access to the experts cutter business technology journalcutter business technology management,...

32
Cutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts JOURNAL www.cutter.com Vol. 29, No. 12 Technology Trends, Predictions, and Reflections 2017 Opening Statement by the Cutter Business Technology Journal Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Five Disruptive Technology Clusters by Steve Andriole . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Rapid Technology Innovation in Blockchain: Should You Be on the Front Lines? by Nate O’Farrell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 The IT Scene in 2017 by Paul Clermont . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Cognitive Computing 2017: What’s Up and Where to Begin? by Curt Hall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Architectural Thinking to the Rescue by Roger Evernden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 The Future of Collaboration by David Coleman . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 AGI: A Threat, an Opportunity, or an Inevitable Unknown for 2017? by Alexandre Rodrigues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2017: The Year of Exchanging Technology Hype for Humility and Hard Work by Robert N. Charette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Process of Things: Ensuring a Successful Connection Between Things by Emir Ugljanin, Zakaria Maamar, Mohamed Sellami, and Noura Faci . . . . . . . . . . . . . . . . . . . . . . . 24 The Tech-Driven Tech Backlash by Carl Pritchard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Delivering a Brighter Future for IT Projects by Darren Dalcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 “Transitioning to a digital world is front-of-mind for many business executives, yet finding the right path is an ongoing challenge.” — the Cutter Business Technology Journal Team NOT FOR DISTRIBUTION For authorized use, contact Cutter Consortium +1 781 648 8700 or [email protected]

Upload: others

Post on 30-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Cutter Business Technology

Management, Innovation, Transformation

Cutter ConsortiumAccess to the Experts

JOURNAL

www.cutter.com

Vol. 29, No. 12

Technology Trends, Predictions,and Reflections 2017Opening Statementby the Cutter Business Technology Journal Team . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Five Disruptive Technology Clustersby Steve Andriole . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Rapid Technology Innovation in Blockchain: Should You Be on the Front Lines?by Nate O’Farrell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

The IT Scene in 2017by Paul Clermont . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Cognitive Computing 2017: What’s Up and Where to Begin?by Curt Hall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Architectural Thinking to the Rescue by Roger Evernden . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

The Future of Collaborationby David Coleman . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

AGI: A Threat, an Opportunity, or an Inevitable Unknown for 2017?by Alexandre Rodrigues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2017: The Year of Exchanging Technology Hype for Humility and Hard Workby Robert N. Charette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Process of Things: Ensuring a Successful Connection Between Thingsby Emir Ugljanin, Zakaria Maamar, Mohamed Sellami, and Noura Faci . . . . . . . . . . . . . . . . . . . . . . . 24

The Tech-Driven Tech Backlashby Carl Pritchard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Delivering a Brighter Future for IT Projectsby Darren Dalcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

“Transitioning to a digital world isfront-of-mind for many businessexecutives, yet finding the rightpath is an ongoing challenge.”

— the Cutter BusinessTechnology Journal Team

NOT FOR DISTRIBUTIONFor authorized use, contact Cutter Consortium +1 781 648 8700 or [email protected]

Page 2: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Cutter Business Technology Journal®

Founding Editor: Ed YourdonPublisher: Karen Fine CoburnGroup Publisher: Christine GeneraliManaging Editor: Karen PasleyProduction Editor: Linda DiasClient Services: [email protected]

Cutter Business Technology Journal®is published 12 times a year by Cutter Information LLC, 37 Broadway, Suite 1, Arlington, MA 02474-5552, USA (Tel: +1 781 648 8700; Fax: +1 781648 8707; Email: [email protected]; Website: www.cutter.com;Twitter: @cuttertweets; Facebook:Cutter Consortium). ISSN: TBD (application submitted).

©2016 by Cutter Information LLC.All rights reserved. Cutter BusinessTechnology Journal® is a trademarkof Cutter Information LLC. No materialin this publication may be reproduced,eaten, or distributed without written per-mission from the publisher. Unauthorizedreproduction in any form, including photo-copying, downloading electronic copies,posting on the Internet, image scanning,and faxing is against the law. Reprintsmake an excellent training tool. Forinformation about reprints and/orback issues of Cutter Consortiumpublications, call +1 781 648 8700 or email [email protected].

Subscription rates are US $485 a yearin North America, US $585 elsewhere,payable to Cutter Information LLC.Reprints, bulk purchases, past issues,and multiple subscription and site licenserates are available on request.

As business models for creating value continue to shift, new business strategies areconstantly emerging and digital innovation has become an ongoing imperative. Themonthly Cutter Business Technology Journal delivers a comprehensive treatment ofthese strategies to help your organization address and capitalize on the opportunitiesof this digital age.

Founded in 1987 as American Programmer by Ed Yourdon, and until recently knownas Cutter IT Journal, Cutter Business Technology Journal is unlike academic journals:Each monthly issue, led by an expert Guest Editor, includes five to seven substantialarticles, case studies, research findings, and/or experience-based opinion pieces thatprovide innovative ideas and solutions to the challenges business technology profes-sionals face right now — and prepares them for those they might face tomorrow. CutterBusiness Technology Journal doesn’t water down or delay its content with lengthy peerreviews. Written by internationally known thought leaders, academics, and practitioners —you can be certain you’re getting the uncensored perspectives of global experts.

You’ll benefit from strategic insight on how the latest movements in digital innovationand transformation, IoT, big data analytics and cloud, to name a few, are changing thebusiness landscape for both new and established organizations and how cutting-edgeapproaches in technology leadership, enterprise agility, software engineering, and businessarchitecture can help your organization optimize its performance and transition to thesenew business models.

As a subscriber, you’ll also receive the Cutter Business Technology Advisor – a weeklybulletin featuring industry updates delivered straight to your inbox. Armed with expertinsight, data, and advice, you’ll be able to leverage the latest business managementthinking to achieve your organization’s goals.

No other journal brings together so many thought leaders or lets them speak so bluntly —bringing you frank, honest accounts of what works, what doesn’t, and why. Subscribershave even referred to the Journal as a consultancy in print and likened each month’s issueto the impassioned discussions they participate in at the end of a day at a conference!

Get the best in thought leadership and keep pace with the technologies and businessmodels that will give you a competitive edge – subscribe to Cutter Business TechnologyJournal today!

Name Title

Company Address

City State/Province ZIP/Postal Code

Email (Be sure to include for weekly Cutter Business Technology Advisor)

Fax to +1 781 648 8707, call +1 781 648 8700, or send email to [email protected]. Mail to Cutter Consortium, 37 Broadway, Suite 1, Arlington, MA 02474-5552, USA.

Request Online LicenseSubscription Rates

For subscription rates for online licenses, email or call:[email protected] or +1 781 648 8700.

Start my print subscription to Cutter Business Technology Journal ($485/year; US $585 outside North America).

Cutter Business TechnologyJOURNAL

Cutter ConsortiumAccess to the Experts

Page 3: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Just as recent global events have given us reason topause and reflect, the pace of technology emergence anddisruption is proving to be a source of inspiration anduncertainty. Transitioning to a digital world is front-of-mind for many business executives, yet finding the rightpath is an ongoing challenge. So we asked Cutter’s teamof experts for their insights on some of the technologies,trends, and strategies that will be relevant in 2017 andbeyond. In typical Cutter Business Technology Journalfashion, our call produced a wide range of opinionsand reflections worthy of consideration as you chartyour business technology journey for the new year.

First up, Steve Andriole shuns a “Top 10” of individualtechnologies in favor of looking at five technologyclusters. This idea stems from the interrelationshipsamong the technologies and their dependence on eachother for implementation. Andriole advises us to focuson investing in multiple technology clusters, as thiswill have the greatest impact on our business models.

Next, Nate O’Farrell takes a look at how blockchaintechnology is making its way into business sectorsacross the globe. With efforts underway toward moresustainability and accessibility, blockchain “holdsgreat potential to disrupt how businesses performbasic transactions, from payments, to programmable,self-executing contracts, to identity verification.”

Paul Clermont builds upon his 2016 predictions aboutthe challenges business technologists face in the ITenvironment. He calls for stronger security measuresto counter and prevent data breaches, the developmentof more sophisticated algorithms to combat the useof social media as a vehicle for false news, and oppor-tunities for more experts in metadata encryption toinvestigate or head off all too frequent terrorist attacks.

Curt Hall then predicts a breakout year for cognitivecomputing. He recommends that companies considerthe application of cognitive computing in research anddiscovery, decision support and advisory, customerengagement and customer experience management,Internet of Things (IoT), and cybersecurity.

The surprising results of two recent major political deci-sions inspired Roger Evernden to consider a need formore architectural thinking to manage the complexitiesof modern life. He also ponders how a faster Internet

can be leveraged to improve and optimize healthcare,transportation, and global energy resources.

The growth in the “gig” economy led David Colemanto delve into the future of collaboration in the work-place. He explores how project work is becoming thenorm, how we are moving from networks to ecosys-tems, and how augmenting human work with AI sys-tems can improve employee productivity and morale.

Next up, Alex Rodrigues reflects on how artificial gen-eral intelligence (AGI) will be used. Will we see AGIused for “healthy” applications, such as to supportbusiness models, or will it emerge as a major threat tohuman welfare if used in “unhealthy” ways, such ashacking, rampant job elimination, or misuse of robotictechnologies?

It’s important not to overhype the potential of technolo-gies such as big data, 3D printing, IoT, self-driving cars,and AI, according to Robert Charette. He predicts that2017 will be the year we learn to approach these andother technologies with humility and diligence toextract the most value from their true capabilities.

Next, Emir Ugljanin et al. anticipate how the IoT andbusiness processes will evolve together to form the con-cept of the Process of Things, or PoT. PoT will facilitatea successful connection between things, ensuring that“things will not function as silos but contribute collec-tively to offering value-added services to enterprises.”

Taking a step back, Carl Pritchard warns against becom-ing an overly connected society with perpetual threatsof security breaches and personal data loss. He advisesconducting business in a safer space by dialing backtechnology and taking control of 24/7 connectedness.

Finally, Darren Dalcher speaks to the strategic projectmanagement trends that will require attention in 2017.He points to new priorities in terms of leading people,repositioning projects, redefining success, and engagingon a deeper level with the business to deliver moremeaningful and sustainable projects.

Together with this outstanding group of authors, wehope this issue helps you determine the strategies andoperating models that will bring the most value to yourorganization now and in years to come.

Opening Statement

3Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

by the Cutter Business Technology Journal Team

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 4: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Every year pundits, hardware vendors, software ven-dors, consultancies, academics, and even governmentagencies publish their technology “picks” for the fol-lowing year. One cannot help but notice that just aboutall of the lists identify the usual suspects; cloud com-puting, AI, predictive analytics, wearables, and aug-mented reality are among about five others that makenearly everyone’s “Top 10.”

The approach I take here is a little different. I look atclusters of technologies. I do this because of the overlapamong the usual suspects and because of the interrela-tionships among the technologies. The identification ofclusters is also useful because it acknowledges the inter-dependencies among technologies as well as the inte-gration and interoperability required to optimize wholetechnology clusters and meaningfully impact businessrules, processes, and models. In other words, it’s opera-tionally impossible to acquire, pilot, deploy, and sup-port technologies individually because they’re alwaysdependent upon each other and always connected.

The five clusters that scream change in 2017 and beyondappear in Figure 1. The arrow that connects the clusters

is extremely understated in its importance. Not onlydo the clusters build upon each other, but they alsodepend upon each other for implementation. For exam-ple, sensor analytics technology assumes the existenceof massive amounts of real-time streaming sensor dataand some intelligent processing as well as cybersecuritytechnology to keep it all secure. Similarly, small soft-ware technology requires advanced interaction technol-ogy to deliver functionality to consumer and corporateclients. There are also numerous technology standardsaround sensor interfaces and open APIs that will accel-erate the adoption of disruptive technologies. The dis-cussion around clusters here assumes these (and other)standards will evolve.

Intelligent Systems Technology Artificial intelligence is now embedded in a wide arrayof software applications, infrastructures, business rules,processes, and even whole business models. IBM’sWatson is the face of popular AI, but intelligent sys-tems technology encompasses so much more, including:

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 4

Five Disruptive Technology Clustersby Steve Andriole

NO TECHNOLOGY IS AN ISLAND

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Intelligent Systems

Technology

Interaction Technology

Small Software Technology

Sensor Analytics Technology

Cybersecurity Technology

Figure 1 — Five disruptive technology clusters.

Page 5: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

5Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Deductive and inductive inference

Deep learning

Machine learning

Tools and techniques used to represent and processdata, information, and knowledge (such as neuralnetwork modeling)

Applications of the technology to a host of problems,such as conversational speech, language translation,predictive analytics, diagnostics, autonomous vehi-cles, network management, weapons systems, andaugmented and virtual reality, among so manyother applications that will affect us all (overtlyand covertly)

The development, embedding, and application ofintelligent systems technology is accelerating and willcontinue to do so through 2017 and well beyond. Weshould track the entire range of this technology, not justthe individual pieces, with an eye toward piloting anddeploying that range against a set of ROI metrics.

Interaction Technology The way we interact with all things digital — andphysical — is changing. We see and experience contentvirtually and through augmented reality. We use wear-ables to track ourselves, our health, our friends, ourtransactions, and just about everything else we do, see,and hear. Many parents, for example, use smartphoneapplications to track the whereabouts of their children.We allow location-based services to follow us around,and we buy just about everything with applications onmobile devices. We converse with knowledge baseswith relatively crude tools like Siri and Alexa, butwithin a few years we’ll be having “meaningful”conversations with increasingly intelligent assistantsand — eventually — managers.

In addition to voice interaction, we’re well on the wayto gesture and other controls that mimic the way weinteract with humans. For example, consumers can usegesture control to look at products they might wantto buy, and retailers can collect the gestures used toinspect their products and services, such as how oftena consumer points to a product over time or how long aconsumer lingers on a product icon (versus competingproducts at which they gesture positively or negatively).Some of this technology already exists for handicappedusers of digital technology. Extending it to consumersprovides retailers with a new, powerful way to trackwhat their customers are doing with their products.

Small Software TechnologySmall software delivered from the cloud is a major tech-nology cluster. The age of monster software applications— like huge multi-module ERP applications — is over.Software is decoupling and shrinking. Even softwarethat stubbornly hasn’t decoupled (yet) is offered inpieces from the cloud to clients who can select the mod-ules they need — and ignore the ones they don’t. Forthose who want newer, smaller, cheaper packages, thereare software vendors (e.g., Zoho and Zendesk) that havereduced functionality to its most useful features.

The small software technology cluster will grow untilsoftware becomes like LEGOs that can be assembledand disassembled at will. As the open source APIworld expands, small software technology will becomegreater than the sum of its parts. The key trend hereis the under-reliance on large integrated softwareapplications and the adoption of smaller, more focusedapplications accessible on every screen we have.

Sensor Analytics Technology Ubiquitous sensors capable of tracking, analyzing, andpredicting all sorts of activities will soon connect every-thing. The Internet of Things (IoT) and then the Internetof Everything (IoE) will generate enormous real-timedata/information/knowledge streams that must bemanaged and, more importantly, optimized.

The ubiquity of sensors will change today’s understand-ing of analytics, especially because they will be “alwayson” and therefore in real time. The deployment ofsensors should be tracked as assiduously as we trackadvances in data science. The more sensors, the greaterthe data and analytical requirements, and therefore thegreater the number of predictive and prescriptive oppor-tunities, such as the ability to predict threats and gener-ate strategies in response to likely threats in real time.

Companies should invest in expanded analytics withthe assumption that data, information, and knowledgewill be continuously exploding and that fixed-time,limited variable–driven “analytics” as we practice it

The age of monster software applications — like huge multi-module ERP applications— is over. Software is decoupling andshrinking.

Page 6: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 6

today will disappear. It will be replaced by smarterintegration across multiple technology clusters. Said alittle differently, next-generation analytics will be drivenby massively complex multiple regression equationscapable of explaining and predicting variance alongmultiple dependent variables.

Cybersecurity Technology All of the technology clusters underscore the impor-tance of digital security. There’s the business of security— audits, compliance, policies, and procedures — andthe security technology itself. The business side lags thetechnology side (which lags the device and applicationsides). All security architectures must continuouslyadapt while recognizing that the security industry isessentially a reactive one destined to chase solutionsto problems it had no idea existed a week, a day, or anhour ago.

Several of the enabling technologies include the broadblockchain family, which in truth is less like a happyfamily than a set of dysfunctional cousins who seldomif ever communicate — except to solve a really big prob-lem. While blockchain and similar technologies that dis-connect and decentralize processes (and assemble themlater for clarity) are here to stay thanks to the inherentsecurity features they offer, issues like centralized ver-sus distributed integration and legacy architecture com-patibility will persist.

Consequently, there will be significant cooperationrequired among implementation parties for blockchainto become core to many flavors of transaction processing(beyond cryptocurrency). Some of this cooperation willoccur outside of the corporate firewall where digitalthird parties will inspect and connect transaction compo-nents. Some will occur internally as legacy applicationsare replaced to optimize the technology. The businesschallenge for blockchain companies will be marketshare: will blockchain be open and diffuse (“neutral”)

or aggressively proprietary and “closed”? The cyberse-curity technology cluster requires continuous attention,investment, testing, and implementation within an arrayof clusters including and beyond those discussed here.

ConclusionsThere are several problems with lists of clusters likemine. First, they are never exhaustive. They are alsopresented at high levels of abstraction. At the sametime, they help us break free of bounded definitionsof technologies that appear on everyone’s Top 10 lists.The clusters presented here are intended to changeeveryone’s perspective on emerging and disruptivetechnologies from definitions and descriptions of indi-vidual technologies to a focus on how technologiesform clusters that exist in an endless world of inter-dependencies. This perspective suggests that compa-nies should step back from specific investments inindividual technologies and invest instead in multipletechnology clusters. It further suggests that those whochampion particular technologies — like AI, wearables,and big data analytics — instead think about wholeclusters of technologies and how the clusters are greaterthan the sum of their parts.

Stephen J. Andriole is a Fellow with Cutter Consortium’s BusinessTechnology & Digital Transformation Strategies and Data Analytics& Digital Technologies practices. Dr. Andriole’s focus is digital busi-ness transformation and emerging digital technologies. His recentconsulting has focused on digital transformation at clients such asComcast, Shire Pharmaceuticals, and Villanova University.

Dr. Andriole was Director of the Cybernetics Technology Office ofthe US Defense Advanced Research Projects Agency (DARPA), wherehe managed a $25 million R&D program that led to several vitalscientific and technological advances in the broad-based information,decision, and computing sciences. He served as CTO and Senior VPof Safeguard Scientifics, Inc., and was also CTO and Senior VP forTechnology Strategy at CIGNA Corporation, a $20 billion globalinsurance and financial services company. As an entrepreneur, Dr.Andriole founded International Information Systems (IIS), Inc., whichdesigned interactive systems for a variety of corporate and governmentclients. He is also cofounder of The Acentio Group, a strategic consult-ing consortium that identifies and leverages technology trends to helpclients optimize their business technology investments.

Dr. Andriole is currently the Thomas G. Labrecque Professor ofBusiness Technology at Villanova University, where he teaches anddirects applied research in business-IT alignment and pervasive com-puting. He is the author of 30 books and more than 500 articles andpapers in such publications as Cutter Business Technology Journal,Software Development, and IEEE Software. He can be reached [email protected].

All security architectures must continuouslyadapt while recognizing that the securityindustry is essentially a reactive one des-tined to chase solutions to problems it hadno idea existed a week, a day, or an hour ago.

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 7: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

One of the most prevalent blockchains in the world,Ethereum, is poised to switch from a proof-of-work(POW) algorithm to a proof-of-stake (POS) algorithm,likely in 2017, with the release of the Casper codebase.Why does this matter? Because blockchain technologyis becoming increasingly relevant and prevalent inbusinesses across the globe. It holds great potentialto disrupt how businesses perform basic transactions,from payments, to programmable, self-executingcontracts, to identity verification.

In the latest issue of Harvard Business Review,1 HarvardBusiness School Professor Marco Iansiti and HarvardBusiness School Professor and Cutter Fellow KarimLakhani discuss the transformative potential of block-chain technology, comparing it as it stands today tothe TCP/IP protocol in its early stages. ARPANET(the Advanced Research Projects Agency Network)was using TCP/IP for interoffice emails in the 1970s,and now, nearly 50 years later, lives around the worlddepend on this fundamental, open source protocol thatgives the Internet its ability to transfer data.

TCP/IP adoption didn’t happen overnight, even thoughit was clear the technology had many powerful usecases. It took us until now to realize the potential andto construct fundamental business processes upon thisprotocol. As Iansiti and Lakhani point out, the technol-ogy adoption path that TCP/IP followed is somethingto consider as blockchain continues to make its way intothe business sector.

POW = Proof of ... Waste?One of the main issues to be overcome as Bitcoin andblockchain increase in popularity across the globe isblockchain’s sheer wastefulness. A POW blockchainsuch as Bitcoin requires high-powered computers thatendlessly process transactions and solve algorithms,rewarded upon discovery of the right solution. Thiscreates an extreme draw on electricity, with data centers

producing excess heat into the atmosphere and hard-ware turnover well above average. Considering onlyBitcoin, the largest of roughly 800 cryptocurrencies,there is currently as much running hardware asmaterial used to build the Eiffel Tower.2 By 2020, theelectricity consumption of the Bitcoin network alonewill exceed that of the entire country of Denmark.3

Chip technology improves, and application-specificintegrated circuits (ASICs) become more efficient intheir electricity consumption as years go on. Never-theless, the amount of electricity and resources neededto efficiently run the Bitcoin network is becomingincreasingly unsustainable.

Casper the Eco-Friendly BlockchainThis isn’t new news. We knew this would happen, andthe leading thinkers behind blockchain technology arefocused on developing new algorithms to reduce thishardware and infrastructural consumption to makeblockchain technology more sustainable and moreaccessible. Vitalik Buterin, creator of Ethereum, thesecond biggest blockchain, leads a team of developersthat are working to combat some of the deficienciesof this wasteful POW system. This brings us to Casper,the POS fork of the Ethereum blockchain, in develop-ment and slated to be released in 2017. This would notbe the first blockchain using a POS method, but itwould be by far the largest.

The basic idea behind proof of stake is that it eliminatesthe need for wasteful data centers full of the expensive,

7Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Rapid Technology Innovation in Blockchain:Should You Be on the Front Lines?by Nate O’Farrell

THE CHARGE OF THE BLOCKCHAIN BRIGADE

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

One of the main issues to be overcomeas Bitcoin and blockchain increase inpopularity across the globe is blockchain’ssheer wastefulness.

Page 8: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 8

power-hungry, environmentally unfriendly machinesused to solve and maintain transactions on the block-chain. It replaces them with lightweight algorithms thatcalculate a worker’s power based on how much currencythe worker holds. Think of it as how much mining andcalculation power they could theoretically buy.

Fair and AboveboardReplacing a POW system with a POS system does morethan simply mitigate the electricity and environmentalchallenges faced by nearly all blockchain systems. Italso introduces a fairer system, where anyone candecide to be a miner without having to invest in physi-cal hardware, data center space, electricity, and security.

Another major pro of a POS system is that it mitigatesagainst a 51% attack. In a traditional POW system, anyuser or group of users could theoretically unite until theypossess 51% of the network’s hashing power. At thatpoint, they would have complete control of the networkand blockchain, allowing them to modify transactionsand double spend currency. This obviously would havea devastating effect on companies, users, and adopterswho have become deeply invested in this new tech-nology. Moving to a POS system creates an interestingdynamic where even if someone or some group wereable to control 51% of the digital currency on thatblockchain, it would not be in their best interest tocreate an attack on something in which they are alreadya majority stakeholder. Furthermore, with market capsnow in the billions, a majority share in a POS blockchaincurrency is becoming prohibitively expensive.

Will Your Organization Lead the Charge?As blockchain systems developers continue to innovate,they are improving the technology by providing newfeatures, enhanced security, and improved ease ofaccess. Companies need to be aware of these develop-ments and adjust their processes in order to incorporatethese new features into their fundamental workflow.Basically, companies need to be as agile with theirprocesses as blockchain developers are with theircodebases. It’s clear that blockchain technology can beas beneficial to business as TCP/IP has become.

While we move toward this decentralized open ledger,we need to remain cognizant of the obvious hurdles tojump and problems to overcome. But the roadmap hasbeen drawn by trendsetters such as Buterin and hisEthereum project. Blockchain is here to stay, and whileit will take some time to perfect as it becomes moremainstream, businesses should be asking, “Do we wantto be on the front lines of in this area of technologyinnovation?”

Endnotes1Iansiti, Marco, and Karim R. Lakhani. “The Truth AboutBlockchain.” Harvard Business Review, Vol. 95, No. 1, January–February 2017 (https://hbr.org/2017/01/the-truth-about-blockchain).

2Deetman, Sebastiaan. “Bitcoin Could Consume as MuchElectricity as Denmark by 2020.” Motherboard, 29 March 2016(https://motherboard.vice.com/read/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020).

3Deetman (see 2).

Nate O’Farrell is a Senior Infrastructure Engineer and AWS Architectat Barton Associates Inc. with a passion for solving the toughest prob-lems and exploring and implementing emerging technologies to findbetter business solutions. He is a blockchain enthusiast and an activeparticipant in numerous blockchain innovation groups. He can bereached at [email protected].

As blockchain systems developers continueto innovate, they are improving the technol-ogy by providing new features, enhancedsecurity, and improved ease of access.

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 9: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Last year, I declined to make specific predictions aboutspecific technologies, what they’d disrupt, and theirimpact on society — a decision based on a mix ofhumility and cowardice. Instead, I made three predic-tions about challenges in the environment in which ITexists. These challenges have only become more real,making the predictions at least directionally accurate.My previous predictions are italicized below withupdated comments added.

Challenges in the IT Environment (Update)

1. SecurityThe increased frequency of hacking into company andgovernment computers and the data theft we’ve been seeingwill result in more and stronger actions on the security front.This is surely ongoing, but the headlines this yearwere grabbed by the apparent ease of hacking intoemail accounts. People have been warned for years notto put anything in emails they’d be embarrassed to havemade public; perhaps now they’ll believe it, especiallywell-known people in sensitive roles where there arelots of “gotcha” players. It’s unprovable but surely pos-sible that the recent US election was swayed by HillaryClinton’s email problems and likely Russia-based hack-ing into the Democratic National Committee’s corre-spondence. More intensive action to better hack-proofthe technology should be expected and is most likelyalready underway. That said, total impenetrability con-flicts with governments’ desire for access when chasingdown criminal and terrorist activity, as mentioned initem 3 below. In the broader world, security will remainfertile ground for clever innovators. As with any formof crime, hacking’s modus operandi will remain a mov-ing target, making this a safe long-term prediction.

2. Social NetworkingThe Wild West of social networking will start to be tamed asconcerns regarding its use by really bad people for really badpurposes … will call into question the libertarian paradigm in

which it has thus far operated. This is happening at arapidly accelerating pace, driven in recent weeks not somuch by threats from terrorists as by the proliferation offalse news posted on Facebook and other social mediaplatforms,1 combined with the sobering realization thata huge proportion of the US population gets its newssolely from such social networks. The planting of fakenews has even been automated in the form of chatbots.2

Again, close elections can be swayed by the kind ofdeliberate, supermarket tabloid–worthy misinformationthat would never pass muster in responsible media out-lets. Providers of social networks will have much moretrouble making the case that they’re just common carri-ers with no responsibility for what passes through theirservers. Indeed, at least one major player3 is alreadybacking away from this increasingly indefensiblestance.4

Figuring out how to vet what purports to be newswhile avoiding even the appearance of bias or crossingthe line into censorship will be a challenge. Algorithmsneed to be developed, but they will never be able to dothe whole job, as evidenced by the incident in whichFacebook briefly took down the iconic 1970 image ofthe naked, fleeing, napalmed Vietnamese girl as if itwere child pornography. Facebook and the like’s busi-ness model probably never accounted for such a rela-tively labor-intensive task, whether done by staff orcontracted out. That said, there will be substantialdemand for ever more sophisticated algorithms thatcan adapt as the originators of fake news try to stayahead of them.

9Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

The IT Scene in 2017by Paul Clermont

SIDE EFFECTS TAKE CENTER STAGE

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Figuring out how to vet what purports to benews while avoiding even the appearance ofbias or crossing the line into censorship willbe a challenge.

Page 10: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 10

3. Data PolicyIn the wake of the Paris and San Bernardino attacks of late2015, governments had a stronger argument for the mass col-lection, storage, and analysis of metadata and their ability todecrypt actual data. In the area of decryption, high-profilesituations failed to produce broad policy, with individ-ual cases being treated on an ad hoc basis. With a newpresident in 2017, it remains unclear at this point howthe US government’s positions and policies will evolveas the tensions among libertarianism, privacy, and thenational security state play out. Whatever materializes,I stand by my previous prediction that opportunitieswill keep emerging for inventors and purveyors ofsophisticated algorithms and heuristics to analyzethe metadata and whatever is decrypted. Expertisein search and pattern recognition in both text andimages will be good to have.

Endnotes1Maheshwari, Sapna. “How Fake News Goes Viral: A CaseStudy.” The New York Times, 20 November 2016 (www.nytimes.com/2016/11/20/business/media/how-fake-news-spreads.html?_r=0).

2Markoff, John. “Automated Pro-Trump Bots Overwhelmed Pro-Clinton Messages, Researchers Say.” The New York Times,17 November 2016 (www.nytimes.com/2016/11/18/technology/automated-pro-trump-bots-overwhelmed-pro-clinton-mes-sages-researchers-say.html).

3Isaac, Mike. “Facebook Considering Ways to Combat FakeNews, Mark Zuckerberg Says.” The New York Times, 19November 2016 (www.nytimes.com/2016/11/20/business/media/facebook-considering-ways-to-combat-fake-news-mark-zuckerberg-says.html).

4Rutenberg, Jim. “Mark Zuckerberg and Facebook Must StepUp to Defend Truth.” The New York Times, 20 November 2016(www.nytimes.com/2016/11/21/business/media/zuckerberg-and-facebook-must-defend-the-truth.html).

Paul Clermont is a Senior Consultant with Cutter Consortium’sBusiness Technology & Digital Transformation Strategies practice.He has been a consultant in IT strategy, governance, and managementfor 30 years. His clients have been primarily in the financial and man-ufacturing industries, as well as the US government. Mr. Clermonttakes a clear, practical view of how IT can transform organizations andwhat it takes to direct both business people and technicians towardthat end. His major practice areas include directing, managing, andorganizing IT; reengineering business processes to take full advantageof technology; and developing economic models and business plans. Inhis consulting engagements, he follows a pragmatic approach to thespecific situation and players at hand and is not wedded to particularmodels, methodologies, or textbook solutions. He has spoken and writ-ten and taught executive MBA courses on the challenges of gettingsignificant and predictable value from IT investments.

Before going into individual practice, Mr. Clermont was a Principalwith Nolan, Norton & Co., a boutique consultancy that became part ofKPMG. Before joining Nolan, Norton & Co., he directed IT strategyat a major Boston bank and launched its IT executive steering commit-tee. His undergraduate and graduate education at MIT’s Sloan Schoolof Management was heavily oriented toward operations research. Hecan be reached at [email protected].

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 11: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Let’s take a look at a technology poised for a breakoutyear: cognitive computing. There is a considerableamount of innovation in the development and applica-tion of cognitive computing across almost every indus-try. Consequently, companies should start examininghow they can benefit from applying cognitive comput-ing, focusing on five key domains: (1) research and dis-covery; (2) decision support and advisory; (3) customerengagement/customer experience management; (4)Internet of Things (IoT); and (5) cybersecurity.

Research and DiscoveryCognitive research and discovery applications, dueto their ability to ingest and analyze huge amountsof structured and unstructured data, are being appliedin many industries and domains today. Good targetareas for cognitive research and discovery applicationsinclude market analysis, marketing, and product R&D.In addition, those in highly regulated industries shouldexamine how cognitive systems can benefit their riskmanagement, compliance, and antifraud efforts, asthese areas are experiencing significant commercialcognitive solutions development.

Communications, marketing, and advertising firms areusing cognitive research and discovery to uncover con-sumer trends — including behavioral and personalitypatterns — from social media, surveys, and other datato facilitate richer customer profiling. As a generaltrend, the use of cognitive systems for automatingand enhancing social media analysis will increaseconsiderably over the next few years.

Decision Support and AdvisoryThis domain includes the use of cognitive systems forimplementing decision support systems and advisoryapplications that promote automated, easy-to-useapproaches to customer service, issue handling, andproduct inquiries.

Healthcare represents the leading area of usage incognitive decision support and advisory systems.Providing researchers, physicians, clinicians, and other

practitioners with advice on illnesses has become awide-open field. As a result, healthcare organizationsare implementing cognitive applications for advisingon everything from cancer, heart disease, and kidneytrouble to general health and wellness.

Banking and finance are also investing in this particularcognitive domain to assist human financial advisors, forexample, to conduct highly targeted search and trendsanalysis into market history and current events in orderto optimize investment decisions and recommendationsfor clients.

Although still experiencing limited use of cognitivecomputing today, insurance is another industry wherewe are starting to see the use of smart cognitive deci-sion support and advisory applications. I expect suchuse (for both internal and customer-facing operations)to increase considerably over the next few years.

We are also witnessing usage in other industries,including education (to provide advice to students onenrollment and other activities) and government (wherecognitive systems serve to advise both staff and citizenson such topics as city operations and planning and theavailability and requirements for social services andother programs).

The oil and gas industry is also employing cognitiveadvisors, particularly to facilitate knowledge manage-ment and more productive group interaction as wellas to help disseminate oil and gas exploration andengineering expertise across organizations.

As a general trend, we should expect advisory anddecision support to be the leading area for applyingcognitive technology for the foreseeable future. Ideally,companies should look to implement cognitive decisionsupport and advisory systems that can serve bothinternal operations and customer-facing scenarios.

Customer Engagement/Customer ExperienceManagementOrganizations should investigate how cognitive tech-nologies — especially natural language processing andconversational interfaces — can make interacting with

11Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Cognitive Computing 2017: What’s Up and Where to Begin?by Curt Hall

LEAVE THE THINKING TO US

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 12: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 12

their company more intuitive, satisfying, and engagingfor customers. This includes examining the use ofcognitive-powered intelligent virtual agents, smartadvisors, and chatbots for facilitating new (truly) real-time customer engagement on popular social media,text, and messaging platforms.

Today, companies are applying cognitive systems to cus-tomer engagement scenarios with two main goals: (1)to achieve a greater level of automation for optimizingcustomer service operations, including encouragingcustomers to take a self-service approach; and (2) tofacilitate easier, more satisfying, and engaging dialoguesbetween customers and the company across variousdigital channels.

In short, there is a great deal of innovation, with compa-nies employing cognitive systems to support a range ofcustomer-focused scenarios — everything from mobileapps designed to assist shoppers with choosing thecorrect product, to online wellness programs offeringpersonalized recommendations pertaining to lifestylechoices, to intelligent banking apps designed to assistconsumers. As a general trend, expect cognitive systemsfor customer engagement and customer experiencemanagement to become a leading area for applyingthe technology over the next two to three years.

Internet of ThingsAlthough cognitive systems are currently experiencinglimited usage in this capacity, their ability to ingest andanalyze extremely large volumes of data (in varyingformats) makes them well suited to automating IoTmaintenance and analysis operations.

Real-world (i.e., production) cognitive IoT applicationsrequire the collection, management, and analysis ofrapidly streaming, time-sensitive data. A good exampleis offered by elevator and escalator manufacturer andservicer KONE, which cut a multiyear deal to useIBM’s Watson IoT Cloud Platform to connect, remotelymonitor, and manage millions of elevators, escalators,doors, and turnstiles in buildings and cities worldwide.Analyzing data from sensors embedded in equipmentwill enable KONE to identify and predict issues andminimize downtime.

As more companies ramp up their IoT initiatives overthe next few years, the use of cognitive IoT applicationswill accelerate as companies begin to struggle with thedifficulties involved in managing and analyzing datagenerated from millions of connected devices. Watchfor IoT platform providers to incorporate cognitivecapabilities in their offerings.

CybersecurityA recent use case seeing much commercial developmentis cognitive application for cybersecurity, where the tech-nology can identify potential threats, predict the likeli-hood of an attack, and interdict attacks as they occur.

IBM and its partners have been busy in this area, work-ing to apply Watson to cybersecurity for various scenar-ios ranging from general IT security to fraud and breachsolutions targeting banking, finance, retail, and otherindustries. A potentially game-changing developmentis cognitive behavioral biometric analysis capabilitiesfor IBM’s digital banking fraud-prevention solutions.Behavioral biometric capabilities apply machine learn-ing (ML) to help understand how users interact withbanking websites, creating gesture models based onpatterns of mouse movements.

Such cognitive analysis can help determine fraudulentactivities — such as when unauthorized users attemptto take over a bank account by using stolen credentials— by detecting anomalies from the real customer’sinteraction with a banking website. The technologyunderstands the context and meaning of subtle mousemovements/clicks and uses this information to continu-ally generate increasingly more accurate gesture models(via ML) over time. Although the technology was ini-tially developed for banking, with the proper data setscognitive biometric models could also be trained tosupport antifraud and other cybersecurity scenariosfor other industries.

ConclusionCognitive computing is proceeding rapidly, and weare seeing considerable application of the technologyacross many domains and industries. Organizationsshould investigate how the technology could benefitvarious areas of their operations, including internaland customer-facing ones. Finally, due to a lack ofexperienced cognitive application developers, manyorganizations would do well to utilize commercialdomain-specific or industry-focused cognitive solutions,of which a growing number are entering the market.

Curt Hall is a Senior Consultant with Cutter Consortium’s DataAnalytics & Digital Technologies and Business & EnterpriseArchitecture practices. His expertise includes the IoT (platforms,architectures, and use cases); artificial intelligence, cognitive systems,and conversational computing; big data platforms and use cases; andbusiness intelligence (BI), predictive modeling, and other analyticpractices. Mr. Hall also focuses on mobile technology in the enterprise(including mobile BI and collaboration) and social media monitoringand analysis (aka “social CRM”). He can be reached at [email protected].

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 13: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Living in a Post-Truth World2016 surprised most of us with two big political deci-sions that we didn’t expect. Britain had a referendumthat returned a vote to leave the European Union —popularly known as “Brexit.” And the US voted for abusiness and property magnate who had never heldelective office as its next president.

Commentators around the world have analyzed thesetwo results, and the consensus seems to be that thesepolitical battles have ushered in a new era of politics inwhich the truth and rational debate are less important,and emotion, lies, and propaganda are more likely tosway voters.

What does this mean from an enterprise architectureperspective?

Well, first of all, it shows that we have reached a tip-ping point in our use of information, communications,social, and Internet technologies. In some situations,facts and understanding don’t matter; only opinionsand emotions do. This is actually quite a radical change!

And this change has increased the need for architecturalthinking, which means:

Thinking about things holistically

Thinking about how changes in one arena have ahuge rock-on impact in other areas

Thinking about interdependence

Thinking about interrelated systems

Thinking about chaos and complexity, and so on

When a majority of people are not thinking about theseconnections and links, it behooves others who have theneeded skills, experience, and techniques to do so.

So my first prediction is that we will need a whole lotmore architectural thinking to explain the complexitiesof modern life so that ordinary people will have a bal-anced view that includes emotions and facts, opinionsand reality. Only in this way can we come up withclever ways to make our planet sustainable and fairfor all living creatures.

From Installing High-Speed Internet toLeveraging ItMy second prediction is that, while some parts of ourworld are still without any form of Internet, those thathave it are steadily working to make it faster and faster.OK, we know that bit. But what hasn’t happened yetis figuring out how to truly exploit that newfoundspeed. Many people and enterprises get faster Internetand just use it to do the same old things, only quicker.

So my prediction is that we will increasingly see peopletaking another look at what high-speed Internet givesus and leveraging it in exciting new ways. We mightask, for example, how we could use better and fasterconnectivity to:

Improve the provision of healthcare

Ease traffic congestion and provide genuinely well-integrated transportation networks

Optimize our use of scarce, global energy resources

Deal with the threats of epidemics, terrorism, and/orenvironmental disasters

You May Say I’m a Dreamer ...Maybe I’m dreaming. Maybe I’m too optimistic aboutthe possibilities of architectural thinking and leveragingour information assets. But maybe making predictionsis all about putting ideas out there and letting themgrow into trends that really do make a difference!Whatever happens, I wish you the very best for 2017.

13Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Architectural Thinking to the Rescueby Roger Evernden

RESUSCITATING REALITY

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

We will need a whole lot more architecturalthinking to explain the complexities of mod-ern life so that ordinary people will have abalanced view that includes emotions andfacts, opinions and reality.

Page 14: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 14

Roger Evernden is a Senior Consultant with Cutter Consortium’sBusiness & Enterprise Architecture practice. He has been an enter-prise architect since 1984, specializing in the highly practical use ofEA to manage organizational transformation. Mr. Evernden acts asadvisor, mentor, and coach on EA initiatives, leads training work-shops, and writes regularly about strategy and architecture. He pro-vides a unique combination of training and tools to help architects andtheir teams throughout an EA program and at each capability level.Mr. Evernden’s hands-on training workshops provide a thoroughgrounding of all key techniques, with practical examples, exercises,and demonstrations.

As architect of the Information FrameWork (IFW), Mr. Evernden pio-neered many contemporary techniques, including the use of industry

reference models, business capability analysis, and component-basedbuilding blocks. His work has been the basis for more than 400 busi-ness and IT architecture initiatives worldwide. Past clients includeAlcatel-Lucent, Allied Irish Banks, AstraZeneca, Bancomer, BankAustria, Barclays, Credit Suisse, DnB NOR, HSBC, IBM, ING,Lombard, Lloyds Banking Group, Microsoft, National Australia Bank,and Westpac. Mr. Evernden has written articles appearing in majorpublications and books, including the seminal article on IFW in theIBM Systems Journal. He is the author of two books about EA:Enterprise Architecture — The Eight Fundamental Factors and101 Lessons from Enterprise Architecture. He can be reached [email protected].

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 15: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Today’s work environment is changing rapidly, so muchso that the ever-increasing velocity of innovation andtechnology will create a workplace five years from nowthat looks nothing like the one of today. The big threefactors in this coming change are:

1. The “gig” economy, or project work, becomingthe norm

2. Moving from networks to ecosystems

3. Augmenting human work with AI systems

The Gig EconomyI have been a member of the “gig” economy for thelast 20 years — I just didn’t know it. Because of myexpertise in collaboration, I have been called on byboth vendors and end-user organizations for everythingfrom product design to training and coaching, competi-tive analysis, and motivational team workshops. Morerecently I have been testing audio components in ameeting room lab; by having meeting participants wearwireless EEG (electroencephalogram) helmets, my col-leagues and I are trying to correlate their behavior fromthe audio interaction with their internal state (mad, sad,glad, paying attention, etc.). What all of these activitieshave in common is that they are all projects, and theyare all being done for different organizations.

A recent study by Intuit predicted that by 2020, 40%of US workers will be part of the gig economy (con-tractors),1 and as a result we have seen the rise of anumber of work platforms such as Elance, oDesk (nowcombined into Upwork), and many others. Some focuson geographies, while others focus on specialties andexpertise (e.g., Maven).

A recent study published by MavenLink and GigaOMlooked at the state of the services economy.2 In this surveyof almost 500 executives, 78% of respondents perceivedthat the pace of change is not only quickening, but itis doing so faster than ever before. It is this velocity ofinnovation and disruption that is having such a greatimpact on the way we work today and will work in the

future. Of those surveyed, 58% noted that the averagelength of their contracts was shortening (from years toweeks), and that over 90% of this work was primarilyproject work rather than retainer work. The bigger thecompany, the more swiftly they are changing to projectwork. And nearly all (96%) of service-oriented providers(lawyers, software developers, research scientists, accoun-tants, etc.) are seeking new contractor relationships.

What this means for IT and most businesses is thatmore of your inhouse staff will be managing contractorsexternal to the organization. Training in this type ofteam or project management would greatly increase thelikelihood of these projects going smoothly. Creating astable of regular contractors with whom you have builttrust is also a good idea.

The way teams work has also been changing. Teamsused to be colocated, but today the norm is for teamsto be geographically distributed. Talent knows noboundaries, and thus team members can be fromanywhere. Yet the biggest challenge to teams is notgeography or technology (which helps to provide acommon context for work), but behavior. Work byPamela Hines of Stanford University and CatherineCramton of George Mason University looks at address-ing the behavioral disconnects in cross-cultural teams:

It takes time to learn about cross-cultural differences,understand distant team members’ context, and deter-mine ways to reconcile these differences and adapt forthe good of the collaboration. Long-term, interdependentteams with stable membership show that the organizationvalues its investment in the team.3

Once a high-performing (distributed) team is stableand able to complete a project effectively, that team willoften stay together to work on other projects. Or, as inthe movie or construction industry, if members of theseteams move on to other different work, they often comeback together in the future to work on new projects.

But while teams are changing, work is changing evenfaster. It will require entrepreneurs and small busi-nesses to start evolving their networks into ecosystems.

15Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

The Future of Collaborationby David Coleman

THE WIDE WORLD OF WORK

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 16: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 16

From Networks to EcosystemsThe gig economy is helping to drive this transition fromnetworks to ecosystems. If you have been in businessfor any length of time, you know lots of people, andthese people you know make up your network. Today,however, networks are not enough — relationshipsare the key. What matters is the ability of two or moreindividuals or organizations to have a common goal ordesired outcome and to work toward that in a coordi-nated manner. Working with others you can trust andcount on, and whose experience and expertise you canleverage, is what is needed to create an ecosystem.

To develop an ecosystem, you must find a few networkpartners and establish a closer relationship with them.But more than just an ecosystem, it has to be a purpose-driven business ecosystem (PDBE); that is, there mustbe a project with a business goal and outcome that all ofthe partners participate in. The best source of informa-tion on this phenomenon is a recently published bookby Robert “Kim” Wilson titled They Will Be Giants,4

which deals with PDBEs for entrepreneurs.

As part of Wilson’s GIANTS ecosystem, I have startedto contribute by suggesting collaboration software toprovide the glue for the ecosystem and recommendingother methods for sales and marketing. “Ecopartners”also reciprocate, so one of the partners is helping tocreate a new website with different offerings for mybusiness.5

The common goal of the GIANTS ecosystem is toprovide mentoring and services (sales, marketing,and strategy) to entrepreneurial organizations. We dothis through the expertise of our members as well asthrough our partners. The GIANTS ecosystem itselfcurrently provides strategy, marketing, sales, and cus-tomer development services to startups, and throughour ecopartners we provide legal, recruiting, PR, andaccounting services, too.

As an ecosystem, GIANTS is also looking at ways wecan augment our experience, expertise, and reach. Oneof the ways to do that is through artificial intelligence.

Augmenting with AIA natural extension of our PDBE would be to start usingAI technologies in different ways. For example, we areusing WizCal (an AI-driven calendaring system) to helpset up optimal meeting times and the like, since as ageographically distributed team we have to deal withthat problem on a daily basis.

Indeed, AI systems will begin taking on numeroustasks, from scheduling our days to driving our kids toschool, from IT administration to data mining. We arestarting to see virtual assistants of many kinds poppingup in our lives. Apple, Amazon, and Google all havedevices on the market that can help play your music,adjust your lighting or heat, do searches for you, orremind you to do something later. They can also helpyou create meeting agendas and reports and find criticaldata for budgeting,

AI systems (and robots) have the potential to makechanges to our society that are as sweeping as thoseof the Industrial Revolution. Many jobs done today bypeople will become jobs that robots and AI can do bet-ter. Once autonomous trucks are certified, for example,truck drivers will need to find new jobs. This is alreadyhappening with taxi drivers thanks to the use of sharedcars through Uber and Lyft. Ironically (or perhaps fit-tingly), Uber drivers themselves will be out of businessjust as soon as Uber can automate its fleet. Even writingeditorial copy is a task that is already yielding to AI.

But the news is not all bad. There may be some less-skilled jobs lost, but there are many more-skilled jobswaiting to be filled. What is needed is a massive retrain-ing program, like the US’s Depression-era New Deal,only building on the information highway instead ofphysical dams and bridges. Some of these jobs may bein cybersecurity or programming. According to ananalysis by Stanford University’s Peninsula Press, therewere over 1 million open cybersecurity jobs in 2016 inthe US alone.6 And the US Bureau of Labor Statisticsprojected that computer programming jobs in the USwould increase by 28.2% in 2016.7

That said, there are many other jobs that might be moreappropriate for newly retrained low-skill workers. Itdoes not take great imagination to see someone whoused to drive and fix trucks now working on wind tur-bines or solar panels. Jobs that require judgment andknowledge of the surrounding environment can oftenbe done better by people than AI systems or robots.Many individuals who find themselves out of jobs will

AI systems (and robots) have the potentialto make changes to our society that areas sweeping as those of the IndustrialRevolution.

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 17: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

17Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

create their own new jobs as entrepreneurs, creatingproducts and services that we have not yet thought of!

For most businesses, I would suggest adopting AI sys-tems slowly, using them in areas where people don’tcurrently occupy those jobs. For instance, there are mostlikely AI systems that can help determine optimal net-work configurations and routing paths on your corpo-rate network (which could save you lots of money indata storage and network infrastructure). Anotherexample is sorting through huge mounds of data. Asanalytics expert Tom Davenport observes:

I initially thought that AI and machine learning would begreat for augmenting the productivity of human quants.One of the things human quants do, that machine learn-ing doesn’t do, is to understand what goes into a modeland to make sense of it. That’s important for convincingmanagers to act on analytical insights. For example, anearly analytics insight at Osco Pharmacy uncovered thatpeople who bought beer also bought diapers. But becausethis insight was counter-intuitive and discovered by amachine, they didn’t do anything with it. But now com-panies have needs for greater productivity than humanquants can address or fathom. They have models with50,000 variables. These systems are moving from aug-menting humans to automating decisions.8

Likewise, using AI to augment what people can cur-rently do is a better way to start than by wholesalereplacement of jobs. For example, IBM’s Watson isdeveloping systems that will “help healthcare providersbetter understand patients’ diseases and recommendpersonalized courses of treatment.”9 Watson-like toolscan also assist experts in doing their jobs better.10 Notonly can they help experts improve their decision mak-ing, but they can also aid in the continual learning andtraining that experts require.

ConclusionThe nature of work is changing, team demographicsare changing, and even the idea of an organization ischanging. In many ways this velocity of change is caus-ing us to need greater bonds of trust (ecosystems), ratherthan broadly scaled networks (or social networks). Wehave reached an inflection point where people by them-selves will no longer be able to keep up with the rate ofchange and what they need to know, so having AI sys-tems augment those human capabilities is the first stepin dealing with a constantly evolving future.

For IT, some things will remain the same (at least forthe next few years) and other things will change morequickly. We are already seeing the move of ERP systems

to the cloud, and more and more companies are usingconsultants or contract hires. About 40% of the teamsmy Collaborative Strategies colleagues and I have sur-veyed are geographically distributed, and we expectthat figure to be about 60% by 2018. As noted earlier,40% of the US workforce will be part of the gig econ-omy by 2020,11 so that transformation is happeningvery rapidly.

Finally, we are starting to see AI used in everythingfrom meeting scheduling to medical diagnosis. Mybest advice here is to pick your battles. Add AI systemswhere they can intelligently help and mostly aim toaugment the abilities people already have. Look at yourmost overwhelmed employees and ask yourself, wouldthe application of an AI system or additional contractresources improve that employee’s productivity, morale,and likelihood of staying with your organization? If theanswer is “yes” to any of those, then you will be swiftlymoving into the futures I have predicted.

Endnotes1“Intuit 2020 Report: Twenty Trends That Will Shape the NextDecade.” Intuit, 2010 (http-download.intuit.com/http.intuit/CMO/intuit/futureofsmallbusiness/intuit_2020_report.pdf).

2Boyd, Stowe, and Ray Grainger. “The 2017 State of the ServicesEconomy.” Mavenlink/Gigaom, November 2016 (http://go.mavenlink.com/state-of-services-economy-research-report-from-mavenlink-2017).

3Hines, Pamela, and Catherine Cramton. “InterculturalCollaboration in Global Teams.” New Ways of Working LLC,June 2008 (http://eu.haworth.com/docs/default-source/white-papers/intercultural-collaboration-pdf-28547.pdf?sfvrsn=8).

4Wilson, Robert Kim. They Will Be Giants: 21st CenturyEntrepreneurs and the Purpose-Driven Business Ecosystem.TLC Mind Publishing, 2016.

5See http://collaborativeshift.com/.6Morgan, Steve. “One Million Cybersecurity Job Openingsin 2016.” Forbes, 2 January 2016 (www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/#3705284e7d27).

7“In the Year 2016: The 30 Fastest-Growing Jobs.” Boston.com,23 December 2013 (www.boston.com/jobs/untagged/ 2013/12/23/in-the-year-2016-the-30-fastest-growing-jobs).

Using AI to augment what people cancurrently do is a better way to start thanby wholesale replacement of jobs.

Page 18: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 18

8Power, Brad. “Artificial Intelligence Is Almost Ready forBusiness.” Harvard Business Review, 19 March 2015 (https://hbr.org/2015/03/artificial-intelligence-is-almost-ready-for-business).

9Power (see 8).10Wilson, H. James, and Cyrille Bataller. “How People Will Use

AI to Do Their Jobs Better.” Harvard Business Review, 27 May2015 (https://hbr.org/2015/05/how-people-will-use-ai-to-do-their-jobs-better).

11Intuit (see 1).

David Coleman is a Senior Consultant with Cutter Consortium’sData Insight & Social BI practice. He is also the founder andManaging Director of Collaborative Strategies, Inc. Mr. Colemanworks with both collaboration vendors and end-user organizationsto help solve collaboration challenges that are common to both. Hehas been an industry analyst and author for over 25 years, focus-ing on the social and collaboration markets. Prior to establishingCollaborative Strategies, Mr. Coleman held the positions of Directorof Marketing and Product Line Marketing Manager at Oracle. Heis the author of four books on collaboration and innumerable articles,presentations, and blog posts on the topic. He can be reached at [email protected].

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 19: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Artificial general intelligence (AGI) is currently emerg-ing as an area where recent developments are likelyto have a major impact on the way organizations dobusiness, societies organize themselves, and even onhow we address values and ethics.

The fact is that AGI already exists in our daily life. Acommon example is the GPS systems present in manynew cars manufactured today; and let’s not forget thedrones being used to deliver pizzas and cars that drivethemselves. While automatic pilots have been used incommercial planes for quite some time, what AGI isabout to offer to general business and human activityis well beyond what most of us have seen so far.

Machines That LearnDevelopments in AGI are moving artificial intelligenceto a point where learning to learn is becoming evermore a reality, and it can be applied to machines, orrobots, to enable them to carry out common daily activ-ities that are either too tedious, dangerous, or otherwisedifficult for humans to perform. Robots can do thembetter, with no life-threatening risks, and they do notget bored with repetition. In fact, they will learn rapidlyfrom repeating tasks — or better said, challenges.

This process of automation and optimization via”intelligent machines” (which we can call “AGI-enabled” or just “AGIs”) creates immense opportunitiesfor the software and hardware industries to deliver everbetter-performing robots, drones, self-driving cars, andso on. It also creates even more opportunities for allkinds of businesses to make use of this new resource,which will inevitably become more cost-efficient andless problem-prone as compared to humans.

Healthy, Harmful, or Merely Inevitable?

The HealthyAGIs can be seen either as an opportunity for “healthy”applications or as a major threat to human welfare. On

the opportunity side, we can consider humans beingfreed to work less time and/or do more intellectuallyinteresting work. We can expect improvements inmedicine, space exploration, security, and servicesin general. At the physical level, robots may performdangerous tasks on our behalf or perform error-pronecomplex activities (e.g., air-traffic control) more reliably.Information security is also likely to improve, sinceinformation and data protection is becoming increas-ingly based on complex algorithms for surveilling anddetecting potential intrusions.

Another potential benefit is reduced consumption ofnatural resources owing to the overall increase in effi-ciency. In a finite world, there is a growing focus onmore “intelligent” use of the available resources viareuse/recycling, waste reduction, and shifting to renew-able energy. The challenge to achieving sustainabilityis that the high rate at which current economies con-sume and waste resources (to the point where they evendepend on unnecessary waste and consumption) seemsto outpace by far their capability to develop, improve,and mass-deploy the technology required for sustain-able alternatives. Automation and optimization, bothof which lie at the very heart of AGI, are key factorsin increasing energy efficiency and reducing waste.

Consider the example of the energy required to controlthe temperature in office buildings and houses. Todaya massive amount of energy is consumed unnecessarilydue to the lack of intelligent and automated control ofthe energy-supplying systems, just because humans areunable to perform continuously and in real time all theactivities required to minimize the use of energy andoptimize available renewables (e.g., solar energy). Orconsider self-driving cars, which operate in a muchmore efficient way than human-driven vehicles do,thus consuming less fuel. It is not hard to see that anAGI — conceived and developed to apply all its fast-performing intelligent capability to a specific problem,with no interference from emotions or a legacy ofoutdated behavioral genes — will easily outperformhumans both in effectiveness and efficiency.

19Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

AGI: A Threat, an Opportunity, or an InevitableUnknown for 2017?by Alexandre Rodrigues

WEEDING OUT WASTE

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 20: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 20

Fukoku Mutual Life Insurance must have seen this, too,because at the very outset of 2017, the Japanese insur-ance firm announced that it would replace 34 of its staffmembers with an AI system that can calculate insuranceclaim payouts.1 The firm believes that the IBM Watson–based system will increase its productivity by 30%.Meanwhile, “three other Japanese insurance companiesare considering adopting AI systems for work likefinding the optimal cover plan for customers.”2 More-over, a 2016 study by the World Economic Forum pre-dicted that the advent of AI and robots “will result ina net loss of 5.1 million jobs over the next five years in15 leading countries,” whose economies account forapproximately 65% of the total global workforce.3

Is this job loss the “threat” side of AGI? Not necessarily.I believe human societies will realize the benefits ofhaving AGIs perform ordinary, supporting, and logicalactivities, which they can do much better than humanswhile consuming fewer resources and producing lesswaste. In turn, humans will naturally tend to focus onorganizing their lives around intellectual and creativework, which is much less prone to consuming unneces-sary resources and producing waste, while increasingoverall welfare significantly.

The HarmfulThat said, AGI does pose major perils, which can begrouped into three categories:

1. The “unhealthy” use of AGI by humans (e.g.,for hacking)

2. Artificial constraints on access to AGIs (a commoditythat would otherwise be accessible to the wholepopulation) so that “savage capitalism” can pros-per based on such artificially managed scarcity

3. AGIs themselves outmaneuvering and dominatinghumans

The last possibility is the least likely in the new yearahead, but perhaps one that deserves our immediateconsideration.

The InevitableIn 2017, we will see AGI continuously entering ourdaily life. In my view, this will produce some interest-ing breakthroughs in the commercial business world,mainly through the emergence of new product con-cepts. While we may tend to welcome these wondersof technology, we must keep in mind that long-term“misusage” of AGI could also lead to irreversiblenegative consequences in our global human society.

It Starts Now Organizations that start thinking early on how totransform their businesses to embrace AGI will preventthe serious risk of rapid obsolescence (remember whathappened to Nokia for not embracing smartphonessoon enough). The true potential of AGI is most likelyalready being devised by a few organizations. Whenthe mass market starts using AGIs as a commodity tosupport its business models (as Fukoku Mutual Lifehas done), AGI will become a game changer. The trendwill be to have some form of intelligence embedded inmost products we use for work and leisure.

Endnotes1“Japanese Insurance Firm Replaces 34 Staff with AI.” BBCNews, 5 January 2017 (www.bbc.com/news/world-asia-38521403).

2BBC News (see 1).3Hirschler, Ben. “Robots, New Working Ways to Cost FiveMillion Jobs by 2020, Davos Study Says.” Reuters, 18 January2016 (http://uk.reuters.com/article/us-davos-meeting-employment-idUKKCN0UW0NV).

Alexandre Rodrigues, PMP, is a Senior Consultant with CutterConsortium’s Agile Product Management & Software EngineeringExcellence practice and Executive Partner of PMO Projects Group,a group of companies that specializes in helping organizations adoptproject and program management best practices. Dr. Rodrigues holdsa licentiate degree in systems and informatics engineering and a PhDin management sciences. He is a regular contributor to the develop-ment of international standards issued by organizations such as ISOand the Project Management Institute. Throughout his 25-year career,Dr. Rodrigues has lectured at several universities and delivered con-sulting and training services to major organizations around the globe.He can be reached at [email protected].

When the mass market starts using AGIs asa commodity to support its business models,AGI will become a game changer.

NOT FOR DISTRIBUTION • For authorized use, contact Cutter Consortium: +1 781 648 8700 • [email protected]

Page 21: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

There has scarcely been a day the past few years inwhich there hasn’t been a breathless press release orarticle touting some new technological advance andhow it will “literally change the world as we know it —forever.” We’ve seen in quick succession big data, 3Dprinting, and the Internet of Things (IoT), to mentionjust a few, given the mantle of being the next big societalrevolutionary change agent.

Big Data Lays an EggTake big data, for instance. In October 2012, an influen-tial article in Harvard Business Review proclaimed thatbeing a data scientist was “The Sexiest Job of the 21stCentury.”1 According to some industry analysts at thetime, there was going to be, conservatively, a majorUS shortage of data scientists ranging from 140,000 to190,000 by 2018.2 Furthermore, despite the shortage,Gartner claimed that big data was still going to create1.9 million new IT jobs — a 50% increase in the then totalnumber of IT workers — as well as generate another 5.7million new non-IT jobs in the US by 2015.3 Yet the latternumber is significantly greater than the average annualrate of private and government jobs (excluding farmjobs) created in the US over the past 76 years!4

The supposedly infallible predictive power of big dataanalytics was on display in the recent US presidentialelection, with some big data–driven pollsters callingfor a 95% or even higher probability of Hillary Clintonwinning the election.5 As we all know, those predictionswere a wee bit off; in fact, the true outcome served toexpose the big data emperor as having fewer clothesthan pre-election hyped proclamations to the contrary.Big data answers are not fate, after all, despite whatmany big data advocates have been strongly selling.

There is now a sense that the field has been greatlyinfected by “big data hubris,” which in turn has calledinto question how much decision value big data analyt-ics can actually create.6 One common excuse for the

election prediction failure has been the old IT maximof “garbage in, garbage out,” which requires one toknow what garbage looks like, of course. Maybe if thedata scientists behind the recent election predictions hadbothered to look into those earlier grandiose predictionsof big data job creation, some humility might have tem-pered the arrogance in their forecasts. For instance, aquick check of the actual US computer and mathemati-cal employment in 2015 showed that it stood at 4,369,000workers,7 up from 3,814,700 in 2012.8 Where were allthose new IT jobs that analysts claimed were beingspawned by big data, let alone the millions of big data–driven non-IT jobs? It doesn’t take a lot of effort to rec-ognize — or smell, for that matter — garbage inputs.

3D Printing JamsAs recently as 2015, 3D printing was the “hottest newthing” that would change the world forever, since soonthere would be a 3D printer in every house. In addition,industry observers claimed there was an acute, massiveshortage of 3D printing engineers available to be hired.9

However, the story today already centers on the lostpromise of 3D printing as, unsurprisingly, it turns outthat it is a lot harder and more expensive than it firstappeared.10 3D printer companies are in trouble, withsome closing their doors for lack of demand. Thoseleft in the business admit that there is still a large gapbetween the hype being sold and reality, and that theynow need to focus on making 3D printing simpler andmore useful to customers in order to repair their dam-aged reputation.11

21Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

2017: The Year of Exchanging Technology Hype forHumility and Hard Workby Robert N. Charette

TECH MUST WALK BEFORE IT CAN RUN

Big data answers are not fate, after all,despite what many big data advocateshave been strongly selling.

Page 22: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 22

Internet of Scary Things Another overhyped technology is the Internet of Things,or perhaps better called the Internet of Thieves. Back in2012, some analysts excitedly claimed that there wouldbe 1 trillion connected devices in the IoT by 2015.12

However, the latest best estimate is now closer to 30billion connected IoT devices — by 2020. What’s alsobecoming alarmingly apparent is that the world of IoTis not very secure, with many of the connected devicesreadily available to be used in mass denial-of-serviceattacks, for instance.13

Security expert Bruce Schneier warns that “with theadvent of the Internet of Things and cyber-physicalsystems in general, we’ve given the Internet hands andfeet: the ability to directly affect the physical world.What used to be attacks against data and informationhave become attacks against flesh, steel, and concrete.”14

Industry IoT groups say not to worry, security stan-dards are on their way, but they admit there is no uni-versal agreement among the various IoT standardsbodies on what they should be.15

Self-Driving Cars, AI Also OverhypedTotally autonomously driven vehicles and artificialintelligence are likewise becoming, or already are, over-hyped technologies. Tesla, Volvo, and Mercedes-Benzhave been warned about misrepresenting their vehicles’self-driving capabilities, which could lead their cus-tomers into thinking they don’t have to pay attention totheir driving while employing them.16 Similarly, artifi-cial intelligence researchers are worried that the term“AI” has been “hijacked by marketers and advertisingcopyrighters” who will misrepresent what can and can-not be realistically done by current AI systems and turnpeople away from usefully applying AI because thetechnology doesn’t meet inflated expectations.17

Today’s Hot New Style: HumilityNone of this is to imply that there is no value in bigdata, 3D printing, IoT, autonomously driven vehicles,or AI, only that there is no value — and potentially a lotof harm — in overhyping their vaporware capabilities.Look again at the world of 3D printing. How muchfurther along would the industry be today if there hadbeen more humility about 3D printing capabilities andwarnings of the hard work needed to make those capa-bilities materialize as promised?

Worse, the oversold capabilities being marketed arelikely to be wrong, anyway. The late Roy Amara, aresearcher, scientist, and past president of the Institutefor the Future, made a sharp observation a number ofyears ago that has been termed Amara’s Law: “We tendto overestimate the effect of a technology in the shortrun and underestimate the effect in the long run.”

I predict that after the past year of technological over-promises, in 2017 we will start to see a refocus onacknowledging the hard work required to make a tech-nology successful, as well as a bit more humility aboutwhat can be accomplished with it today and in thenear future.

Endnotes1Davenport, Thomas H., and D.J. Patil. “Data Scientist: TheSexiest Job of the 21st Century.” Harvard Business Review,October 2012 (https://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century).

2Manyika, James, et al. “Big Data: The Next Frontier forInnovation, Competition, and Productivity.” McKinsey GlobalInstitute, May 2011 (www.mckinsey.com/business-functions/digital-mckinsey/our-insights/big-data-the-next-frontier-for-innovation).

3“Gartner Says Big Data Creates Big Jobs: 4.4 Million IT JobsGlobally to Support Big Data By 2015.” Press release, Gartner,22 October 2012 (www.gartner.com/newsroom/id/2207915).

4“Current Employment Statistics Survey: 100 Years ofEmployment, Hours, and Earnings.” Monthly Labor Review,August 2016 (www.bls.gov/opub/mlr/2016/article/current-employment-statistics-survey-100-years-of-employment-hours-and-earnings.htm).

5Lohr, Steve, and Natasha Singer. “How Data Failed Us inCalling an Election.” The New York Times, 10 November 2016(www.nytimes.com/2016/11/10/technology/the-data-said-clinton-would-win-why-you-shouldnt-have-believed-it.html?_r=0).

Totally autonomously driven vehicles andartificial intelligence are likewise becoming,or already are, overhyped technologies.

Page 23: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

23Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

6“ ‘Big Data’ Keeps Having Epic Failures.” The ColumbiaMissourian, 21 November 2016 (www.columbiamissourian.com/opinion/editorial-big-data-keeps-having-epic-failures/article_ade916b6-ade2-11e6-8f0f-27ff4c880456.html).

7“Labor Force Statistics from the Current Population Survey(2015).” Bureau of Labor Statistics, US Department of Labor,10 February 2016 (www.bls.gov/cps/cpsaat11.htm).

8“Labor Force Statistics from the Current Population Survey(2011-12).” Bureau of Labor Statistics, US Department of Labor,5 February 2013 (www.bls.gov/cps/aa2012/cpsaat09.htm).

9Vazquez, Eric, Michael Passaretti, and Paul Valenzuela.“3D Opportunity for the Talent Gap.” Deloitte University Press,24 March 2016 (https://dupress.deloitte.com/dup-us-en/focus/3d-opportunity/3d-printing-talent-gap-workforce-develop-ment.html).

10Brandon, John. “4 Important Lessons You Can Learn Now That3-D Printing Is Dying.” Inc., 27 June 2016 (www.inc.com/john-brandon/the-slow-sad-and-ultimately-predictable-decline-of-3d-printing.html).

11Sharma, Mahesh. “Autodesk Boss Explains Why 3D PrintingFailed to Take Off Despite the Hype.” The Sydney MorningHerald, 6 December 2016 (www.smh.com.au/technology/inno-vation/autodesk-boss-explains-why-3d-printing-failed-to-take-off-despite-the-hype-20161205-gt4muf.html).

12Hirst, Peter. “Are We There Yet? Catching Up With the Internetof Things.” IEEE-USA InSight, 9 December 2016 (http://insight.ieeeusa.org/insight/content/views/553170).

13Solomon, Brian. “Hacked Cameras Were Behind Friday’sMassive Web Outage.” Forbes, 21 October 2016 (www.forbes.com/sites/briansolomon/2016/10/21/hacked-cameras-cyber-attack-hacking-ddos-dyn-twitter-netflix/#7633fe137e6f).

14Dittman, David. “The Next President Will Face anInternet Disaster.” Wall St. Daily, 16 August 2016 (www.wallstreetdaily.com/2016/08/16/internet-security/).

15Tilley, Aaron. “Two Major ‘Internet of Things’ StandardsGroups Strike Alliance.” Forbes, 27 July 2016 (www.forbes.com/sites/aarontilley/2016/07/27/two-major-internet-of-things-standards-groups-strike-alliance/#56c53c517c01).

16Brown, Bruce. “Tesla Joins Volvo and Mercedes in WalkingBack ‘Self-Driving’ Terminology.” Digital Trends, 15 August2016 (www.digitaltrends.com/cars/tesla-china-wording-change-autopilot-selfdriving-driver-assist/).

17Malik, Om. “The Hype — and Hope — of Artificial Intelligence.”The New Yorker, 26 August 2016 (www.newyorker.com/business/currency/the-hype-and-hope-of-artificial-intelligence).

Robert N. Charette is a Fellow with Cutter Consortium’s BusinessTechnology & Digital Transformation Strategies practice. Dr. Charetteis also President of ITABHI Corporation, a business and technologyrisk management consultancy. With 40 years’ experience in a widevariety of international technology and management positions, he isrecognized as an international authority and pioneer regarding IS, IT,and telecommunications risk management.

Dr. Charette serves as a senior risk advisor to Global 100 CEOs,CFOs, and program and project managers. He is a trusted riskadvisor to senior-level defense, civil, and local government officialsworldwide on the effectiveness, impacts, rewards, and risks of theirhigh-tech programs and policies. Dr. Charette acts as chief risk con-sultant to financial organizations and companies when investments,mergers, or takeovers are considered. His experience in both govern-ment and business provides a unique perspective on addressing therisk management issues confronting today’s public sector. He can bereached at [email protected].

Page 24: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Internet of Things (IoT), smart cities, wearable devices,and virtual reality are some information and communi-cations technology (ICT) buzzwords that are makingthe boundaries between reality and fiction vanish.According to Mark Weiser, the father of ubiquitouscomputing:

The most profound technologies are those that disappear.They weave themselves into the fabric of everyday lifeuntil they are indistinguishable from it.1

While this weave is already happening through smartfabrics, for example, we expect that IoT2 (or “things” forshort) will transparently blend with the know-how ofenterprises commonly referred to as business processes(BPs). Although the ICT community considers the taskthe basic unit of work that implements a BP, the nexttrend is to allow things to be in charge of this imple-mentation by forming ad hoc (i.e., on-the-fly/oppor-tunistic) collaborative groups. This should happenthrough the concept of Process of Things (PoT),which will:

Guide the identification of things according totheir capabilities

Allow things to take over new capabilities (i.e., mutation)

Facilitate the connection (and disconnection) ofthings through socially flavored relations

Incentivize or penalize things in response to theirpositive or negative participation in processes

PoT is the new way of tapping into the worlds of IoTand BP. PoT ensures that things will not function assilos but contribute collectively to offering value-addedservices to enterprises such as developing smart appli-cations around connected things and reaching out tomore customers through adaptable things. Predefinedrelations between things (e.g., parental, colocation,ownership3) will support the development of networksof (privileged) contacts so that a thing can:

1. Contact other things for possible connection in thesenetworks

2. Avoid conflicts with existing things in processes

3. Recommend other things for either inclusion in orexclusion from processes based on past experiences

The ICT community is already building the SocialInternet of Things (SIoT) using social relations4 amongthings (not among their owners5) and is stressing theimportance of exploiting these relations in developingsmart applications. In a PoT, capabilities will prescribea thing’s duties once it becomes activated and, thus,ready to form collaborative groups with other things.Capabilities would include sensing, storing, processing,diffusion, and reporting, with the option of combiningthem (e.g., sensing-and-processing).

Despite the ICT community’s interest in blendingsocial computing with IoT, a good number of challengesand open issues that emerge out of this blend remainuntackled.6 This includes defining a social-thing archi-tecture, addressing the interoperability of things, dis-covering things, managing energy consumption ofthings, and handling the security, privacy, and trust ofthings, to cite just a few. On top of these challenges andissues, it is important to examine the on-the-fly com-bination of things, taking into account their dynamiccapabilities and end users’ dynamic requirements. APoT should have an operation model that inventoriesthings according to a particular context (e.g., meetingroom) and capitalizes on relations between things toexpand this model.

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 24

Process of Things: Ensuring a Successful Connection Between Thingsby Emir Ugljanin, Zakaria Maamar, Mohamed Sellami, and Noura Faci

BP + IoT = PoT

Although the ICT community considers thetask the basic unit of work that implementsa business process, the next trend is to allowthings to be in charge of this implementationby forming ad hoc collaborative groups.

Page 25: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

25Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Business Processes, Old and NewEnterprises and/or IT practitioners will raise thequestion of how a PoT compares to a regular processof tasks. There are some similarities:

Just as a process of tasks has a business logic definingwho does what, when, and where, a PoT will have a“story” that defines the necessary things along withtheir capabilities and connections to other things. Todevelop such a story, enterprises will need a ThingDefinition Language (TDL) and a Thing ConnectionLanguage (TCL). Both languages could be built uponthe W3C semantic sensor network ontology7 afterenrichment with additional properties that describecontext-based social relations between things.

Like dependencies between tasks in processes, aPoT will count on capacity-driven relations betweenthings, such as precedence (washing machine thendryer), complementarity (coffee machine and toaster),“antagonism” (VCR and DVD), and competition(a new fridge that could replace an existing one).Relations will be context-sensitive and based onthe purpose of the future PoT.

And there are some differences:

Contrary to a process of tasks whose runtime instan-tiation leads into several process instances that couldrun concurrently, instantiating the same PoT severaltimes could call for different things depending ontheir capabilities and availabilities.

Unlike a process of tasks whose tasks are knownin advance, a PoT will have a set of core things(also known in advance) and a set of optional thingsthat are part of these core things’ networks of con-tacts. Upon the recommendation of the core things,optional things can be added to a PoT, subject to theenterprise’s approval of the additional cost. Needlessto say, dropping a core thing from a PoT results indropping all of its optional things.

We believe it is necessary to differentiate between thesocial Internet of things and the Internet of social things.On the one hand, in the social Internet, things areconfigured and controlled in preparation for their inte-gration into specialized networks built upon specificrelations like those mentioned above. On the otherhand, a social thing will be empowered with the capa-bilities needed for tapping into the opportunities ofthese networks, such as looking for partners, avoidingpartners, forming alliances with partners, and so on,based on past experiences.

Capabilities in ContextTo run a PoT, enterprises will have to define contextualboundaries of the future thing-based applications. Theseboundaries will identify the things that are willing toparticipate in these applications, taking into accounttheir ongoing commitments and available capabilities.As stated above, each PoT execution can call for differ-ent things, since new things could emerge and existingthings could, at any given moment, either cease to existor change their priorities in supporting applicationdevelopment.

An example of a PoT could be a heating system thatrelies on sensors, actuators, and other devices to ensurecomfortable living conditions for people. Mapping theheating system onto a PoT would require scanning theenvironment to detect things in terms of availabilitiesand capabilities, defining relations between things, andputting appropriate things together in response to spe-cific requests such as maintaining a certain temperaturelevel. Of course, it is vital to secure each PoT, as hackedthings could lead to catastrophic consequences.8 In aPoT, things are parts of networks, and thus hackingone thing will give free access to the remaining thingsin these networks. The success of PoT will depend onenhancing things with the necessary capabilities to sup-port them in securely building networks of contacts,responding to users’ needs proactively, and — last butnot least — questioning our ways of thinking aboutthings.

Endnotes1Weiser, Mark. “The Computer for the 21st Century.” ACM SIGMOBILE Mobile Computing and Communications Review, Vol.3, No. 3, July 1999 (http://dl.acm.org/citation.cfm?id=329126).

2Georgakopoulos, Dimitrios, and Prem Prakash Jayaraman.“Internet of Things: From Internet Scale Sensing to SmartServices.” Computing, Vol. 98, No. 10, October 2016 (http://link.springer.com/article/10.1007/s00607-016-0510-0).

3Atzori, Luigi, et al. “The Social Internet of Things (SIoT) —When Social Networks Meet the Internet of Things: Concept,Architecture, and Network Characterization.” ComputerNetworks, Vol. 56, No. 16, 14 November 2012 (www.sciencedirect.com/science/article/pii/S1389128612002654).

4Atzori et al. (see 3).5Atzori, Luigi, Antonio Iera, and Giacomo Morabito. “SIoT:Giving a Social Structure to the Internet of Things.” IEEECommunications Letters, Vol. 15, No. 11, November 2011(http://ieeexplore.ieee.org/document/6042288/).

Page 26: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 26

6Ortiz, Antonio M., et al. “The Cluster Between Internetof Things and Social Networks: Review and ResearchChallenges.” IEEE Internet of Things Journal, Vol. 1, No. 3,June 2014 (http://ieeexplore.ieee.org/document/6802330/).

7W3C Semantic Sensor Network Incubator Group. “SemanticSensor Network Ontology.” W3C, 2009-2011 (www.w3.org/2005/Incubator/ssn/ssnx/ssn).

8Palmer, Danny. “IoT Devices Can Be Hacked in Minutes, WarnResearchers.” ZDNet, 25 October 2016 (www.zdnet.com/article/iot-devices-can-be-hacked-in-minuteswarn-researchers/).

Emir Ugljanin is a PhD student at the University of Nis and a teach-ing assistant at the State University of Novi Pazar, both in Serbia.His current research interests are business process management,the Internet of Things, and the social Web. He can be reached [email protected].

Zakaria Maamar is Professor in the College of TechnologicalInnovation at Zayed University, Dubai, UAE. His researchinterests include business processes, the Internet of Things,and Web 2.0. Dr. Maamar has a PhD in computer science fromLaval University, Quebec City, Canada. He can be reached [email protected].

Mohamed Sellami is Associate Professor at ISEP (Institut Supérieurd’Electronique de Paris) and a member of the LISITE Laboratory,Paris, France. His current research interests revolve around servicecomputing, cloud computing, and social computing. Dr. Sellamiobtained his PhD from Telecom SudParis, Paris, France. He can bereached at [email protected].

Noura Faci is Associate Professor in the Department of ComputerScience of Claude Bernard Lyon 1 University, Lyon, France. Herresearch interests include service computing, social computing,and business process management. Dr. Faci has a PhD in computerscience from URCA University, Reims, France. She can be reachedat [email protected].

Page 27: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

2017 is going to be a year of strange winners, and per-haps the strangest of all will be a giant leap away fromtechnology and back to solutions that don’t rely on 24/7connectivity. With the onslaught of major hacks andFacebook embarrassment, the antitech crowd mayhave its best year in decades.

The early evidence is somewhat startling:

The average US Internet user has 130 onlineaccounts,1 each of which carries its own usernameand password. Such a wide-ranging online presencegreatly increases the risk of losing personal data.In response to this threat, a Swedish firm is puttingthe final polish on its new Deseat software, whichenables you to delete (or at least scale back) yourInternet presence.

Facebook has run afoul of German hate speech laws,putting the social media giant in the crosshairs of afury over what a social media organization can andcannot be held accountable for.2

Ransomware became a billion-dollar industry in2016, including a hit on the San Francisco transitsystem that demanded payment in Bitcoin.3

What do these examples have in common? They’rereadily resolved by minimizing technology in the equa-tion. Low-tech will be the hot tech trend for 2017.

Rather than looking for the next in the endless proces-sion of new players in the Internet of Things (IoT), com-panies that want to seize on the hottest tech trends for2017 need to give serious consideration to unplugging.As hackers continue their dedicated push to break intoeverything from your laptop to your pacemaker, com-panies that rely on technology as their backbone willbe looking to older tech as their “back brace.”

For some individuals, the rationale behind the shiftaway from connectedness is personal rather than tech-nical. US National Public Radio’s All Things Consideredin November 2016 featured an interview with RachaelGarrity, a specialist in marketing and publishing fornonprofit organizations. She is one of the legions of

people who have decided to cut at least part of theirInternet “cord.” “I am finding Facebook to have a nega-tive impact on my continuing to keep a positive feelingregarding some of the people I have known longest andcherish most,” she said.4

Individuals and businesses are taking more and morecontrol over their connectivity, and for some that meansdepending on local data storage and non-Internet-reliant approaches to their endeavors. This doesn’tmean that innovation will be quashed in 2017, butrather the opposite. Deseat.me is just the first firm outof the box with termination technology. And while thecloud will continue to grow (Cisco is predicting trafficwill be up to 14 zettabytes in just four years — that’s 14-trillion gigabytes5), the other, quieter growth indus-try is hard-copy tape backups with physical pickup anddelivery by firms like Iron Mountain.6 The movement toreal (rather than virtual) data storage is just one moresign that 2017 will be a year for hedging bets against anunsafe, insecure virtual world.

Ways to DisconnectHow can you take advantage of this trend?

It becomes a lesson in creative thinking, and thinkingoutside the Internet may prove to be the ultimate lessonin both forward thinking and disaster recovery. Thequestions managers and executives should ask are:

Can I approach my latest innovation with a tandem(connected/unconnected) strategy?

Can I convert my products/services in a relative flashto/from a connected environment?

If I can’t do either of those things, have I minimizedmy exposure to the outside through other strategies?

27Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

The Tech-Driven Tech Backlashby Carl Pritchard

HOW LOW CAN YOU GO?

Low-tech will be the hot tech trendfor 2017.

Page 28: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 28

Tandem StrategiesA peer of mine with a semi-apocalyptic bent has alwayshad a classic VW Beetle. When I probed why he optedfor the Bug, his reply was very much in line with thetandem strategy: “I don’t have to take it out of thegarage very often, but I do, just to make sure it stillruns.” He went on to explain that if every hacker,electromagnetic pulse, and solar flare hit the earthsimultaneously, he could still roll the Beetle down thehill, pop the clutch, and off he’d go. Everyone elsewould be trying to figure out why their Lexus justturned into a paperweight.

An effective tandem strategy doesn’t require a Luddite’smentality. It simply requires that we have the ability toturn on a dime from a high-technology approach to alower-tech version of the same solution. But it can getexpensive and definitely requires a lot of forethought.

Conversion StrategiesUntil I get my own VW, I have Keith. Keith is a neigh-bor, a skilled mechanic, and an artisan in the garage. Iftechnology ever gets the best of my computer-driven,high-tech automobile, I know that I can rely on Keith tojury-rig something to get me back on the road in rela-tively short order. It won’t be pretty, but it’ll work andget me past any crisis. (Evidence? My son’s engine lightwas permanently on. Keith worked a little magic andsqueezed another eight months of life out of my boy’sdying car.)

For corporate conversion strategies, we don’t have tobuild in supplemental infrastructure, but we do needour own corporate Keiths. These individuals should beidentified for their ability to identify ways to accessdata, work around systems, and build temporary solu-tions when technology becomes an enemy rather thanan ally.

Minimized ExposureThis is actually where most organizations land, trustingthe cloud, trusting multiple backups — and firewallsand antiviral defenses — to keep them safe. It’s standard… 2016. As 2017 gets into full swing, anticipate that

some of these traditions will fall, and the realization willstrike that all things new are not all things wonderful.

What will 2017 bring? Surprises. And most businessesand government entities really don’t appreciate sur-prises. Nor do they handle them with aplomb. 2017will bring a renewed emphasis on conducting businessin a safe space, including spaces where the Internetcannot reach. 2017 will praise many older approachesas “innovative” and will see great gnashing of teethwhen connectivity becomes a profound challenge.

Oh, yes, and 2017 will bring with it flying cars.

Endnotes1Simic, Ivan. “Deseat.Me Helps You Delete UnnecessaryOnline Accounts with Ease.” .ME, 28 November 2016(http://domain.me/deseat-me-account-deleting/).

2Scott, Mark, and Melissa Eddy. “Facebook Runs Up AgainstGerman Hate Speech Laws. The New York Times, 28 November2016 (www.nytimes.com/2016/11/28/technology/facebook-germany-hate-speech-fake-news.html?_r=0).

3Weise, Elizabeth. “Ransomware Attack Hit San Francisco TrainSystem.” USA Today, 28 November 2016 (www.usatoday.com/story/tech/news/2016/11/28/san-francisco-metro-hack-meant-free-rides-saturday/94545998/).

4Selyukh, Alina. “Postelection, Overwhelmed FacebookUsers Unfriend, Cut Back.” NPR, 20 November 2016 (www.npr.org/sections/alltechconsidered/2016/11/20/502567858/post-election-overwhelmed-facebook-users-unfriend-cut-back).

5Bourne, James. “Cisco Argues Global Cloud Traffic to Hit 14 ZB by 2020 in Latest Study.” CloudTech, 14 November 2016(www.cloudcomputing-news.net/news/2016/nov/14/cisco-argues-global-cloud-traffic-hit-14-zb-2020-latest-study/).

6Boyd, Michael. “Iron Mountain: Worth a Look fromIncome Investors.” Seeking Alpha, 5 December 2016 (http://seekingalpha.com/article/4028229-iron-mountain-worth-look-income-investors).

Carl Pritchard is a Senior Consultant with Cutter Consortium’sBusiness Technology & Digital Transformation Strategies practice.He is a project management thought leader and the lead chapterauthor for the Risk Management chapter of the Guide to theProject Management Body of Knowledge, 4th Edition. Mr.Pritchard is the US correspondent for the British project manage-ment magazine Project Manager Today and is an internationallyrecognized lecturer and author with five books to his credit, includ-ing Risk Management: Concepts & Guidance. He co-producedThe Portable PMP Prep, a nine-CD audio training program and isa member of the board of directors of ProjectConnections.com. Mr.Pritchard has authored hundreds of articles on management practiceand served as a semifinal judge in the Project Management Institute’s“Project of the Year” competition. He is a certified Project ManagementProfessional (PMP), a certified Earned Value Professional (EVP), anda graduate of The Ohio State University. Mr. Pritchard resides withhis wife and sons in Frederick, Maryland. He can be reached [email protected].

2017 will bring a renewed emphasis on con-ducting business in a safe space, includingspaces where the Internet cannot reach.

Page 29: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

IT project performance used to be characterized by run-away projects, late delivery, exceeded budgets, reducedfunctionality, and questionable quality that could trans-late into cancellations, reduced scope, and significantrework cycles. To combat this less-than-favorable trackrecord of project delivery, the UK’s Association forProject Management has formed a rather challengingvision of a world where all projects succeed by theyear 2020. On my wish list for 2017, though, is the moremodest aspiration for a new kind of better-informedand more successful project management.

In looking forward to a bright future, projects providean exciting arena where human ambition and daringimagination continue to drive societal endeavors andachievements. Yet even the successful delivery of aproject is no longer sufficient. Life does not stand still.The bar, it seems, is always being raised and with it theexpectations regarding what can be achieved throughprojects and the ambition and appetite to deliver more.

Over the years, commentators have noted that achieve-ment often motivates the next cycle of undertakingsas humans seek longer bridges, taller buildings, fastercars, and more responsive and integrated systems.Extending our reach inevitably means taking a chanceand testing the limits of our capability and knowledge,especially in the context of project work.

Greater ambition also signals the need to accommodaterising levels of complexity, uncertainty, ambiguity, andchange. Meanwhile, as we learn to cope with a worldthat is more volatile, multifaceted, and interconnected —and risky — we need to hone our skills and capabilities.

Attempting more demanding endeavors requires innov-ative methods for delivering, guiding, and managingprojects. Meanwhile, the rise in complexity and uncer-tainty demands new ways of thinking about projects.

Project Management in 2017So how do we deliver on the wish of success? Thisarticle builds upon the recent trends identified in thebook Further Advances in Project Management: Guided

Exploration in Unfamiliar Landscapes, an edited volume Irecently published with Routledge.1 Recognizing thatconcerns around successful delivery, value realization,resilience, and making change stick force a significantreevaluation of the scope and extent of “normal” proj-ect discourse, the book brings together many leadingthinkers and practitioners in an effort to provide newinsights and perspectives and distill new knowledgethrough narrated exploration. While the book offersa wealth of new ideas, models, and perspectives thatencourage new conversations around projects andproject management, the following seven overarchingthemes emerge as the key trends and changes in projectmanagement that will require our attention in 2017.

PeopleProjects are about people, but project managementsays little about this aspect. Yet people are difficultto include, plan for, and satisfy. Methods to deliverimproved project experiences increasingly accountfor the human aspects of projects and better addressstakeholders, motivation, needs discovery, engagement,marketing, influencing, persuading, and understandingof users and their role. Examples of such new methodsinclude:

Systemically evaluating the spheres of influence

Driving stakeholder engagement by role andcontribution

Determining the (human) pace of progress

Repositioning projects as “social endeavors”

Focusing on gatekeepers, customers, client chains,and contractors as stakeholders

29Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Delivering a Brighter Future for IT Projectsby Darren Dalcher

WISH YOU WERE HERE

As we learn to cope with a world thatis more volatile, multifaceted, and inter-connected — and risky — we need to honeour skills and capabilities.

Page 30: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

©2016 Cutter Information LLCCUTTER BUSINESS TECHNOLOGY JOURNAL 30

Utilizing choice engineering

Fostering project resilience

Considering the methodology of compellingbehaviors2

LeadershipA theme that emerges from the different conversationsin the project space, including those highlighted in thebook, is the need to move from managing to leading.Managing is the hallmark of certainty and a control-oriented perspective, while leadership points to a dif-ferent and more varied skill set. The combination ofuncertainty and a greater reliance on a network of par-ticipants requires a more organic approach emphasizinginfluence, participation, and collaboration.

ContextProjects rely on situational and contextual factors thatmanagers need to understand. Interacting with projectsin complex environments requires an awareness of thespecific characteristics, including informational, contex-tual, strategic, geomorphological, geological, environ-mental, and public perception considerations and awillingness to experiment and adapt.

StrategyProject management is concerned with the deliveryof projects, while projects link strategy and execution.Improving the alignment between strategy and execu-tion requires strategic-level engagement from projectprofessionals.

ValueProjects are often created to satisfy strategic needsand objectives, and therefore project management isincreasingly called upon to deliver benefits and value.However, it is completed projects that satisfy users bysubsequently providing benefits, not project manage-ment per se. For example, a completed footbridge doesnot deliver a benefit stream until pedestrians begin touse it to move across to the other side of town. This is

an important lesson to digest. Benefit realization andvalue delivery capability can be linked to projects, butonly via a strategic, or organizational, frame of thinkingthat extends beyond execution.

Long-Term ThinkingThe long-term perspective is often invoked to considerethics, decision making, ROI, benefits realization, valueaccumulation, decommissioning, extended lifecycles,and warranty periods. It is here that the distinctionbetween temporal project management (focused ondelivery to predefined schedules according to pre-determined milestones) and the sustained outcomes,and even outputs of a project, come into play. Sharingknowledge, resources, and talent often requires organi-zational considerations that extend beyond any singleproject. Similarly, as project managers are asked torelate to a wider horizon or adopt an extended lifecycle,they enter a different level of conversation about theproject and its impacts. They therefore need new waysof reasoning for this type of conversation, such asemploying new and extended methods of addressingmultiple levels of success, timely engagement modes,and ultimate project outcomes.

InnovationInnovation and experimentation feature in conversa-tions about requirements, resilience, decision making,and new mindsets as they provide essential learningopportunities for validating and improving perfor-mance. Moreover, adaptation, trial-and-error, andresilience enable managers to adjust and respond tothe unknown.

What Are the Main Implications of These New Ways of Thinking?Adopting the emerging themes in 2017 has interestingramifications for professionals and offers the potential fora repositioning of the discipline of project management.

First, the trends and changes imply adjustments to therole and importance of project managers. Participatingin strategic conversations, innovating, delivering value,and aligning projects with business strategy requires amore central position. Engaging in a range of strategicroles may lead to the reemergence of the professionalthinker, integrator, and synergy-aware and stakeholder-savvy executive with greater organizational under-standing and clearer links to strategy, benefits, value,and impacts.

Benefit realization and value delivery capa-bility can be linked to projects, but onlyvia a strategic, or organizational, frameof thinking that extends beyond execution.

Page 31: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

31Get The Cutter Edge free: www.cutter.com Vol. 29, No. 12 CUTTER BUSINESS TECHNOLOGY JOURNAL

Second, multiple perspectives, alternative lenses, andthe use of fresh metaphors may support the develop-ment of complementary options and arrangements forprojects and action and lead to fundamental improve-ments in the approaches employed by project managersin accounting for wider areas and interests. Formulationof projects relies on the perceptions we hold. If we areable to question and challenge the purpose, value, andoutcomes of proposed undertakings and view themfrom alternate vantage points, we may be able to con-ceive more useful and meaningful projects that deliveressential benefits and address real concerns and issues.

Third, we require a new understanding of project suc-cess, an idea that is explored in the various chapters ofthe book and other recent work.3 Success in the futurewill demand deeper engagement with the business. Italso implies an acute understanding of the values andpreferences of different, yet much wider, circles ofstakeholder communities, possibly arranged in complexand interconnected ecologies embracing supply chains,coalitions, spheres of influence, and common values andpreferences. The set of concerns is likely to encompasssustainability and survivability issues, extended timehorizons, and the impact of wider communities withshared interests. Greater sensitivity to context, consider-ation of the different phasing of lifecycles, and adding alonger-term perspective would allow the focus to shiftfrom efficiency of execution to an extended lifecycleperspective. This will support change, adaptation, andresilient posturing and enable organizations to betteraccommodate urgent and unexpected perturbations.The old tools and approaches that characterize the clas-sic mindset will thus be augmented by new thinkingmechanisms and reflection skills, such as reasoningabout multiple levels of success, determining the paceof projects, utilizing resilience modes, and applyingcomplexity, humanistic, and systemic models, all ofwhich will help practitioners balance ethical, economic,and environmental considerations.

The new themes point to new priorities in terms of lead-ing people, repositioning projects, redefining success,and focusing on the delivery of value in the new worldof projects. Many of the ideas can be easily adapted toaugment current practices. Others may provide the seedfor developing future improvements in project practice.

Used together in 2017, they enable project professionalsto begin to address the concerns around projects,update current thinking, and start to repair the trackrecord of IT asset, project, and service delivery.

Endnotes 1Dalcher, Darren (ed.). Further Advances in Project Management:Guided Exploration in Unfamiliar Landscapes. Routledge, 2017.

2Price, Martin. “Successful Projects and the Eight CompellingBehaviours.” Chap. 22 in Further Advances in ProjectManagement: Guided Exploration in Unfamiliar Landscapes,edited by Darren Dalcher. Routledge, 2017.

3Dalcher, Darren. “Rethinking Success in Software Projects:Looking Beyond the Failure Factors.” Chap. 2 in Software ProjectManagement in a Changing World, edited by Günther Ruhe andClaes Wohlin. Springer, 2014; Dalcher, Darren. “What CanProject Success, or Failure, Tell Us about Project ManagementTheory?” In Theory Meets Practice in Projects, edited by StephenRietiker, Reinhard Wagner. GPM, 2014; Dalcher, Darren.“Making Sense of IS Projects.” In Encyclopaedia of InformationScience and Technology. Idea Publishing, July 2017.

Darren Dalcher is Chair Professor of Project Management at theUniversity of Hertfordshire and is the Founding Director of theNational Centre for Project Management, an interdisciplinary centerof excellence operating in collaboration with industry, government,charities, NGOs, and the learned societies. He has been named oneof the top 10 “movers and shapers” in project management by theAssociation for Project Management and has also been voted Projectmagazine’s Academic of the Year for his contribution in “integratingand weaving academic work with practice.” Dr. Dalcher has builta reputation as a leader and innovator in the area of practice-basededucation and reflection in project management and has worked withmany major industrial, commercial, and charitable organizations andgovernment bodies. He is active in numerous international commit-tees, steering groups, and editorial boards. Dr. Dalcher is heavilyinvolved in organizing international conferences and has deliveredmany keynote addresses and tutorials. He has written over 200 refer-eed papers and book chapters on project management and softwareengineering. He is Editor-in-Chief of Journal of Software: Evolutionand Process and Editor of the Advances in Project Managementand Fundamentals of Project Management book series publishedby Routledge. Dr. Dalcher is a Chartered Fellow of the BritishComputer Society, a Fellow of the Chartered Management Instituteand the Royal Society of Arts, and a Senior Fellow of the HigherEducation Academy. In 2011, he was awarded a prestigious lifetimeHonorary Fellowship from the Association for Project Managementfor his outstanding contribution to project management. He can bereached at [email protected].

Page 32: Access to the Experts Cutter Business Technology JOURNALCutter Business Technology Management, Innovation, Transformation Cutter Consortium Access to the Experts ... Vol. 29, No. 12

Cutter ConsortiumAccess to the Experts

Cutter Business TechnologyJOURNAL

Abou

t Cut

ter C

onso

rtium

Cutter Consortium is a unique, global business technology advisory firmdedicated to helping organizations leverage emerging technologies and thelatest business management thinking to achieve competitive advantage andmission success. Through its research, training, executive education, andconsulting, Cutter enables digital transformation.

Cutter helps clients address the spectrum of challenges technology changebrings — from disruption of business models and the sustainable innovation,change management, and leadership a new order demands, to the creation,implementation, and optimization of software and systems that power newlyholistic enterprise and business unit strategies.

Cutter pushes the thinking in the field by fostering debate and collaborationamong its global community of thought leaders. Coupled with its famouslyobjective “no ties to vendors” policy, Cutter’s Access to the Experts approachdelivers cutting-edge, objective information and innovative solutions to itsclients worldwide.

For more information, visit www.cutter.com or call us at +1 781 648 8700.