Page 1
Innovating Beyond the Enterprise
Stuart Charlton
BEA Worldwide Enterprise Architecture
Page 2
BEA Confidential. | 2
start
Page 3
BEA Confidential. | 3
First, about me
Page 4
BEA Confidential. | 4
Stuart Charlton
Page 5
BEA Confidential. | 5
Page 6
BEA Confidential. | 6
Joined in 2004
Page 7
BEA Confidential. | 7
Lead SOA Architect
Page 8
BEA Confidential. | 8
May 2007
Page 9
BEA Confidential. | 9
Joined Worldwide Consulting
Page 10
BEA Confidential. | 10
This talk
Page 11
BEA Confidential. | 11
Page 12
BEA Confidential. | 12
“The future is already here.It's just not evenly distributed yet.”
- William Gibson
Page 13
BEA Confidential. | 13
My 3 Claims:
Page 14
BEA Confidential. | 14
1. Organizations are drastically rethinking how they mobilize
resources
Page 15
BEA Confidential. | 15
Resources?
Page 16
BEA Confidential. | 16
Resources =ideas and things
Page 17
BEA Confidential. | 17
Knowledge capitalThingsNature
Entrepreneurial skills
Page 18
BEA Confidential. | 18
(could be acquired via financial capital)
Page 19
BEA Confidential. | 19
Implications
Page 20
BEA Confidential. | 20
Major impact on the mindset of organization
Page 21
BEA Confidential. | 21
Major impact on how we innovate
Page 22
BEA Confidential. | 22
2. The “service network” is evolvinginto a web of resources and capabilities
Page 23
BEA Confidential. | 23
Supporting this new approach to mobilization
Page 24
BEA Confidential. | 24
3. “Information assurance”will be a major limiting factor
Page 25
BEA Confidential. | 25
Assumptions
Page 26
BEA Confidential. | 26
Societal Trends
Page 27
BEA Confidential. | 27
1. Economic and Political Uncertainty
Page 28
BEA Confidential. | 28
Page 29
BEA Confidential. | 29
Page 30
BEA Confidential. | 30
Page 31
BEA Confidential. | 31
Page 32
BEA Confidential. | 32
Page 33
BEA Confidential. | 33
Page 34
BEA Confidential. | 34
Page 35
BEA Confidential. | 35
Business regulatory reform
Page 36
BEA Confidential. | 36
Environmental reform
Page 37
BEA Confidential. | 37
(some day)
Page 38
BEA Confidential. | 38
Changing Demographics
Page 39
BEA Confidential. | 39
Page 40
BEA Confidential. | 40
2. Growing Abundance
Page 41
BEA Confidential. | 41
(except energy)
Page 42
BEA Confidential. | 42
Global Labour
Page 43
BEA Confidential. | 43
Page 44
BEA Confidential. | 44
Page 45
BEA Confidential. | 45
Services
Page 46
BEA Confidential. | 46
Page 47
BEA Confidential. | 47
Page 48
BEA Confidential. | 48
Page 49
BEA Confidential. | 49
Page 50
BEA Confidential. | 50
3. Globalized Learning & Experimenting
Page 51
BEA Confidential. | 51
Page 52
BEA Confidential. | 52
Mashups
Page 53
BEA Confidential. | 53
4. Broader Adoption of Risk Management
Page 54
BEA Confidential. | 54
Page 55
BEA Confidential. | 55
Technology trends
Page 56
BEA Confidential. | 56
SOA
Page 57
BEA Confidential. | 57
Virtualization
Page 58
BEA Confidential. | 58
Web 2.0
Page 59
BEA Confidential. | 59
BPM
Page 60
BEA Confidential. | 60
How does all of this impact organizations?
Page 61
BEA Confidential. | 61
(1)
Page 62
BEA Confidential. | 62
Organizations are drastically rethinking how they mobilize resources
Page 63
BEA Confidential. | 63
Page 64
BEA Confidential. | 64
Businesses
Page 65
BEA Confidential. | 65
Page 66
BEA Confidential. | 66
schools
Page 67
BEA Confidential. | 67
Page 68
BEA Confidential. | 68
media
Page 69
BEA Confidential. | 69
Page 70
BEA Confidential. | 70
Most common today
Page 71
BEA Confidential. | 71
Assumption:Demand is stable
Page 72
BEA Confidential. | 72
Assumption: Transaction & communication costs are
high
Page 73
BEA Confidential. | 73
Assumption: The response to uncertainty is more
planning
Page 74
BEA Confidential. | 74
Page 75
BEA Confidential. | 75
1945
Page 76
BEA Confidential. | 76
Page 77
BEA Confidential. | 77
Page 78
BEA Confidential. | 78
How do you get:
Page 79
BEA Confidential. | 79
1. Mobilized quickly from nothing
Page 80
BEA Confidential. | 80
Page 81
BEA Confidential. | 81
2. Build diverse products in variable quantities
Page 82
BEA Confidential. | 82
Page 83
BEA Confidential. | 83
Where would you look?
Page 84
BEA Confidential. | 84
Page 85
BEA Confidential. | 85
Page 86
BEA Confidential. | 86
kanban
Page 87
BEA Confidential. | 87
Page 88
BEA Confidential. | 88
Page 89
BEA Confidential. | 89
Page 90
BEA Confidential. | 90
Many books
Page 91
BEA Confidential. | 91
Page 92
BEA Confidential. | 92
Page 93
BEA Confidential. | 93
Page 94
BEA Confidential. | 94
2007
Page 95
BEA Confidential. | 95
Page 96
BEA Confidential. | 96
Distributed CRM
Page 97
BEA Confidential. | 97
Partner Network
Page 98
BEA Confidential. | 98
Page 99
BEA Confidential. | 99
Process network
Page 100
BEA Confidential. | 100
7,500 partners
Page 101
BEA Confidential. | 101
37 countries
Page 102
BEA Confidential. | 102
Page 103
BEA Confidential. | 103
Pull knowledge + goods
Page 104
BEA Confidential. | 104
Page 105
BEA Confidential. | 105
Page 106
BEA Confidential. | 106
Education
Page 107
BEA Confidential. | 107
Page 108
BEA Confidential. | 108
Page 109
BEA Confidential. | 109
Media
Page 110
BEA Confidential. | 110
Page 111
BEA Confidential. | 111
vs
Page 112
BEA Confidential. | 112
Page 113
BEA Confidential. | 113
Retail
Page 114
BEA Confidential. | 114
Page 115
BEA Confidential. | 115
Shared Experiences
Page 116
BEA Confidential. | 116
Page 117
BEA Confidential. | 117
Comparing Push with Pull
Page 118
BEA Confidential. | 118
Contrasting the Push vs. Pull Approach
Demand can be forecasted
Resource centric
Tightly coupled
Centralized control
Major capital allocations
Efficiency focus
Demand is uncertain
People centric
Loosely-coupled, organic
Decentralized initiative
Incremental investment
Innovation focus
Push Model Pull Model
Participation restricted Collaboration is ingrained
Page 119
BEA Confidential. | 119
What are the implications?
Page 120
BEA Confidential. | 120
1. Flow value from demand
Page 121
BEA Confidential. | 121
Or, strategy begins with a consumer view
Page 122
BEA Confidential. | 122
What value do you consume?
Page 123
BEA Confidential. | 123
Who consumes your value?
Page 124
BEA Confidential. | 124
2. Decentralized innovation
Page 125
BEA Confidential. | 125
Goal-driven behaviour
Page 126
BEA Confidential. | 126
Processes form a pull platform
Page 127
BEA Confidential. | 127
Use process management to gain visibility
Page 128
BEA Confidential. | 128
3. More opportunities for collaboration
Page 129
BEA Confidential. | 129
In a community of practice
Page 130
BEA Confidential. | 130
With consumers
Page 131
BEA Confidential. | 131
With partners
Page 132
BEA Confidential. | 132
Example
Page 133
BEA Confidential. | 133
Page 134
BEA Confidential. | 134
Lean Consumption
Page 135
BEA Confidential. | 135
Eliminating the “unpaid work” of the consumer
Page 136
BEA Confidential. | 136
Page 137
BEA Confidential. | 137
Is the amount of work to be donereduced by having customers wait?
Page 138
BEA Confidential. | 138
Would there be a queue if the providers had to pay for customers waiting time?
Page 139
BEA Confidential. | 139
Principles for Lean Consumption:
Solve my problem completely.
Don’t waste my time.
Provide exactly what I want
Deliver value where I want it
Supply Value when I want it
Reduce the number of decisions I need to make to solve my problems.
Page 140
BEA Confidential. | 140
Page 141
BEA Confidential. | 141
Consumer-First Process Design
Page 142
BEA Confidential. | 142
So:
Page 143
BEA Confidential. | 143
1. Organizations are drastically rethinking how they mobilize
resources
Page 144
BEA Confidential. | 144
Resources =ideas and things
Page 145
BEA Confidential. | 145
Impact on the mindset of business
Page 146
BEA Confidential. | 146
Impact on how we innovate
Page 147
BEA Confidential. | 147
2. The “service network” is evolvinginto a web of resources and capabilities
Page 148
BEA Confidential. | 148
Supporting this new approach to mobilization
Page 149
BEA Confidential. | 149
3. “Information assurance”will be a major limiting factor
Page 150
BEA Confidential. | 150
(2)
Page 151
BEA Confidential. | 151
Evolving the Service Network
Page 152
BEA Confidential. | 152
Topology
Page 153
BEA Confidential. | 153
Decentralized & Distributed
Page 154
BEA Confidential. | 154
Page 155
BEA Confidential. | 155
SOA
Page 156
BEA Confidential. | 156
Lessons?
Page 157
BEA Confidential. | 157
Open, uniform agreements scale
Page 158
BEA Confidential. | 158
Service infrastructure is the on-ramp
Page 159
BEA Confidential. | 159
Visibility
Page 160
BEA Confidential. | 160
Relevance
Page 161
BEA Confidential. | 161
Agility
Page 162
BEA Confidential. | 162
But….
Page 163
BEA Confidential. | 163
Page 164
BEA Confidential. | 164
Page 165
BEA Confidential. | 165
Page 166
BEA Confidential. | 166
whoa
Page 167
BEA Confidential. | 167
Liquid?
Page 168
BEA Confidential. | 168
Web services are often misnamed
Page 169
BEA Confidential. | 169
Neither on the web
Page 170
BEA Confidential. | 170
Page 171
BEA Confidential. | 171
Nor are they general “services”
Page 172
BEA Confidential. | 172
Page 173
BEA Confidential. | 173
Let’s take another look at whatSOA can be.
Page 174
BEA Confidential. | 174
We want to:Pull resources & capabilities from
demand
Page 175
BEA Confidential. | 175
1. Name resources
Page 176
BEA Confidential. | 176
2. Agree how to manipulate & communicate
with resources
Page 177
BEA Confidential. | 177
(i.e. services)
Page 178
BEA Confidential. | 178
3. Connect resources to form capabilitiesand new resources
Page 179
BEA Confidential. | 179
4. Low barrier to entry
Page 180
BEA Confidential. | 180
5. Extensible
Page 181
BEA Confidential. | 181
Ultimately,Weaving a Web of Resources and
Capabilities
Page 182
BEA Confidential. | 182
AvailableInside the Organization
Page 183
BEA Confidential. | 183
AvailableOutside the Organization
Page 184
BEA Confidential. | 184
How?
Page 185
BEA Confidential. | 185
Good news:The world-wide web architecture already
does this
Page 186
BEA Confidential. | 186
Good news:SOA is evolving to become
more like the Web
Page 187
BEA Confidential. | 187
Bad News:This is only in the early stages
Page 188
BEA Confidential. | 188
Insight:Services come in different shapes and
sizes
Page 189
BEA Confidential. | 189
JBOS “Uniform”
Level of Uniformity
“Governed SOA” ConnectedResources
Just a BunchOf… Services
Page 190
BEA Confidential. | 190
The Contract must fit the Consumer
Page 191
BEA Confidential. | 191
Examples
Page 192
BEA Confidential. | 192
Mashups and Collaboration
Page 193
BEA Confidential. | 193
Page 194
BEA Confidential. | 194
The Search for Jim Gray
Page 195
BEA Confidential. | 195
Page 196
BEA Confidential. | 196
Page 197
BEA Confidential. | 197
Page 198
BEA Confidential. | 198
Page 199
BEA Confidential. | 199
Page 200
BEA Confidential. | 200
(squint)
Page 201
BEA Confidential. | 201
Page 202
BEA Confidential. | 202
The political implications of web networking?
Page 203
BEA Confidential. | 203
The fundamental premise behind web networking is that regardless of the amount of automation involved in a transaction, there is always a human being who will be accountable for what happens.
-- Paul Strassmann, 1995
Page 204
BEA Confidential. | 204
Page 205
BEA Confidential. | 205
(3)
Page 206
BEA Confidential. | 206
“Information assurance”is a limiting factor
Page 207
BEA Confidential. | 207
“48% of the nearly 3,000 leading executives surveyed
are actively investing in Web 2.0 approaches (e.g. wikis, blogs, social networking, mashups).”
- How Businesses are using Web 2.0: A McKinsey Global Survey, March 2007
Page 208
BEA Confidential. | 208
Governance?
Page 209
BEA Confidential. | 209
"Just because something can be mashed up doesn't mean it should be… The big question to ask is, 'What are the unintended consequences
of a particular mashup'? That's a corporate policy issue."
- Ron Schmelzer, ZapThink“The Enterprise Promise of Mashups”, CMP Media,
January 8, 2007
Page 210
BEA Confidential. | 210
The general theme:
Page 211
BEA Confidential. | 211
Data is political
Page 212
BEA Confidential. | 212
Data is politicalHas always been
Page 213
BEA Confidential. | 213
but
Page 214
BEA Confidential. | 214
With freedom comes responsibility
Page 215
BEA Confidential. | 215
Page 216
BEA Confidential. | 216
Information Assurance:The practice of managing information-
related risks
Page 217
BEA Confidential. | 217
More than security and data governance
Page 218
BEA Confidential. | 218
Business Continuity Planning
Page 219
BEA Confidential. | 219
Disaster Recovery Planning
Page 220
BEA Confidential. | 220
High Availability
Page 221
BEA Confidential. | 221
Auditing and Fraud Detection
Page 222
BEA Confidential. | 222
You will fail
Page 223
BEA Confidential. | 223
(sorry)
Page 224
BEA Confidential. | 224
Not just preventative,but reactive and counteractive
Page 225
BEA Confidential. | 225
Forensics
Page 226
BEA Confidential. | 226
Criminology
Page 227
BEA Confidential. | 227
The name of the game is:Operating at an acceptable level of risk
Page 228
BEA Confidential. | 228
Of course, one can get too paranoid
Page 229
BEA Confidential. | 229
Page 230
BEA Confidential. | 230
Page 231
BEA Confidential. | 231
Identity of a Consumer
Page 232
BEA Confidential. | 232
Identity of an Information Producer
Page 233
BEA Confidential. | 233
Identity of the Device
Page 234
BEA Confidential. | 234
Integrity and Confidentiality
Page 235
BEA Confidential. | 235
Authority over quality
Page 236
BEA Confidential. | 236
Summary:
Page 237
BEA Confidential. | 237
1. Organizations are drastically rethinking how they mobilize
resources
Page 238
BEA Confidential. | 238
Moving from Push to Pull
Page 239
BEA Confidential. | 239
Impact on the mindset of business
Page 240
BEA Confidential. | 240
Impact on how we innovate
Page 241
BEA Confidential. | 241
2. The “service network” is evolvinginto a web of resources and capabilities
Page 242
BEA Confidential. | 242
Lowered barriers to entrySupported by a web architecture
Page 243
BEA Confidential. | 243
3. “Information assurance”will be a major limiting factor
Page 244
BEA Confidential. | 244
What now?
Page 245
BEA Confidential. | 245
1. Think about ways in which your enterprise is a pull platform.
How could it become more of one?
Page 246
BEA Confidential. | 246
2. Evolve your IT services into a web of capabilities resources, exposed as low-barrier-to-entry
services,ready to be pulled by demand
Page 247
BEA Confidential. | 247
3. Begin to coordinate the multiple disciplines of
Information Assurance
Page 248
BEA Confidential. | 248
Thank You
[email protected]
Page 249
BEA Confidential. | 249