Swim Lanes

CM2016_11_swim“Have you designed your swim lanes yet?’ isn’t a good question to ask someone whose only form of exercise is swimming. My immediate thought was of a pool, with the rows of floating lane markers.

It turns out, as those of you who have trained or worked in business process design will know, that a “swim lane” in business terms refers to groups of activities in an process that belong together or are completed by the same department. It can help clarify the responsibilities within a process by presenting them visually.  When you’re trying to set up multiple and complex processes that involve a number of participants it makes sense.

It’s a helpful metaphor since swim lanes keep swimmers apart and moving in the same direction, but don’t extend the metaphor too far – swimmers in swim lanes are generally trying to beat the other swimmers to the end of the pool. In a business process there isn’t much to “win” by being the first to finish your steps in the process.

So if you’re working business process diagrams use the term, it has a technical meaning that makes sense. Avoid using it as a synonym for a department, role, or stakeholder group.

It lost out in the first round of the Forbes Annoying Business Jargon Matchup in 2012, where the eventual winner was “drinking the Kool-aid”, so apparently this term is more useful and perhaps less abused than most jargon.

Image: Swim via pixabay

Doxxing

I heard this for the first time recently, despite being online for hours of every day for the last 15 years, and despite witnessing a couple of examples of it.

So what is it? Here’s the definition the Urban Dictionary gives, you’ll note it’s from 2008


Some examples;

  • in an anonymous forum someone figures out who you are IRL (in real life) and publishes your real name.
  • your social security number ends up on a site based in the former soviet union – and you’re the First Lady, Michelle Obama
  • the head of FBI’s home address was posted online (although an out-of-date address)

It sounds like a problem, and it could be in some cases, but it’s legal. Or at least it’s legal to re-publish public information.

If the information is obtained by hacking or by social engineering then a crime may have be committed, and if the information is used to infiltrate emails, commit fraud or to threaten someone that is a crime.

But publishing public information? Not a problem.

Which means we should all be smart about how much information we share online, but as the number of devices we use grows, and the amount we communicate online grows this gets harder.

image: address book via pixabay

Gamification

Gamification takes the concept of rewards in games and applies it elsewhere, often to non-game websites. It relies on our natural desire for achievement and our competitiveness.

Yu-kai Chou, an expert in gamification developed an Octalysis framework which identifies 8 possible motivations for people to stay in a game.

  1. Epic Meaning & Calling
  2. Development & Accomplishment
  3. Empowerment of Creativity & Feedback
  4. Ownership & Possession
  5. Social Influence & Relatedness
  6. Scarcity & Impatience
  7. Curiosity & Unpredictability
  8. Loss & Avoidance

Game makers will ideally include all motivations in the course of the game to maximise engagement, but marketers will choose to focus on the motivations that align with their brand. For example Nike’s brand is based on the famous “just do it” mentality and their Nike+ uses aspects of gamification associated with accomplishment, by allowing successful users to unlock motivation talks from elite athletes.

Social Networks also use gamification to encourage activity, the most famous example is probably 4square with over one hundred and fifty active badges, some related to activity on 4square but others, such as the Met Lover’s Badge, connect to the marketing campaigns of companies and organisations. Enterprise social networks, including ours, also use badges to reward activity and connections.

Educators and health professionals try to use gamification principles to increase people’s motivation for positive change. However it can be challenging to integrate this external purpose setting with the user-centred design principles of a game. Or, as discussed on the Psyche’s Circuitry blog; The game doesn’t care.

Not everyone responds well to gamification techniques, when we introduced them to our enterprise social network a small group of people thought them horribly childish. The result being that we’ll allow you to switch off display of badges on your own profile – although you’ll still be awarded the badges.

image: roll the dice via pixabay

Big Data

Big Data is often touted as a solution to all our problems, a panacea for all ills often by people who struggle to define it. So what is big data and what kind of problems has it solved?

Big data refers to sets of data so big and complex that they cannot be analysed by traditional methods and tools, but which release new value when analysis is achieved.

Google translate is an example of a problem solved by the use of big data. Although the translations are imperfect they are often good enough to have an understanding of what the writer intended whatever language it was written in. Google does this by statistically analysing millions of documents online that exist in multiple languages and figuring out what is most likely to be a correct translation. The more documents available that have been accurately translated by humans the more accurate the Google translation will be.

Big data analysis has been used in predicting maintenance needs for UPS, New York city council and various car manufacturers. It’s been used in healthcare to predict the onset of infections in newborns, and outbreaks of flu.

So it sounds like it could solve some tough business problems, and it can. But it has limits.

  • messiness of data means tricky to anaylse and interpret – google translate occasionally gets the translation between Dutch and English completely wrong, and this is a language pair that must have millions of documents, you need good analytical expertise and data governance to get the valuable insights out of the data.
  • hidden biases in data collection, for example if you’re relying on smart phone data  you are probably selecting against the lowest income earners.
  • identifies correlation, but that explain causality and doesn’t necessarily tell you what to do.
  • privacy concerns; relating to the collection, use and reuse of data. People may not realise that if enough anonymised data is combined it is possible to identify an individual.

And sometimes all that extra data may induce a sort of paralysis by analysis, a belief that you could make the perfect decision with just a little more data.

Right now we’re only beginning to unlock the value of big sets of data, and it’s still very much in the hands of the experts. It’s going to take some re-learning for managers/business leaders to ask questions that big data can answer, and to understand that correlation does not imply causation.

image: geralt via pixabay

Turnkey Solutions

A colleague came to me a while back really excited about a potential new supplier. The social solution they offered was perfect, fantastic, value for money and a turnkey solution. “Just think, we could have this in place in four weeks!” he said.

I think he was a bit underwhelmed by my reaction.

So what is a turnkey solution? Wikipedia gives this definition

The term turnkey is also often used in the technology industry, most commonly to describe pre-built computer “packages” in which everything needed to perform a certain type of task (e.g. audio editing) is put together by the supplier and sold as a bundle.

The solution offered was theoretically turn-key that should be easily implemented. According to my colleague they’d implemented such things before.

So why did I find it hard to believe the four week timeline? Because in ten years of implementing technology solutions I’ve learnt that as soon as a solution needs to touch employee or customer data systems we need to follow tough procedures to make sure each step is taken correctly and with due concern for the protection of that data. That takes time, certainly more than four weeks.

So is anything a turnkey solution or is the term a myth?

The search engine we have in place on our external site behaves in this way. I think from the time we’d signed the contract until it was implemented was days rather than weeks. It’s an external tool, relying only on public – and published data. Although the supplier didn’t label it as such while they were selling the service, it is a turnkey solution.

When you hear the term used by a supplier think hard about your own company’s requirements and processes, what is turnkey for the supplier may not be turnkey for you.

Image keys via pixabay

 

Critical Mass


Wikipedia defines critical mass as the point when;

a sufficient number of adopters of an innovation in a social system so that the rate of adoption becomes self-sustaining and creates further growth.

When people will adopt depends on where they sit in the adoption lifecycle, and if you’re managing the implementation of a innovation into a company it’s crucial to help each group in their own adoption process. Critical mass is usually said to fall between the early adopters and the early majority, although some research puts it further into the early majority phase.

The five categories can be defined as:

  • innovators – eager to try something new, need little training
  • early adopters – quick to try something new, seek out new experiences, see benefits of the innovation
  • early majority – open to new ideas, will try something if the purpose is clear, influence to colleagues
  • late majority – want proof it works, safety and systems around anything they use,
  • laggards – reluctant to change, sometimes only change because their existing tool is obsolete, or no longer available.

Not everyone is the same type for all innovations I’m an example of someone who can be an early adopter with one innovation and a laggard with another – I joined Linkedin in about 2005, but didn’t get a smart phone until last year.

Critical mass, where the growth in adoption becomes self sustaining, is reached when the early majority start to take up your innovation.

I’m trying to apply this to our implementation of an Enterprise Social Network, we have a total target audience of about 65,000 and so far 45,000 have signed up to use the tool. So that sounds like we’re already into the late majority – job done.

Except signing up is a low impact activity and doesn’t reflect a real use. It just means the person has agreed to the terms and conditions.

So I’ve been looking for some other measurable behaviours which we could consider as a threshold for use.

We see a monthly report on active users. To be considered an active user you need to have done something – anything – in the time frame measured. The activity could be five useful answers to five other users or it could be a comment or a like. So it’s a very broad measure, but by this measure we are into the early majority as of January – just.

We have implemented badges on our enterprise social network and this might give the best measure of where we are on the adoption lifecycle. The lowest level badge, the “starter” badge rewards a low level of activity; a post and a few comments and you’re there. By this measure we’re about to enter the “early adopters” stage. However badges were only introduced 6 months after launch so they under measure the adoption activity.

Looking at all these measures, the data per country, and reviewing how the Enterprise Social Network is used I believe we’re still with the early adopters across the company, but we’re into the early majority in the two countries with the largest numbers of employees. This is huge progress. Now the challenge is to embed this Enterprise Social Network in the company, my real measure of success is when it’s just how we work.

Images boulder

Work found at http://en.wikipedia.org/wiki/File:DiffusionOfInnovation.png / CC BY-SA 3.0

The Streisand Effect

Nothing to do with singing, everything to do with pointless and futile attempts at hiding or censoring information results in a surge of unexpected (and unwanted) attention. The name came about when Barbara Streisand tried to use the courts to suppress photos taken of her house in 2003.

There’s been a bit of it going around lately, with a new twist, the publicity has been used to raise money for charity.

Never Seconds & Mary’s Meals

A nine-year-old blogger set out to document her school lunch, setting up a scale of quality for the meal and taking a photo every day. She was also raising money for a charity called “Mary’s Meals” which raises money to feed children in Malawi. Her target was 7,000 GBP – enough to build a school kitchen. So far a very normal story… until the council authorities got involved and told her she could no longer photograph her school meals.

This led to an outpouring of outrage on behalf of the blog’s owner, Martha Payne, with many of the outraged donating to her cause. She’s now raised over 100,000 GBP, enough to build a school kitchen and feed 10,000 Malawi students for a year. (You can still donate if you want to!). Martha is now a finalist for the 2012 Great Scot Award, as she said of her nomination “I think it’s really for everyone that has supported Mary’s Meals“.

Martha had already had attention of local press, and a tweet of support from Jamie Oliver, so there’s no doubt she was going to do well with her blog. But when the Argyll and Bute council (who run the school) tried to stop her photographs her charity total was at around 2,000 pounds. She reached her 7,000 pound target within hours, and the following day it reached 45,000 pounds.

The negative PR swamped the council within hours – emails were pouring in from all over the world pointing out the silliness of the decision to ban her photographs, and pretty soon the council backed down. It’s a lesson for other councils, OK, it’s a lesson for all of us. Next time you’re tempted to tell people what they can and cannot say about your brand online, stop, think of Martha – and make a donation.

Postscript

There’s an updated version of the Streisand effect – where Zillow tried to sue Kate Wagner for her use of images from the Zillow site (although not owned by Zillow). Kate Wagner runs a blog critiquing the architecture of “McMansions” called McMansion Hell.

image The Streisand Effect  | Kenneth & Gabrielle Adelman, California Coastal Records Project,  |   CC BY-SA 3.0

 

The Cloud

CM2012_08_Cloud

Cloud storage, putting it in the cloud, cloud data; these and similar expressions are entering business language. The Cloud is being touted as a solution to all hosting, data management and infrastructure woes. The very name conjures up some thing soft, white, fluffy – essentially innocuous.

But what does it mean? Is it really an answer for business?

Cloud computing is essentially an outsourcing mechanism. It means that instead of building all the storage capacity, infrastructure, platforms and software inside your company, you can treat those as a service and use the service as you need. The concept has been around for a while – first as a theory and now we’re heading towards reality with a range of solutions that come under the definition of cloud computing. The simplest of these, Software as a Service (SaaS), was something I implemented for our company’s Business School using a learning management system from NetDimensions about 10 years ago.

It’s a natural development, and a good step. It means that a company can access flexible capacity quickly, even temporarily. It is part of a trend of commoditisation of IT, where parts of IT are standard and can be treated as a utility rather than as a strategic supply.

But there are issues;

(1) Whose Cloud?

If you’re a large company you probably have a several service suppliers all of whom want to provide services in the cloud. What they mean by that is their cloud, which means you could still end up deal with several different environments.

(2) Whose Data?

By using the cloud you are handing your data over to an external party. In theory they could use or alter the data. This is a big privacy concern for many end users and companies considering using the cloud.

(3) Who’s There?

Security remains the biggest barrier for many companies thinking about adopting the cloud, potential customers quite rightly have concerns about issues such as access to sensitive data, privacy, exploitation of bugs, recovery, malicious insiders and multi-tenancy issues.

(4) Legal Issues

There are a whole host of legal and compliance issues to examine when looking at cloud partners. If you’re in the EU for example, you’re probably going to want a data centre hosted within the EU to comply with legislation regarding the export of personal data.

I think the cloud is the inevitable next step in enterprise computing, but it’s a complex change for an organisation to make and there are many problems to solve before it’s implemented. It’s not as simple as “putting it in the cloud” sounds.

image Clouds /theaucitron/ CC BY-SA 2.0

SoLoMo

Have you heard this term yet? I have and every single time I have to unpack the three words that contribute to the term to understand what the speaker means.

Social – Local – Mobile. It’s an attempt to coin a single word that combines the potential of these three trends. It’s being called a revolution that “picks up where hyperlocal left off

Or not. I’ve only heard the term used by Americans, and at one conference recently it was met with blank stares from an audience drawn from 10 or 12 European nations.

The New York times gives a definition, helpfully pointing out that it’s “unique to the mobile device”. Makes sense – my desktop doesn’t move more than about 5 cm in either direction.

The examples I’ve found seem to be new businesses focusing on entertainment, few service organisations or established businesses seem to be using this at all.

  • Forecast is a fun and simple way for friends to share where they’re going.
  • SCVNGR is a game about doing challenges at places
  • Foodspotting; Find and recommend dishes, not just restaurants.
  • Localmind is a new service that allows you to send questions and receive answers about what is going on—right now—at places you care about.

Those listed are all US-based, they all use the geo-location (local) function of your phone (mobile) to let you send some form of message (social). Like any social tool they rely on a critical mass to be truly useful; in the same way that the first fax machine was useless, and only started to become useful as others came into use. So it’ll be interesting which of these (if any) survive.

I’m also curious to see whether an established business will build an own tool – my guess is not, they’re more likely to find ways to advertise and provide services through whichever SoLoMo tools emerge as having the numbers to make it worth while.

Will the term catch on in Europe? Who knows, among non-English speakers it may require just a little too much explaining. In any case I’m not the only one who cringes when I do hear it. Techcrunch have already called for the term to die.

Post script September 2018: It never caught on, I think because smartphones became so normal that we don’t need a specific term.

Image earphones via pixabay 

Walled Garden

Traditional walled gardens protected the plants from high winds and frost, in fact they often create a warmer micro-climate as the brick walls release stored heat from the sun. They often sit alongside stately homes, where they would have provided vegetables, fruit, herbs and flowers for the household.

The same term has been borrowed for a more modern, geek-world use. It has come to mean a virtual environment where entrance/access is controlled. The best examples currently are facebook – which controls a person’s access and the provision of content, and apple’s operating system which limits developer and user access.

Sometimes the walled garden is created as a security measure, but most often it’s now a way of maximising profits. A supplier wants to keep you in their own environment as long as possible – that way you’re more likely to buy from them or be exposed to more of their ads for which they earn income.

However more cynical visitors may refer to the area as a “walled desert” particularly if the content within the garden is not as rich as the content outside.

image Walled Garden  |   Stu Smith  |   CC BY-ND-2.0