c. 1400 as "experiential knowledge;" also "a skill, handicraft; a trade." From late 14c. as "collective human knowledge" (especially "that gained by systematic observation, experiment, and reasoning). Modern (restricted) sense of "body of regular or methodical observations or propositions concerning a particular subject or speculation" is attested from 1725; in 17c.-18c. this concept commonly was called philosophy. Sense of "non-arts studies" is attested from 1670s.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.etymonline.com/index.php?term=science" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Engineer</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >mid-14c., enginour, "constructor of military engines," from Old French engigneor "engineer, architect, maker of war-engines; schemer" (12c.), from Late Latin ingeniare (see engine); general sense of "inventor, designer" is recorded from early 15c.; civil sense, in reference to public works, is recorded from c. 1600 but not the common meaning of the word until 19c (hence lingering distinction as civil engineer). Meaning "locomotive driver" is first attested 1832, American English. A "maker of engines" in ancient Greece was a mekhanopoios.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.etymonline.com/index.php?allowed_in_frame=0&search=engineer" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Art</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >early 13c., "skill as a result of learning or practice," from Old French art (10c.), from Latin artem (nominative ars) "work of art; practical skill; a business, craft," from PIE *ar-ti- (source also of Sanskrit rtih "manner, mode;" Greek arti "just," artios "complete, suitable," artizein "to prepare;" Latin artus "joint;" Armenian arnam "make;" German art "manner, mode"), from root *ar- "fit together, join" (see arm (n.1)).<br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" /><br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" />In Middle English usually with a sense of "skill in scholarship and learning" (c. 1300), especially in the seven sciences, or liberal arts. This sense remains in Bachelor of Arts, etc. Meaning "human workmanship" (as opposed to nature) is from late 14c. Sense of "cunning and trickery" first attested c. 1600. Meaning "skill in creative arts" is first recorded 1610s; especially of painting, sculpture, etc., from 1660s. Broader sense of the word remains in artless.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.etymonline.com/index.php?allowed_in_frame=0&search=art" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Craft</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >Old English cræft (West Saxon, Northumbrian), -creft (Kentish), originally "power, physical strength, might," from Proto-Germanic *krab-/*kraf- (source also of Old Frisian kreft, Old High German chraft, German Kraft "strength, skill;" Old Norse kraptr "strength, virtue"). Sense expanded in Old English to include "skill, dexterity; art, science, talent" (via a notion of "mental power"), which led by late Old English to the meaning "trade, handicraft, calling," also "something built or made." The word still was used for "might, power" in Middle English.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.etymonline.com/index.php?allowed_in_frame=0&search=craft" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><b>Methdology </b>(Method)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And for good measure:</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >early 15c., "regular, systematic treatment of disease," from Latin methodus "way of teaching or going," from Greek methodos "scientific inquiry, method of inquiry, investigation," originally "pursuit, a following after," from meta- "after" (see meta-) + hodos "a traveling, way" (see cede). Meaning "way of doing anything" is from 1580s; that of "orderliness, regularity" is from 1610s. In reference to a theory of acting associated with Russian director Konstantin Stanislavsky, it is attested from 1923.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.etymonline.com/index.php?term=method&allowed_in_frame=0" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Common Themes</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Looking at the etymology of these words reveals some common themes (created using the amazing online mind-mapping tool <a href="https://www.mindmup.com/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">MindMup</a>):</span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="732" data-orig-width="800" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="584" data-orig-height="732" data-orig-width="800" src="https://68.media.tumblr.com/8cce195fd5cc8c8311cd6a71a2fe2d5e/tumblr_inline_oga6ngf1xr1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >What associations do we glean from this?</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Science: Skill</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Art: Craft, Skill</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Craft: Art, Skill, Science</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Methodology: Science</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Interestingly, the term "engineer" does not directly associate with the etymology of science, art, craft, or methodology, but one could say those concepts are facets of "engineering" (diagram created with the old horse Visio):</span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="571" data-orig-width="425" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="587" data-orig-height="571" data-orig-width="425" src="https://68.media.tumblr.com/fcaea5ca2eb6b57ef41b649e1a1e31da/tumblr_inline_oga6nsWzLn1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >This is arbitrary and doesn't mean that we're implying right away that software development is engineering, but it does give one an idea of what it might mean to call oneself a "software engineer."</span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
The Scientific Method</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<a href="https://en.wikipedia.org/wiki/Scientific_method" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;"><span style="background-color: white; color: black;">https://en.wikipedia.org/wiki/Scientific_method</span></a></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >How many software developers could actually, off the top of their head, describe the scientific method? Here is one description:</span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="556" data-orig-width="675" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="590" data-orig-height="556" data-orig-width="675" src="https://68.media.tumblr.com/69adf7ca8aad3c131df218510c8159e2/tumblr_inline_oga6o7rLSa1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://idea.ucr.edu/documents/flash/scientific_method/story.htm" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">http://idea.ucr.edu/documents/flash/scientific_method/story.htm</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >The scientific method is an ongoing process, which usually begins with observations about the natural world. Human beings are naturally inquisitive, so they often come up with questions about things they see or hear and often develop ideas (hypotheses) about why things are the way they are. The best hypotheses lead to predictions that can be tested in various ways, including making further observations about nature. In general, the strongest tests of hypotheses come from carefully controlled and replicated experiments that gather empirical data. Depending on how well the tests match the predictions, the original hypothesis may require refinement, alteration, expansion or even rejection. If a particular hypothesis becomes very well supported a general theory may be developed.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >Although procedures vary from one field of inquiry to another, identifiable features are frequently shared in common between them. The overall process of the scientific method involves making conjectures (hypotheses), deriving predictions from them as logical consequences, and then carrying out experiments based on those predictions. A hypothesis is a conjecture, based on knowledge obtained while formulating the question. The hypothesis might be very specific or it might be broad. Scientists then test hypotheses by conducting experiments. Under modern interpretations, a scientific hypothesis must be falsifiable, implying that it is possible to identify a possible outcome of an experiment that conflicts with predictions deduced from the hypothesis; otherwise, the hypothesis cannot be meaningfully tested.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >We can summarize this as an iterative process of:</span></b></div>
<ol style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 38px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Observation</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Question</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Hypothesize</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Create tests</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Gather data</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Revise hypothesis (go to step 3)</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Develop general theories and test for consistency with other theories and existing data</span></li>
</ol>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="478" data-orig-width="482" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="593" data-orig-height="478" data-orig-width="482" src="https://68.media.tumblr.com/a2a8471af04e9c0d420d94cbc80bde73/tumblr_inline_oga6okJ8971qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Software Development: Knowledge Acquisition and Prototyping / Proof of Concept</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >We can map the scientific method steps into the process of the software development that includes knowledge acquisition and prototyping:</span></div>
<ol style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 38px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Observe current processes.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Ask questions about current processes to establish patterns.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Hypothesize how those processes can be automated and/or improved.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Create some tests that measure success/failure and performance/accuracy improvement.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Gather some test data for our tests.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Create some prototypes / proof of concepts and revise our hypotheses as a result of feedback as to whether the new processes meet existing process requirements, are successful, and/or improve performance/accuracy.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Abstract the prototypes into general solutions and verify that they are consistent with other processes and data.</span></li>
</ol>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="478" data-orig-width="482" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="596" data-orig-height="478" data-orig-width="482" src="https://68.media.tumblr.com/93c90ff85e5deb6b336b9ea1762f01b1/tumblr_inline_oga6owIuuu1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Where we Fail</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Software development actually fails at most or all of these steps. The scientific method is typically applied to the observation of nature. As with nature, our observations sometimes come to the wrong conclusions. Just as we observe the sun going around the earth and erroneously come up with a geocentric theory of the earth, sun, moon, and planets, our understanding of processes is fraught with errors and omissions. As with observing nature, we eventually hit the hard reality that what we understood about the process is incomplete or incorrect. One pitfall is that, unlike nature, we also have the drawback that as we're prototyping and trying to prove that our new software processes are better, the old processes are also evolving, so by the time we publish the application, it is, like a new car being driven off the lot, already obsolete.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Also, the software development process in general, and the knowledge acquisition phase in specific, typically doesn't determine how to measure success/failure and performance improvement/accuracy of <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">an existing process</i>, simply because we, as developers, lack the tools and resources to measure existing processes (there are exceptions of course.) We are, after all, attempting to <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">replace a process</i>, not just understand an existing, immutable process and build on that knowledge. How do we accurately measure the cost/time savings of a new process when we can barely describe an existing process? How do we compare the training required to efficiently utilize a new process when everyone has "cultural knowledge" of the old process? How do we overcome the resistance to new technology? Nature doesn't care if we improve on a biological process by creating vaccines and gene therapies to cure cancer, but secretaries and entrenched engineers alike do very much care about new processes that require new and different skills and potentially threaten to eliminate their jobs.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And frequently enough, the idea of how an existing process can be improved comes from incomplete (or completely omitted) observation and questions, but begins at step #3, imagining some software solution that "fixes" whatever concept the manager or CEO thinks can be improved upon, and yes, in many cases, the engineer thinks can be improved upon--we see this in the glut of new frameworks, new languages and forked GitHub repos that all claim to improve upon someone else's solution to a supposedly broken process. The result is a house of cards of poorly documented and buggy implementations. The result is why Stack Overflow exists.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >As to the last step, abstracting the prototypes into general solutions, this is the biggest failure of all of software development -- re-use. As Douglas Schmidt wrote in C++ Report magazine, <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">in 1999</span> (<a href="http://www.cs.wustl.edu/~schmidt/reuse-lessons.html" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>):</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >Although computing power and network bandwidth have increased dramatically in recent years, the design and implementation of networked applications remains expensive and error-prone. Much of the cost and effort stems from the continual re-discovery and re-invention of core patterns and framework components throughout the software industry.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Note that he wrote 17 years ago (at the time of this article) and it still remains true today.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And:</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >Reuse has been a popular topic of debate and discussion for over 30 years in the software community. Many developers have successfully applied reuse opportunistically, e.g., by cutting and pasting code snippets from existing programs into new programs. Opportunistic reuse works fine in a limited way for individual programmers or small groups. However, it doesn't scale up across business units or enterprises to provide systematic software reuse. Systematic software reuse is a promising means to reduce development cycle time and cost, improve software quality, and leverage existing effort by constructing and applying multi-use assets like architectures, patterns, components, and frameworks.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >Like many other promising techniques in the history of software, however, systematic reuse of software has not universally delivered significant improvements in quality and productivity.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >The Silver Lining, Sort Of</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Now granted, we can install a variety of flavors of Linux on everything from desktop computers to single board computers like the Raspberry Pi or Beaglebone. Cross-compilers let us compile and re-use code on multiple processors and hardware architectures. .NET Core is open source, running on Windows, Mac, and Linux. And script languages like Python, Ruby, and Javascript hide the low level compiled implementations in the subconscious mind of the program, enabling code portability for our custom applications. However, we are still stuck in the realm of, as Mr. Schmidt puts it: "Component- and framework-based middleware technologies." Using those technologies, we still have to "re-discover and re-invent" much of the glue that binds these components.</span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
The Engineering Method</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >What is engineering?</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">Engineering is the application of mathematics, empirical evidence and scientific, economic, social, and practical knowledge in order to invent, innovate, design, build, maintain, research, and improve structures, machines, tools, systems, components, materials, processes and organizations. </i>(<a href="https://en.wikipedia.org/wiki/Engineering" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" /></span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="598" data-orig-width="664" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="599" data-orig-height="598" data-orig-width="664" src="https://68.media.tumblr.com/9d0b8fa586e81b965de5b4343fc68dfd/tumblr_inline_oga6piWqaQ1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Seriously? And we have the hubris to call what we do software <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">engineering</i>?</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >"Application of" can only assume a deep understanding of whatever items in the list are applicable to what we're building.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >"In order to" can only assume proficiency in the set of necessary skills.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And the "New stuff" certainly assumes that 1) it works, 2) it works well enough to be used, and 3) people will want it and know how to use it.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Engineering implies knowledge, skill, and successful adoption of the end product. To that end, there are formal methodologies that have been developed, for example, the Department of Energy Systems Engineering Methodology (SEM):</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">The Department of Energy Systems Engineering Methodology (SEM) provides guidance for information systems engineering, project management, and quality assurance practices and procedures. The primary purpose of the methodology is to promote the development of reliable, cost-effective, computer-based solutions while making efficient use of resources. Use of the methodology will also aid in the status tracking, management control, and documentation efforts of a project.</i> (<a href="http://energy.gov/sites/prod/files/cioprod/documents/SEM3_1231.pdf" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Engineering Process Overview</span></b></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="388" data-orig-width="600" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="602" data-orig-height="388" data-orig-width="600" src="https://68.media.tumblr.com/af4dbdb6afadec64a0b30547dacfa843/tumblr_inline_oga6q0HOtW1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" /></span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="https://confluence.oceanobservatories.org/display/syseng/CI+System+Engineering+Methodology" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Notice some of the language:</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >to promote the development of:</span></li>
</ul>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >reliable</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >cost-effective</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >computer-based solutions</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And:</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >the methodology will also aid in the:</span></li>
</ul>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >status tracking</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >management control</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >and documentation efforts</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >This actually sounds like an attempt to apply the scientific method <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">successfully</i> to software development.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Another Engineering Model - the Spiral Development Model</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >There are many engineering models to choose from, but here is one more, the Spiral Development Model. It consists of Phases, Reviews, and Iterations (<a href="https://confluence.oceanobservatories.org/display/syseng/CI+System+Engineering+Methodology" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>):</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Phases</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Review Milestones Process</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Iterations</span></li>
</ul>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Inception Phase</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Elaboration Phase</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Construction Phase</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Transition Phase</span></li>
</ul>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Life Cycle Objectives Review</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Life Cycle Architecture Review</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Initial Operating Capability Review</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Product Readiness Review + Functional Configuration Audit</span></li>
</ul>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Iteration Structure Description: Composition of an 8-Week Iteration</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Design Period Activities</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Development Period Activities</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Wrap-Up Period Activities</span></li>
</ul>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="362" data-orig-width="437" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="605" data-orig-height="362" data-orig-width="437" src="https://68.media.tumblr.com/099f518ffa102847ffeff1cc0f81c4b8/tumblr_inline_oga6qoFiTf1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">In each phase, the Custom Engineering Group (CEG) works closely with the customer to establish clear milestones to measure progress and success. </i>(<a href="http://www.wildpackets.com/products/professional_services/custom_engineering/method" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >This harkens a wee bit to Agile's "customer collaboration", but notice again the concepts of:</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >a project plan</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >a test plan</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >supporting documentation</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >customer sign-off of specifications</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And the formality implied in:</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >investigation</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >design</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >test and user acceptance</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >True software engineering practically demands skilled professionals, whether they are developers, managers, technical writers, contract negotiators, etc. Certainly there is room for the people of all skill levels, but the structure of a real engineering team is such that "juniors" are mentored, monitored, and given appropriate tasks for their skill level and in fact, even "senior" people review each other's work.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Where we Fail</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Instead, we have Agile Development and its Manifesto (<a href="http://agilemanifesto.org/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>, bold is mine):</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Individuals and interactions <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">over processes and tools</span></span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Working software <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">over comprehensive documentation</span></span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Customer collaboration <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">over contract negotiation</span></span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Responding to change <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">over following a plan</span></span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >How can we fail to conclude that Agile Development is <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">anything but engineering</i>?</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >The Agile Manifesto appears to specifically de-emphasizes a scientific method for software development, and it also de-emphasizes the skills actual engineering requires of both software developers and managers, instead emphasizing an ill-defined psychological approach to software development involving people, interactions, collaboration, and flexibility. While these are necessary skills as well, they are not more important <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">over</i> the skills and formal processes that software development requires. In fact, Agile creates an artificial tension between the two sides of each of the bullet points above, often leading to an extreme adoption of the left side, for example, "the code is the documentation."</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >From real world experience, the Manifesto would be better written replacing the word "over" with "and":</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Individuals and interactions <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">and</span> processes and tools</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Working software <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">and</span> comprehensive documentation</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Customer collaboration <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">and</span> contract negotiation</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Responding to change <span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">and</span> following a plan</span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >However this approach is rarely embraced by over-eager coders that want to dive into a new-fangled technology and start coding, and it also isn't embraced by managers that view "over" as (incorrectly) reducing cost and time to market, vs. "and" as (incorrectly) increasing cost and time to market. As with any approach, a balance must be struck that is appropriate for the business domain and product to be delivered, but rarely does that conversation happen.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Regardless, Agile Development is not engineering. But is it a methodology?</span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
Software Development Methodologies: Are They Really?</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >As <a href="https://hohmannchris.wordpress.com/2014/10/30/approach-philosophy-or-methodology/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">Chris Hohmann</a> writes:</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >[I] chose the Macmillan online dictionary and found this:<br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" /><br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" />Approach (noun): a particular way of thinking about or dealing with something<br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" />Philosophy: a system of beliefs that influences someone’s decisions and behaviour. A belief or attitude that someone uses for dealing with life in general<br style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; outline: none 0px;" />Methodology: the methods and principles used for doing a particular kind of work, especially scientific or academic research</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Do we view whatever structure we impose on the software development process as an approach, a philosophy, or a methodology?</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >So-Called Methodologies</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Wikipedia has a page <a href="https://en.wikipedia.org/wiki/List_of_software_development_philosophies" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">here</a> and <a href="https://en.wikipedia.org/wiki/Category:Software_development_philosophies" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">here</a> that lists dozens of philosophies and IT Knowledge Portal lists 13 software development methodologies <a href="http://www.itinfo.am/eng/software-development-methodologies/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">here</a>:</span></div>
<ol style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 38px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Agile</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Crystal</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Dynamic Systems Development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Extreme Programming</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Feature Drive Development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Joint Application Development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Lean Development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Rapid Application Development</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Rational Unified Process</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Scrum</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Spiral (not the Spiral Development Model described earlier)</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >System Development Life Cycle</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Waterfall (aka Traditional)</span></li>
</ol>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And even this list is missing so-called methodologies like Test Driven Development and Model Driven Development.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >As methodology derives from Greek <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">methodos</i>: "scientific inquiry, method of inquiry, investigation", the definition of Methodology from Macmillan seems reasonable enough. Let's look at two of the most common (and seen as opposing) so-called methodologies, Waterfall and Agile.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Waterfall</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >The waterfall model is a sequential (non-iterative) design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance. The waterfall development model originates in the manufacturing and construction industries: highly structured physical environments in which after-the-fact changes are prohibitively costly, if not impossible. Because no formal software development methodologies existed at the time, this hardware-oriented model was simply adapted for software development..</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >The first formal description of the waterfall model is often cited as a 1970 article by Winston W. Royce, although Royce did not use the term waterfall in that article. Royce presented this model as an example of a flawed, non-working model; which is how the term is generally used in writing about software development—to describe a critical view of a commonly used software development practice.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"><span >The earliest use of the term "waterfall" may have been in a 1976 paper by Bell and Thayer.</span></i></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">In 1985, the United States Department of Defense captured this approach in DOD-STD-2167A, their standards for working with software development contractors, which stated that "the contractor shall implement a software development cycle that includes the following six phases: Preliminary Design, Detailed Design, Coding and Unit Testing, Integration, and Testing."</i> (<a href="https://en.wikipedia.org/wiki/Waterfall_model" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Waterfall might actually be categorized as an <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">approach</i>, as there is no specific guidance for the six phases mentioned above -- they need to be part of the development cycle, but any specific scientific rigor applied to each of the phases is entirely missing. It is ironic that the process originates from manufacturing and construction industries, where there is often considerable mathematical analysis / modeling performed before construction begins. And certainly in the 1960's, construction of electronic hardware was expensive, and again, rigorous electrical circuit analysis using scientific methods would greatly mitigate the cost of after-the-fact changes.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Agile</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >There are a variety of diagrams for Agile Software Development, I've chosen one that maps somewhat to the "Scientific Method" above:</span></div>
<span ><span style="color: white;"><br /></span>
</span><br />
<div class="media-holder media-holder-draggable media-holder-figure" draggable="true" style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin: 0px -20px; outline: none 0px; padding: 0px 20px; position: relative; vertical-align: baseline;">
<span ><br />
</span><br />
<br />
<figure class="tmblr-full" data-orig-height="292" data-orig-width="400" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px -20px 15px; outline: none 0px; padding: 0px; vertical-align: baseline;"><img data-img-key="608" data-orig-height="292" data-orig-width="400" src="https://68.media.tumblr.com/0b18dda8c71974075f94fb3e9e524413/tumblr_inline_oga6r5oy6O1qcytkx_540.png" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 100%; min-width: 100%; outline: none 0px; padding: 0px; pointer-events: none; vertical-align: baseline; width: 540px;" /></figure><br />
<div class="media-button icon_close media-killer" style="border-radius: 50%; border: 1px solid rgb(217, 94, 64); box-sizing: border-box; cursor: pointer; font-family: inherit; font-size: 13px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 21px; line-height: 21px; margin: 0px; opacity: 0; outline: none 0px; padding: 0px; position: absolute; right: -11px; text-align: center; top: -7px; transform: scale(0); transition: all 0.3s cubic-bezier(0.175, 0.885, 0.32, 1.275) 0s, all 0.3s cubic-bezier(0.165, 0.84, 0.44, 1) 0s; vertical-align: baseline; width: 21px;">
</div>
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 20px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(<a href="http://www.a2design.biz/blog/why-should-you-use-agile-software-development-methodology/" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Ironically, IT Knowledge Portal describes Agile as "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">a conceptual framework for undertaking software engineering projects.</i>" It's difficult to understand how a <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">conceptual framework</i> can be described as a <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">methodology</i>. It seems at best to be an <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">approach</i>. More telling though is that the term "methodology" appears to have no foundation in "scientific inquiry, method of inquiry, investigation" when it comes to the software development process.</span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
Software Development as a Craft</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">A craft is a pastime or a profession that requires particular skills and knowledge of skilled work.</i> (<a href="https://en.wikipedia.org/wiki/Craft" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Historically, one's skill at a craft was described in three levels:</span></div>
<ol style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 38px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Apprentice</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Journeyman</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: decimal; margin: 0px; outline: none 0px; padding: 0px 0px 0px 2px; vertical-align: baseline;"><span >Master Craftsman</span></li>
</ol>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >When we look at software development as a craft, one of the advantages is that we move away from the Scientific Method and its emphasis on the natural world and physical processes. We also move away from the conundrum of applying an approach, philosophy, or methodology to the software development process. Instead, viewing software development as a craft emphasizes the skill of the craftsman (or woman.) We can also begin to establish rankings of "craft skill" with the general skills discussed above in the section on Engineering.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Apprentice</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">An apprenticeship is a system of training a new generation of practitioners of a trade or profession with on-the-job training and often some accompanying study (classroom work and reading). Apprenticeship also enables practitioners to gain a license to practice in a regulated profession. Most of their training is done while working for an employer who helps the apprentices learn their trade or profession, in exchange for their continued labor for an agreed period after they have achieved measurable competencies. Apprenticeships typically last 3 to 6 years. People who successfully complete an apprenticeship reach the "journeyman" or professional certification level of competence. </i>(<a href="https://en.wikipedia.org/wiki/Apprenticeship" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Journeyman</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">A "journeyman" is a skilled worker who has successfully completed an official apprenticeship qualification in a building trade or craft. They are considered competent and authorized to work in that field as a fully qualified employee. A journeyman earns their license through education, supervised experience, and examination. [1] Although a journeyman has completed a trade certificate and is able to work as an employee, they are not yet able to work as a self-employed master craftsman.[2] The term journeyman was originally used in the medieval trade guilds. Journeymen were paid each day, and this is where the word ‘journey’ derived from- journée meaning ‘a day’ in French. Each individual guild generally recognized three ranks of workers; apprentices, journeymen, and masters. A journeyman, as a qualified tradesman could become a master, running their own business although most continued working as employees. </i>(<a href="https://en.wikipedia.org/wiki/Journeyman" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Master Craftsman</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span ><i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">A master craftsman or master tradesman (sometimes called only master or grandmaster) was a member of a guild. In the European guild system, only masters and journeymen were allowed to be members of the guild. An aspiring master would have to pass through the career chain from apprentice to journeyman before he could be elected to become a master craftsman. He would then have to produce a sum of money and a masterpiece before he could actually join the guild. If the masterpiece was not accepted by the masters, he was not allowed to join the guild, possibly remaining a journeyman for the rest of his life. Originally, holders of the academic degree of "Master of Arts" were also considered, in the Medieval universities, as master craftsmen in their own academic field.</i> (<a href="https://en.wikipedia.org/wiki/Master_craftsman" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">source</a>)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Where do we Fit in This Scheme?</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >While we all begin as apprentices and our "training" is often through the anonymity of books and the Internet as well as code camps, our peers, and looking at other people's code, we eventually develop various technical and interpersonal skills. And software development is somewhat unique as a tradecraft because we are always at different levels depending on the technology that we are attempting to use. So when we use the terms "senior developer," we're really making an implied statement about what skills we have that rank us at least as a journeyman. One of the common threads of the three levels of a tradecraft is that there is a master craftsman working with the apprentice and journeyman, and in fact certifies the person to move on to the next step. Also, becoming a master craftsman required developing a "masterpiece," which is ironic because I know a few software developers that consider themselves "senior" and only have failed software projects under their belt.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And as Donald Knuth wrote in his preface to The Art of Computer Programming: <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">This book is...designed to train the reader in various skills that go into a programmer's craft."</i></span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Where we Fail</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Analogies to the software development process includes code reviews, peer programming, and even employee vs. contractor or business owner. Unfortunately, the craft model of software development is not really adopted, perhaps because employers don't want to use a system that harks back at least to the medieval days. Code reviews, if they are done at all, can be very superficial and not part of a systematic development process. Peer programming is usually considered a waste of resources. Companies rarely provide the equivalent of a "certificate of accomplishment," which would be particularly beneficial when people are no longer in school and they are learning skills that school never taught them (the entire Computer Science degree program is questionable as well in its ability to actually producing, at a minimum, a journeyman in software development.)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Furthermore, given the newness of the software development field and the rapidly changing tools and technologies, the opportunity to work with a master craftsman is often hard to come by. In many situations, one can at best apply general principles gleaned from skills in other technologies to the apprentice work in a new technology (besides the time honored practice of "hitting the books" and looking up simple problems on Stack Overflow.) In many cases, the process of becoming a journeyman or master craftsman is a bootstrapping process with ones peers.</span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
Software Development as an Art</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >(With apologies to the reader, but Knuth states the matter so eloquently, I cannot express it better.)</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Quoting Donald Knuth again: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">The process of preparing programs for a digital computer is especially attractive, not only because it can be economically and scientifically rewarding, but also because it can be an aesthetic experience much like composing poetry or music.</i>" and: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">I have tried to include all of the known ideas about sequential computer programming that are both beautiful and easy to state.</i>"</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >So there is an aesthetic experience associated with programming, and programs can have the qualities of being beautiful, perhaps where the aesthetic experience, the beauty of a piece of code, lies in its ability to easily describe (or self-describe) the algorithm. In his excellent talk on Computer Programming as an Art (<a href="http://delivery.acm.org/10.1145/370000/361612/a1974-knuth.pdf?ip=24.105.201.179&id=361612&acc=OPEN&key=4D4702B0C3E38B35.4D4702B0C3E38B35.4D4702B0C3E38B35.6D218144511F3437&CFID=840514034&CFTOKEN=21319550&__acm__=1474414787_73621d32e967f2ae77682c469f33" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">online PDF</a>), Knuth states: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">Meanwhile we have actually succeeded in making our discipline a science, and in a remarkably simple way: merely by deciding to call it 'computer science.'</i>" He makes a salient statement about science vs. art: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">Science is knowledge which we understand so well that we can teach it to a computer; and if we don't fully understand something, it is an art to deal with. Since the notion of an algorithm or a computer program provides us with an extremely useful test for the depth of our knowledge about any given subject, the process of going from an art to a science means that we learn how to automate something.</i>"</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >What a concise description of software development as an art - the process of learning something sufficiently to automate it! But there's more: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">...we should continually be striving to transform </i>every<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"> art into a science: in the process, we advance the art.</i>" An intriguing notion. He also quotes Emma Lehmer (11/6/1906 - 5/7/2007, mathematician), when she wrote in 1956 that she had found coding to be "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">an exacting science as well as an intriguing art.</i>" Knuth states that "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">The chief goal of my work as educator and author is to help people learn how to write </i>beautiful programs<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">...The possibility of writing beautiful programs, even in assembly language, is what got me hooked on programming in the first place."</i></span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >And:<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"> "Some programs are elegant, some are exquisite, some are sparkling. My claim is that it is possible to write</i>grand<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"> programs, </i>noble<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"> programs, truly </i>magnificent<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;"> ones!"</i></span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Knuth then continues with some specific elements of the aesthetics of a program:</span></div>
<ul style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; list-style: none; margin: 15px 0px; outline: none 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >It of course has to work correctly.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >It won't be hard to change.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >It is easily readable and understandable.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >It should interact gracefully with its users, especially when recovering from human input errors and in providing meaningful error message or flexible input formats.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >It should use a computer's resources efficiently (but in the write places and at the right times, and not prematurely optimizing a program.)</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >Aesthetic satisfaction is accomplished with limited tools.</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >"<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">The use of our large-scale machines with their fancy operating systems and languages doesn't really seem to engender any love for programming, at least not at first.</i>"</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >"<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">...we should make use of the idea of limited resources in our own education.</i>"</span></li>
<li style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-type: disc; margin: 0px; outline: none 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"><span >"Please, <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">give us tools that are a pleasure to use, especially for our routine assignments, instead of providing something we have to fight with. Please, give us tools that encourage us to write better programs, by enhancing our pleasure when we do so."</i></span></li>
</ul>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Knuth concludes his talk with: "<i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">We have seen that computer programming is an art, because it applies accumulated knowledge to the world, because it requires skill and ingenuity, and especially because it produces objects of beauty. A programmer who subconsciously views himself as an artist will enjoy what he does and will do it better.</i>"</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Reading what Knuth wrote, one can understand the passion that was experienced with the advent of the 6502 processor and the first Apple II, Commodore PET, and TRS-80. One can see the resurrection of that passion with single board computers such as the rPi, Arduino, and Beaglebone. In fact, whenever any new technology appears on the horizon (for example, the Internet of Things) we often see the hobbyist passionately embracing the idea. Why? Because as a new idea, it speaks to our imagination. Similarly, new languages and frameworks ignite passion with some programmers, again because of that imaginative, creative quality that something new and shiny holds.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >Where we Fail</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Unfortunately, we also fail at bringing artistry to software development. Copy and paste is not artistic. An inconsistent styling of code is not beautiful. An operating system that produces a 16 byte hex code for an error message is not graceful. The nightmare of NPM (as an example) dependencies (a great example <a href="https://news.ycombinator.com/item?id=8228537" style="background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.247059) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration: none; vertical-align: baseline;">here</a>) is not elegant, beautiful, and certainly is not a pleasure to use. Knuth reminds us that programming should for the most part be pleasurable. So why have we created languages like VB and Javascript that we love to hate, use syntaxes like HTML and CSS that are complex and not fully supported across all the flavors of browsers and browser versions, and why do we put up with them? But worse, why do we ourselves write ugly, unreadable, un-maintainable code? Did we ever even look at programming from an aesthetic point of view? It is unfortunate that in a world of deadlines and performance reviews we seem to have lost (if we ever had it to begin with) the ability to program <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">artistically.</i></span></div>
<h2 style="border: 0px; box-sizing: border-box; font-family: gibson, "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 26px; margin: 15px 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >
Conclusion: What Then is the Software Development Process?</span></h2>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Most software development processes attempt to replicate well-developed processes of working with nature and physical construction. This is the wrong approach. Software usually does not involve <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">things</i> where everyone can (usually) agree on the observations and "science." Rather, software development involves <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">people</i> (along with their foibles) and <i style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px; vertical-align: baseline;">concepts</i> (of which people often disagree.) One distinguishing aspect is when software is designed to control hardware (a thing) whether it's the cash dispenser of an ATM, a self-driving car, or a spacecraft. Because the "thing" is then well known, the software development process has a firm foundation for construction. However, much in software development lacks that firm foundation. The debate over which methodology is best is inappropriate because none of the so-called methodologies put forward over the years are actual methodologies. Discussing approaches and philosophy might be fun over a beer but does it really result in advancing the process?</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >In fact, the question of defining a software development process is wrong because there simply is no right answer. Emphasis should be placed on the skills of the developers themselves and how they transform the unknown into the known, with artistry. If anything, the software development process needs to be approached like a craft, in which skilled people mentor the less skilled and in which masters of the craft recognize, in some tangible manner, the "leveling up" of an apprentice or journeyman. The "process" is best described as a transformation of art into science through formalization and knowledge that can be shared with others. When in the process, the work that we do must be personally satisfying. While there is satisfaction in "it works," the true artisan finds personal satisfaction in also creating something that is aesthetically pleasing, whether it is (to name a few) in their coding style, writing a beautiful algorithm, or applying some technology or language feature elegantly to solve a complex problem. When we critique someone else's work, it is not sufficient to count how many unit tests pass. A true masterpiece includes the process as well as the code and the user experience, all of which should combine aspects of artistry and science. If we looked at software development in this way, we might eventually get to a better place, where processes can actually be called methodologies and with languages and tools that we can say were truly engineered.</span></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<b><span >What Then is A Senior Developer or a Software Engineer?</span></b></div>
<div style="border: 0px; box-sizing: border-box; font-family: "helvetica neue", helveticaneue, helvetica, arial, sans-serif; font-size: 14px; font-stretch: inherit; line-height: inherit; margin-top: 15px; outline: none 0px; padding: 0px; vertical-align: baseline;">
<span >Perhaps: Someone who is senior or calls themselves a software engineer is able to apply scientific methods and has formal methodologies for their work process, demonstrates skill in the domain, tools, and languages, would be considered a master craftsman (ie, proven track record, ability to teach others, etc.) and also treats development as an art, meaning that it requires creativity, imagination, the ability to think outside of the box of said skills, and that those skills are applied with an aesthetic sense.</span></div>
</div>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-42507039150381664372016-05-30T07:28:00.000-07:002020-07-22T02:53:13.596-07:00Social & Organizational Success With Data<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<br />
The pace of digital change is creating new opportunities for customers and these opportunities require quick responses. The role of the digital executive/officer is one of the most demanding in business. They need to be strategic, creative, growth-minded and cost conscious of the world they live in.<br />
<div style="text-align: center;">
<br /></div>
Business success in the digital age will require organizations to take bold actions, including inventing new business models and changing the way they function. By 2017, 70% of successful digital business models will rely on deliberately unstable processes designed to shift with customers' needs.<br />
<br />
Many organizations are either beginning, or in the midst of, digital business transformation initiatives. The prediction is that only 30% of these efforts will succeed. To be part of that 30%, business and IT leaders must be ready and willing to innovate rapidly from a business model, business process and technology perspective.<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
As a result of business model innovation, some business processes must become deliberately unstable, and deliberately unstable processes are designed for change and can dynamically adjust to customers' needs. They’re needed because they are agile, adaptable and "supermanoeuvrable" as customers' needs shift. They are also competitive differentiators, because they support customer interactions that are unpredictable and require ad hoc decision making to enable larger, more stable processes to continue.<br />
<br />
It is imperative in 2016 to break away from linear business processes and deploy a spectrum of standardized and variable processes to reap the benefits of digital business. The need for this shift is intensified by the introduction of several new factors and many types of unmeasured KPIs/ Internet-connected 'things' etc. into the business environment. Things like smart machines generate real-time information for other machines. Business processes must be designed for change to enable organizations to exploit this information.<br />
<br />
There are many aspects to consider in harnessing big data and advanced analytics, and becoming an insights-driven organization. To help data professionals and IT leaders on their journey, here are a few Guiding Principles to not only drive value from big data and analytics, but to also put insights at the heart of your enterprise. Here are those principles:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div style="text-align: center;">
<b>Governing Principles</b></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
<b>Principle 1: </b></div>
<br />
<div style="text-align: center;">
<b>Embark on the journey to insights, within your business and technology context</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<br /></div>
<b><br /></b>The starting point must be your digital business objectives. Design your roadmap to harness new data sources based on how they will help achieve these objectives. Equally importantly, your journey must be dictated by where you start, not only in terms of data maturity but also technology.<br />
<br />
<br />
<br />
<div style="text-align: center;">
<b> Principle 2: </b></div>
<b></b><br />
<div style="text-align: center;">
<b><b>Enable your data landscape for the flood coming from connected people and things</b></b></div>
<b>
</b>
<br />
<div style="text-align: center;">
<b><b><br /></b></b></div>
<b>
</b>
There are many new technologies that enable the capture and management of the data flood. Your new data landscape should be a mix of these technologies, chosen to provide the right solution in terms of cost, flexibility and speed to suit each specific data set and meet the insight needs of the business.<br />
<br />
<br />
<div style="text-align: center;">
<b>Principle 3:</b> </div>
<b></b><br />
<div style="text-align: center;">
<b><b>Master governance, security and privacy of your data assets</b></b></div>
<b>
</b>
<br />
<div style="text-align: center;">
<b><b><br /></b></b></div>
<b>
</b>
<br />
<div style="text-align: center;">
<br /></div>
<b>
</b>
<br />
<div style="text-align: center;">
</div>
<b>
</b>
<div style="text-align: center;">
<b><b><br /></b></b></div>
<b>
</b><br />
Insights from unreliable data are worse than no insights at all. Equally, programs fail and businesses leave themselves exposed if data is not handled securely and with consideration of relevant privacy issues. Maturing and industrializing an organization in its production of value from data, is a key lever to success.<br />
<br />
<div style="text-align: center;">
<b>Principle 4: </b></div>
<div style="text-align: center;">
<b>Develop an enterprise data science culture</b></div>
<div style="text-align: center;">
<b><br /></b></div>
Data science unlocks insights. Appreciating and understanding how value is derived from data needs to become part of the culture of the organization. Only by embedding it throughout the enterprise, and systematically making all decisions better informed, can organizations achieve the transformation to becoming insights-driven.<br />
<br />
<br />
<div style="text-align: center;">
<b>Principle 5: </b></div>
<div style="text-align: center;">
<b>Unleash data- and insights-as-a-service</b></div>
<div style="text-align: center;">
<b><br /></b></div>
The demand from business users for information and data-driven insights is ever increasing across all organizations. To harness this, business users must feel that they can rapidly access the insights they need where and when they need it. Setting up a powerful platform that delivers these insights ‘on-demand’, is the ultimate goal.<br />
<b><br /></b>
<br />
<div style="text-align: center;">
<b>Principle 6: </b></div>
<div style="text-align: center;">
<b>Make insight-driven value a crucial business KPI</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<br /></div>
<b><br /></b>
Measure your measurement. Apply data science to your data science to see where you are adding value and where you are not. If data is becoming one of your most valuable assets, then treat it as such – include it in KPIs and business reviews.<br />
<br />
<div style="text-align: center;">
<b>Principle 7: </b></div>
<div style="text-align: center;">
<b>Empower your people with Insights at the point of action</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<br /></div>
<b><br /></b>
All functions in an organization are faced daily with a series of decision points and actions, both at the macro and micro level. Whether you are in Supply Chain, Finance, Procurement, Marketing or other parts of the business, empowering your business teams with real-time insights at the point of action makes the crucial difference.<br />
<br />
From marketing to medicine, personalized treatment is taking hold. Customers across all industries expect more these days, and they will go elsewhere if they don't get what they want. The most advanced organizations are actively addressing this dynamic by blending traditional customer data with big data, then using analytics to fine-tune their products and services.<br />
<br />
<div style="text-align: center;">
______________________________________________________</div>
<br />
<div style="text-align: center;">
<span style="font-weight: bold;"><br /></span></div>
<b></b><br />
<div style="text-align: center;">
<b><b>Big Data Is Improving Lives of Americans: A White House Report</b></b></div>
<b>
</b>
<br />
<div style="text-align: center;">
<b><b><br /></b></b></div>
<b>
</b>
<br />
<div style="text-align: center;">
<br /></div>
<br />
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<div>
The White House has just issued a report looking at four of the top areas where big data has the potential to greatly improve the lives and safety of Americans. But there are just as many pitfalls as promises to be aware of.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>Big Data’s Opportunities & Challenges for All Americans</b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div>
The Obama Administration’s Big Data Working Group has just issued its comprehensive report looking at the opportunities and challenges around big data and four key areas of society:</div>
<div>
<br /></div>
<div>
<b>•<span class="Apple-tab-span" style="white-space: pre;"> </span>Personal credit •<span class="Apple-tab-span" style="white-space: pre;"> </span>Employment •<span class="Apple-tab-span" style="white-space: pre;"> </span>Higher education •<span class="Apple-tab-span" style="white-space: pre;"> </span>Law enforcement.</b></div>
<div>
<br /></div>
<div style="text-align: center;">
<i><b>Entitled Big Data: A Report on Algorithmic Systems, Opportunity, and Civil Rights, the report notes that “big data and associated technologies have enormous potential for positive impact in the United States.”</b> </i></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: left;">
But big data also has the potential to create unintended discriminatory consequences if not used correctly. Here we look at the Problem the government is trying to solve; the Opportunity that big data presents; and the Challenge that will need to be overcome in order for a big data solution to work.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Challenge: </b></div>
<div style="text-align: center;">
<b>Expanding access to affordable credit while preserving consumer rights that protect against discrimination in credit eligibility decisions.</b></div>
<div>
<br /></div>
<div>
The right to be informed about and to dispute the accuracy of the underlying data used to create a credit score is particularly important because credit bureaus have significant data accuracy issues, which are likely to be exacerbated by the use of new, fast-changing data sources.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Problem: Traditional hiring practices may unnecessarily filter out applicants whose skills match the job opening.</b><br />
<b><br /></b></div>
<div>
<br /></div>
<div>
Even as recruiting and hiring managers look to make greater use of algorithmic systems and automation, the inclination remains for individuals to hire someone similar to themselves, an unconscious phenomenon often referred to as “like me” bias, which can impede diversity.44 Algorithmic systems can be designed to help prevent this bias and increase diversity in the hiring process.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Opportunity: </b></div>
<div style="text-align: center;">
<b>Big data can be used to uncover or possibly reduce employment discrimination.</b></div>
<div>
<br /></div>
<div>
Companies can use data-driven approaches to find potential employees who otherwise might have been overlooked based on traditional educational or workplace-experience requirements. Data-analytics systems allow companies to objectively consider experiences and skill sets that have a proven correlation with success.</div>
<div>
<br /></div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Challenge: </b></div>
<div style="text-align: center;">
<b>Promoting fairness, ethics, and mechanisms for mitigating discrimination in employment opportunity.</b><br />
<b><br /></b></div>
<div>
<br /></div>
<div>
Data-analytics companies are creating new kinds of “candidate scores” by using diverse and novel sources of information on job candidates. These sources, and the algorithms used to develop them, sometimes use factors that could closely align with race or other protected characteristics, or may be unreliable in predicting success of an individual at a job.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Problem: Students often face challenges accessing higher education, finding information to help choose the right college, and staying enrolled.</b></div>
<div>
<br /></div>
<div>
Differences in the price of attendance across institutions affect financial returns, and may lead to differences in the amount that students have to borrow, which may also affect their career decisions and personal lives in meaningful ways. Despite the importance of this decision, there is a surprising lack of clear, easy to use, and accessible information available to guide the students making these choices. The opportunities to use big data in higher education can either produce or prevent discrimination—the same technology that can help identify and serve students who are more likely to be in need of extra help can also be used to deny admissions or other opportunities based on the very same characteristics.</div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b>The Big Data Opportunity: </b></div>
<div style="text-align: center;">
<b>Using big data can increase educational opportunities for the students who most need them.</b></div>
<div>
<br /></div>
<div>
To address the lack of information about college quality and costs, the Obama Administration has created a new College Scorecard to provide reliable information about college performance.56 The College Scorecard is a large step toward helping students and their families evaluate college choices. Never-before-released national data about post-college outcomes—including the most comparable and reliable data on the earnings of colleges’ alumni and new data on student debt—and student-loan repayment provides students, families, and their advisers with a more accurate picture of college cost and value.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Challenge: </b></div>
<div style="text-align: center;">
<b>Administrators must be careful to address the possibility of discrimination in higher education admissions decisions.</b></div>
<div>
<br /></div>
<div>
In making admissions decisions, institutions of higher education may use big data techniques to try to predict the likelihood that an applicant will graduate before they ever set foot on campus.59 using these types of data practices, some students could face barriers to admission because they are statistically less likely to graduate. Institutions could also deny students from low-income families, or other students who face unique challenges in graduating, the financial support that they deserve or need to afford college.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Problem: In a rapidly evolving world, law enforcement officials are looking for smart ways to use new technologies to increase community safety and trust.</b></div>
<div>
<br /></div>
<div>
Local, state, and federal law enforcement agencies are increasingly drawing on data analytics and algorithmic systems to further their mission of protecting America. Using information gathered from the field and through the use of new technologies, law enforcement officials are analyzing situations in order to determine the appropriate response.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Opportunity:</b></div>
<div style="text-align: center;">
<b> Data and algorithms can potentially help law enforcement become more transparent, effective, and efficient.</b></div>
<div>
<br /></div>
<div>
New technologies are replacing manual techniques, and many police departments now use sophisticated computer modeling systems to refine their understanding of crime hot spots, linking offense data to patterns in temperature, time of day, proximity to other structures and facilities, and other variables. Some of the newest analytical modeling techniques, often called “predictive policing,” might provide greater precision in predicting locations and times at which criminal activity is likely to occur. An analytical method known as “near-repeat modeling” attempts to predict crimes based on this insight.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>The Big Data Challenge: </b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div style="text-align: center;">
<b>The law enforcement community can use new technologies to enhance trust and public safety in the community, especially through measures that promote transparency and accountability and mitigate risks of disparities in treatment and outcomes based on individual characteristics.</b></div>
<div>
<br /></div>
<div>
Those leading efforts to use data analytics to create and implement predictive tools must work hard to ensure that such algorithms are not dependent on factors that disproportionately single out particular communities based on characteristics such as race, religion, income level, education, or other data inputs that may serve as proxies for characteristics with little or no bearing on an individual’s likelihood of association with criminal activity.</div>
<div>
<br /></div>
<div style="text-align: center;">
<b>Looking to the Future</b><br />
<b><br /></b></div>
<div style="text-align: center;">
<b><br /></b></div>
<div>
The use of big data can create great value for the American people, but as these technologies expand in reach throughout society, we must uphold our fundamental values so these systems are neither destructive nor opportunity limiting. Moving forward, it is essential that the public and private sectors continue to have collaborative conversations about how to achieve the most out of big data technologies while deliberately applying these tools to avoid—and when appropriate, address—discrimination.</div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
</div>
</div>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-11535443686996406272015-03-19T16:58:00.001-07:002020-07-22T02:54:02.644-07:00Key Big Data Challenges<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<b><span style="font-size: large;">Sixty-one percent of IT leaders expect spending on big data
initiatives to increase, while only 5% expect decreases. The challenge: Finding
the right big data talent to fulfill those initiatives, according to a recent
survey.</span></b><o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Nearly 60% of the respondents are confident that their IT
department can satisfy big data demands of the business and 14% are not confident.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">"The data indicates current expectations of big data
are still somewhat unrealistic due to market hype,”the report states. “Despite
IT leaders expecting spending to increase, the confidence level in their
department’s ability to meet big data demands in comparison to broader IT
initiatives is lower.”</span><o:p></o:p></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; direction: ltr; font-family: Arial, Helvetica, sans-serif; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
</div>
<div class="MsoNormal">
<br /></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; direction: ltr; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxNoo8K7ytZ7pA-GTOWDQI0nB3WKDdUnbUq7nW8l0g8tVy28PsE8fowp-q3c0x6ltPB95rw0THEkMdlN9xQCK3SyLHj4sY0ApCWwScyAQ5J6qAgm6txC894S0FprFbII25sqbPbwOz6hY/s1600/Challenges-Big-Data2.png" imageanchor="1" style="clear: left; float: left; font-family: 'Times New Roman'; font-size: medium; line-height: normal; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" height="263" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxNoo8K7ytZ7pA-GTOWDQI0nB3WKDdUnbUq7nW8l0g8tVy28PsE8fowp-q3c0x6ltPB95rw0THEkMdlN9xQCK3SyLHj4sY0ApCWwScyAQ5J6qAgm6txC894S0FprFbII25sqbPbwOz6hY/s400/Challenges-Big-Data2.png" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">About two thirds of the IT executives rank big data
architects as the most difficult role to fill. Data scientists (48%) and data
modelers (43%) round out the top three most difficult positions to
fill. More technical big data positions are ranked less difficult to fill.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Not by coincidence, big data companies are introducing
online and face-to-face training programs and certifications for Hadoop and
other related software platforms.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Still, other big data challenges remain. Variety—the
dimension of big data dealing with the different forms of data—hinders
organizations from deriving value from big data the most, according to 45% of
those surveyed. Speed of data is next in terms of challenges, at 31%, followed
by the amount of data, at 24%.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">The application of big data is happening in a number of
business areas, according to the study, with 81% of organizations viewing
operations and fulfillment as priority areas within the next 12 months. This
was followed by customer satisfaction (53%), business strategy (52%),
governance/risk/compliance (51%) and sales/marketing (49%).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">More than 200 IT leaders participated in the February 2015
survey.</span><o:p></o:p></div>
<br />
<div class="WordSection1">
<div style="text-align: center;">
<b style="font-size: x-large; line-height: 54.05pt;"><u>ADDRESSING FIVE EMERGING CHALLENGES</u></b></div>
<span class="A1"></span><br />
<div style="text-align: center;">
<span class="A1"><b style="font-size: x-large; line-height: 54.05pt;"><u> OF BIG DATA</u></b></span></div>
<span class="A1">
</span>
<br />
<div class="Pa3" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.0pt;">
<br /></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Introduction - Big Data Challenges <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Challenge #1: Uncertainty of the Data Management Landscape <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Challenge #2: The Big Data Talent Gap <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Challenge #3: Getting Data into the Big Data Platform <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Challenge #4: Synchronization across the Data Sources <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Challenge #5: Getting Useful Information out of the Big Data
Platform <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Considerations: What Risks Do These Challenges Really Pose? <o:p></o:p></b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><b>Conclusion: Addressing the Challenge with a Big Data Integration
Strategy </b></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><br /></span></div>
<div class="Pa6" style="margin-bottom: .25in;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh85lH6miNjj9Au9zCHlYlKws7TYVkDcAzwg28g0VSDyFQlpeYZL-iXwOWAm4WkBcGs_hKUTX3QC4l70zn99GDP9_sBXT6PNLOfy6Dwc5TM8Rt8-cSTnnjrYpnr1OKcNxg0f4mL8X3SS0o/s1600/Big-Data-Infographic-infographicsmania.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"><img border="0" height="253" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh85lH6miNjj9Au9zCHlYlKws7TYVkDcAzwg28g0VSDyFQlpeYZL-iXwOWAm4WkBcGs_hKUTX3QC4l70zn99GDP9_sBXT6PNLOfy6Dwc5TM8Rt8-cSTnnjrYpnr1OKcNxg0f4mL8X3SS0o/s400/Big-Data-Infographic-infographicsmania.jpg" width="400" /></a></div>
<div align="right" class="Pa7" style="page-break-before: always; text-align: right;">
<br /></div>
<div class="Pa8" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="font-size: 13pt;">INTRODUCTION - BIG DATA CHALLENGES </span></b><span style="font-size: 13pt;"><o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">Big data technologies are maturing to a point in which more
organizations are prepared to pilot and adopt big data as a core component of
the information management and analytics infrastructure. Big data, as a
compendium of emerging disruptive tools and technologies, is positioned as the
next great step in enabling integrated analytics in many common business
scenarios. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">As big data wends its inextricable way into the enterprise, information
technology (IT) practitioners and business sponsors alike will bump up against
a number of challenges that must be addressed before any big data program can
be successful. Five of those challenges are: <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Default" style="margin-bottom: 4.3pt; margin-left: .25in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "geogrotesque rg" , sans-serif;">1.<span style="font-family: "times new roman";">
</span></span><!--[endif]--><b>Uncertainty of
the Data Management Landscape </b><span style="font-family: "geogrotesque rg" , sans-serif;">–
There are many competing technologies, and within each technical area there are
numerous rivals. Our first challenge is making the best choices while not
introducing additional unknowns and risk to big data adoption. <o:p></o:p></span></div>
<div class="Default" style="margin-bottom: 4.3pt; margin-left: .25in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "geogrotesque rg" , sans-serif;">2.<span style="font-family: "times new roman";">
</span></span><!--[endif]--><b>The Big Data
Talent Gap </b><span style="font-family: "geogrotesque rg" , sans-serif;">– The excitement around big data
applications seems to imply that there is a broad community of experts
available to help in implementation. However, this is not yet the case, and the
talent gap poses our second challenge. <o:p></o:p></span></div>
<div class="Default" style="margin-bottom: 4.3pt; margin-left: .25in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "geogrotesque rg" , sans-serif;">3.<span style="font-family: "times new roman";">
</span></span><!--[endif]--><b>Getting Data
into the Big Data Platform </b><span style="font-family: "geogrotesque rg" , sans-serif;">– The
scale and variety of data to be absorbed into a big data environment can
overwhelm the unprepared data practitioner, making data accessibility and
integration our third challenge. <o:p></o:p></span></div>
<div class="Default" style="margin-bottom: 4.3pt; margin-left: .25in; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "geogrotesque rg" , sans-serif;">4.<span style="font-family: "times new roman";">
</span></span><!--[endif]--><b>Synchronization
Across the Data Sources </b><span style="font-family: "geogrotesque rg" , sans-serif;">– As more
data sets from diverse sources are incorporated into an analytical platform,
the potential for time lags to impact data currency and consistency becomes our
fourth challenge. <o:p></o:p></span></div>
<div class="Default" style="margin-left: .25in; mso-list: l0 level1 lfo1; text-indent: -.25in;">
<!--[if !supportLists]--><span style="font-family: "geogrotesque rg" , sans-serif;">5.<span style="font-family: "times new roman";">
</span></span><!--[endif]--><b>Getting Useful
Information out of the Big Data Platform </b><span style="font-family: "geogrotesque rg" , sans-serif;">–
Lastly, using big data for different purposes ranging from storage augmentation
to enabling high-performance analytics is impeded if the information cannot be
adequately provisioned back within the other components of the enterprise
information architecture, making big data syndication our fifth challenge. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Default">
<br /></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">In this paper, we examine these challenges and consider the
requirements for tools to help address them. First, we discuss each of the
challenges in greater detail, and then we look at understanding and then
quantifying the risks of not addressing these issues. Finally, we explore how a
strategy for data integration can be crafted to manage those risks. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><br /></span></div>
<div class="Pa8" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="font-size: 13pt;">CHALLENGE #1: UNCERTAINTY OF THE DATA MANAGEMENT LANDSCAPE </span></b><span style="font-size: 13pt;"><o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">One disruptive facet of big data is the use of a variety of
innovative data management frameworks whose designs are intended to support
both operational and to a greater extent, analytical processing. These
approaches are generally lumped into a category referred to as NoSQL (that is,
“not only SQL”) frameworks that are differentiated from the conventional
relational database management system paradigm in terms of storage model, data
access methodology, and are largely designed to meet performance demands for
big data applications (such as managing massive amounts of data and rapid
response times). <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">There are a number of different NoSQL approaches. Some employ the
paradigm of a document store that maintains a hierarchical object
representation (using standard encoding methods such as XML, JSON, or BSON)
associated with each managed data object or entity. Others are based on the
concept of a key-value store that allows applications to associate values
associated with varying attributes (as named “keys”) to be associated with each
managed object in the data set, basically enabling a schema-less model. Graph
databases maintain the interconnected relationships among different objects,
simplifying social network analyses. And other paradigms are continuing to evolve.
<o:p></o:p></span></div>
<div class="Pa3" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.0pt;">
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;">The wide variety of
NoSQL tools, developers and the status of the market are creating uncertainty
within the data management landscape.</span></i></b></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><i>We are still in the relatively early stages of this
evolution, with many competing approaches and companies. In fact, within each
of these NoSQL categories, there are dozens of models being developed by a wide
contingent of organizations, both commercial and non-commercial. Each approach
is suited differently to key performance dimensions—some models provide great
flexibility, others are eminently scalable in terms of performance while others
support a wider range of functionality.</i></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"> </span><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">In other words, the wide variety of NoSQL tools developers
and the status of the market lend a great degree of uncertainty to the data
management landscape. Choosing a NoSQL tool can be difficult, but committing to
the wrong core data management technology can prove to be a costly error if the
selected vendor’s tool does not live up to expectations, the vendor company
fails, or if third-party application development tends to adopt different data
management schemes. For any organization seeking to institute big data, this
challenge is to propose a means for your organization to select NoSQL
alternatives while mitigating the technology risk.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b>CHALLENGE #2: THE BIG DATA TALENT GAP</b><o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">It is difficult to peruse the analyst and high-tech media
without being bombarded with content touting the value of big data analytics
and corresponding reliance on a wide variety of disruptive technologies. These
new tools range from traditional relational database tools with alternative
data layouts designed to increased access speed while decreasing the storage
footprint, in-memory analytics, NoSQL data management frameworks, as well as
the broad Hadoop ecosystem.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">There is a growing community of application developers who
are increasing their knowledge of tools like those comprising the Hadoop
ecosystem. That being said, despite the promotion of these big data
technologies, the reality is that there is not a wealth of skills in the
market. The typical expert, though, has gained experience through tool
implementation and its use as a programming model, rather than the data
management aspects. That suggests that many big data tools experts remain
somewhat naïve when it comes to the practical aspects of data modeling, data
architecture, and data integration. And in turn, this can lead to less-then-successful
implementations whose performance is negatively impacted by issues related to
data accessibility.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;">And the talent gap is real—consider these statistics:
According to analyst firm McKinsey & Company, “By 2018, the United States
alone could face a shortage of 140,000 to 190,000 people with deep analytical
skills as well as 1.5 million managers and analysts with the know-how to use
the analysis of big data to make effective decisions.”2 And in a report
from 2012, “Gartner analysts predicted that by 2015, 4.4 million IT jobs
globally will be created to support big data with 1.9 million of those jobs in
the United States. … However, while the jobs will be created, there is no
assurance that there will be employees to fill those positions.”<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b><i>NoSQL and other innovative data management options are
predicted to grow in 2015 and beyond.<o:p></o:p></i></b></span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><i>The big data talent gap is real. Consider this statistic:
“By 2018, the US alone could face a shortage of 140,000 to 190,000 people with
deep analytical skills as well as 1.5 million managers and analysts with the
know-how to use the analysis of big data to make effective decisions.”<o:p></o:p></i></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<o:p><span style="font-family: "arial" , "helvetica" , sans-serif;"> </span></o:p><span style="font-family: "arial" , "helvetica" , sans-serif;">There is no doubt that as more data practitioners become
engaged, the talent gap will eventually close. But when developers are not
adept at addressing these fundamental data architecture and data management
challenges, the ability to achieve and maintain a competitive edge through
technology adoption will be severely impaired. In essence, for an organization
seeking to deploy a big data framework, the challenge lies in ensuring a level
of the usability for the big data ecosystem as the proper expertise is brought
on board.</span></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><b>CHALLENGE #3: GETTING DATA INTO THE BIG DATA PLATFORM</b></span><o:p></o:p></div>
<div class="MsoNormal">
</div>
<div class="MsoNormal">
<br /></div>
</div>
<div class="WordSection4">
<div class="Default" style="line-height: 13.05pt; margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="color: windowtext; font-size: 13.0pt;"><br /></span></b></div>
<div class="Default" style="line-height: 13.05pt; margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTad9JpLdVBohJsUCw26rnFzNsybVy-d6BlozEvPU3VFqQOBXhQ1kDInqUQ5y7QNOKm48m-iYjUVOfkEP8OrKuJjXIQzhvQaA9JVv3sthJOqgCfwbXY0442oY1MTVMb7DGExSUNdYjQ-U/s1600/3Vs-of-Big-Data.png" imageanchor="1" style="line-height: normal; margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="379" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTad9JpLdVBohJsUCw26rnFzNsybVy-d6BlozEvPU3VFqQOBXhQ1kDInqUQ5y7QNOKm48m-iYjUVOfkEP8OrKuJjXIQzhvQaA9JVv3sthJOqgCfwbXY0442oY1MTVMb7DGExSUNdYjQ-U/s400/3Vs-of-Big-Data.png" width="400" /></a></div>
<div class="Default" style="line-height: 13.05pt; margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="color: windowtext; font-size: 13.0pt;"><br /></span></b></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">It
might seem obvious that the intent of a big data program involves processing or
analyzing massive amounts of data. Yet while many people have raised
expectations regarding analyzing massive data sets sitting in a big data
platform, they may not be aware of the complexity of facilitating the access,
transmission, and delivery of data from the numerous sources and then loading
those various data sets into the big data platform. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">The
impulse toward establishing the ability to manage and analyze data sets of
potentially gargantuan size can overshadow the practical steps needed to
seamlessly provision data to the big data environment. The intricate aspects of
data access, movement, and loading are only part of the challenge. The need to
navigate extraction and transformation is not limited to structured
conventional relational data sets. Analysts increasingly want to import older
mainframe data sets (in VSAM files or IMS structures, for example) and at the
same time want to absorb meaningful representations of objects and concepts
refined out of different types of unstructured data sources such as emails,
texts, tweets, images, graphics, audio files, and videos, all accompanied by
their corresponding metadata. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">An
additional challenge is navigating the response time expectations for loading
data into the platform. Trying to squeeze massive data volumes through “data
pipes” of limited bandwidth will both degrade performance and may even impact
data currency. This actually implies two challenges for any organization
starting a big data program. The first involves both cataloging the numerous
data source types expected to be incorporated into the analytical framework and
ensuring that there are methods for universal data accessibility, while the
second is to understand the performance expectations and ensure that the tools
and infrastructure can handle the volume transfers in a timely manner. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><br /></span></div>
<div class="Pa8" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="font-size: 13.0pt; mso-bidi-font-family: "Geogrotesque SmBd";">CHALLENGE
#4: SYNCHRONIZATION ACROSS THE DATA SOURCES </span></b><span style="font-size: 13.0pt; mso-bidi-font-family: "Geogrotesque SmBd";"><o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">Once
you have figured out how to get data into the big data platform, you begin to
realize that data copies migrated from different sources on different schedules
and at different rates can rapidly get out of synchronization with the
originating systems. There are different aspects of synchrony. From a data
currency perspective, synchrony implies that the data coming from one source is
not out of date with data coming from another source. From a semantics
perspective, synchronization implies commonality of data concepts, definitions,
metadata, and the like. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">With
conventional data marts and data warehouses, sequences of data extractions,
transformations, and migrations all provide situations in which there is a risk
for information to become unsynchronized. But as the data volumes explode and
the speed at which updates are expected to be made, ensuring the level of
governance typically applied for conventional data management environments
becomes much more difficult. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">The
inability to ensure synchrony for big data poses the risk of analyses that use
inconsistent or potentially even invalid information. If inconsistent data in a
conventional data warehouse poses a risk of forwarding faulty analytical
results to downstream information consumers, allowing more rampant
inconsistencies and asynchrony in a big data environment can have a much more
disastrous effect. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Pa3" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.0pt;">
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;">Many people may not be aware of the
complexity of facilitating the access, transmission, and delivery of data from
the numerous sources and then loading those data sets into the big data
platform. </span></i></b><span style="font-family: "geogrotesque bd it" , sans-serif;"><o:p></o:p></span></div>
<div class="Pa3" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 4.0pt;">
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;">The inability to ensure synchrony
for big data poses the risk of analyses that use inconsistent or potentially
even invalid information.</span></i></b><br />
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;"><br /></span></i></b>
<br />
<div class="MsoNormal">
<b>CHALLENGE #5: GETTING USEFUL INFORMATION OUT OF THE BIG DATA
PLATFORM</b><o:p></o:p></div>
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;"><br /></span></i></b>
<b><i><span style="font-family: "geogrotesque bd it" , sans-serif;"><br /></span></i></b></div>
</div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">Most
of the most practical uses cases for big data involve data availability:
augmenting existing data storage as well as providing access to end-users
employing business intelligence tools for the purpose of data discovery. These
BI tools not only must be able to connect to one or more big data platforms,
they must provide transparency to the data consumers to reduce or eliminate the
need for custom coding. At the same time, as the number of data consumers
grows, we can anticipate a need to support a rapidly expanding collection of
many simultaneous user accesses. That demand may spike at different times or
the day or in reaction to different aspects of business process cycles.
Ensuring right-time data availability to the community of data consumers
becomes a critical success factor. <o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">This
frames our fifth and final challenge: enabling a means of making data
accessible to the different types of downstream applications in a way that is
seamless and transparent to the consuming applications while elastically
supporting demand. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Pa8" style="margin-bottom: 4.0pt; margin-left: 0in; margin-right: 0in; margin-top: 9.0pt;">
<b><span style="font-size: 13.0pt; mso-bidi-font-family: "Geogrotesque SmBd";">CONSIDERATIONS:
WHAT RISKS DO THESE CHALLENGES REALLY POSE? </span></b><span style="font-size: 13.0pt; mso-bidi-font-family: "Geogrotesque SmBd";"><o:p></o:p></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;">Considering
the business impacts of these challenges suggests some serious risks to
successfully deploying a big data program. In Table 1, we reflect on the
impacts of our challenges and corresponding risks to success. <span style="font-size: 9pt;"><o:p></o:p></span></span></div>
<div class="Pa9" style="margin-bottom: 4.0pt;">
<span style="font-family: "geogrotesque rg" , sans-serif;"><br /></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="border-collapse: collapse; border: none; margin-left: -5.4pt; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-table-layout-alt: fixed;">
<tbody>
<tr style="height: 5.5pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;">
<td style="border: none; height: 5.5pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div align="center" class="Pa14" style="margin-bottom: 10.0pt; text-align: center;">
<span class="A4"><b><span style="font-family: "geogrotesque smbd" , sans-serif; font-size: 9.0pt;">Challenge </span></b></span><span style="font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 5.5pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div align="center" class="Pa14" style="margin-bottom: 10.0pt; text-align: center;">
<span class="A4"><b><span style="font-family: "geogrotesque smbd" , sans-serif; font-size: 9.0pt;">Impact </span></b></span><span style="font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 5.5pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div align="center" class="Pa14" style="margin-bottom: 10.0pt; text-align: center;">
<span class="A4"><b><span style="font-family: "geogrotesque smbd" , sans-serif; font-size: 9.0pt;">Risk </span></b></span><span style="font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 11.3pt; mso-yfti-irow: 1;">
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Uncertainty of the market landscape </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa15">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Difficulty in choosing technology
components </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
<div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Vendor lock-in </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Committing to failing product or failing vendor </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 17.3pt; mso-yfti-irow: 2;">
<td style="border: none; height: 17.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Big data talent gap </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 17.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa15">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Steep learning curve </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
<div class="Pa15">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Extended time for design,
development, and implementation </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 17.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Delayed time to value </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 11.3pt; mso-yfti-irow: 3;">
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Big data loading </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Increased cycle time for analytical platform data
population </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Inability to actualize the program due to unmanageable
data latencies </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 5.3pt; mso-yfti-irow: 4;">
<td style="border: none; height: 5.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Synchronization </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 5.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Data that is inconsistent or out of date </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 5.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Flawed decisions based on flawed data </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
<tr style="height: 11.3pt; mso-yfti-irow: 5; mso-yfti-lastrow: yes;">
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Big data accessibility </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Increased complexity in syndicating data to end-user
discovery tools </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
<td style="border: none; height: 11.3pt; padding: 0in 5.4pt 0in 5.4pt; width: 159.6pt;" valign="top" width="213"><div class="Pa13" style="margin-bottom: 10.0pt;">
<span class="A4"><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9.0pt;">Inability to appropriately satisfy the growing community
of data consumers </span></span><span style="font-family: "geogrotesque rg" , sans-serif; font-size: 9pt;"><o:p></o:p></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<br /></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; direction: ltr; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
</div>
</div>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-85784954928041618142015-01-21T12:25:00.004-08:002015-01-21T12:37:08.057-08:00The Transforming Business Intelligence Landscape (2015 Update)<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">To compete in today's global economy, businesses and governments need agility and the ability to adapt quickly to change. And what about internal adoption to roll out enterprise-grade Business Intelligence (BI)applications?</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">BI change is ongoing; often, many things change concurrently.</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip5wCx0NGPAvbPnkaMEgl0ND2ojGVIN4SIDF7IqNC94OdziUwcJlbPzRsyys8j9DbQJead36c28yf5FEDz9uf1mRxEU7aZjvodyZaXFzD3Qwa2T4YaxTZr0AZOT3JYbQd7otpZRPfgZQI/s1600/Business+Intelligence+Change+Management.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEip5wCx0NGPAvbPnkaMEgl0ND2ojGVIN4SIDF7IqNC94OdziUwcJlbPzRsyys8j9DbQJead36c28yf5FEDz9uf1mRxEU7aZjvodyZaXFzD3Qwa2T4YaxTZr0AZOT3JYbQd7otpZRPfgZQI/s1600/Business+Intelligence+Change+Management.jpg" height="400" width="400" /></span></a></div>
<span style="background-color: black;"><span style="color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
</span><br />
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">One element that too often takes a back seat is the impact of changes on the organization's people. Prosci, an independent research company focused on organizational change management (OCM), has developed benchmarks that propose five areas in which change management needs to do better. They all involve the people side of change: better engage the sponsor; begin organizational change management early in the change process; get employees engaged in change activities; secure sufficient personnel resources; and better communicate with employees.</span><br />
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<strong style="box-sizing: border-box; line-height: inherit;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Five Plus One</span></strong><br />
<strong style="box-sizing: border-box; line-height: inherit;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></strong></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Because BI is not a single application — and often not even a single platform — we recommend adding a sixth area: visibility into BI usage and performance management of BI itself, aka <a class="ui-link" href="https://www.forrester.com/BI+On+BI+How+To+Manage+The+Performance+Of+BI+Initiatives/quickscan/-/E-RES95581" style="box-sizing: border-box; line-height: inherit; text-decoration: none; text-shadow: none !important;" target="_blank">BI on BI</a>. Forrester recommends keeping these six areas top of mind as your organization prepares for any kind of change.</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Some strategic business events, like mergers, are high-risk initiatives involving major changes over two or more years; others, such as restructuring, must be implemented in six months. In the case of BI, some changes might need to happen within a few weeks or even days. All changes will lead to either achieving or failing to achieve a business.</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="box-sizing: border-box; line-height: inherit;"><span style="color: white; font-family: Times, Times New Roman, serif; font-size: large;"><b style="background-color: black;">Triggers for Change</b></span></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<strong style="box-sizing: border-box; line-height: inherit;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></strong></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">There are seven major categories of business and organizational change:</span></div>
<ol style="box-sizing: border-box; direction: ltr; line-height: 1.6; list-style-position: outside; margin: 0px 0px 1.25em; padding: 0px;">
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">People acquisitions</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Technology acquisitions</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Business process changes</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">New technology implementations</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Organizational transformations</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Leadership changes</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Changes to business process outsourcing or technology sourcing</span></li>
</ol>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">When organizations decide to implement change, detailed upfront planning puts the framework in place to make that change a success. Project and change management teams work in parallel but have many points of intersection. Project managers focus on aspects like tasks, timelines, and technology, while change managers look at which people will be affected by the change and plan ways to mitigate fear. With any change, no matter how small, do not neglect the people angle by focusing only on the project management aspects of the change. Prosci warns that ignoring the people side of change until employees greet a go-live date with outrage and resistance will result in teams having to go back to the drawing board and rework, redesign, re-evaluate, and revisit the entire effort.</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<strong style="box-sizing: border-box; line-height: inherit;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Flex Your Business Muscle</span></strong></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<strong style="box-sizing: border-box; line-height: inherit;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></strong></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">In the modern world, one cannot leave technology to technologists. In BI, this is especially challenging and critical with the added complexity of increased business involvement. Unlike other enterprise technology applications, where business and technology partner, in BI the business owns many BI components and work streams. In <a class="ui-link" href="https://www.forrester.com/Its+Time+For+A+UserDriven+Enterprise+BI+Strategy/quickscan/-/E-RES115628" style="box-sizing: border-box; line-height: inherit; text-decoration: none; text-shadow: none !important;">the world of BI, technology is everyone's job</a>. Therefore, pay particular attention to several ways in which project leaders differ from change leaders:</span></div>
<ul style="box-sizing: border-box; direction: ltr; line-height: 1.6; list-style-position: outside; margin: 0px 0px 1.25em; padding: 0px;">
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Project leaders focus on tasks; change leaders focus on people.</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Project leaders and change leaders work together to integrate their plans.</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Change leaders are "people persons" with credibility in the organization.</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Team members have a wide range of competencies but add additional value with a specialty.</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">BI projects are iterative; BI change management is constant and ongoing.</span></li>
</ul>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Meticulous preparation for BI change is critical to success. This means creating an awareness of the need for and value of change management. Management often underestimates the effort and resources necessary to implement the change. The end result or business outcome of the change must be explicit and clearly communicated to employees, customers, and partners. Planning includes specific tasks and activities, as well as careful analysis of people management challenges and how to address them.</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Also, consider that BI projects are different from many technology projects and therefore require special change management considerations. </span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">In our <a class="ui-link" href="https://www.forrester.com/Get+Ready+For+BI+Change/quickscan/-/E-RES95981" style="box-sizing: border-box; line-height: inherit; text-decoration: none; text-shadow: none !important;" target="_blank">recently published report</a> we researched the following key areas of BI organizational change management</span></div>
<div style="box-sizing: border-box; direction: ltr; line-height: 20px; margin-top: 5px; padding: 0px; text-rendering: optimizelegibility;">
<span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></div>
<ul style="box-sizing: border-box; direction: ltr; line-height: 1.6; list-style-position: outside; margin: 0px 0px 1.25em; padding: 0px;">
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Identifying who will help make the change</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Securing a budget to fund and support ongoing change management activities</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Reaching out to specialists (we reviewed OCM capabilities of top management consulting firms</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Making a change management plan</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Preparing a varied, ongoing communications plan</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Developing learning, development and an incentive plan</span></li>
<li style="box-sizing: border-box; direction: ltr; margin: 0px 0px 0px 30px; padding: 0px;"><span style="background-color: black; color: white; font-family: Times, Times New Roman, serif; font-size: large;">Planning for measuring change management effectiveness</span></li>
</ul>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-12750944781508139732013-06-14T07:01:00.000-07:002013-06-14T07:25:00.331-07:00Forecast & Trends in Business Intelligence for 2013<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /></span><span style="font-family: Times,"Times New Roman",serif;"><b> A BIG (Business Intelligence Growth) Year :)</b></span></span><br />
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><span style="font-size: large;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiervNN86Vcefry2uFKdaU5Q0lQXWaALYDdqUpVsCstq41lUmj9gBGlUHMoY07ijCJNQ2lyBQh9HdRjBpjeqN83cCpmBmeC-zbQT1rGLGTrqkEMj7y2fzUVKOM9umOf3eWh86haFRIdiXY/s1600/Business+Intelligence+Trends+2013+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiervNN86Vcefry2uFKdaU5Q0lQXWaALYDdqUpVsCstq41lUmj9gBGlUHMoY07ijCJNQ2lyBQh9HdRjBpjeqN83cCpmBmeC-zbQT1rGLGTrqkEMj7y2fzUVKOM9umOf3eWh86haFRIdiXY/s400/Business+Intelligence+Trends+2013+~+Jai+Krishna+Ponnappan.jpg" width="370" /></a></span></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b><span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;">Defining Business Intelligence in 2013 as A Collaborative Experience and a Shared Exercise of Asking and Answering Insightful Questions About a Business</span></span></b></td></tr>
</tbody></table>
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><b> </b><br /> </span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"> What a year 2012 was for business intelligence! The said old world of databases is developing faster and faster, with startups addressing new data problems and established companies innovating on their platforms. Web-based analytics tools are connecting to web-based data. And everything’s mobile. <br /> </span></span><br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"> <b> With all the attention organizations are placing on innovating around data, the rate of change will only increase. So what should you expect to see? </b><br /><br /><b> </b></span></span><br />
<br />
<div style="text-align: center;">
<span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;"><b> Proliferation of Data Stores. </b></span></span></div>
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Once upon a time, an organization had different types of data: CRM, point of sale, email, and more. The rulers of that organization worked very hard and eventually got all their data into one fast data warehouse…2013 is the year we will recognize this story as a fairy tale. The organization that has all its data in one place does not exist. Moreover, why would you want to do it? Big data could be in places like Teradata and Hadoop. Transactional data might be in Oracle or SQL Server. The right data stores for the right data and workload will be seen as one of the hallmarks of a great IT organization, not a problem to be fixed. </span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /></span></span><span style="font-size: large;"><span style="font-size: x-large;"><span style="font-family: Times,"Times New Roman",serif;"><b> Hadoop is Real.</b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Back in 2008 and 2009 Hadoop was a science project. By 2010 and 2011 some forward-thinking organizations started doing proof-of-concepts with Hadoop. In 2012, we saw the emergence of many production-scale Hadoop implementations, as well as a crop of companies trying to address pain points in working with Hadoop. In 2013, Hadoop will finally break into the mainstream for working with large or unstructured data. It is also becoming more “right-time” for a faster analytics experience. </span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /><span style="font-size: x-large;"><br /><b> Self-reliance Is the New Self-Service.</b></span></span></span> <br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Self-service BI is the idea that any business user can analyze the data they need to make a better decision. Self-reliance is the coming of age of that concept: it means business users have access to the right data, that the data is in a place and format that they can use, and that they have the solutions that enable self-service analytics. When all this happens, people become self-reliant with their business questions and IT can focus on providing the secure data and solutions to get them there. </span></span><br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /></span></span><span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><span style="font-size: x-large;"><b>The Value of text and other Unstructured Data is (finally!) Recognized. </b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> One of the subplots of the rise of Hadoop has been the rise of unstructured data. Emails, documents, web analytics and customer feedback have existed for years, but most organizations struggled enough to understand their structured data that unstructured data was left alone. In 2011 and 2012 we saw more techniques emerge to help people deal with unstructured data, not least of which is a place to put it (Hadoop). With the explosion of social data like Twitter and Facebook posts, text analysis becomes even more important. Expect to see a lot of it in 2013. </span></span><br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /><br /><span style="font-size: x-large;"><b> Cloud BI Grows up. </b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Cloud business intelligence as your primary BI? No way! Not in 2012, at least. There are cloud BI services, but with important limitations that have made it difficult to use the cloud as your primary analytics solution. In 2013 we expect to see the maturation of cloud BI, so that people can collaborate with data in the cloud, just like they collaborate on their Salesforce.</span></span><br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /><br /><span style="font-size: x-large;"><b> Visual Analytics wins Best Picture. </b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> For years visual analytics has been the Best Documentary of business intelligence: impressive, but for the intellectuals and not the mass audience. But people are finally beginning to realize that visual analytics helps anyone explore, understand and communicate with data. It’s the star of business analytics, not a handy tool for scientists. </span></span><br />
<br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /><span style="font-size: x-large;"><b>Forecasting and Predictive Analytics become common. </b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Much like visual analytics, forecasting used to be seen as the domain of the scientist. But everyone wants to know the future. Forecasting tools are maturing to help businesses identify emerging trends and make better plans. We expect forecasting and predictive analyses to become much more common as people use them to get more value from their data. </span></span><br />
<br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /><span style="font-size: x-large;"><b> Mobile BI Moves up a Weight Class. </b></span></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> Last year we predicted that Mobile BI would go mainstream—and it did. Now everyone from salespeople to insurance adjusters to shop floor managers use tablets to get data about their work right in the moment. To date mobile BI has been lightweight—involving the consumption of reports, with a bit of interactivity. But the tremendous value that people have seen in mobile BI is driving a trend for more ability to ask and answer questions. </span></span><br />
<br />
<br />
<br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"> </span></span><span style="font-size: x-large;"><b><span style="font-family: Times,"Times New Roman",serif;"> Collaboration is not a Feature, it’s a Reality!</span></b></span><br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"> Business intelligence solutions have often talked up their collaboration features. In 2013, that’ll no longer be good enough. Collaboration must be at the root of any business intelligence implementation, because what is business intelligence but a shared experience of asking and answering questions about a business? In 2013, business will look for ways to involve people all around their organization in working together to understand and solve problems. </span></span><br />
<br />
<br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /></span></span><span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><b><span style="font-size: x-large;"> Pervasive Analytics: Finally…Pervasive.</span> </b></span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br />As an industry, we’ve talked for years about terms like “pervasive BI” or “BI for the masses”. There’s a whole market for data that is outside of the market for “business intelligence.” When we talk more about data, and less about software categories like BI, we get to the crux of maximizing business value—and fast, easy-to-use visual analytics is the key that opens the door to organization-wide analytics adoption and collaboration. </span></span><br />
<span style="font-size: large;"><span style="font-family: Times,"Times New Roman",serif;"><br /> <b>These are the trends we see in talking with customers about what they’re doing today and where we are investing for the future. The good news is that investment is most often being driven by a desire to take good initiatives farther, not a sense of frustration with failed initiatives. Perhaps the new technology and investment of the last few years is finally starting to pay off. No matter what, you can expect lots of change in business intelligence in 2013.</b></span></span><br />
<br />
<br />
<br />
<br />Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-67462548805667742272012-10-24T23:26:00.000-07:002015-01-05T17:14:48.667-08:00Internet Governance In a Changing World | Ensuring an Open, Fair and Neutral Architecture <b><span style="font-family: Times, Times New Roman, serif;"> <span style="font-size: large;"> This is a comment in response to a post I read on <a href="https://www.facebook.com/TAPolicy" target="_blank"> TAP: Technology | Academics | Policy </a>,</span></span></b><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b><br /></b>
<b>The<a href="https://www.facebook.com/TAPolicy/posts/280047198781155" target="_blank"> original post</a> read as,</b></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<i><span style="font-family: Times, Times New Roman, serif; font-size: large;">"The Internet's unique characteristics have made it remarkably resistant to traditional tools of state governance. This is both good and bad. Phil Weiser of Silicon Flatirons explains in the paper below. What do you think? "</span></i><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">Here's a <a href="http://siliconflatirons.com/documents/publications/report/InternetGovernanceRoleofMSHOrgs.pdf" target="_blank">link</a> to the paper titled <i>"The Silicon Flatirons Roundtable Series on Entrepreneurship, Innovation, and Public Policy"</i> | <i>Internet Governance: The Role of Multistakeholder Organizations by Joe Waz and Phil Weiser*</i></span></b><br />
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;"><br />Ref.<a href="http://siliconflatirons.com/documents/publications/report/InternetGovernanceRoleofMSHOrgs.pdf" target="_blank">http://siliconflatirons.com/documents/publications/report/InternetGovernanceRoleofMSHOrgs.pdf</a></span></b><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://siliconflatirons.com/documents/publications/report/InternetGovernanceRoleofMSHOrgs.pdf" target="_blank"><span style="font-family: Times, Times New Roman, serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH9CPQP_h1sPENeWtCoBOB2P5gYaYfkEa92ha2fFcsb2ZyMRJpSSjNVG8wy4ckCq3URCYHDjmdSr2U7p8K5JaX5Dp-na68G4I_MbU4DJ5DOw0XNJngCFHvbQeS_zVPrjazDF0VRIDdbzA/s1600/Ensuring+NET+Neutrality+~+Jai+Krishna+Ponnappan.jpg" /></span></a></div>
<span style="font-family: Times, Times New Roman, serif;"><b><br /></b>
<b><span style="font-size: large;">Response,</span></b></span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;"> <span style="font-size: large;"> "As an observation among individuals and groups within the broader global community, this is not merely a case of inherent resistance, it is critically essential to have organizations that are presently integral to the net, and that actively participate and engage in diplomacy, society, commerce and the likes, to determine and to have a say when it comes to building consensus, scoping out the cultural aspects of the Internet, its evolving architecture and keeping pace with its exponential development. Such a sentiment among the broader community is what has, despite all opponents and obstacles, helped keep the net open, neutral and truly global to date. </span></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"> Skepticism is expected and is natural among those in governments across the world, some individuals in civil society, and in elements of industry, because there are no clear and obvious means by which they can<b> 1)avoid isolation, 2)ensure inclusion/participation and 3) contribute to help make such a flexible governing body truly representative, accountable,and responsible.</b></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b>P.S ~ Thank You so much for posting this. I am definitely going to dig deeper, research and keep track of their findings. <br /><br />Best Regards, Jai Krishna Ponnappan :)</b> "</span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">Suggested Reading (2012 Publication):</span></b><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<br />
<div style="text-align: center;">
<b><span style="font-family: Times, Times New Roman, serif; font-size: x-large;">"Internet Architecture And Innovation" </span></b></div>
<div style="text-align: center;">
<b><b><span style="font-family: Times, Times New Roman, serif; font-size: x-large;">by Barbara van Schewick</span></b></b></div>
<b><span style="font-family: Times, Times New Roman, serif;">
</span></b>
<span style="font-family: Times, Times New Roman, serif;"><b><br /></b>
<b><br /></b>
</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.amazon.com/dp/026251804X/ref=as_li_qf_sp_asin_til?tag=theactsjou-20&camp=0&creative=0&linkCode=as1&creativeASIN=026251804X&adid=0X4PZKM5DS2PR68GHXFD" target="_blank"><span style="font-family: Times, Times New Roman, serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5X16rzkbdO3RXQhq_d2V6V3-De_2JQWNeJHPxDxMD4kxmczp9VYSuizmWkEoFa6Rflv82Zo08oqVxwZ3_kwUvgeaXPf5N__CjMCNrHlOVv_36RX0H4zuoKnw4YdEzI73S7LteMw8k3-U/s640/Internet+Architecture+and+Innovation+by+Barbara+van+Schewick.jpg" height="640" width="428" /></span></a></div>
<b><span style="font-family: Times, Times New Roman, serif;"><br /></span></b>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">Overview</span></b><br />
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span></b>
<span style="font-family: Times, Times New Roman, serif; font-size: large;"> Today.. following housing bubbles, bank collapses, and high unemployment--the Internet remains the most reliable mechanism for fostering innovation and creating new wealth. The Internet’s remarkable growth has been fueled by innovation. In this path breaking book, Barbara van Schewick argues that this explosion of innovation is not an accident, but a consequence of the Internet’s architecture--a consequence of technical choices regarding the Internet’s inner structure that were made early in its history. The Internet’s original architecture was based on four design principles: modularity, layering, and two versions of the celebrated but often misunderstood end-to-end arguments. But today, the Internet’s architecture is changing in ways that deviate from the Internet’s original design principles, removing the features that have fostered innovation and threatening the Internet’s ability to spur economic growth, to improve democratic discourse, and to provide a decentralized environment for social and cultural interaction in which anyone can participate. <b>If no one intervenes, network providers’ interests will drive networks further away from the original design principles. If the Internet’s value for society is to be preserved, van Schewick argues, policymakers will have to intervene and protect the features that were at the core of the Internet’s success.</b></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">About the Author</span></b><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b><br /></b>
Barbara van Schewick is Associate Professor of Law and Helen L. Crocker Faculty Scholar at Stanford Law School, Director of Stanford Law School’s Center for Internet and Society, and Associate Professor (by courtesy) of Electrical Engineering in Stanford University's Department of Electrical Engineering.</span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">Reviews</span></b><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b><br /></b>
“...Internet Architecture and Innovation is an important work: it supplies a key piece of the broadband puzzle in its consideration of broadband transport as a necessary input for other businesses…van Schewick’s fundamental premise rings true: only neutral networks promote competition and innovation.” ars technica</span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">Endorsements</span></b><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b><br /></b>
<i>"This is a tour de force on the topic of the end-to-end principle in the design of the Internet." <b>Daniel E. Atkins, W.K. Kellogg Professor of Community Information, Professor of Information and EECS, and Associate Vice-President for Research Cyberinfrastructure, University of Michigan</b></i></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><i><br /></i>
<i>"This is an important book, one which for the first time ties together the many emerging threads that link the economic, technical, architectural, legal, and social frameworks of the birth and evolution of the Internet." <b>David P. Reed, MIT Media Laboratory</b></i></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><i><br /></i>
<i>"This isn't a flash in the pan piece. This book will be an evergreen in a wide range of academic and policy contexts more than an introduction to how technology and policy should be analyzed, it is, in my view, the very best example of that analysis."<b> Lawrence Lessig, author of Code and Other Laws of Cyberspace</b></i></span><br />
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<span style="font-family: Times, Times New Roman, serif;"><br /></span>
<br />
<div>
<br /></div>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-78400814466684904952012-09-28T10:32:00.002-07:002012-11-20T13:09:03.194-08:00Catering to Your Niche Crowd ~ Boutique Publishing<span style="font-family: Times, Times New Roman, serif; font-size: large;"> </span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"> This is in response to an interesting article on Forbes,<br /><a href="https://www.facebook.com/forbes">https://www.facebook.com/forbes</a></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<br />
<i><span style="font-family: Times, Times New Roman, serif; font-size: large;">"..S</span></i><span style="font-family: Times, Times New Roman, serif; font-size: large;"><i>ome of the most interesting experiments in publishing are the ones that use an entirely different math. </i></span><i><span style="font-family: Times, Times New Roman, serif; font-size: large;">NSFW Corp.(</span></i><span style="font-family: Times, Times New Roman, serif; font-size: large;"><i><a href="http://www.nsfwcorp.com/">http://www.nsfwcorp.com/</a>)</i></span><i><span style="font-family: Times, Times New Roman, serif; font-size: large;"> is one of them. Launched by former TechCrunch writer Paul Carr over the summer, it’s a general-interest news and humor site that doesn’t need, doesn’t expect and doesn’t particularly want a ton of readers.</span></i><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.forbes.com/sites/jeffbercovici/2012/09/27/can-boutique-publishing-be-big-business-nsfw-corp-says-yes/" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;" target="_blank"><span style="font-family: Times, Times New Roman, serif; font-size: large;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioxx8XIxYuiXc1VjZ4afaXNsIeWSgtzxRoulTcViz3u8d8NqLfRrvHQ7LasJfKsIPd4vfjNC7RitdDlAG_J_mYBIDgz-iALI4NCeTnYgeVnGVrycXde_BG_Nubu2YzK2Gm2qn1y_sC3Bg/s320/Boutique+Publishing+~+Forbes+posted+via+JaiKrishna+Ponnappan.jpg" width="320" /></span></a></div>
<i style="font-family: Times, 'Times New Roman', serif;"><span style="font-size: large;">Since its launch, it has amassed — or a-niched — more than 3,000 subscribers who pay $3 a month for access. If it can attract 30,000 subscribers, it will be at or near the breakeven point. “If we can get 50,000, none of us will ever have to do anything else again,” says Carr.</span></i><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><i><br /></i>
<i>NSFW’s mix of <b>gonzo politics, guerilla journalism and open-mic comedy </b>isn’t for everyone. But that’s the point. It’s because it doesn’t try to be for everyone that it can be what it is. After all, Carr notes, if there’s one thing the Web has proven, it’s that there’s money to be made in catering to niche tastes. “It’s nearer to paying for porn than it is to paying for news,” he says of his site’s appeal.</i></span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><i><br /></i>
<i><b>Smallness also makes it easier to innovate</b>, which NSFW does on a variety of levels."</i></span><br />
<br />
<b><span style="font-family: Times, Times New Roman, serif; font-size: large;">My response,</span></b><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script> </span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"> There are quiet few select groups, underground networks and circles that offer membership by invite only. Off-course, once you identify and demarcate your niche crowd/select audience things such as scalability and monetization by numbers go out the window because the primary emphasis often is purely on things such as delivering quality and value that is relevant, unique and hard to find. P.S ~ Not an easy model to follow but worthy of consideration once you have matured in the business and tested the waters over the years. </span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><b>~ </b>Jai Krishna Ponnappan</span><br />
<span style="font-family: Times, Times New Roman, serif; font-size: large;"><br /></span>
<i><span style="font-family: Times, Times New Roman, serif;">Ref.</span><a href="https://www.facebook.com/photo.php?fbid=10151170951552509&set=a.10151047526737509.456571.30911162508&type=1&ref=nf">https://www.facebook.com/photo.php?fbid=10151170951552509&set=a.10151047526737509.456571.30911162508&type=1&ref=nf</a></i>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-24700593179990610372012-08-16T03:12:00.000-07:002012-11-20T13:13:44.837-08:00Content is King and So is Leveraging Big Data<br />
<br />
<br />
<b><span style="font-size: x-large;">" We Offer Content Management "</span></b><br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNSgDm3q8JEOyQyCgkEpGN6BG1mCQM92-T0ikFc8dZurtTlJDv19pMViRRATw5XC-FW5r0v9_Aj2FNdwnEVu0Ho-smRJomu9KDKwXm3J-KROMFHEaM2vhM969fKIyLXhv6qvmEGfQhirs/s1600/Content+Management+Systems+~+Jai+Krishna+Ponnappan+Web.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNSgDm3q8JEOyQyCgkEpGN6BG1mCQM92-T0ikFc8dZurtTlJDv19pMViRRATw5XC-FW5r0v9_Aj2FNdwnEVu0Ho-smRJomu9KDKwXm3J-KROMFHEaM2vhM969fKIyLXhv6qvmEGfQhirs/s400/Content+Management+Systems+~+Jai+Krishna+Ponnappan+Web.JPG" width="400" /></a><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
This is a statement being offered by many but is it really content management or merely storing documents that are linked to a database record?<br />
<br />
Questions that immediately arise in my mind when I hear this statement are:<br />
<br />
Do you provide audit logs reflecting what happens to the content?<br />
What levels of security do you support? (Repository, folder, document, element)<br />
How do you capture information? (Imaging, Office applications, Outlook)<br />
What capture devices are supported? (Scanners, multi-function peripherals, cameras)<br />
Is there an ability to use workflow to automate some processes?<br />
What is the approach to search? (Keyword, Boolean, full-text, parametric)<br />
Does it support versioning?<br />
<br />
The term content management is being used more and more by suppliers of all types and sizes and while there is some truth in their claims, the question is what does content management mean to you in relation to addressing your business requirements? Peel this back again and the real question becomes, what are your business requirements in relation to content and records management and does the application you are considering deliver what you need now and provide a way to grow in the future?<br />
<br />
In my view, there are many good applications on the market today. Some of which are focused on content management and some that are focused on a business application with bolt on content management capabilities and some that combine a good degree of both. This does not mean they are bad or will not work for you, it means that you have to become more knowledgeable in order to make the right decisions and choices. The last thing you want to do is make an investment only to find out it does not provide what you thought it would.<br />
Imagine that you make an investment to manage risk and when an audit comes, you cannot defend your information due to a lack of audit logs that would have presented a historical view of the information in question. When you are asked to show who accessed it, when they accessed it and what they did with it, could you answer these questions confidently? If you are brought to court and asked to provide all of the information related to the case which includes electronic files, emails and even metadata associated with the case, could you do so with a level of confidence that you have found everything or would you have a high level of doubt and uncertainty? In order to make the right choices, you need to identify and define your requirements, understand the technologies and assess what is available to you. It could be that the functionality being offered is suitable to meet your needs but wouldn’t you feel better knowing it for sure?<br />
If you are ready to move forward and are finding yourself stuck or unfocused and are not sure where to begin or what to do next, seek professional assistance and/or training to get you started. Be sure to investigate AIIM's Enterprise Content Management training program.<br />
<br />
<br />
And be sure to read the AIIM Training Briefing on ECM (authored by yours truly). Click on the image to download and read.<br />
What say you? Do you have a story to tell? What are your thoughts on this topic? Do you have a topic of interest you would like discussed in this forum? Let me know.<br />
<br />
Bob Larrivee, Director and Industry Advisor – AIIM<br />
Ref. Posted originally on AIIM at, <a href="http://www.aiim.org/community/blogs/expert/We-Offer-Content-Management">http://www.aiim.org/community/blogs/expert/We-Offer-Content-Management</a><br />
<br />
<b><i><span style="font-size: large;">An after Thought and Response,</span></i></b><br />
<br />
<div style="text-align: center;">
<b><span style="font-size: x-large;">"Content is King </span></b><br />
<span style="font-size: x-large;"><b>and So is Leveraging </b><b>Big Data"</b></span></div>
<br />
<span style="font-size: large;"> <b>Going a step further from this-></b> </span>"The question is what does content management mean to you in relation to addressing your business requirements? Peel this back again and the real question becomes, what are your business requirements in relation to content and records management and does the application you are considering deliver what you need now and provide a way to grow in the future?"<br />
<br />
<b><span style="font-size: large;">...I believe it is important to ask</span></b><br />
<b><span style="font-size: large;"><br /></span></b>
<span style="font-size: large;"><b>-></b>"<b>Does your organization recognize and value the power of data/content and the systems/solutions that can leverage it to your advantage?</b>" </span><br />
<br />
Many organizations across several industries know that "Content can be King" even within their organizational setting as well as potentially serve as a key area facilitating advantage, efficiency and growth in their wider industry and market place. As a result the understandable trend translates as a shift towards making this is a vital high level strategic decision that can clearly separate them from organizations with less adaptable, less compatible and poorly tailored and managed Data/content Management Systems. Many of these are experiencing measurable and significant setbacks as a result of it.<br />
<br />
<b>Thank You for posting on this topic, I am quiet sure many of us have come across critical real life business scenarios and systems that serve as great case studies and examples that teach us valuable lessons worth sharing. Have a great day. Best Regards, Jai Krishna Ponnappan :)</b><br />
<div>
<br />
<br />
<br /></div>
Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-58041664634387571572012-07-31T13:48:00.000-07:002012-11-20T13:57:00.360-08:00Disaster Recovery Virtualization Using the Cloud<br />
Disaster recovery is a necessary component in any organizations’ plans. Business data must be backed up, and key processes like billing, payroll and procurement need to continue even if an organization’s data center is disabled due to a disaster. Over time, two distinct approaches to disaster recovery models have emerged: dedicated and shared models. While effective, these approaches often forced organizations to choose between cost and speed.<br />
<br />
We live in a Global economy that is balanced around and driven by a '24x7' culture. Nobody likes to think about it but in order to thrive and survive Disaster Recovery is a necessary component in any organizations’ plans. Even with a flat IT budget, you need to have seamless failover and failback of critical business applications. The flow of information never stops and commerce in our global business environment never sleeps. With the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters, and disaster recovery service providers need to enable more seamless, nearly instanta-neous failover and failback of critical business applications. Yet given the reality that most IT budgets are flat or even reduced, these services must be provided without incurring significant upfront or ongoing expenditures. <b>Cloud-based business resilience can provide an attractive alter-native to traditional disaster recovery, offering both the more-rapid recovery time associated with a dedicated infrastructure and the reduced costs that are consistent with a shared recovery model.</b> With pay-as-you-go pricing and the ability to scale up as conditions change, cloud computing can help organizations meet the expectations of today’s frenetic, fast paced environment where IT demands continue to increase but budgets do not. This white paper discusses traditional approaches to disaster recovery and describes how organizations can use cloud computing to help plan for both the mundane interruptions to service—cut power lines, server hardware failures and security breaches—as well as more-infrequent disasters. The paper provides key considerations when planning for the transition to cloud-based business resilience and in selecting your cloud partner.<br />
<br />
<br />
<br />
<span style="font-size: large;"><b>A Qualitative Trade Off Between Cost & Speed </b></span><br />
<span style="font-size: large;"><b><br /></b></span>
<br />
When choosing a disaster recovery approach, organizations have traditionally relied on the level of service required, as measured by two recovery objectives:<br />
<br />
●● <b>Recovery time objective (RTO)—the amount of time between an outage and the restoration of operations </b><br />
●● <b>Recovery point objective (RPO)—the point in time where data is restored and reflects the amount of data that will be ultimately lost during the recovery process. </b><br />
<br />
In most traditional disaster recovery models—that are usually dedicated and shared— organizations are forced to make the tradeoff between cost and speed to recovery.<br />
<br />
<br />
In a dedicated model, the infrastructure is dedicated to a single organization. This type of disaster recovery can offer a faster time to recovery compared to other traditional models because the IT infrastructure is mirrored at the disaster recovery site and is ready to be called upon in the event of a disaster. While this model can reduce RTO because the hardware and software are pre-configured, it does not eliminate all delays. The process is still dependent on receiving a current data image, which involves transporting physical tapes and a data restoration process. This approach is also costly because the hardware sits idle when not being used for disaster recovery. Some organizations use the backup infrastructure for development and test to mitigate the cost, but that introduces additional risk into the equation. Finally, the data restoration process adds variability into the process.<br />
<br />
In a shared disaster recovery model, the infrastructure is shared among multiple organizations. Shared disaster recovery is designed to be more cost effective, since the off-site backup infrastructure is shared between multiple organizations. After a disaster is declared, the hardware, operating system and application software at the disaster site must be configured from the ground up to match the IT site that has declared a disaster, and this process can take hours or even days.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-KBd8P8EADcgJgOkevNonyEOFCMjtxmUzB-idVea4B0y1bELXM1dgfHWqKuNqIgka3qZm0avOr79er2W89Jhx-k4sEVyExqHJ2E8RcGjRfa4I8bxkRjPL_xT4_fjxqCKgn4NEI2wkTrU/s1600/Measuring+level+of+service+required+by+RPO+and+RTO+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-KBd8P8EADcgJgOkevNonyEOFCMjtxmUzB-idVea4B0y1bELXM1dgfHWqKuNqIgka3qZm0avOr79er2W89Jhx-k4sEVyExqHJ2E8RcGjRfa4I8bxkRjPL_xT4_fjxqCKgn4NEI2wkTrU/s400/Measuring+level+of+service+required+by+RPO+and+RTO+~+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<b><i>Measuring level of service required by RPO and RTO </i></b><br />
<b><i><br /></i></b>
<b><i><br /></i></b>
<b><i><br /></i></b>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4kbjqPwxlJslLWz9NPeexxAtD28vlrnYQmhuPws5pBC3_MnOo3YSwZXfB2nXLgVyyOwyfzymVMtTWAytzoGY4roGuXLi_2D6c0aB7WecSS-WyVNYKJLLiixSNVCMDu4mTFsBr2MgpWLY/s1600/Traditional+disaster+recovery+approaches+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4kbjqPwxlJslLWz9NPeexxAtD28vlrnYQmhuPws5pBC3_MnOo3YSwZXfB2nXLgVyyOwyfzymVMtTWAytzoGY4roGuXLi_2D6c0aB7WecSS-WyVNYKJLLiixSNVCMDu4mTFsBr2MgpWLY/s400/Traditional+disaster+recovery+approaches+~+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<b><i> Traditional disaster recovery approaches include shared and dedicated models </i></b><br />
<b><i><br /></i></b>
<b><i><br /></i></b>
<b style="font-size: x-large;">The pressure for continuous availability </b><br />
<br />
<br />
According to a CIO study, organizations are being challenged to keep up with the growing demands on their IT departments while keeping their operations up and running and making them as efficient as possible. Their users and customers are becoming more sophisticated users of technology. Research shows that usage of Internet-connected devices is growing about 42 percent annually, giving clients and employees the ability to quickly access huge amounts of storage. In spite of the pressure to do more, they are spending a large percentage of their funds to maintain the infrastructure that they have today. They are also not getting many significant budget increases; budgets are essentially flat.1 With dedicated and shared disaster recovery models, organiza-tions have traditionally been forced to make tradeoffs between cost and speed. As the pressure to achieve continuous availability and reduce costs continues to increase, organizations can no longer accept tradeoffs. While disaster recovery was originally intended for critical batch “back-office” processes, many organi-zations are now dependent on real-time applications and their online presence as the primary interface to their customers. Any downtime reflects directly on their brand image and interrup-tion of key applications such as e-commerce, online banking and customer self service is viewed as unacceptable by customers. The cost of a minute of downtime may be thousands of dollars.<br />
<br />
<br />
<span style="font-size: large;"><b>Thinking in terms of interruptions and not disasters </b></span><br />
<br />
<br />
Traditional disaster recovery methods also rely on “declaring a disaster” in order to leverage the backup infrastructure during events such as hurricanes, tsunamis, floods or fires. However, most application availability interruptions are due to more mundane everyday occurrences. While organizations need to plan for the worst, they also must plan for the more likely—cut power lines, server hardware failures and security breaches. While weather is the root cause of just over half of the disasters declared, note that almost 50 percent of the declarations are due to other causes. These statistics are from clients who actually declared a disaster. Think about all of the interruptions where a disaster was not declared. In an around-the-clock world, organizations must move beyond disaster recovery and think in terms of application continuity. You must plan for the recovery of critical business applications rather than infrequent, momentous disasters, and build resiliency plans accordingly.<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5sfHE_YOk9INllghFXqZssiXtOmOZ6zbeZ_oGO6jbUEbzGZTTP_TevQy5mCObjbT1pC5x0TQLzZRqm0CxMapu7359qzo8UQD2oEALwQG-G1NmUqEeyhxOuaaWqNTYnVzoATFu7RN_QCE/s1600/Time+to+recovery+using+a+dedicated+infrastructure+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="138" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5sfHE_YOk9INllghFXqZssiXtOmOZ6zbeZ_oGO6jbUEbzGZTTP_TevQy5mCObjbT1pC5x0TQLzZRqm0CxMapu7359qzo8UQD2oEALwQG-G1NmUqEeyhxOuaaWqNTYnVzoATFu7RN_QCE/s400/Time+to+recovery+using+a+dedicated+infrastructure+~+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<b><i> </i></b><b><i>Time to recovery using a dedicated infrastructure </i></b><br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT0ag-_54ErmOrbuBmcbPyLCdG6SAqsLQs5T0HWGxlIz0zC_IOEgIYfAKBjdBHJ7u1lM7zbF6sUpmT984XTpF434WJUL_SEXdfjHOob_P7X6BvpZHrXxuNQeO7SwJ5HY0tvViMcrVxyH8/s1600/Time+to+recovery+using+a+shared+infrastructure+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="141" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT0ag-_54ErmOrbuBmcbPyLCdG6SAqsLQs5T0HWGxlIz0zC_IOEgIYfAKBjdBHJ7u1lM7zbF6sUpmT984XTpF434WJUL_SEXdfjHOob_P7X6BvpZHrXxuNQeO7SwJ5HY0tvViMcrVxyH8/s400/Time+to+recovery+using+a+shared+infrastructure+~+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<b><i>Time to recovery using a shared infrastructure. </i></b><b><i>The data restoration process must be completed as shown, resulting in an average of 48 to 72 hours to recovery. </i></b><br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcbYlQVxhEXLEUFTUGINwsmCgxin-EcU8wP15toyYWFXoDoXJntxynL-WZsWrCjZpdN7_MGis9ORGqFBJPrk3G_HxOozSc8hnrx2Dn5VU5e_kOtWQB1iUxTNvD62eAyYgrNqyCz7OUftY/s1600/Types+of+business+interruptions+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcbYlQVxhEXLEUFTUGINwsmCgxin-EcU8wP15toyYWFXoDoXJntxynL-WZsWrCjZpdN7_MGis9ORGqFBJPrk3G_HxOozSc8hnrx2Dn5VU5e_kOtWQB1iUxTNvD62eAyYgrNqyCz7OUftY/s400/Types+of+business+interruptions+~+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<br />
<b><i>Types of Potential business interruptions</i></b><br />
<br />
<br />
<br />
<b><span style="font-size: large;">Cloud-based Business Resilience is a Welcome New Approach </span></b><br />
<br />
<br />
<b>Cloud computing offers an attractive alternative to traditional disaster recovery. “The Cloud” is inherently a shared infrastruc-ture: a pooled set of resources with the infrastructure cost dis-tributed across everyone who contracts for the cloud service. This shared nature makes cloud an ideal model for disaster recovery. Even when we broaden the definition of disaster recovery to include more mundane service interruptions, the need for disaster recovery resources is sporadic. Since all of the organizations relying on the cloud for backup and recovery are very unlikely to need the infrastructure at the same time, costs can be reduced and the cloud can speed recovery time. </b><br />
<br />
<br />
Cloud-based business resilience managed services are designed to provide a balance of economical shared physical recovery with the speed of dedicated infrastructure. Because the server images and data are continuously replicated, recovery time can be reduced dramatically to less than an hour, and, in many cases, to minutes—or even seconds. However, the costs are more consistent with shared recovery.<br />
<br />
<br />
<br />
<br />
<b><span style="font-size: large;">Cloud-based business resilience offers several other benefits over traditional disaster recovery models:</span></b><br />
<b><span style="font-size: large;"><br /></span></b>
<b><span style="font-size: large;"><br /></span></b>
<b><i>Speed to recovery using cloud computing</i></b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW7bGZjBA-1i0Bx7ur5gU6uyQAKhR8lEijQBRN9WiLcsPB8g3zqedLJZ6R3GchulrRIbFoY_90qhJ3Mm1ho9OR9Pcmzot1Gl6VR3zbM6QUFX_Y8zukO-1wIVjTVvObsZt_QyUMdnGWdYc/s1600/Speed+to+recovery+using+cloud+computing+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW7bGZjBA-1i0Bx7ur5gU6uyQAKhR8lEijQBRN9WiLcsPB8g3zqedLJZ6R3GchulrRIbFoY_90qhJ3Mm1ho9OR9Pcmzot1Gl6VR3zbM6QUFX_Y8zukO-1wIVjTVvObsZt_QyUMdnGWdYc/s640/Speed+to+recovery+using+cloud+computing+~+Jai+Krishna+Ponnappan.jpg" width="640" /></a></div>
<b><span style="font-size: large;"><br /></span></b>
<br />
<b>• More predictable monthly operating expenses can help you avoid the unexpected and hidden costs of do-it-yourself approaches.</b><br />
<b>• Reduced up-front capital expenditure requirements, because the disaster recovery infrastructure exists in</b><br />
<b>the cloud.</b><br />
<b>• Cloud-based business resilience managed services can more easily scale up based on changing conditions.</b><br />
<b>• Portal access reduces the need to travel to the recovery site which can help save time and money.</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR-wM44m_bjnHb9HV7414kKXiAS0IZIUOkAMi-3kv1gHbRJ_GdQm_BLpBrQhVlXr9FJc7IAFvIdoL_5AGBgAAa6C54ERNFK-Dl8Gc6DGdC__AEcryG1KZTZ1QUlOGtVjmvuu2pOekIuGA/s1600/A+cloud-based+approach+to+business+resilience+~+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR-wM44m_bjnHb9HV7414kKXiAS0IZIUOkAMi-3kv1gHbRJ_GdQm_BLpBrQhVlXr9FJc7IAFvIdoL_5AGBgAAa6C54ERNFK-Dl8Gc6DGdC__AEcryG1KZTZ1QUlOGtVjmvuu2pOekIuGA/s640/A+cloud-based+approach+to+business+resilience+~+Jai+Krishna+Ponnappan.jpg" width="640" /></a></div>
<i><b>A cloud-based approach to business resilience. Virtualizing disaster recovery using cloud computing</b></i><br />
<br />
While the cloud offers multiple benefits as a disaster recovery platform, there are several key considerations when planning for the transition to cloud-based business resilience and in selecting your cloud partner. These include:<br />
<br />
<b>●● Portal access with failover and failback capability</b><br />
<b>●● Support for disaster recovery testing</b><br />
<b>●● Tiered service levels</b><br />
<b>●● Support for mixed and virtualized server environments</b><br />
<b>●● Global reach and local presence</b><br />
<b>●● Migration from and coexistence with traditional disaster recovery</b><br />
<br />
The next few sections describe these considerations in greater detail. Facilitating improved control with portal access. <b> Disaster recovery has traditionally been an insurance policy that organizations hope not to use. In contrast, cloud-based business resilience can actually increase IT’s ability to provide service continuity for key business applications.</b> Since the cloud-based business resilience service can be accessed through a web portal, IT management and administrators gain a dashboard view to their organization’s infrastructure.<br />
<br />
Without the need for a formal declaration and the ability to fail over from the portal, IT can be much more responsive to the more mundane outages and interruptions. Building confidence and refining disaster recovery plans with more frequent testing. One traditional challenge of disaster recovery is the lack of certainty that the planned solution will work when the time comes. Typically, organizations only test their failover and recovery on average once or twice per year, which is hardly sufficient, given the pace of change experienced by most IT departments. This lost sense of control has caused some organizations to bring<br />
disaster recovery “in house,” diverting critical IT focus for mainline application development. Cloud-based business resilience provides the opportunity for more control and more frequent and granular testing of disaster recovery plans, even at the server or application level.<br />
<br />
<div style="text-align: left;">
Supporting optimized application recovery times with tiered service levels Cloud-based business resilience offers the opportunity for tiered service levels that enable you to differentiate applications based on their importance to the organization and the associated tolerance for downtime. The notion of a “server image” is an important part of traditional disaster recovery. As the complexity of IT departments has increased, including multiple server farms with possibly different operating systems and operating system (OS) levels, the ability to respond to a disaster or outage becomes more complex. Organizations are often forced to recover on different hardware, which can take longer and increase the possibility for errors and data loss. Organizations are implementing virtualization technologies in their data centers to help remove some of the underlying complexity and optimize infrastructure utilization. The number of virtual machines installed has been growing exponentially over the past several years.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
According to a recent survey of Chief Information Officers, 98 percent of respondents either had already implemented virtualization or had plans to implement it within the next 12 months. Cloud-based business resilience solutions must offer both physical-to-virtual (P2V) and virtual-to-virtual (V2V) recovery in order to support these types of environments. Cloud-based business resilience requires ongoing server replication, making network bandwidth an important consideration when adopting this approach. A global provider should offer the opportunity for a local presence, thereby reducing the distance that data must travel across the network.</div>
<br />
While cloud-based business resilience offers many advantages for mission-critical and customer-facing applications, an efficient enterprise-wide disaster recovery plan will likely include a blend of traditional and cloud-based approaches. In a recent study, respondents indicated that minimizing data loss was the most important objective of a successful disaster recovery solution. With coordinated disaster recovery and data<br />
back-up, data loss can be reduced and reliability of data integrity improved.<br />
<br />
<br />
<b>Cloud computing offers a compelling opportunity to realize the recovery time of dedicated disaster recovery with the cost structure of shared disaster recovery. However, disaster recovery planning is not something that is taken lightly; security and resiliency of the cloud are critical considerations.</b><br />
<br />
<br />
<br />
<b>Posted by Jai Krishna Ponnappan</b><br />
<span style="font-size: large;"><b><br /></b></span>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-9916012474659463902012-07-02T20:40:00.003-07:002012-11-20T13:57:36.090-08:00Keys to Business Intelligence by Jai Krishna Ponnappan<br />
<br />
<br />
Historically, business intelligence has promised a lot of “Yes,” but the reality has been filled with “Nos.” The promises are enormously compelling. Companies collect vast amounts of information about markets, customers, operations, and financial performance. Harnessing this information to drive better business results can have tremendous impact. Some corporations have achieved impressive gains after investing millions of dollars and multiple years of effort into building traditional analytical systems.<br />
<span style="font-family: Times, 'Times New Roman', serif; font-size: large;"><b><br /></b></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0cdc4yWfmKeP1gJe_wdA-HU4MvnB5GHA08SanQkJ8HbGGcf4ND0br2AFIJo1fTJGHEIN47KLiUUM2Kf-PVCpoY96vvUx48F0OZQQUkWrjpzo7hEWsMHIR8G_xyKizeBk2uHme6JPgl4s/s1600/Architecture+of+Future_+Business+Intelligence+Solutions_+Jai+Krishna+Ponnappan.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0cdc4yWfmKeP1gJe_wdA-HU4MvnB5GHA08SanQkJ8HbGGcf4ND0br2AFIJo1fTJGHEIN47KLiUUM2Kf-PVCpoY96vvUx48F0OZQQUkWrjpzo7hEWsMHIR8G_xyKizeBk2uHme6JPgl4s/s400/Architecture+of+Future_+Business+Intelligence+Solutions_+Jai+Krishna+Ponnappan.jpg" width="400" /></a></div>
<span style="font-family: Times, 'Times New Roman', serif; font-size: large;"><b><br /></b></span>
<br />
However, these success stories are frustratingly few and far between. Traditional BI, long the only option, can be prohibitively costly and complex. For companies without millions of dollars to invest, the options have been few and unattractive. Further, even when these investments of time and resources can be made, they don’t guarantee success. For too many companies, BI doesn’t deliver on its promises -- it is too costly, too complicated, too difficult to scale and extend. The end result is a reality in which only a small minority of employees have access to BI. According to Gartner, only 20% of employees use BI today. This falls far short of the potential transformative capabilities of BI throughout a company. It’s time for BI that says Yes. Yes to the requirements of your budget, business, and business users. Yes to fewer compromises. This whitepaper first looks at the fundamental requirements that a BI solution should deliver to your company. Next, this whitepaper covers the 11 Key Questions that you should be asking of a future BI technology partner. When the BI provider can answer Yes to all of these questions, you have BI that is capable of fulfilling your analytical and reporting needs both today and over time – it is flexible, powerful, and efficient. It is BI that says Yes.<br />
<br />
<span style="background-color: white;"></span><br />
<div style="font-weight: bold;">
<span style="font-size: x-large;"><u>Business Insight—Four Foundational Requirements</u></span></div>
<div style="font-weight: bold;">
<br /></div>
<i>Any organization investing in business intelligence needs to define the capabilities</i><br />
<i>that will help them to win against the strongest competitors in their market.</i><br />
<i>Here are the four bedrock requirements that should define the core capabilities</i><br />
<i>of your solution:</i><br />
<br />
<b style="background-color: white;"></b><br />
<br />
<b>Historical analysis and reporting.</b><br />
<br />
Fundamentally, BI should give you insight into both business performance and<br />
the drivers of that performance. An understanding of business influencers and<br />
results is the foundation for successful, proactive decision making. Technically,<br />
this capability requires the mapping and analysis of data over multiple years.<br />
This can also often mean the modeling and manipulation of hundreds of millions<br />
of database rows.<br />
<br />
<br />
<b>Forecasting and future projection.</b><br />
<br />
While understanding historical data is a first step, it is also vital to project those<br />
findings into the future. For example, once you know how different types of<br />
sales deals have progressed in the past, you can examine current opportunities<br />
from that perspective and make future forecasts. The ability to forecast and<br />
align your business resources accordingly are key to success.<br />
<br />
<b>Ability to integrate information from multiple business functions.</b><br />
<br />
Strategic insight often requires data from multiple systems. For example, operational<br />
results require a financial perspective to show the full picture. Sales management<br />
benefits from a comprehensive view of the demand funnel. Targeted, customized<br />
marketing efforts require analysis compiled from customer, marketing, and<br />
purchasing data. Your solution needs to be able to easily integrate information<br />
from multiple sources in order to get answers to broad business questions.<br />
Easily explored reporting and analysis.<br />
<br />
<b>Decision makers need to understand overarching business views and trends. </b><br />
<br />
They also need to examine increasing levels of detail to understand what actions can<br />
be taken to achieve further success. It’s not enough to simply have a report; if<br />
that report is not explorable, it might raise critical issues but not satisfy the need<br />
to know more detail in order to make a decision. A full range of drill-down and<br />
drill-across capabilities make it possible for decisionmakers to fully understand<br />
an issue at hand and make critical decisions.<br />
<br />
These four capabilities form the foundation of a powerful business intelligence<br />
solution that can answer the critical questions facing your business. If a solution<br />
cannot meet one of these requirements, your solution will not have the full<br />
range of analytical capability that you will need to be competitive.<br />
<br />
<br />
<br />
If the solution that you are considering meets the Four Foundational Requirements,<br />
it is time to delve more deeply. The following twelve questions will help you to<br />
assess your options and ensure that you are getting a robust, powerful solution<br />
that meets your business requirements.<br />
<br />
<b><u><span style="font-size: x-large;">Can I get a comprehensive view of my business?</span></u></b><br />
<br />
<br />
<i>Even seemingly basic questions can require data from a variety</i><br />
<i>of operational systems, 3rd party data sources, and spreadsheets</i>.<br />
<br />
<br />
<br />
Even basic business questions such as “Which marketing campaigns generated<br />
the most revenue this year?” or “Did the product redesign have the desired<br />
effect on part inventory levels?” could require data from different operational<br />
systems, 3rd party or partner sources, databases, and individual spreadsheets. As<br />
a result, a core BI requirement is the ability to access, acquire, and integrate data<br />
from multiple sources.<br />
Traditional BI solutions provide this capability, but it can be arduous to implement<br />
and maintain. Traditional BI accesses multiple data sources with complex and<br />
expensive ETL systems that bring data together into one physical database.<br />
Unfortunately, this database is totally disconnected from the world of the<br />
business user. This requires another round of programming to connect the<br />
physical data with the business user model.<br />
A more modern solution enables you to:<br />
• Experience a powerful, usable solution. Traditional solutions build from<br />
the bottom up. A more modern approach starts instead from the top - the<br />
logical business model. It then works downwards to manage the physical<br />
data that is required to deliver these business views. This “top down”<br />
approach manages the complexity that results from integrating multiple<br />
data sources – so that the solution is both powerful and easy to use.<br />
• Analyze information from all types of data assets. Data are provided to the<br />
business in a variety of ways. Your BI solution needs to extract information<br />
from corporate systems, stand-alone databases, flat files, XML files, and<br />
even spreadsheets.<br />
• Access remote or secured databases. Traditional BI uses an ETL process to<br />
extract data out of a source database and place it into a data warehouse,<br />
while some SaaS providers can only access data that is uploaded to their<br />
servers. The more sophisticated SaaS BI providers can both upload data<br />
and access local databases; that is, it allows you to access and analyze data<br />
without actually uploading it. This is accomplished via real-time queries<br />
against the database.<br />
• Manage the required metadata. In addition to the management of data<br />
sources, multi-source BI requires the management of all accompanying<br />
metadata, the information about the data itself.<br />
<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Does it provide full features at an affordable price?</span></u></b><br />
<br />
<br />
<i>Modern BI solutions make it possible even for smaller</i><br />
<i>organizations to afford a comprehensive BI solution.</i><br />
<br />
<br />
<br />
Traditional BI solutions were often affordable only to the largest companies,<br />
which had the large budget, IT staff, and resources required for initial deployment<br />
and ongoing maintenance. Departments of enterprises and SMBs were<br />
effectively priced out of the market.<br />
Recently, the attractiveness of the midmarket has resulted in new “midsize”<br />
solutions from traditional players and from new vendors. The catch, however, is<br />
that the lower price often only purchases a “crippled” or partial solution.<br />
<br />
<b>So how can a smaller organization get a true BI solution? A fully deployed BI</b><br />
<b>solution must include the following: ETL and scheduling, database, metadata</b><br />
<b>management, banded/pixel perfect reporting, dashboards, e-mail alerts, and</b><br />
<b>OLAP slice-and-dice functionality.</b><br />
<b>Look for a solution that:</b><br />
<b><br /></b>
• Delivers a full BI solution, not parts of one. The license should include<br />
everything that you need for a true solution: ETL, database management,<br />
meta-data management, OLAP slice-and-dice query generation, banded<br />
reporting, ad hoc reporting, and visual dashboards. A solution that has all<br />
of the necessary components, already integrated for you, will deliver the<br />
fastest, greatest value to your organization.<br />
• Has easy-to-understand, affordable pricing. Traditional solutions have<br />
many cost components – hardware, software, consultants, in-house IT,<br />
support, and ongoing maintenance. As a result, the pricing is both high<br />
and difficult to track fully. Modern solutions, such as ones delivered<br />
software-as-a-service (SaaS), have more transparent and affordable pricing.<br />
SaaS pricing is more comprehensive – the cost of hardware, software, and<br />
support is in one monthly number. SaaS pricing is also more affordable,<br />
since it leverages a shared cost structure, and these lower costs are spread<br />
over time. This makes it easier to deploy and maintain a BI solution.<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can I start seeing value within 90 days?</span></u></b><br />
<br />
<br />
<i>In order for BI to be effective, it has to be deployed quickly</i><br />
<i>enough to address the critical issues that you are currently</i><br />
<i>facing.</i><br />
<br />
<br />
Time to value is a prime determinant of the ROI of a business intelligence<br />
deployment. Traditional BI solutions have struggled to deliver value to<br />
stakeholders within a desirable timeframe. Due to challenges such as high<br />
upfront capital expenditures, extensive IT resource requirements, and lengthy<br />
development schedules, many traditional BI projects have taken over 12 to 18<br />
months to complete.<br />
<br />
<b>Modern BI solutions can dramatically reduce the time to value by making use of</b><br />
<b>the following:</b><br />
<b><br /></b>
• Fully integrated solutions, from ETL to analytical engine to reporting engine<br />
• Automation of standard processes<br />
• Use of templates for typical reporting requirements, such as sales reporting,<br />
financial reporting, etc.<br />
• Software-as-a-service (SaaS) or on-demand, delivery models<br />
• Leveraging of existing data warehousing investments<br />
Modern solutions can also enable processes and approaches for BI deployment<br />
that increase the likelihood of success. These include:<br />
• Proving success incrementally and iteratively – avoiding the “Big<br />
Bang.” In the earlier days of BI, customers were tempted to create a “big<br />
bang” solution, since the cost and effort of creating the initial solution<br />
and updating it over time were so high. Today, a BI solution offering a<br />
fully integrated architecture – one with all of the components already<br />
provided, working together -- allows companies to focus on initial highneed<br />
projects, prove success, and expand or adapt over time. This ability<br />
to iterate over time provides value more quickly, lowers ongoing cost, and<br />
increases the likelihood of success.<br />
• Deploying to the existing infrastructure; avoiding major infrastructure<br />
upgrades. The second major reason that traditional solutions are slow to<br />
deploy is that they often require an additional investment in new hardware or<br />
software. This lengthens timeframes, since a major capital purchase requires<br />
a financial approval process that can take up to a full year of review and<br />
approval. If a solution can leverage the existing infrastructure, this process<br />
step is avoided. Also, if the solution itself is more affordable, or, like SaaS<br />
solutions, offered as a subscription (which can be charged to operating<br />
expenses, not capital budgets), this budgeting process step can be bypassed<br />
or shortened.<br />
• Deploying with the IT team you have. The construction of a traditional<br />
BI solution requires many specialized resources like data modelers and<br />
ETL specialists. Any plan that requires these professionals will confront<br />
resource bottlenecks.<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can I be assured that my data is secure</span></u></b><br />
<b><u><span style="font-size: x-large;">and available?</span></u></b><br />
<br />
<br />
<i>Data security and availability are key requirements of a BI</i><br />
<i>project.</i><br />
<br />
<br />
Data security and availability are key requirements for any IT system. You need<br />
a BI solution that matches the same high levels of performance, reliability, and<br />
security that you expect of the other systems in your portfolio.<br />
Security is fundamental, since the data your business uses is critical to competitive<br />
advantage, effective operations, and consumer or patient privacy. Availability<br />
is also critical, since you need to be able to make decisions in a timely manner,<br />
addressing issues as they emerge. Your system needs to be ready to respond<br />
when you need it.<br />
Your BI system should:<br />
• Provide high availability. If the solution that you are considering is a<br />
traditional, on-premise one, how often is it down for maintenance or<br />
updates? How reliably is it available, given your configuration? If the<br />
solution that you are considering is a SaaS solution, what is the uptime<br />
guaranteed in subscription contracts? You will want to be sure that your<br />
solution will be available 99% of the time, if it is on-premise or SaaS.<br />
• Be built on high performance hardware. If you are selecting a SaaS<br />
vendor, make sure that their solution is operating on high performance<br />
hardware that will provide the necessary reliability and availability that you<br />
seek. If you are selecting an on-premise vendor, make sure that you are<br />
making the appropriate investments into the type and quantity of hardware<br />
that will provide high reliability and will also scale over time.<br />
• Provide flexible security models. Most deployments have varying levels<br />
of feature access, depending on the user’s role. Some users may only be<br />
able to view a subset of reports, such as sales reports, while others will have<br />
full access to all data, reports, and administration features. The solution<br />
needs to ensure that users have access appropriate to their role. This will<br />
require features such as defining row and column filters to limit data to<br />
those individuals and groups who require it.<br />
• Have SAS 70 data center certification (SaaS providers only). If you<br />
are reviewing SaaS vendors, be sure that the data center where the<br />
information will be stored has SAS 70 Certification. This represents that a<br />
service organization has been through an in-depth audit of their control<br />
objectives and control activities, which include controls over information<br />
technology and related processes.<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can I proceed with limited IT resources?</span></u></b><br />
<br />
<br />
<i>Traditional IT solutions can monopolize IT resources. Modern solutions have a</i><br />
<i>lighter IT footprint, so that IT can focus on higher priorities.</i><br />
<br />
<br />
<br />
Traditional BI solutions require significant IT resources up front for deployment,<br />
as well as a high level of ongoing resources for maintenance, support, and<br />
report creation and updating.<br />
These intense IT requirements often limited the use of BI by smaller and midsize<br />
organizations, which didn’t have a deep IT bench, or departments of enterprises,<br />
which didn’t get enough allocation of IT resources.<br />
Worse, IT resources were often required for report creation or updating. This led<br />
to long lines outside of the IT department by business managers who wanted new<br />
or better reporting. IT was swamped, and unable to focus on other priorities.<br />
<br />
<b>Modern solutions have a lighter IT footprint, which allows IT to focus on high</b><br />
<b>priority projects, and also ensures that business users get their questions answered</b><br />
<b>quickly and independently of IT. Look for a solution that:</b><br />
<b><br /></b>
• Minimizes IT resource requirements. Reducing the upfront and ongoing<br />
IT resource requirements both saves money and increases the speed of<br />
deployment. SaaS based solutions, for example, require less IT resources<br />
since the solution is provided as a service – there is no hardware to buy, no<br />
software components to cobble together. Updates happen automatically,<br />
so IT maintenance burdens are dramatically reduced.<br />
• Respects IT standards and expertise. An organization’s IT team is<br />
fundamental to the company’s ongoing operational success. The solution<br />
should meet IT requirements for security, availability, and compatibility with<br />
other systems.<br />
• Empowers the end users. When end users are more self sufficient, the<br />
demands on IT are lighter, and IT can better prioritize their activities. Ideally,<br />
trained users can define reports, dashboards, and alerts on their own,<br />
without any Java programming or scripting. IT can oversee critical data<br />
management functions without getting bogged down in time consuming<br />
user-facing report definitions.<br />
<br />
<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Does it avoid risky integrations?</span></u></b><br />
<br />
<br />
<br />
<i>A solution that is already integrated has far lower deployment and ongoing risk</i><br />
<i>than a solution that starts as standalone components.</i><br />
<br />
<br />
<br />
<br />
Another major contributor to the high risk in traditional BI solution development<br />
is the large number of products and technologies that must be bolted together<br />
to get a full solution. To start with, an ETL product is used to manage the<br />
task of extracting data, transforming it for analysis and inserting it into the<br />
warehouse. These tools are very technical and require expensive programmers<br />
with specialized training.<br />
But vendors have menacing gaps within their own product suites. Most BI suites<br />
have been created from acquired technologies with only loose integration<br />
between the capabilities. Most enterprise BI vendors require you to use separate<br />
technologies for OLAP, reporting, dashboards, and even on-line access to data.<br />
These separate products each require configuration and support.<br />
Modern vendors take an entirely different approach to solving the technology<br />
problem. They:<br />
• Deliver all key functionality in one solution. A fully integrated BI<br />
platform means you have one solution to master and all of your metadata<br />
is encapsulated in one place.<br />
• Require your staff to learn one technology and toolset. A single<br />
solution has one set of commands, syntax, and data structures throughout.<br />
Once your users have been quickly trained to develop applications on<br />
the underlying platform, they will be fully equipped to create all types of<br />
customer facing functionality.<br />
• Avoid custom coding. Because Birst connects everything within one<br />
application, you eliminate all of the situations where you would be required<br />
to use custom java code to script data or custom reports.<br />
• Ease vendor management. Birst reduces the number of responsible<br />
parties to the magic number of one. You won’t have to live with finger<br />
pointing and cross vendor diagnostics when you have a problem. Birst provides<br />
a unique answer to the ultimate need that you have for accountability.<br />
<br />
<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can business users easily create and explore</span></u></b><br />
<b><u><span style="font-size: x-large;">their own dashboards and reports?</span></u></b><br />
<br />
<br />
<i>Ideally, the solution can meet your current needs and easily scale to meet</i><br />
<i>future needs – even when that’s expanding from ten to ten thousand users.</i><br />
<br />
<br />
<br />
Knowledge and speed are critical to solving business challenges. While BI<br />
provides the information, it is the business manager who provides the timely<br />
response to the new information. When insight is in the hands of business<br />
professionals who can make a difference, organizations can achieve great success.<br />
For this reason, it’s vital for a BI solution to make it easy for business users, not just<br />
IT users, to analyze and explore information. The more BI becomes “pervasive” in<br />
an organization, the more agile and proactive a business can become.<br />
Achieving a solution that is easy for business users to “self serve” is challenging,<br />
however. A solution has to be powerful enough to manage complexity and<br />
make it simple for the end user.<br />
<br />
<b>To ensure that you have a solution from which your business users can ”self</b><br />
<b>serve,” look for one that:</b><br />
<b><br /></b>
• Is easy to learn and use. Users should be able to come up to speed<br />
on the system within days, not months. The solution itself should take<br />
advantage of user interface standards – dragging and dropping, dropdown<br />
boxes, highlighting – that are already familiar to a web savvy audience. The<br />
vendor should also provide adequate online, webinar, or in-person training<br />
to ensure that your user base can take best advantage of the solution.<br />
• Makes it easy to explore data and new information. A report is of<br />
limited use if you can’t easily dig for more details or find the drivers of<br />
why a result happened as it did. Dashboards and reports that allow you to<br />
“drill” into deeper details, filter information to the exact data set that you<br />
need, or reset information to desired parameters make it possible for you<br />
to truly explore your data.<br />
• Delivers quick responses; allows users to hone in on interesting data.<br />
Even if the solution is analyzing gigabytes of information from across<br />
multiple tables and data sources, answers need to be delivered quickly to<br />
the user. Responsiveness, when combined with easy data exploration,<br />
allows users to continue asking questions, refining them with each answer,<br />
to hone in analyzing the exact issue of interest.<br />
• Makes the complex easy. In order to make BI approachable for business<br />
users, the solution needs to manage complexity to make analysis easier to<br />
conduct. For example, one of the most complicated aspects of BI is dealing<br />
with time variables. Every company has its own approach, and many business<br />
questions include complex time nuances. Modern solutions can simplify<br />
this complexity, allowing users to simply select options from a menu. Rather<br />
than figuring out how to create formulas on their own, time-based reports<br />
can be created with ease.<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can the solution scale to a large, diverse</span></u></b><br />
<b><u><span style="font-size: x-large;">user base?</span></u></b><br />
<br />
<br />
<i>The demands of your business can change rapidly and dramatically. Your BI solution</i><br />
<i>needs to keep pace.</i><br />
<br />
<br />
<br />
Even BI projects with modest initial goals can eventually become huge deployments,<br />
and you want to make sure that your solution can handle whatever the future<br />
holds. If you are a midsize business with ambitions to grow significantly larger,<br />
or a department of a large organization that realizes that your solution may<br />
become a standard for the entire company – you want to make sure that your<br />
solution can handle large, diverse groups of users, even if that’s not where<br />
you’re starting.<br />
A modern, SaaS architecture is highly flexible and scalable. It allows organizations<br />
to start small, but add users quickly and at large scale. To be future proof, you<br />
want your solution to:<br />
• Quickly and easily scale to thousands of users. If your user base grows<br />
from ten people to thousands in a short period of time, you want to be sure<br />
that you can handle that growth in stride, without a major re-architecting<br />
of the solution or the use of the full efforts of your IT team. This has two<br />
benefits –since you only have to pay for what you need today, and you<br />
only have to pay for what you need tomorrow, too. You don’t have to<br />
pay upfront for “shelfware” that may or may not get used. The solution<br />
should be able to add on users quickly, without a serious degradation in<br />
performance, and without major resource and time requirements.<br />
• Support multiple roles. As deployments get larger, users tend to fall into<br />
different categories – super users, average users, occasional users. They<br />
may have different demands on data, or have different security levels. Your<br />
solution has to be able to easily accommodate these different types of users,<br />
their access patterns, feature needs, and the ability to easily administer<br />
them all.<br />
• Grow without resetting. Scale should be organic and evolutionary, not<br />
disruptive. You should be able to expand easily, without having to make<br />
significant new investments in infrastructure or supporting headcount.<br />
It should be a natural expansion, not a complete reconstruction of the<br />
existing implementation.<br />
<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can the solution keep up with my business</span></u></b><br />
<b><u><span style="font-size: x-large;">as its needs change?</span></u></b><br />
<br />
<br />
<i>When information can be easily and securely shared with partners, vendors, or</i><br />
<i>customers, the entire business ecosystem is more efficient and effective.</i><br />
<br />
<br />
A changing business landscape can challenge every company’s key systems,<br />
but BI solutions confront even bigger obstacles than most. First, because of<br />
their historical perspective, they must rationalize data across every version of<br />
the business over a period of several years. BI cannot just move on to the next<br />
release—it must accommodate the next release, as well as every prior iteration.<br />
Second, much of the value of BI is to make sense of changing measures of<br />
business effectiveness. Changes in customers, competitors, product offerings,<br />
suppliers, and business units are all the target of your BI effort. A successful<br />
solution must accommodate easily a dynamic business environment, rather than<br />
requiring major reconstruction of data and functionality with each new major<br />
product update.<br />
<br />
<b>A successful solution must:</b><br />
<b><br /></b>
• Add new data sources without requiring a major reset of the<br />
solution. As your BI solution demonstrates its value with initial projects,<br />
demand will increase to analyze more data sources. Your system should<br />
be architected in such a way that it can accommodate this data easily and<br />
seamlessly, without significant IT intervention or recoding of the solution.<br />
• Be able to evaluate changes over time. To be effective, a BI solution<br />
must model the many changes that happen over time. Looking at data<br />
from an historical perspective requires a technology that can provide<br />
meaningful views across data that is constantly changing.<br />
• Offer business users self-service, so that they can answer their own<br />
questions quickly and easily. Successful BI solutions become popular<br />
solutions. If IT intervention is required for every new report request or<br />
report update request, organizations end up with angry business users and<br />
choked up IT request queues. When business users are empowered to<br />
build and update their own reports and dashboards, the business is agile<br />
and the IT agenda is focused on priorities. SaaS BI solutions, which have<br />
the lightest requirements of IT teams, are particularly helpful on this point.<br />
Heavy IT footprint solutions, such as open source software, can create<br />
substantial IT backlogs over time.<br />
<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Can the solution easily serve my</span></u></b><br />
<b><u><span style="font-size: x-large;">entire ecosystem?</span></u></b><br />
<b><span style="font-size: large;"><br /></span></b>
Increasingly, organizations function by working with a network of suppliers, retailers,<br />
partners, and channel resellers. Empowering these participants in your ecosystem with<br />
timely information and analysis is a key to making this network function smoothly.<br />
Achieving this extended view of information brings additional challenges to<br />
your BI system, however. It requires a solution that can be easily and securely<br />
accessed anywhere in the world. It also requires that information be tailored to<br />
the level of access required – suppliers may have different views from logistics<br />
partners. It may also require the effective delivery of information to a broad<br />
array of devices - not just desktops and laptops, but mobile phones or tablet<br />
computers as well.<br />
<br />
<b>A solution that serves your entire ecosystem should:</b><br />
<br />
• Deliver a solution globally. While your direct employees may be<br />
concentrated in one locale, your extended network is probably national or<br />
global. Because of this, your solution must be accessible from any point<br />
in the world where it is needed. While delivering a system like this in the<br />
traditional method is complicated and prohibitively expensive, it can be<br />
achieved fairly easily with SaaS solutions, which are available anywhere<br />
there is an internet connection.<br />
• Provide for multiple levels of access, with high security. The solution<br />
should be able to control for which type and amount of data gets seen,<br />
as well as which partners have the ability to add data or create their own<br />
reports. Users could vary from people who only get alerts, people who can<br />
see reports, and people who have full access to the solution. All should be<br />
protected with the highest level of information security.<br />
• Integrate partner data. Your strategic partners demand higher levels of<br />
data integration. In the same way that your sales and marketing teams<br />
want a unified view of the demand generation funnel, your partners<br />
will want to see how, for example, your finished good inventory level<br />
expectations match with their production capacity or parts inventories.<br />
• Deliver to all types of devices. Supply chain users may be on the factory<br />
floor. Sales users may be in transit, and executive users could be anywhere.<br />
Keeping your ecosystem in synch requires that information be consumed<br />
by the most convenient device, whether this is a desktop, laptop, mobile<br />
phone, or tablet computer. SaaS solutions have another advantage here,<br />
since they are accessed through a modern browser, so they can be easily<br />
adapted to be consumed by small format devices.<br />
<br />
<br />
<b><u><span style="font-size: x-large;">Is the solution provider dedicated to my</span></u></b><br />
<b><u><span style="font-size: x-large;">ongoing success in BI?</span></u></b><br />
<br />
<br />
<i>A solution provider that is dedicated to providing best in class BI for its customers, </i><br />
<i>both now and in the future, is a better bet.</i><br />
<br />
<br />
<br />
Are the BI provider’s technology, incentives and motivations aligned with your<br />
ongoing needs as a BI customer? Many traditional BI solutions have core<br />
technology developed over two decades ago. These products were architected<br />
in the age of thick clients, mainframe applications, and Unix database servers.<br />
While these products have been updated with veneers of modern technology,<br />
they still retain their older technology foundations.<br />
Also, many traditional BI solutions have a business model that focuses on the<br />
initial sale, not ongoing success. In the traditional software model, the initial<br />
implementation is the largest payment to the software vendor. So completing<br />
the initial sale is paramount, instead of ensuring satisfaction over the full<br />
customer lifetime.<br />
<br />
<b>Companies deserve better than this. They deserve a company that is dedicated</b><br />
<b>to long term customer success. A modern vendor:</b><br />
<br />
• Starts with a modern, standards-based architecture. Unlike traditional vendors<br />
that continue to market what are essentially legacy products, modern vendors have<br />
technology that is fully aligned with the cloud-based realities of today.<br />
• Supports seamless, regular upgrades. Once a traditional BI solution<br />
is deployed, it can be complicated, time consuming, and disruptive to<br />
upgrade the solution, even when the new features are very desirable.<br />
With a SaaS solution, new features and functionality are added regularly<br />
and seamlessly, so that you can quickly experience the benefits of new<br />
development while avoiding downtime and disruptions.<br />
• Lives and dies by BI. The BI product category has come to be dominated<br />
by technology giants that generate the majority of their revenues by doing<br />
other things besides BI. As a result, the focus on business intelligence<br />
innovation and customer satisfaction has declined. A vendor solely focused on<br />
business intelligence is more dedicated to innovation and customer success in BI<br />
• Is successful when the customer is successful – now and in the future.<br />
SaaS vendors have a subscription model. They make their money over<br />
the lifetime of a customer relationship, so their incentive is to ensure that<br />
companies are up and running quickly, and satisfied with the ongoing<br />
solution today, tomorrow, and five years from now. This is a significant<br />
departure from the traditional model, where customers paid a significant<br />
amount up front, but were left to manage deployment and maintenance<br />
themselves; customer satisfaction concerns were left to the customer<br />
themselves, and satisfaction was often low.<br />
<br />
~Jai Krishna PonnappanJai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-16693209342376140782011-10-26T15:33:00.000-07:002012-11-20T13:58:21.800-08:00Sustainable Success Starts with Agile: Best Practices to Create Agility in Your Organization. While it might frustrate us when we can’t control it, change really should be seen as opportunity in disguise. Enterprises everywhere recognize that to turn opportunity into advantage, business and IT agility is more important than ever. Fifty-six percent of IT executives in a recent survey1 put agility as the top factor in creating sustainable competitive advantage—ahead of innovation.<br />
<br />
But creating true agility is hard. In the same survey, just one in four respondents said their enterprise’s IT was successful at improving and sustaining high levels of agility. Of the more crucial IT goals—optimization, risk management, agility and innovation—agility had the lowest rate of realization among enterprises.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCeGwM1KS6Upf_8NRuGMw20riQWmTFin8GHFi1YlH7C1tny6AvY3zNBJjTi7Wyl9GwUoPmhlZTMPGPum1sb4uDmHMHfG3S2Pz0LrHacIkSgDWkmicjkkPvaQ0ptLvpB6SWBrbqSbDPyO0/s1600/Agile+Success.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCeGwM1KS6Upf_8NRuGMw20riQWmTFin8GHFi1YlH7C1tny6AvY3zNBJjTi7Wyl9GwUoPmhlZTMPGPum1sb4uDmHMHfG3S2Pz0LrHacIkSgDWkmicjkkPvaQ0ptLvpB6SWBrbqSbDPyO0/s1600/Agile+Success.gif" /></a></div>
<br />
True agility in today’s Instant-On Enterprise involves reducing complexity on an application and infrastructure level, aggressively pursuing standardization and automation, and getting control of IT data to create a performance-driven culture. While the challenges are great, getting it right enables enterprises to capitalize on change by reducing time to market and lowering costs.<br />
<br />
<u><span style="font-size: large;">Four drivers for agility</span></u><br />
<br />
At its simplest, agility refers to an organization’s ability to manage change. But there isn’t always agreement on what agility means to the enterprise. Keith Macbeath, senior principal consultant in HP Software Professional Services, meets frequently with customers seeking to increase IT performance. Typically, he says, drivers for agility include the following:<br />
<br />
<span style="font-size: large;">IT financial management:</span><br />
Understanding the levers that affect cost allow your enterprise to be more nimble. For instance, if your business is cyclical, moving to a variable-cost model in IT can help sustain profitability even through a down cycle.<br />
<br />
<span style="font-size: large;">Improved time to market:</span><br />
This gets to the heart of agility: delivering products and services faster.<br />
<br />
<span style="font-size: large;">Ensuring availability: </span><br />
"Availability isn't a problem ... until it is. Then it's at the top of the CIO's agenda," says Macbeath. Being able to rapidly triage, troubleshoot and restore service is as important to agility as the ability to get the service deployed in the first place.<br />
<br />
<span style="font-size: large;">Responding to a significant business event:</span><br />
<span style="font-size: large;"> </span>In the merger of HP customer United Airlines with Continental Airlines, the faster the IT integration, the more significant the savings.<br />
<span style="font-size: large;"><br />
</span><br />
<u><span style="font-size: large;">Important factors for creating sustainable competitive advantage</span></u><br />
<br />
<span style="font-size: large;">The importance of measurement and benchmarking</span><br />
<br />
Business agility starts with a holistic view of IT data, says Myles Suer, senior manager in HP Software’s Planning and Governance product team. "Getting timely access to data that allows you to drive to performance goals and then make adjustments when you don't meet those goals represents the biggest transformation possibility for IT," he says.<br />
<br />
For CIOs focused on transforming their business, the key is gaining access to accurate, up-to-date metrics that are based on best-practice KPIs. Trustworthy metrics let CIOs control IT through exception-based management and understand what it will take to improve performance.<br />
<span style="font-size: large;"> </span><br />
<span style="font-size: large;">What to monitor and measure</span><br />
<br />
To achieve greater agility, look to three broad areas of improvement and put in place monitoring programs to track against performance goals.<br />
<br />
<span style="font-size: large;">Standardization:</span><br />
<br />
<span style="font-size: large;"> </span>"That's the first step," Suer says. Ask yourself: What percentage of your applications run on standard infrastructure? How many sets of standard infrastructure do you have? "You want a standard technology foundation to meet 80 percent of your business requirements," says Macbeath. It may seem counterintuitive, but standardization makes a company more efficient and more agile than competitors. Standardization is also a prerequisite for automation. Public cloud providers aggressively pursue both. Taking the same approach for enterprise services means you can begin to realize cloud efficiency gains.<br />
<br />
<span style="font-size: large;">Simplicity:</span><br />
<br />
"Agility is the inverse of complexity," says Macbeath. Your goal is to measure and reduce the number of integration points and interfaces in your architecture. The key is decreasing the number of platforms managed. Application rationalization and infrastructure standardization programs reach for low-hanging fruit, such as retiring little-used and duplicative applications and unusual, hard-to-support infrastructure. Longer term, your enterprise needs to tackle the more difficult task of reducing the number of interfaces between applications. Macbeath recommends driving to a common data model between applications. This reduces support costs and makes it faster and cheaper to integrate new functionality into an existing environment.<br />
<br />
<span style="font-size: large;">Service responsiveness:</span><br />
This can be as simple as tracking help-desk response time, mean time to repair, escalations and so on. "Once you're systematically tracking responsiveness, you can move to a more sophisticated level of cost-to-quality tradeoffs," Macbeath says.<br />
<br />
<u><span style="font-size: large;">Translating agility into business success</span></u><br />
<br />
In working with HP customers, Macbeath sees numerous examples of organizations that are successfully increasing their agility.<br />
<br />
For example, a European bank working with HP has established an online system to show internal customers exactly how much it costs for one "unit" of Linux computing to run an application at multiple service levels: silver or gold. "Retail banking is a very cost-competitive business," Macbeath says. "Allowing internal customers to see the cost-performance tradeoffs for themselves and have the numbers right there makes it possible for business and IT to work together to make decisions to benefit the business."<br />
<br />
Pursuing agility by way of automation let another HP customer, a global telecom company, reach new sources of revenue. Instantly deploying wireless hotspots provides a key capability for the company; by automating this process, IT was able to push out more than 40,000 new hotspots. The company turned on a new source of revenue almost immediately.<br />
<br />
<span style="font-size: large;">Other organizations are finding the same path to greater agility:</span><br />
<br />
Standardization and automation combined with measuring results to drive performance. Through this process, their IT departments are demonstrating greater value for the business while delivering greater speed and transparency.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-3427419829114486022011-10-26T15:19:00.000-07:002012-11-20T13:58:51.864-08:00Extend the Principles of Agile to Deliver Maximum Business Value. The Agile movement has already helped thousands of IT organizations develop applications at light speed. But to maximize Agile’s impact on the business, you have to push its principles further throughout the enterprise until Agile delivery becomes continuous delivery, and continuous delivery leads to true business agility. The four stages that lead from Agile development to the agile enterprise can revolutionize the way business value reaches customers’ hands.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTOnHhvMqLWgPhopoD-lO3qxAvNofRrpDCw6ielzeTGuoNwB_qQ-IG8usYLpg8sg6okI_AkBMsZz34_0zHq2MrZxZqUokREbLT4HEOSm3CqainMRHn89YUgdthSVCRZysMPnCya2ssywY/s1600/Agile+Enterprise.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTOnHhvMqLWgPhopoD-lO3qxAvNofRrpDCw6ielzeTGuoNwB_qQ-IG8usYLpg8sg6okI_AkBMsZz34_0zHq2MrZxZqUokREbLT4HEOSm3CqainMRHn89YUgdthSVCRZysMPnCya2ssywY/s1600/Agile+Enterprise.jpg" /></a></div>
<br />
<span style="font-size: large;">Stage 1: Agile development</span><br />
<br />
Agile initially emerged as a collection of software development practices in which solutions evolve incrementally through the collaboration of self-organizing teams. Because early adoption grew out of grassroots, developer-led initiatives, Agile matured first within the developer space. It manifested in practices designed to shorten the feedback loop and uncover problems earlier in the cycle so they could be addressed sooner. It made coders fast and flexible.<br />
<br />
<span style="font-size: large;">Stage 2: Agile delivery</span><br />
<br />
In many IT shops that had been organized in traditional functional silos, testers initially stood on the sidelines and wondered what Agile meant for them. The effect was a pseudo-Agile process in which code was developed in iterations but then tossed over the wall for QA teams to test the same way they always had.<br />
<br />
The IT organizations that have had the best results with Agile have torn down the silos between development and QA to create truly cross-functional teams. To allow testers to keep up with the accelerated development pace and not sacrifice quality for velocity, they have revamped their approach to incorporate more robust test automation that can be run on a near-continuous basis. They have also adopted advanced techniques, such as service level (API) testing and exploratory testing to mitigate risk as early as possible.<br />
<br />
Many organizations adopting Agile today are at this level. But as Agile adoption continues to expand and leaders see the value it can bring to delivery, momentum is gathering to break down the next level of organizational silos.<br />
Four stages to an agile enterprise<br />
<br />
<span style="font-size: large;">Stage 3: Continuous delivery</span><br />
<br />
Agile delivery teams have made great strides, but what is the point of rapidly building new features if those features just sit and wait to be released? To capitalize on the advances in delivery and better translate them into business value, it’s time to extend Agile development principles to deployment.<br />
<br />
Continuous delivery, which is enabled by the DevOps movement, extends the Agile mind-set to incorporate IT operations. It focuses on what is ultimately important—shorter cycles for actually putting functionality in the hands of users. It relies not only on better collaboration between the two disciplines, but on comprehensive automation of the build, test and deployment process, so that—at the extreme level—every code change that passes automated functional, performance and security testing could be immediately deployed into production. This level of integration and collaboration between delivery and operations allows releases to be driven by business need rather than operational constraints.<br />
<br />
Blurring the lines between development and operations isn’t easy, but it is critical. According to Forrester Research, some traditional process models can “encourage handoffs and demarcation of responsibility and ownership rather than collaboration, teaming, and shared goals. This may lead each party to think that the other is trying to pull a fast one, leading to confrontational situations and heavy reliance on paperwork and formal documentation. By sharing process and building a cross-functional team inclusive of operations, IT organizations can remove the disconnects.”1<br />
<br />
The best way to start moving toward continuous delivery is to begin embracing DevOps principles. Include operations staff in demo meetings and planning sessions, share assets (test, build and deployment) and automate as much as possible. Examine KPIs and incentives to ensure alignment across the two functions. You’ll know you’re making progress when you see overall cycle times, from idea inception to released functionality, decrease dramatically.<br />
<br />
<span style="font-size: large;">Stage 4: Business agility</span><br />
<br />
Although few organizations have achieved this stage, it’s what all are aiming for. True business agility happens when the entire organization can continuously analyze results and adapt accordingly.<br />
<br />
Here’s how it happens: Deploying smaller increments more frequently not only puts features into the hands of the users at a much faster rate, but it also facilitates a steady stream of user feedback. User feedback lets you apply the Agile concept of “inspect and adapt” at the business level. It provides timely insight into shifting user preferences and helps you make precise course corrections and more informed decisions.<br />
<br />
<span style="font-size: large;">Business agility requires more than just IT. </span><br />
<br />
Achieving true agility will require a cultural shift within your organization before you can fully take advantage of the opportunity it presents. Business stakeholders must be empowered to make decisions quickly without legacy processes—such as annual budgeting—standing in their way. Other functions, such as sales, marketing and customer support, also play vital roles and need to be tied in effectively.<br />
<br />
<span style="font-size: large;">If you’re already operating at Stage 3, it’s time to look ahead. Start by asking yourself these questions:</span><br />
<br />
Which of your core business applications could benefit or gain differentiation from constant user feedback?<br />
What non-IT areas of your organization would need to be better integrated to get full, end-to-end agility?<br />
What legacy processes might need to be revisited and transformed?<br />
<br />
When you start to achieve more of the business objectives that drove your projects in the first place—increased revenue, faster ROI, improved customer satisfaction—you’ll know you’re approaching true business agility.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-76659147357614278492011-10-19T10:39:00.000-07:002012-11-20T13:59:28.958-08:00Why You Should Take this Social Enterprise Seriously<span style="font-size: large;">Salesforce Presents New Social Enterprise with Chatter, Mobility and Data</span><br />
<br />
Organizations should take this social enterprise seriously, and especially those that see social media as essential to their future and Salesforce as well<br />
<br />
At the Dreamforce conference, Salesforce.com (NYSE:CRM) CEO Marc Benioff unveiled the latest evolution of the company’s strategy and supporting technology for cloud computing and mobile technologies.<br />
<br />
Its aim is to enable businesses to engage with customers and prospects via social media channels – what Salesforce calls the “social enterprise” – and empower employee and customer social networks to operate individually and together. Note I did not mention CRM, which doesn’t have a role in this platform for basic interactions with prospects and customers and is accompanied by a large ecosystem of partners that provide dedicated marketing and contact center applications. As summarized in its announcement, Salesforce’s strategy is clearly different from that of others in the applications market, including Oracle and SAP, which have products for the cloud computing environment and have made strides into integrating collaboration and social media capabilities into their applications.<br />
<br />
Salesforce.com’s social enterprise is a big step forward from the strategy it talked about at last year’s Dreamforce, and is now focused helping companies build social profiles of employees and customers that can managed and augmented with information about the individuals from other social networks. The company’s partners are also working on such capabilities. For example, software from Reachable can present the relationships among individuals in a social graph. This week Roambi introduced analytic and mobile integration with Salesforce Chatter, which is another advance in what my colleague David Menninger calls the consumerization of collaborative BI.<br />
<br />
Salesforce says significant technological improvements in the coming Winter 2012 release and later will make Chatter a true social business tool with many methods to chat, share, approve and otherwise enable the collaborative process. Another addition slated for Chatter is the ability to include presence information in the chat the way most instant messaging networks do today in a feature the company calls Chatter Now.<br />
<br />
Users will be able to embed and share video, graphics and other kinds of files. Users who have too much traffic in their feeds will be able to filter content based on keywords. Chatter Approvals will be able to handle prompted interactions. With Chatter Customer Groups users will be able to invite and interact with customers or external people in private discussion groups. Those looking to build custom enhancements to the software can employ the Chatter API using REST and streaming that can be embedded with Chatter to interact with applications. Last year iWay Software demonstrated third-party integration to take any systems event and publish it into a Chatter feed.<br />
<br />
Surprisingly, iWay, which is an Information Builders company, was not at Dreamforce this year, but it has paved the way for enterprise notifications in Salesforce’s social enterprise efforts. Salesforce also is targeting organizations using Microsoft SharePoint; they will be able to use Chatter instead of Microsoft’s messenger technology. Salesforce with Chatter Connect will be able to integrate its feeds with other environments to make a more seamless social and collaborative environment.<br />
<br />
The expanded capabilities for Chatter, and Salesforce’s enhanced profiles of customers and prospects, will be integrated with the Service Cloud in an application called Chatter Service to help improve customer interactions for contact centers. Chatter Service will also be able to integrate into Facebook. This could create a new class of customer self-service for organizations that want to move their initial interactions into social media, and move questions and comments into more formalized customer service channels for resolution.<br />
<br />
To address the full needs of a contact center though beyond social media will create other applications for which Salesforce has plenty of partners exhibiting including Contactual, inContact, Interactive Intelligence, Five9 and LiveOps. Salesforce showed how it can add value to the Sales Cloud with its advances in Chatter, but we do not expect to see a more integrated set of methods till 2012. Until then you can use Chatter by itself to interact with your sales team and the new versions will now be a good reason to evaluate them for what they call social sales. If you are looking to address the broader set of sales activities and processes beyond SFA, Salesforce has plenty of partners that should be considered if you care about efficiency and achieving sales quotas and targets.<br />
<br />
Salesforce.com’s social enterprise direction will require simpler access to applications from smartphones and tablets. The company has created an engine to transform its applications to operate in an HTML5 environment so they can be utilized on smartphones and tablets from Apple, Android devices, RIM hardware and Microsoft’s, too. Salesforce calls this its Touch approach and will release it sometime in the future. You can sign up to be notified when that happens with Salesforce’s Touch. This will be a significant new option for anyone operating in the Salesforce.com environment.<br />
<br />
One of the key pushes by Salesforce is database.com, which is designed to securely store organizations’ data in the cloud; it can be used by applications running on the company’s force.com platform for cloud apps as well as new social enterprise offerings that will come out in 2012. Our upcoming research in business data in the cloud will unveil more challenges and opportunity for improvement to support technology like database.com. This offering makes it easy to provision a database and get started. Its pricing and capabilities suggest that database.com is a transactional centralized data service. It’s not clear whether it will be useful for business analytics, which our research finds to be a major need in organizations today.<br />
<br />
Business analytics has not been one of Salesforce strengths which its customers can attest which is why the portfolio of partners providing these capabilities is quite significant. Many of them also depend on their own database technology for analytics that operates in the cloud. If database.com is not able to support the analytics needs within the database its potential and impact to its customers could be hindered.<br />
<br />
The challenge with database.com is that if you are trying to do automated data integration efficiently, including migration, synchronization or replication across clouds of data under applications or to the enterprise, you will need a separate product, and while Salesforce has many partners, none are part of the announcement or listed on the database.com website. As David Menninger has pointed out, integrating information from diverse clouds of applications requires work. Our newly completed research in Business Data in the Cloud will enumerate those challenges. If you are looking for help in dealing with integration in cloud and enterprise, consider Dell Boomi, Informatica, Pervasive and SnapLogic, with its dedicated data integration technologies.<br />
<br />
Salesforce.com makes the social enterprise interesting, and it is taking the lead in advancing these kinds of interactions, especially with business-to-consumer companies, which need the most help in dealing with social media. Its ecosystem of partners and the ability to integrate with consumer social media give Salesforce an early advantage in the market.<br />
<br />
If you are looking for new core applications in marketing, sales and customer service, you will need to invest in the partners to make this happen. It’s not easy to determine how to get the full value in your Salesforce.com investments, but it is worth the effort. If you are in sales or customer service departments or are trying to get a great mobile strategy, come and let us know as we can definitely help get what you need today. Organizations should take this social enterprise seriously, and especially those that see social media as essential to their future and Salesforce as well.<br />
<br />
<br />Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-47123800188218317992011-10-19T10:21:00.000-07:002012-11-20T13:59:50.336-08:00Kinect Turns Any Surface Into a Touch Screen Researchers combine a Kinect sensor with a pico projector to expand the possibilities for interactive screens.<br />
<br />
A new prototype can transform a notebook into a notebook computer, a wall into an interactive display, and the palm of your hand into a smart phone display. In fact, researchers at Microsoft and Carnegie Mellon University say their new shoulder-mounted device, called OmniTouch, can turn any nearby surface into an ad hoc interactive touch screen.<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZqnCJoripJuEp2PZ_KlgA_Hb3ZFIVXh2axtg1CBfXCAPlwwwOE5GrPrkWa_ohImgLRnbL2nw7R-Z8Ev8nlmclBqqr-lVc0JMTmrRjGKt_bOM3_LFWzpDVbjy60KfWdIiRc_e5px428ek/s1600/multitouch_x220.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="392" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZqnCJoripJuEp2PZ_KlgA_Hb3ZFIVXh2axtg1CBfXCAPlwwwOE5GrPrkWa_ohImgLRnbL2nw7R-Z8Ev8nlmclBqqr-lVc0JMTmrRjGKt_bOM3_LFWzpDVbjy60KfWdIiRc_e5px428ek/s400/multitouch_x220.jpg" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-size: small;"><b>Hands-on "screen":</b> A proof-of-concept system allows smart phones to use virtually any surface as a touch-based interactive display. </span></td></tr>
</tbody></table>
<br />
<br />
OmniTouch works by bringing together a miniature projector and an infrared depth camera, similar to the kind used in Microsoft's Kinect game console, to create a shoulder-worn system designed to interface with mobile devices such as smart phones, says co-inventor Chris Harrison, a postgraduate researcher at Carnegie Mellon's Human-Computer Interaction Institute in Pittsburgh and a former intern at Microsoft Research. Instead of relying on screens, buttons, or keys, the system monitors the user's environment for any available surfaces and projects an interactive display onto one or more of them.<br />
<br />
OmniTouch does this automatically, using the depth information provided by the camera to build a 3-D model of the environment, says Harrison. The camera acquires depth information about the scene by emitting a patterned beam of infrared light and using the reflections to calculate where surfaces are in the room. This eliminates the need for external calibration markers. The system rebuilds the model dynamically as the user or the surface moves—for example, the position of a hand or the angle or orientation of a book—so the size, shape, and position of these projections match those of the improvised display surfaces, he says. OmniTouch "figures out what's in front you and fits everything on to it."<br />
<br />
The system also monitors the environment for anything cylindrical and roughly finger-sized to work out when the user is interacting with it, again using depth information to determine when a finger or fingers make contact with a surface. This lets users interact with arbitrary surfaces just as they would a touch screen, says Harrison. Similarly, objects and icons on the ad hoc "screens" can be swiped and pinched to scroll and zoom, much like on a traditional touch screen. In one demonstration art application, for example, OmniTouch used a nearby wall or table as a canvas and the palm of the user's hand as the color palette.<br />
<br />
<br />
The shoulder-mounted setup is completely impractical, admits Hrvoje Benko, a researcher in Natural Interaction Research group at Microsoft Research in Redmond, Washington, who also worked on the project, along with colleague Andrew Wilson. "But it's not where you mount it that counts," he says. "The core motivation was to push this idea of turning any available surface into an interactive surface." All the components used in OmniTouch are off the shelf and shrinking all the time. "So I don't think we're so far from it being made into a pendant or attached to glasses," says Benko.<br />
<br />
Duncan Brumby, a researcher at the University College London Interaction Center, in England, calls OmniTouch a fun and novel form of interaction. The screen sizes of mobile devices can be limiting, he says. "There's a growing interest in this area of having ubiquitous, intangible displays embedded in the environment," he says. And although new generations of smart phones tend to have increasingly higher-quality displays, Brumby reckons users would be willing to put up with lower-quality projected images, given the right applications.<br />
<br />
Precisely which applications is hard to predict, says Harrison. "It's an enabling technology, just like touch screens. Touch screens themselves aren't that exciting," he says—it's what you do with them. But the team has built several sample applications; one allows users to virtually annotate a physical document, and another incorporates hand gestures to allow OmniTouch to infer whether the information being displayed should be made public or kept private.<br />
<br />
"Using surfaces like this is not novel," says Pranav Mistry a researcher at MIT's Media Labs. Indeed, two years ago, Mistry demonstrated a system called SixthSense, which projected displays from a pendant onto nearby surfaces. In the original version, Mistry used markers to detect the user's fingers, but he says that since then, he has also been using a depth camera. "The novelty here [with OmniTouch] is the technology," he says. "The new thing is the accuracy and making it more robust."<br />
<br />
Indeed, the OmniTouch team tested the system on 12 subjects to see how it compared with traditional touch screens. Presenting their findings this week at the ACM Symposium on User Interface Software and Technology in Santa Barbara, the team showed it was possible to display incredibly small buttons, just 16.2 millimeters in size, before users had trouble clicking on them. With a traditional touch screen, the lower limit is typically around 15 millimeters, says Harrison.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-48529019971918508962011-10-19T10:15:00.000-07:002012-11-20T14:00:07.024-08:00Reorganize Your Past, Online<span style="font-size: large;">A Web service developed by Microsoft Research lets people curate their own personal history.</span><br />
<br />
Microsoft researchers are set to launch Project Greenwich, a website that helps users assemble and chronologically organize content about a person, event, or any other subject. The site, to launch in beta on October 31, allows users to archive uploaded items, such as photos and scans of objects, alongside links to existing Web content around a horizontal timeline marked with dates. Different timelines can be combined and displayed on the same page or merged.<br />
<br />
Project Greenwich users attach images, maps, and other visual content, plus accompanying text, to relevant dates on their timelines. Each entry, which a viewer can click to see in full, is illustrated with thumbnail pictures in chronological order to show it in the context of other entries, and potentially alongside other timelines.<br />
<br />
"We are interested in the creative act of reflecting on the past," says Richard Banks, lead designer on the project. "Actually sitting down and spending time creatively thinking about the past by making a photo album or a timeline is very different to existing online content being ordered chronologically."<br />
<br />
The website was provisionally called Timelines by its developers at Microsoft Research Cambridge, in England. This was hastily changed due to the similarity to Facebook's new Timeline feature, which allows users to scroll chronologically through pictures, updates, and event listings related to their lives or those of their friends. Facebook's format uses indicators such as the numbers of comments that content has attracted to automatically highlight key events. Users can also manually choose what should be included and left out.<br />
<br />
<br />
Banks, who is a principal interaction designer in the Computer Mediated Living group at Microsoft Research Cambridge, was partly inspired by a suitcase of around 200 photographs left by his grandfather Ken Cook, who flew bombers over Germany during World War II, on his death in 2006. As an example of what can be done using Project Greenwich, he has created representations of his grandfather's life merged with historical content on the Web about the war and the British Royal Air Force. "The ability to merge different timelines about, say, people and events creates interesting contrasts between authoritative and personal versions of events," adds Banks. <br />
<br />
For several years, Banks has been studying how the increasing digitization of our lives affects how we deal with the past, remember the dead, and create memorabilia. Project Greenwich builds on previous projects developed by the Computer Mediated Living group. One, called Family Archive, was an interactive tabletop touch screen with an integrated camera. It was designed to allow family members to organize their digital memorabilia alongside scans of physical artifacts. Banks also previously developed a prototype called Timecard, a digital photo frame with an interface that allowed users to create timelines about the people or events featured in the displayed images.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOSQ36OQgJbbLrlPCtW3ZRETEYoQaZKZfSgNvCfUQg1vpBuMONdEPMtySgN2ImkDL6tJ_EUJBRa5VCL3xt6V3M20XSnzxV_FawUGAdOnMx3PZ3quLuo23ZQXobOABUMbF3pCW-f5vcoms/s1600/greenwich-x616.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOSQ36OQgJbbLrlPCtW3ZRETEYoQaZKZfSgNvCfUQg1vpBuMONdEPMtySgN2ImkDL6tJ_EUJBRa5VCL3xt6V3M20XSnzxV_FawUGAdOnMx3PZ3quLuo23ZQXobOABUMbF3pCW-f5vcoms/s1600/greenwich-x616.jpg" /></a></div>
<br />
The beta launch will allow the team to gather data on how people think about time and reconstruct the past, what elements they choose to include, and the ways they contrast personal and existing content. This information will shape its ultimate form and potentially also inform the way other future Microsoft products are designed. Project Greenwich may ultimately become a commercial Microsoft website, or it could be integrated into new versions of existing products or entirely new products. This will be decided later, partly based on the response to the beta launch. Banks expects to include new features in later versions, such as the ability to print timelines created on the site; to embed them in documents, such as blogs or homework; and to allow for multiple individuals to contribute to the same entry.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-2053801029803021862011-10-19T10:02:00.000-07:002012-11-20T14:00:25.407-08:00Mobility Matters: Delivering Needed Information at the Right Time Demand for BI as a means to get maximum value from information has never been higher as businesses increasingly compete in real time and require integrated information from across the enterprise. An old saw says BI gets "the right information to the right people at the right time." It's really time to add "via the right medium" to that mix.<br />
<br />
Automating business decisions is one path to BI maturity. Triggering actions automatically, based on changes in corporate data, can arise beneficially from a solid understanding of how decisions are made today.<br />
<br />
But we also know that many decisions are multifaceted, and a knowledge worker's analysis will continue to be a part of effective business intelligence.<br />
<br />
<br />
Effective analysis is getting more complicated for knowledge workers. The more involved aspects require understanding what is happening and combining that with summarized historical data to build a set of possible actions. These decision "analytics" are the basis of competitive advantage for organizations today. Once calculated, they are put to effective use, utilizing the best medium available for real-time delivery.<br />
<br />
Like water, information and analytics must flow through the path of least resistance, utilizing the deployment option that turns the information into valuable business action most quickly.<br />
BI Deployment Option History<br />
<br />
The accepted paradigm of effective business intelligence must change. Once, BI was exclusively made of reports built by IT from overnight-batch-loaded data warehouses, which replicated a single or small set of source systems. Those reports were deployed to the personal computers of end users in what now seems, in hindsight, a very heavy-handed and resource- intensive process.<br />
<br />
Delivering a report to a user's personal computer on a regular basis is nowhere near the pinnacle of BI achievement. Shops still operating with this mentality are leaving tremendous value on the table.<br />
<br />
Today the norm for BI involves "zero footprint" Web-based delivery of reports. This improvement allows information to reach many more users. A parallel development is that, while the detailed transactional data is necessary to be accessible on a drill-through basis, it is the rapid availability of summary level information that activates the process.<br />
<br />
The majority of users have become more accustomed to a targeted presentation layer. Dashboards represent an advanced form of information delivery, second only to operational BI as a mature approach to disseminating information. Acting on dashboards that already have a certain amount of knowledge worker intelligence built in moves the organization to real-time competitiveness.<br />
<br />
When you add mobility to the picture, notifications take on a whole new utility. Notifications can be sent to mobile devices when the dashboard data changes - or, rather, changes in a way that is meaningful to the knowledge worker. Mobile applications provide useful notifications and remove email as an extra step in the process.<br />
<br />
Notifications, combined with the ability to immediately access the information wherever the knowledge worker is, provide many advantages over a dashboard, which requires Web browser technologies.<br />
<span style="font-size: large;"><br />
</span><br />
<span style="font-size: large;">Business Mobility</span><br />
<br />
If the past several years have brought a sea change in social culture, it is clearly in the use of mobile devices. What was once a phone for verbal communication has become a favored medium for email, Web access, music, podcasts, photos and information about weather, dining and travel. This has all happened in a short period of time and the trend will surely continue.<br />
<br />
As case studies attest, mobile devices and tablet computers are highly useful business tools. The flexibility that they offer to knowledge workers no longer tied to a physical location is now seen to be as necessary in business. Achieving real-time business mobility helps information flow like water through the path of least resistance. It facilitates less hunting and gathering on the part of the information consumer by delivering summarized information, supported by detail by BI systems.<br />
<br />
The biggest business factor driving the need for mobility is the real-time nature of new business needs. Out-of-stock conditions, customer complaints and fraud are not optimally solved with reporting. In order to address these issues, information cannot be out of date. Fortunes can be gained and lost by suboptimal business decision timing. Data warehouses built with a personal computer usage layer create a distinct challenge to the optimal timing of decisions.<br />
<br />
The preferred timing of intelligence gathering is during the immediate occurrence of a trigger event. Business is becoming a world where the players are always plugged in, and expect and need to make immediate decisions. Therefore, business units - and the systems they utilize for real-time decision-making - need high quality, high performing, corporately arbitrated information in real-time.<br />
<br />
For competitive parity, it is imperative that the information management function not only responds to business needs, but also brings solutions to the table in real-time and ensures that they are visibly exposed for decision-makers.<br />
<br />
Real-time information delivered to an abandoned desktop or to the Web that inherently involves multiple steps for the user to derive value does not exploit the potential of available on-time information. Businesspeople need easy access to accurate information delivered to them at any time or place. The answer is mobile BI, utilizing the mobile device as the data access layer.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-3583495731896576827.post-33202610012536980572011-10-19T09:54:00.000-07:002012-11-20T14:00:44.341-08:00Getting the Most out of Business Analytics The expanding managerial movement to adopt analytics is being spurred by the needs for improved organizational performance and a sharpened competitive edge. Now that the benefits of applying analytics for insights and better decisions are being accepted, the next question is: How should an organization get the maximum yield and benefits from business analytics?<br />
<br />
Carlson’s Law: Bottom-Up versus Top-Down Ideas<br />
<br />
A trend with applying analytics is a demonstration of “Carlson’s Law,” posited by Curtis Carlson, the CEO of SRI International in Silicon Valley. It states that: “In a world where so many people now have access to education and cheap tools of innovation, innovation that happens from the bottom up tends to be chaotic but smart. Innovation that happens from the top down tends to be orderly but dumb.” As a result, says Carlson, the sweet spot for innovation today is “moving down,” closer to the people, not up, because all the people together are smarter than anyone alone, and all the people now have the tools to invent and collaborate.<br />
<br />
A generally accepted way to drive the adoption of analytics is with executive team sponsorship and formally establishing a competency center for analytics. Unfortunately, the conditions are not always right for these. Executives are often distracted with fire-fighting or office politics. And creating a competency center requires foresight and willpower from executives, which can be a limiting factor.<br />
<br />
<br />
I am a believer in Carlson’s Law because I have observed it in the adoption of enterprise performance management methodologies. These methodologies include strategy maps, balanced scorecards, customer profitability analysis, risk management, and driver-based rolling financial budgets and forecasts. Passionate middle-management champions drive change involving analytics more often compared to executives. Why? Middle managers ask themselves, “How long do we want to perpetuate gaining understanding and making decisions the way we do now – with little or no analytical insight or hypothesis testing?”<br />
Pursuing Unachievable Accomplishments<br />
<br />
Leadership does not only exist at the top of the organizational chart. Leadership can be present in individuals below the C-suite positions. This is possible because a key dimension of leadership is the art of getting a group of people to accomplish something that each individual could not do alone. Leadership does not require formal authority and command-and-control behavior.<br />
<br />
There are hundreds or maybe even thousands of books and articles about leadership, yet some highly respected people believe there is a shortage of leadership. For example, in “Where Have All the Leaders Gone?” former Chrysler CEO Lee Iacocca describes with anger the sad state of leadership in the U.S. today.<br />
<br />
My simple model of leadership has three components:<br />
<br />
Care: Followers believe that leaders care about them and their organization.<br />
Trust and hope: Followers believe that supporting a leader will improve things.<br />
Mission: Followers want leaders to answer the question “Where do we want to go?” so that they can help answer “How will we get there?”<br />
<br />
Executive leaders must communicate the third component; however, middle-manager champions can exhibit the first two.<br />
Analysts Can be Leaders<br />
<br />
Experienced analysts realize that applying analytics is not like searching for a diamond in a coal mine or flogging data until it confesses the truth. Instead, they first speculate that two or more things are related, or that some underlying behavior is driving a pattern to be seen in various data. They apply business analytics more to confirm a hypothesis than to randomly explore. This requires easy and flexible access to data, the ability to manipulate the data, and software to support the process. This is a form of leadership.<br />
<br />
Leaders require moral, not physical, courage. An example of physical courage is rescuing someone from a fire. That is noble, but is not leadership. Moral courage is almost the opposite of a rescue. It is doing something not immediately highly valued and potentially perceived as sticking your nose in other’s business. Ultimately it is seen as a helpful contribution to organizational performance improvement.<br />
<br />
There are hundreds of examples of applying analytics. One is to identify the most attractive types of customers to retain, grow, win back or acquire. Others involve risk management, warranty claim analysis, credit scoring, demand forecasting, clinical drug trials, insurance claims analysis, distribution route optimization, fraud detection, and retail markdown and assortment planning. The list is endless.<br />
<br />
The investigation and discovery of what will align an organization’s actions with the executive team’s strategy for execution will not come from a CEO with a bullhorn or a whip. Better insights and their resulting decisions will come from analytical competency. Analysts can demonstrate leadership with the passion and desire to solve problems and discern answers – the power to know.Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.com