<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:georss='http://www.georss.org/georss'><id>tag:blogger.com,1999:blog-7302924</id><updated>2009-12-18T09:46:56.988Z</updated><title type='text'>Notions</title><subtitle type='html'>Selected glossary and index by Richard Veryard, with links to other material.</subtitle><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/latest.htm'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://feeds.feedburner.com/Notions'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>19</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7302924.post-113522273618965894</id><published>2005-12-22T02:26:00.000Z</published><updated>2005-12-22T03:50:42.596Z</updated><title type='text'>Identity</title><content type='html'>&lt;h4&gt;Is identity a thing?&lt;/h4&gt;Some people talk about identity as some special kind of object - a valuable possession that can be stolen by fraudsters (&lt;a href="http://www.veryard.com/notions/2005/01/identity-theft.htm"&gt;identity theft&lt;/a&gt;), appropriated by authority (e.g. government), and/or captured in some technological device (database, smartcard).&lt;br /&gt;&lt;br /&gt;Some people say we have exactly one of these things, while others say we may have several different identities (corresponding perhaps to different social contexts). Some of us may have a cluster of overlapping but not-quite-consistent identities.&lt;br /&gt;&lt;br /&gt;Some people say identity is a permanent fixture, while others say it can develop over time.&lt;br /&gt;&lt;br /&gt;Identity may be fractured into technological bits. For example, &lt;a href="http://www.windley.com/archives/2005/10/on_the_word_ide.shtml"&gt;Phil Windley&lt;/a&gt; describes identity in terms of "a collection of attributes, preferences, and traits stored in a computer record". He contrasts this (as he puts it) "dry technical definition of identity" with "the living language of identity" mooted by &lt;a href="http://timothygrayson.com/blog/archives/000775.html"&gt;Tim Greyson&lt;/a&gt;. Perhaps the computer record is merely an impoverished representation of a living identity.&lt;br /&gt;&lt;br /&gt;But perhaps it isn't a thing after all ...?&lt;br /&gt;&lt;h4&gt;Is identity a function or process?&lt;/h4&gt;In my 1992 book on Information Modelling, I argued (following &lt;a href="http://en.wikipedia.org/wiki/Frege"&gt;Frege&lt;/a&gt;) that identity was a special kind of rule, defining when something could be regarded as &lt;span style="font-weight: bold;"&gt;the same again&lt;/span&gt;. This notion of identity is invoked by &lt;a href="http://netmesh.info/jernst/2005/12/19#scott-lemon-identity-same-as"&gt;Johann Ernst&lt;/a&gt; and &lt;a href="http://the.inevitable.org/anism/2005/12/19.html#a755"&gt;Scott Lemon&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;A company identifies me using a relatively small set of characteristics. If a fraudster manages to replicate these characteristics, then he can impersonate me for fraudulent ends. If the company is unable to detect the impersonation, then the fraudster and I are (at least temporarily) indistinguishable.&lt;br /&gt;&lt;br /&gt;One way of making sense of this is to say that there are at least two different identity functions in play here. The bank's identity function answers YES when asked if the fraudster and I are the same; my own identity function answers NO. From my perspective, the bank's error counts as a false positive, caused by inadequate information.&lt;br /&gt;&lt;br /&gt;In general, such identity functions are epistemological rather than ontological. They are about what a company knows (or chooses to know, or is permitted to know) about a data subject, rather than the intrinsic nature of the data subject himself.&lt;br /&gt;&lt;br /&gt;And importantly, whereas ontological identity obeys all sorts of simple logic (excluded middle, transitivity), epistemological identity (indistinguishability) doesn't.&lt;br /&gt;&lt;h4&gt;Is identity a policy?&lt;/h4&gt;This kind of identity is not stable, because it depends on the company's policy - what it chooses to know about me. It also depends on my own preferences - what I am willing to divulge to the company - for example whether I choose to participate in loyalty schemes or frequent flyer programmes. In some industries, there are also regulatory concerns - for example, banks have been forced to increase the amount they know about their customers, and this is apparently to counter money-laundering.&lt;br /&gt;&lt;br /&gt;From this perspective, the question of biometric identity is not whether two people are theoretically indistinguishable, but whether anyone can be bothered to spend enough money to make the technology sufficiently accurate. (See discussion on the Ultimate Biometric by &lt;a href="http://www.chi-publishing.com/samples/ISB1008Editorial.pdf"&gt;Neils A Bjergstrom&lt;/a&gt; (pdf), &lt;a href="http://www.idcorner.org/?p=136#more-136"&gt;Stefan Brands&lt;/a&gt; and &lt;a href="http://www.identityblog.com/2005/10/30.html#a363"&gt;Kim Cameron&lt;/a&gt;.)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;... more later&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-113522273618965894?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/113522273618965894/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=113522273618965894' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/113522273618965894'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/113522273618965894'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/12/identity.htm' title='Identity'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-113049836325651149</id><published>2005-10-28T11:39:00.000+01:00</published><updated>2005-10-28T12:19:23.283+01:00</updated><title type='text'>Life Cycle</title><content type='html'>It might seem obvious, but the word "cycle" means going round in a loop. In biology, this means the cycle of birth, reproduction and death. In business, talking about product lifecycles or technology lifecycles carries the expectation that every instance of PRODUCT or TECHNOLOGY has a finite life expectancy, and will be replaced by something else.&lt;br /&gt;&lt;br /&gt;But there are two common misuses of the word lifecycle. In the first misuse, people say "cycle" but mean something else. This is illustrated by Gartner's concept of the Hype Cycle, which is not even drawn as a cycle, but as a curved graph going from left to right. See discussion in my &lt;a href="http://www.veryard.com/industryanalysis/2005/09/software-hype-curve.html"&gt;Software Industry Analysis&lt;/a&gt; blog.&lt;br /&gt;&lt;br /&gt;In the second misuse, the concept of cycle is used inappropriately. This is illustrated by a Disaster Lifecycle found on the FEMA website. This appears to show each instance of DISASTER producing new instances of DISASTER.&lt;br /&gt;&lt;br /&gt;&lt;a onclick="window.open(this.href, '_blank', 'width=250,height=275,scrollbars=no,resizable=no,toolbar=no,directories=no,location=no,menubar=no,status=no,left=0,top=0'); return false" href="http://presentationzen.blogs.com/.shared/image.html?/photos/uncategorized/what_the_2.gif"&gt;&lt;img src="http://presentationzen.blogs.com/presentationzen/images/what_the_2.gif" title="What_the_2" alt="What_the_2" style="width: 220px; height: 242px;" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;(via &lt;a href="http://presentationzen.blogs.com/presentationzen/2005/10/fema_chart_beco.html"&gt;Presentation Zen&lt;/a&gt;)&lt;p&gt;(Of course the ongoing purpose of FEMA assumes a continuous supply of fresh disasters, just as rat-catchers rely upon a continuous supply of rats, but it is really bad PR for FEMA to imply that they are helping to create the disasters they are supposed to be managing.)&lt;br /&gt;&lt;br /&gt;The &lt;a href="http://presentationzen.blogs.com/presentationzen/2005/10/fema_chart_beco.html"&gt;Presentation Zen&lt;/a&gt; blog suggests that "Perhaps FEMA would have been better advised to show the stages in a more linear way?" and refers to product adoption lifecycles being presented in left-to-right manner. But the problem (both here and elsewhere) is not just that a given concept has been inappropriately drawn, but that it was the wrong concept in the first place.&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-113049836325651149?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/113049836325651149/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=113049836325651149' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/113049836325651149'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/113049836325651149'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/10/life-cycle.htm' title='Life Cycle'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-112903438243622542</id><published>2005-10-11T13:29:00.000+01:00</published><updated>2005-10-11T13:39:43.473+01:00</updated><title type='text'>Attenuation</title><content type='html'>A number of people have been talking about attenuation recently, and it links to some aspects of business intelligence I've been researching. When &lt;a href="http://www.redmonk.com/jgovernor/archives/001013.html"&gt;James Governor&lt;/a&gt; complained that the word was geeky, and asked why we couldn't just use the word filtering, I thought I should try to answer him.&lt;br /&gt;&lt;br /&gt; I think the important difference is this. Attenuation is an outcome (black box), whereas filtering is a mechanism (white box).  Filtering generally involves some device or subsystem (hardware, software, clerical or hybrid) that performs a filtering function - letting some items through and not others. Although it is possible in complex systems for filtering to happen by accident, and it is certainly possible for filtering devices to perform incorrectly, the filter is an architectural pattern that is normally implemented as a deliberate design decision.&lt;br /&gt;&lt;br /&gt; In contrast, attenuation simply means that some data or information are just not getting through. This can occur as an emergent effect of the interactions within a large complex system, without being specifically located anywhere. It may be deliberate or accidental, it may be predictable or random. Filtering is certainly one possible mechanism for achieving attenuation, but there are many other possible causes of attenuation including distance or impedance mismatch. Simple aggregation also produces attenuation, and this has led some people (I think misleadingly) to bundle the two concepts. (See for example &lt;a href="http://conferences.oreillynet.com/et2006/"&gt;O'Reilly&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt; When I am looking at a complex system or organization, I can often start with the observation that attenuation is happening, but without knowing where or how. I infer attenuation when I see a system that is failing to respond to significant events in its environment, or when I see systems that cannot coordinate properly.&lt;br /&gt;&lt;br /&gt; In some cases, of course, this inferred attenuation leads to the discovery of a specific filter - perhaps a communication channel has got blocked, or adapted for some local purpose that conflicts with the objectives of the whole system. But often the root cause is not the presence of a filtering mechanism but the absence or inadequacy of a communication mechanism. Or even a fundamental incompatibility between different systems or viewpoints.&lt;br /&gt;&lt;br /&gt; Attenuation is often a desirable effect - particularly when dealing with information overload or complexity overload.  &lt;a href="http://interconnected.org/home/2005/10/02/attenuation_is"&gt;Matt Webb&lt;/a&gt; praises maps, and points out that "the taking of a position in a landscape of information flow" produces attenuation. (Thus attenuation is a necessary consequence of perspective.) IT architects practise two forms of attenuation in particular - Modelling and SeparationOfConcerns.&lt;br /&gt; &lt;ul&gt; &lt;li&gt;Modelling is a form of conceptual attenuation - reducing a complex situation to an abstract model.&lt;/li&gt;&lt;li&gt;SeparationOfConcerns is a form of parallel attenuation - creating a series of simpler views of a complex situation.&lt;/li&gt; &lt;/ul&gt;  However, there are many situations where attenuation needs to be overcome: I want more detail / context in the data than I'm being given. When attenuation occurs in my system, I may be able to get inside the system to detect and alter the causes of the attenuation.  &lt;a href="http://interconnected.org/home/2005/10/02/attenuation_is"&gt;Matt Webb&lt;/a&gt; describes these as algorithms, and advocates "co-production of the algorithms with the people who sit in the information flows".&lt;br /&gt;&lt;br /&gt; This is fine when it's available - but it usually isn't. Because sometimes the attenuation is happening in someone else's system. So I have to find a way to amplify the data I can get access to - using statistical inference to deconstruct aggregations and reconstruct detail and context - which help to connect and explain the attenuated fragments of data that are available. A lot of what happens under the heading of Business Intelligence can be understood as a form of archaeology - piecing together patterns of market behaviour from large quantities of extremely attenuated data.&lt;br /&gt;&lt;br /&gt; Finally, I should acknowledge that James is not alone in equating attenuation with filtering. Stafford Beer uses the term attenuator as if it were equivalent to filter, and his Viable Systems Model (VSM) describes variety attenuators as if they were devices for filtering out complexity. And yet he says: "The lethal variety attenuator is sheer ignorance." and it is hard to see ignorance as a filter. [See this presentation on VSM by Trevor Hilder (&lt;a href="http://www.users.globalnet.co.uk/%7Erxv/orgmgt/vsm.pdf"&gt;pdf&lt;/a&gt;).]&lt;br /&gt;&lt;br /&gt; My dear James, if you think that attenuation is geeky, you should try implicature. (Sources: &lt;a href="http://interconnected.org/home/2005/10/02/attenuation_is"&gt;Matt Webb&lt;/a&gt;, &lt;a href="http://www.lllj.net/blog/archives/2005/10/04/attenuation-and-implicature/"&gt;Lloyd Shepherd&lt;/a&gt;.) Perhaps someone could explain to me how this usefully differs from either framing or perspective. (See also &lt;a href="http://costarica.cs.northwestern.edu/bmd/blogs/nmh/archives/001201.html"&gt;Brian M Dennis&lt;/a&gt;.)&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-112903438243622542?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/112903438243622542/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=112903438243622542' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/112903438243622542'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/112903438243622542'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/10/attenuation.htm' title='Attenuation'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-111628905625932602</id><published>2005-05-17T01:10:00.000+01:00</published><updated>2005-12-14T12:01:59.563Z</updated><title type='text'>Bezzle</title><content type='html'>The economist J.K Gailbraith used the term "bezzle" to denote the amount of money siphoned (or "embezzled") from the system. In good times, he remarked, the bezzle rises sharply, because everyone feels good and nobody notices. "In [economic] depression, all this is reversed. Money is watched with a narrow, suspicious eye. The man who handles it is assumed to be dishonest until he proves himself otherwise. Audits are penetrating and meticulous. Commercial morality is enormously improved. The bezzle shrinks." [Galbraith, The Great Crash 1929]&lt;br /&gt;&lt;br /&gt;Bezzle can be interpreted to cover a range of ethical crimes and misdemenours - from outright corruption and fraud to self-interested self-deception and greed.&lt;br /&gt;&lt;h4&gt;Bezzle Theory&lt;/h4&gt;Galbraith's idea that bezzle oscillates with the economic cycle can be elaborated into a prototype theory, which may do the following&lt;br /&gt;&lt;ul&gt;   &lt;li&gt;&lt;b&gt;explain &lt;/b&gt;some recent phenomena&lt;/li&gt;   &lt;li&gt;&lt;b&gt;illustrate &lt;/b&gt;some important behaviour patterns of complex systems&lt;/li&gt;   &lt;li&gt;support some tentative &lt;b&gt;predictions&lt;/b&gt;&lt;/li&gt; &lt;/ul&gt; &lt;h4&gt;Example - Split Cap Scandal&lt;br /&gt;&lt;/h4&gt;Few of the people who sold split capital investments as "low risk" were capable of exposing the dodgy mathematics that supposedly underpinned the sector - so they may have a reasonable claim to have been acting in good faith, based on prevailing knowledge.&lt;br /&gt;&lt;br /&gt;We need to take a particular perspective in order to interpret such scams as bezzle. Bezzle depends on clear notions of legitimacy, which are lacking in many situations.&lt;br /&gt;&lt;br /&gt;Chris Flitwick, who was at the centre of the split capital scam, has argued that the split caps were originally low risk, and that it was the investment practices of the fund managers that turned them into high risk. This raises some interesting risk management and trust issues - if events and changing management practices turn a low risk into a high risk, is there a duty of trust to notify all stakeholders that the risk profile has changed and give them an opportuity to reconsider their investment/involvement, or is there a duty of trust to mantain the original risk profile and bear the difference?&lt;br /&gt;&lt;br /&gt;Meanwhile apparent wealth acts as an attractor - so gullible investors and intellectually lazy or cynical brokers rush towards get-rich-quick schemes. (This is perhaps an example of Gresham's law - bad money driving out good.)&lt;br /&gt;&lt;br /&gt;Galbraith would surely argue that this phenomenon is itself dependent on the economic cycle - acting strongly at some times and very weakly at other times. Galbraith's theory is interesting from an epistemological perspective, because it suggests that bezzle is higher when it is unobserved (unobservable), and lower when it is observed. While this is intuitively plausible, it is scientifically problematic - because it cannot be tested through observation.&lt;br /&gt;&lt;br /&gt;These theories provide ways of making sense of recent activity - especially the flurry of activity around corporate governance and "ethical" acccounting standards. Based on these theories, we can predict that the energy behind this activity will subside as economic conditions improve. Doubtless many stakeholders will be counting on this.&lt;br /&gt;&lt;h4&gt;Corporate Governance&lt;/h4&gt;In the past few years, the level of public trust in accounts and accountants has been severely damaged. Some executives have evidently stolen from their shareholders for years, without any demur from the auditors. Other accounts have had to be restated, thanks to gross systemic error. Papers and reputations have been shredded, executives have been jailed or disgraced, large firms have collapsed, and stock markets around the world have taken a cold bath.&lt;br /&gt;&lt;br /&gt;There are undoubtedly many accountants and auditors who perform a dedicated and thorough job, carefully checking the accounts of their clients, and investigating inconsistencies and anomalies; but it has become apparent that the traditional auditing system is no longer able to deliver adequate guarantees of reliability and honesty in corporate accounts.&lt;br /&gt;&lt;br /&gt;Part of the problem is the sheer complexity of corporate accounting dataflows. Let's suppose your accounts are based on data output from one or more ERP packages, and exported into Excel for the final consolidation. Mix in some data from a few dozen legacy systems, sprinkle with currency conversion and actuarial calculations, and bake in a hot spreadsheet for a manic Year-End panic. Mistakes are inevitable, and not even the smartest auditor has much chance of spotting them. Cynical executives and conniving accountants may deliberately cook the books, but even honest executives cannot guarantee the results.&lt;br /&gt;&lt;br /&gt;The US Sarbanes-Oxley Act of 2002 (SOX) mandates what is effectively a systems engineering solution to this problem. Reliability is achieved not by human oversight alone, but by a set of information and control systems that ensures information quality and management accountability. Executive officers are required to sign the accounts and are criminally liable for any inaccuracy. The act also mandates near-real-time disclosure of any material events.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;In the past, reliability was equated with the moral character of the directors and auditors. Nowadays, reliability must be seen as an engineering problem.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;table style="text-align: left;" border="1" cellpadding="2" cellspacing="2"&gt;     &lt;tbody&gt;     &lt;tr&gt;       &lt;td&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/td&gt;       &lt;td style="vertical-align: middle;"&gt;Business Organization Management: &lt;a href="http://www.dontpanic-ii.org/busorg/2005/02/moral-bankruptcy.html"&gt;Moral Bankruptcy&lt;/a&gt;&lt;br /&gt;SOAPbox: &lt;a href="http://www.veryard.com/so/2005/05/compliance-and-control.htm"&gt;Compliance and Control&lt;/a&gt;&lt;br /&gt;POSIWID: &lt;a href="http://www.dontpanic-ii.org/posiwid/2005/09/gas-bezzle.html"&gt;Gas Bezzle&lt;/a&gt;&lt;br /&gt;CBDI Report April 2004: &lt;a href="http://www.cbdiforum.com/secure/interact/2004-04/Sarbanes_Oxley_Drives_Web_Service_Adoption.php"&gt;Sarbanes-Oxley Drives Web Services Adoption&lt;/a&gt;&lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt; &lt;/table&gt;&lt;br /&gt;&lt;small&gt;Technorati Tags: &lt;a href="http://technorati.com/tag/bezzle" rel="tag"&gt;bezzle&lt;/a&gt; &lt;a href="http://technorati.com/tag/compliance" rel="tag"&gt;compliance&lt;/a&gt; &lt;a href="http://technorati.com/tag/sarbox" rel="tag"&gt;sarbox&lt;/a&gt; &lt;a href="http://technorati.com/tag/SOX" rel="tag"&gt;SOX&lt;/a&gt; &lt;a href="http://technorati.com/tag/trust" rel="tag"&gt;trust&lt;/a&gt;&lt;/small&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-111628905625932602?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/111628905625932602/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=111628905625932602' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111628905625932602'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111628905625932602'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/05/bezzle.htm' title='Bezzle'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-111537568480948987</id><published>2005-05-06T11:30:00.000+01:00</published><updated>2005-05-06T11:34:44.816+01:00</updated><title type='text'>Reuse or Repurpose</title><content type='html'>The software world has spent many years talking about reuse, especially in the context of Component-Based Software Engineering (CBSE). Reuse is linked to the economics of scale/scope, and is supposedly associated with a range of benefits including the productivity of development and maintenance.&lt;br /&gt; &lt;br /&gt;  But as the focus shifts from components to services, the  word "reuse" doesn't quite reflect the opportunity. To my mind, the word never made quite as much sense for services as it did for components.&lt;br /&gt; &lt;br /&gt;  A number of commentators are now using the word repurpose instead of reuse. (&lt;a href="http://www.pcmag.com/article2/0,1759,1171047,00.asp"&gt;PCMag&lt;/a&gt;, &lt;a href="http://www.zapthink.com/report.html?id=ZAPFLASH-200553"&gt;Zapthink&lt;/a&gt;)&lt;br /&gt; &lt;br /&gt;  A lot of discussion of repurposing seems to be largely about altering the format of information to suit different devices, channels or media. Such discussion is popular in the publication/syndication world, with reference to RSS and repurposing content for internet distribution. It is also relevant for transmitting content to a complex array of new devices such as mobile phones.&lt;br /&gt;  &lt;ul&gt; &lt;li&gt;&lt;small&gt;&lt;a href="http://www.csoft.co.uk/mms/issues.htm"&gt;Dynamic Content Repurposing for Mobile Phones&lt;/a&gt; (Connection Software)&lt;/small&gt;&lt;/li&gt;&lt;li&gt;&lt;small&gt;&lt;a href="http://www.businesswire.com/cgi-bin/ts_headline.sh?/bw.081401/212260122"&gt;DeBabelizer for Repurposing Digital Assets&lt;/a&gt; (Equilibrium Technologies)&lt;br /&gt;&lt;/small&gt;&lt;/li&gt; &lt;/ul&gt;   I don't deny the technical challenge of reformatting, but to my mind the more interesting aspects of repurposing is where there is a significant variation in the context of use. What is the (end-user) purpose that may be served by the content? For example, see this discussion &lt;a href="http://seminars.seyboldreports.com/1998_san_francisco/Eday7_2.html"&gt;Repurpose or Perish&lt;/a&gt; from 1998, which raises some of these issues:&lt;br /&gt;  &lt;ul&gt; &lt;li&gt;the users' choice of how they want to get this information and how frequently they want it&lt;/li&gt;&lt;li&gt;users adopting different ways of reading/scanning material on-line  (lean-forward versus lean-back)&lt;/li&gt; &lt;/ul&gt;   &lt;table cellpadding="2" cellspacing="2" border="1" style="text-align: left;"&gt;     &lt;tbody&gt;     &lt;tr&gt;       &lt;td style="vertical-align: top;"&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/td&gt;       &lt;td style="vertical-align: middle;"&gt;&lt;a href="http://www.veryard.com/so/soapbox.htm"&gt;Repurposing Data and Services&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt; &lt;/table&gt; &lt;br /&gt; For a humorous definition of repurposing, see &lt;a href="http://www.buzzwordsfornerds.com/2005/04/repurpose.html"&gt;Buzzwords for Nerds&lt;/a&gt;.&lt;br /&gt;  &lt;small&gt;&lt;br /&gt;Technorati Tags: &lt;a href="http://technorati.com/tag/repurpose" rel="tag"&gt;repurpose&lt;/a&gt; &lt;a href="http://technorati.com/tag/reuse" rel="tag"&gt;reuse&lt;/a&gt; &lt;a href="http://technorati.com/tag/service-oriented" rel="tag"&gt;service-oriented&lt;/a&gt; &lt;a href="http://technorati.com/tag/XML" rel="tag"&gt;XML&lt;/a&gt;&lt;/small&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-111537568480948987?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/111537568480948987/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=111537568480948987' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111537568480948987'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111537568480948987'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/05/reuse-or-repurpose.htm' title='Reuse or Repurpose'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-111098253934692531</id><published>2005-03-16T13:58:00.000Z</published><updated>2005-03-29T10:18:32.090+01:00</updated><title type='text'>Off-Label</title><content type='html'>In a pharmaceutical context, Off-Label refers to uses of drugs that are not approved by the regulators and cannot therefore be printed on the product label or officially promoted by the drug company. More generally, it refers to any unauthorized or emergent use of a product or service.&lt;br /&gt;&lt;br /&gt;From the regulatory point of view, off-label is not merely unapproved but (at least to some extent) disapproved, and subject to secondary regulation.&lt;br /&gt;&lt;ul&gt; &lt;li&gt;&lt;a href="http://www.fda.gov/oc/ohrt/irbs/offlabel.html"&gt;US Food &amp; Drug Administration (FDA)&lt;/a&gt;&lt;br /&gt; &lt;/li&gt;&lt;li&gt;&lt;a href="http://www.pesticides.gov.uk/approvals.asp?id=486"&gt;UK Pesticides Saftey Directorate (PSD)&lt;br /&gt;   &lt;/a&gt;&lt;/li&gt; &lt;/ul&gt; But off-label usage is apparently increasing. This raises several questions which I shall raise in separate blog postings. [Update: links added]&lt;br /&gt;&lt;br /&gt; &lt;table cellpadding="2" cellspacing="2" border="1" style="text-align: left; width: 100%;"&gt;    &lt;tbody&gt;     &lt;tr&gt;       &lt;td style="vertical-align: top;"&gt;&lt;span style="font-weight: bold;"&gt;Innovation&lt;/span&gt;&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt; The technological leading edge is often/always off the label.&lt;br /&gt;      &lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;&lt;a href="http://www.veryard.com/tcm/2005/03/off-label-as-innovation.htm"&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/a&gt;       &lt;/td&gt;     &lt;/tr&gt;     &lt;tr&gt;       &lt;td style="vertical-align: top;"&gt;&lt;span style="font-weight: bold;"&gt;Knowledge and Uncertainty&lt;/span&gt;&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;Off-label usage is disseminated by informal knowledge mechanisms ("samizdat").&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;&lt;a href="http://www.dontpanic-ii.org/knowledge/2005/03/off-label-as-samizdat.html"&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/a&gt;       &lt;/td&gt;     &lt;/tr&gt;     &lt;tr&gt;       &lt;td style="vertical-align: top;"&gt;&lt;span style="font-weight: bold;"&gt;Trust&lt;/span&gt;&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;On-label and off-label usage rely on different trust mechanisms.&lt;br /&gt;      &lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;&lt;a href="http://www.dontpanic-ii.org/trustblog/2005/03/off-label-trust.html"&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/a&gt;       &lt;/td&gt;     &lt;/tr&gt;     &lt;tr&gt;       &lt;td style="vertical-align: top;"&gt;&lt;span style="font-weight: bold;"&gt;Service-Based Business&lt;/span&gt;&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;There is a critical asymmetry between on-label and off-label, which must be accommodated in the geometry of services.&lt;/td&gt;       &lt;td style="vertical-align: top;"&gt;&lt;a href="http://www.veryard.com/so/2005/03/soa-pharma.htm"&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/more.gif" title="" alt="more" style="border: 0px solid ; width: 39px; height: 39px;" /&gt;&lt;/a&gt;       &lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt; &lt;/table&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-111098253934692531?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/111098253934692531/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=111098253934692531' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111098253934692531'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/111098253934692531'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/03/off-label.htm' title='Off-Label'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-110534990133296514</id><published>2005-01-10T09:21:00.000Z</published><updated>2005-04-25T09:20:57.076+01:00</updated><title type='text'>Identity Theft</title><content type='html'>Identity theft is usually defined in terms of the impersonation of individuals for criminal purposes.&lt;br /&gt;&lt;br /&gt;See for example the recent report on &lt;a href="http://www.fdic.gov/consumers/consumer/idtheftstudy/index.html"&gt;Identity Theft&lt;/a&gt; published by the US Federal Deposit Insurance Corporation (December 14th, 2004).&lt;br /&gt;&lt;br /&gt;However, phishing typically starts with a criminal attempt to impersonate a financial institution. Thus organizations can also suffer identity theft. See Paul Brown's blog posting, &lt;a href="http://blogs.fivesight.com/pbblog/index.php?p=75"&gt;The Identity Problem is Symmetric&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;However, financial institutions deal with the problem in a highly asymmetric way. Banks and other financial services companies don’t appreciate the customer’s need for security - they think security is about protecting them from us! Asymmetric Trust fits into a more general theory I have about Asymmetric Demand. &lt;p&gt;I got so fed up with “courtesy calls” that asked me to identify myself before they would even tell me what they were trying to sell me, that I blogged about this last year. &lt;/p&gt;    &lt;p&gt;&lt;a href="http://www.veryard.com/news/2004/06/finance-industry-view-of-security.htm"&gt;Finance Industry View of Security&lt;/a&gt;. See also further material on &lt;a href="http://www.veryard.com/security/identity.htm"&gt;Identity and Security&lt;/a&gt;.&lt;br /&gt;&lt;/p&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;UPDATE: Technorati Tags: &lt;a href="http://technorati.com/tag/asymmetry" rel="tag"&gt;asymmetry&lt;/a&gt; &lt;a href="http://technorati.com/tag/identity-theft" rel="tag"&gt;identity-theft&lt;/a&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-110534990133296514?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/110534990133296514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=110534990133296514' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110534990133296514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110534990133296514'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/01/identity-theft.htm' title='Identity Theft'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-110460580510895633</id><published>2005-01-01T18:45:00.001Z</published><updated>2009-12-18T09:46:57.124Z</updated><title type='text'>Collaborative Composition</title><content type='html'>There is a fundamental clash between two modes of software production. Based on the Boxer Model of Collaborative Composition, we characterize these modes as Clockwise and Anticlockwise. &lt;br /&gt;&lt;img alt="clockwise anticlockwise" src="http://www.users.globalnet.co.uk/%7Erxv/images/clockanticlock.gif" /&gt; &lt;br /&gt;&lt;br /&gt;The anticlockwise mode of software production starts with Domain Knowledge, and is dominated by the economies of scale/scope. Software engineering has traditionally been dominated by anticlockwise thinking. &lt;br /&gt;&lt;br /&gt;The clockwise mode starts with Cases, and is dominated by providing a situated response to the specifics of the demand ecosystem. One version of this is known as &lt;a href="http://www.veryard.com/notions/2004/12/situated-software.htm"&gt;Situated Software&lt;/a&gt;, which refers to software designed in and for a particular social situation or context.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Further Reading&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Richard Veryard and Philip Boxer, &lt;a href="http://www.scribd.com/doc/20984711/Public-Sector-IT-The-CSA-Case"&gt;Public Sector IT - The CSA Case&lt;/a&gt; (December 2004)&lt;/li&gt;&lt;li&gt;Philip Boxer and Richard Veryard, &lt;a href="http://msdn.microsoft.com/en-us/library/bb245658.aspx"&gt;Taking Governance to the Edge&lt;/a&gt; (Microsoft Architect Journal August 2006)&lt;/li&gt;&lt;/ul&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-110460580510895633?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/110460580510895633/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=110460580510895633' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110460580510895633'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110460580510895633'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2005/01/collaborative-composition.htm' title='Collaborative Composition'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-110428339978475457</id><published>2004-12-29T01:21:00.000Z</published><updated>2004-12-29T01:23:19.783Z</updated><title type='text'>Situated Software</title><content type='html'>Software designed in and for a particular social situation or context.  &lt;a href="http://www.shirky.com/writings/situated_software.html"&gt;Clay Shirky&lt;/a&gt; explains how this works in practice, with some examples taken from his class at NYU. See discussion &lt;a href="http://www.corante.com/many/archives/2004/03/31/situated_software.php"&gt;here&lt;/a&gt;, including sceptical comment by &lt;a href="http://www.corante.com/many/archives/2004/03/31/situated_software.php#3869"&gt;Lucas&lt;/a&gt;. See also comments by &lt;a href="http://www.redmonk.com/jgovernor/archives/000364.html"&gt;James Governor&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt; Situated software resists the traditional software engineering pressure towards generalization, and apparently disregards the economics of scale/scope. Instead it works solely within a collaborative socio-technical system (the "community"); the conditions for the success of the software (including meaning and trust) are co-created by the members of the community.&lt;br /&gt;&lt;br /&gt; One of the earliest forms of situated software was the spreadsheet. Power users built themselves complicated structures using Visicalc or Lotus 123 or Excel. These were essentially non-transferable artefacts with many hidden assumptions, but they served a useful purpose within a given context.&lt;br /&gt;&lt;br /&gt; This illustrates the fact that situated software is assisted by the existence of tools and platforms that provide generalized support for situated software. This is one interpretation of the software factory idea.&lt;br /&gt;&lt;br /&gt; In the Boxer Model of Collaborative Composition, situated software appears to be a clockwise-dominant process, contrasting with the anticlockwise-dominant processes of traditional software engineering.&lt;br /&gt;&lt;br /&gt; Related Concepts: Situated Action (Lucy Suchman). Situated Software Architecture (&lt;a href="http://www.csse.monash.edu.au/%7Eptaylor/"&gt;P Taylor&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-110428339978475457?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/110428339978475457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=110428339978475457' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110428339978475457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110428339978475457'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/12/situated-software.htm' title='Situated Software'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-110128951625038175</id><published>2004-11-24T09:34:00.000Z</published><updated>2004-11-24T11:18:21.413Z</updated><title type='text'>Bearing Limit</title><content type='html'>"Bearing limit" refers to the amount of cost or uncertainty a person or organization (or any other component of a distributed system) can contain or can be expected to bear. (Uncertainty here may include risk, surprise, instability or variability.)&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;Between 1994 and 1996, a stand-off emerged between two speculators. Yasuo Hamanaka, Sumitomo's chief copper trader, was long on copper. Julian Robertson, of the Tiger Fund, was short on copper.&lt;br /&gt;&lt;br /&gt;By mid 1995, Robertson un-owned about $1bn-worth of copper. Robertson was convinced copper was over-priced, but the price was still rising. Other speculators (notably Soros Fund Management) bailed out and took their losses. Robertson held on.&lt;br /&gt;&lt;br /&gt;By spring 1994, Hamanaka probably owned about $10bn-worth of copper. When this was discovered, the price of copper fell 30%. Tiger made $300m in one day. Sumitomo lost billions. History refers to this incident as the Sumitomo copper scandal (and not the Tiger copper coup).&lt;br /&gt;&lt;br /&gt;Alistair Blair reviews the story in his weekly column. "Mr Hamanaka ... couldn't squeeze any more copper trade tickets into the bottom right hand drawer of his desk, where he had been accumulating them for two years in an attempt to recover losses ... think of Nick Leeson times three". In contrast, "Mr Robertson ... was not betting his bank. He had conviction and self-belief, but he also had discipline. ... He could remain solvent for as long as it took." (Investor's Chronicle &lt;a href="http://www.investorschronicle.co.uk/nofreelunch"&gt;No Free Lunch&lt;/a&gt;, 19 November 2004)&lt;br /&gt;&lt;br /&gt;Rogue traders such as Hamanaka and Leeson exceed their bearing limits, and may damage or destroy their respective organizations. Meanwhile, Robertson remained well inside his bearing limit.&lt;br /&gt;&lt;br /&gt;Of course markets are irrational. Sometimes rogue traders get away with it; sometimes disciplined speculators lose out. But distributed risk management (not just in financial trading but in a wide range of domain) always demands attention to bearing limits.&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;We introduced the term "bearing limit" into our risk management practice following the Nick Leeson scandal and the fall of Barings Bank. (The pun is deliberate.) More recently, the term "risk-bearing limit" was used in a Sept 2001 paper &lt;a href="http://cei.ier.hit-u.ac.jp/working/2001/2001WorkingPapers/wp2001-25.pdf"&gt;Reflections on New Financial System in Japan&lt;/a&gt; (pdf). We have also started to apply the term to questions of knowledge and intelligence. (See weblog post on &lt;a href="http://www.dontpanic-ii.org/knowledge/2004/07/bearing-limit.html"&gt;Bearing Limit and WMD&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Any given party has a &lt;b&gt;bearing limit&lt;/b&gt;, which defines how much cost and risk it can bear. Above this limit, the party cannot be expected to contain the costs and risks allocated to it, and these may spill over the contractual boundaries to its partners. In the worst case, a party unable to bear its costs and risks goes into liquidation, and the remaining costs and risks then have to be picked up by another party. (Think about PFI and the possible demise of Jarvis.)&lt;br /&gt;&lt;br /&gt;In some cases, the bearing limit can be determined fairly precisely. This is particularly true in cases that are covered by various forms of indemnity insurance, since the bearing limit can be taken to be equal to the level of insurance cover. In other cases, the bearing limit is itself a matter for negotiation.&lt;br /&gt;&lt;br /&gt;Within a hierarchical organization, there is a bearing limit at each level of the management hierarchy. In other words, there is a maximum level of responsibility that can be delegated downwards. Above this limit, the responsibility remains with upper management. (For example, if a trading bank loses half a billion dollars, this cannot be blamed solely on a rogue trader with an authorization limit of 50 million dollars. To pretend otherwise is either foolish or corrupt.)&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-110128951625038175?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/110128951625038175/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=110128951625038175' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110128951625038175'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/110128951625038175'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/11/bearing-limit.htm' title='Bearing Limit'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-109403922757626858</id><published>2004-09-01T13:30:00.000+01:00</published><updated>2004-09-20T09:36:50.866+01:00</updated><title type='text'>Design by Contract</title><content type='html'>Design by Contract was pioneered by Bertrand Meyer, who refined the assertion-based approach into the Design by Contract method and the Eiffel language. The basic idea is that a component and its clients have a contract with each other. The client guarantees certain preconditions before calling a method, the component guarantees certain postconditions after the call. If the pre- and postconditions are included in a form that the compiler can check, then any violation of the contract between caller and component can be detected immediately. The prime focus of the approach is to deliver reliable software.&lt;br /&gt;&lt;br /&gt;Design by Contract has wide theoretical acceptance. It is an intrinsic component of the Catalysis Approach, perhaps the most influential of all component methodologies. However its usage has to date been relatively limited, the most prevalent use being in the Eiffel language.&lt;br /&gt;&lt;div style="text-align: left;"&gt; &lt;ul&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;CBDI Report &lt;a href="http://www.cbdiforum.com/secure/interact/2002-10/eiffel.php3"&gt;Eiffel in the .NET Environment&lt;/a&gt; October 2002 (restricted access)&lt;/span&gt;&lt;/li&gt; &lt;/ul&gt; &lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;In business terms, the basis for collaboration between autonomous business entities is a service contract. This suggests a design process in which contracts are paramount - such as Design by Contract.&lt;br /&gt;&lt;br /&gt;For distributed collaborations, a contract between provider and consumer needs to have three parts: logical, quality and commercial.&lt;br /&gt;&lt;img src="http://www.users.globalnet.co.uk/%7Erxv/images/contract.jpg" alt="parts of a contract" /&gt;&lt;br /&gt;The &lt;span style="font-weight: bold;"&gt;logical contract&lt;/span&gt; specifies the function of the Service, typically using a series of logical assertions such as preconditions and postconditions. This includes both syntactic elements (signature) and semantic elements (vocabulary, meaning).&lt;br /&gt;&lt;br /&gt;The &lt;span style="font-weight: bold;"&gt;quality contract&lt;/span&gt; specifies the quality of service - often given the rather dismissive label of non-functional characteristics.&lt;br /&gt;&lt;br /&gt;The &lt;span style="font-weight: bold;"&gt;commercial contract&lt;/span&gt; specifies the commercial arrangements, including charging for normal operation and compensation for abnormal operation.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;Design by Contract allows services to be defined and used without knowing anything about the implementation. It therefore seems ideally suited to the design of web collaborations. Design by Contract has traditionally concentrated on the logical contract, but the same principles and related design techniques can be extended to the quality contract and the commercial contract.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt; &lt;hr style="margin-left: 0px; margin-right: auto;"&gt; &lt;div style="text-align: left;"&gt;The term "web service contract" is sometimes used in the very narrow sense of the syntax/signature of the service call, as expressed in WSDL/XML. Much of the recent discussion on Contract-First Development seems to be focused on these aspects of the contract.&lt;br /&gt;&lt;/div&gt; &lt;div style="text-align: right;"&gt; &lt;ul style="text-align: left;"&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;For example, Simon Guest regards &lt;a href="http://weblogs.asp.net/smguest/archive/2004/08/30/222856.aspx"&gt;Contract-First Development&lt;/a&gt; as an alternative to Data-First Development (which he prefers).&lt;/span&gt;&lt;/li&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;See also Aaron Skonnard blog on &lt;a href="http://pluralsight.com/blogs/aaron/archive/2004/08/27/2092.aspx"&gt;Contract-First Development&lt;/a&gt; (August 2004)&lt;/span&gt;&lt;span style="font-size:85%;"&gt; with many comments&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-size:85%;"&gt;Eric Newcomer (&lt;a href="http://www.iona.com/blogs/newcomer/archives/000087.html"&gt;Description First&lt;/a&gt;, September 2004) points out that for Web services, the purpose is to share data over the network. Therefore the Schema is more correctly viewed as the contract, not the WSDL.&lt;/span&gt;&lt;/li&gt;  &lt;/ul&gt;  &lt;/div&gt;Design by Contract has a broader concept of contract, which explicitly includes the semantics of the service call in terms of pre/postconditions and invariants, but against a single semantic vocabulary.&lt;br /&gt;&lt;br /&gt;Web services will be implemented in a range of formal languages and protocols. These will not only specify the syntax of the service (e.g. using WSDL/XML) but also the semantic vocabulary (e.g. using RDF or DAML-S) and the pragmatics (e.g. using BPEL). However, these languages do not yet cover the full ground of quality contracts and commercial contracts. In the short term, these aspects of the contract are likely to be covered by legal contracts and SLAs between service providers and consumers. Some vendors refer to this broader notion of contract as the Relationship Contract. Some service management tools include such characteristics within the service repository as metadata.&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt; &lt;div style="text-align: left;"&gt; &lt;ul&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;CBDI Newswire &lt;a href="http://www.cbdiforum.com/public/news/index.php3?id=1243&amp;news_date=2003-5"&gt;22nd May 2003&lt;/a&gt; and &lt;a href="http://www.cbdiforum.com/public/news/index.php3?id=1249&amp;amp;news_date=2003-5"&gt;28th May 2003&lt;/a&gt; (free access).&lt;/span&gt;&lt;/li&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;CBDI Reports &lt;a href="http://www.cbdiforum.com/secure/interact/2002-11/collaboration.php3"&gt;From Web Services to Web Collaborations&lt;/a&gt; (Nov 2002) and &lt;a href="http://www.cbdiforum.com/secure/interact/2003-02/model.php3"&gt;Modelling for SOA&lt;/a&gt; (Feb 2003) (restricted access).&lt;/span&gt;&lt;/li&gt;   &lt;li&gt;&lt;span style="font-size:85%;"&gt;See my blog entry on &lt;a href="http://www.veryard.com/so/2004/09/bpel.htm"&gt;BPEL&lt;/a&gt; (September 2004)&lt;br /&gt; &lt;/span&gt;&lt;/li&gt; &lt;/ul&gt; &lt;/div&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-109403922757626858?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/109403922757626858/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=109403922757626858' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109403922757626858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109403922757626858'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/09/design-by-contract.htm' title='Design by Contract'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-109395033570160521</id><published>2004-08-31T12:00:00.000+01:00</published><updated>2004-08-31T12:05:35.700+01:00</updated><title type='text'>Leaky Abstraction</title><content type='html'>Joel Spolsky's &lt;a href="http://www.joelonsoftware.com/articles/LeakyAbstractions.html"&gt;Law of Leaky Abstraction&lt;/a&gt;:&lt;br /&gt;&lt;blockquote&gt;All non-trivial abstractions, to some degree, are leaky.&lt;/blockquote&gt;Technologies (Joel talks specifically about code generation tools) are generally supposed to abstract out something. They create a separation (decoupling) between some abstract service at one level, and some technical code or mechanism at another level.&lt;br /&gt;&lt;br /&gt;But all abstractions leak, and the only way to deal with the leaks competently is to learn about how the abstractions work and what they are abstracting. So the abstractions save us time working, but they don't save us time learning.&lt;br /&gt;&lt;div style="text-align: right;"&gt;See note on &lt;a href="http://www.veryard.com/tcm/2004/08/automation-and-skill.htm"&gt;Automation and Skill&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;So decoupling is never as clean as it should be, and we should always expect hidden coupling and feature interaction.&lt;br /&gt;&lt;div style="text-align: right;"&gt;See note on &lt;a href="http://www.veryard.com/so/2004/08/simplicity-and-complexity.htm"&gt;Simplicity and Complexity&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;The Law of Leaky Abstraction is related to the belief that symbolization (standardization or formalization) is necessarily imperfect, always leaves holes (something to be desired, the invasion of the Real).  Complexity, often seen as part of the solution, merely adds to the problem.&lt;br /&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-109395033570160521?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/109395033570160521/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=109395033570160521' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109395033570160521'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109395033570160521'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/08/leaky-abstraction.htm' title='Leaky Abstraction'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-109208703976031965</id><published>2004-08-09T22:28:00.000+01:00</published><updated>2008-02-05T00:33:09.849Z</updated><title type='text'>Asymmetry</title><content type='html'>Many enterprises are managed on a false assumption of symmetry.&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;span style="font-weight: bold;"&gt;War and Peace&lt;/span&gt;&lt;br /&gt;Traditional armies assumed that their principal enemies were also traditional armies. This assumption was shaken by insurgency and guerilla and is completely irrelevant to the war against terror. Hence the modern interest in asymmetric warfare.&lt;br /&gt;&lt;br /&gt;Traditional diplomacy focused on the relationships between nation states, represented by the political establishment within each state. These states has peer-to-peer relationships, and also participated in various international bodies.&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;span style="font-weight: bold;"&gt;Enterprise&lt;/span&gt;&lt;br /&gt;Traditional enterprises assumed symmetry between supply and demand. But this symmetry typically suppresses the real demands of the &lt;a href="http://rvsoapbox.blogspot.com/2005/01/support-economy.htm"&gt;support economy&lt;/a&gt;.&lt;br /&gt;&lt;hr /&gt;&lt;a href="http://www.veryard.com/system/asymmetry.htm"&gt;General Notes on Asymmetry&lt;/a&gt;, &lt;a href="http://rvtrustblog.blogspot.com/2004/09/asymmetric-trust.html"&gt;Asymmetric Trust&lt;/a&gt;, ...&lt;br /&gt;&lt;br /&gt;Information Asymmetry: &lt;a href="http://rvsoapbox.blogspot.com/2004/09/labelling-as-service.htm"&gt;Labelling as Service&lt;/a&gt;&lt;br /&gt;Asymmetry of Demand: &lt;a href="http://rvsoapbox.blogspot.com/2004/09/business-geometry.htm"&gt;Business Geometry&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://del.icio.us/tag/asymmetry"&gt;asymmetry@del.icio.us&lt;/a&gt;&lt;br /&gt;&lt;a href="http://technorati.com/tag/asymmetry" rel="tag"&gt;asymmetry@technorati&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-109208703976031965?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/109208703976031965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=109208703976031965' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109208703976031965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109208703976031965'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/08/asymmetry.htm' title='Asymmetry'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-109189162233417920</id><published>2004-08-07T16:07:00.001+01:00</published><updated>2008-03-07T09:13:34.118Z</updated><title type='text'>Power to the Edge</title><content type='html'>&lt;p&gt;&lt;small&gt;cross-posted to &lt;a href="http://www.asymmetricdesign.com/archives/14"&gt;AsymmetricDesign blog&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;&lt;small&gt;&lt;br /&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Power to the edge&lt;/b&gt; is about changing the way individuals, organizations, and systems relate to one another and work.&lt;/p&gt; &lt;ul&gt;&lt;li&gt;empowerment of individuals at the edge of an organization&lt;/li&gt;&lt;li&gt;adoption of an &lt;b&gt;edge organization&lt;/b&gt;, with greatly enhanced peer-to-peer interactions.&lt;/li&gt;&lt;li&gt;moving senior personnel into roles that place them at the edge&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;b&gt;Power to the edge&lt;/b&gt; is being presented in the military domain as the correct response to increased uncertainty, volatility, and complexity. Clearly these factors also apply to civilian enterprises, both commercial and public sector.&lt;/p&gt; &lt;p&gt;Carole Eigen and Philip Boxer presented on this topic at the &lt;a href="http://www.ispso.org/Symposia/Baltimore/2005%20papers/2005Boxerslides.pdf" mce_href="http://www.ispso.org/Symposia/Baltimore/2005%20papers/2005Boxerslides.pdf"&gt;ISPSO Symposium&lt;/a&gt; in Baltimore in June 2005 (&lt;a href="http://www.ispso.org/Symposia/Baltimore/2005%20papers/2005Boxertext.pdf" mce_href="http://www.ispso.org/Symposia/Baltimore/2005%20papers/2005Boxertext.pdf"&gt;paper&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;Military use of the term comes from a book by David S. Alberts and Richard E. Hayes, &lt;span style="font-weight: bold;"&gt;Power to the Edge: Command … Control … in the Information Age&lt;/span&gt;.  June 2003.  Published by &lt;a href="http://www.dodccrp.org/" mce_href="http://www.dodccrp.org/"&gt;CCRP&lt;/a&gt;. PDF version available online (&lt;a href="http://www.dodccrp.org/publications/pdf/Alberts_Power.pdf" mce_href="http://www.dodccrp.org/publications/pdf/Alberts_Power.pdf"&gt;1.7 MB&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;See &lt;a href="http://www.defenselink.mil/nii/homepage.html" mce_href="http://www.defenselink.mil/nii/homepage.html"&gt;John Stenbit statement&lt;/a&gt;. See also presentation material  by Dr Margaret Myers. &lt;span style="font-weight: bold;"&gt;Power to the Edge Through Net Centricity - Transformation of the Global Information Grid&lt;/span&gt; &lt;a href="http://www.chips.navy.mil/archives/02_Summer/authors/index2_files/power_to_the_edge.htm" mce_href="http://www.chips.navy.mil/archives/02_Summer/authors/index2_files/power_to_the_edge.htm"&gt;Text (html)&lt;/a&gt; &lt;a href="http://www.stc-online.org/stc2002proceedings/SpkrPDFs/Special/Myers.pdf" mce_href="http://www.stc-online.org/stc2002proceedings/SpkrPDFs/Special/Myers.pdf"&gt;Slides (pdf)&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Groove (acquired by Microsoft in March 2005 - see &lt;a title="my commentary" target="_blank" href="http://rvsoftware.blogspot.com/2005/03/microsoft-and-groove.html" mce_href="http://rvsoftware.blogspot.com/2005/03/microsoft-and-groove.html"&gt;my commentary&lt;/a&gt;) always liked this concept (for reasons that should be obvious) - see blogs by &lt;a href="http://www.ozzie.net/blog/2003/09/14.html" mce_href="http://www.ozzie.net/blog/2003/09/14.html"&gt;Ray Ozzie&lt;/a&gt; (now offline) and &lt;a href="http://helfrich.typepad.com/michael_helfrichs_weblog/2004/01/network_centric.html" mce_href="http://helfrich.typepad.com/michael_helfrichs_weblog/2004/01/network_centric.html"&gt;Michael Helfrich&lt;/a&gt;.   See also blogs by &lt;a href="http://www.dougsimpson.com/blog/archives/000190.html" mce_href="http://www.dougsimpson.com/blog/archives/000190.html"&gt;Doug Simpson&lt;/a&gt; and &lt;a href="http://www.synop.com/Weblogs/Nathan/PermaLink.aspx?guid=dec45762-0330-4d14-8e46-06bd5923bbc0" mce_href="http://www.synop.com/Weblogs/Nathan/PermaLink.aspx?guid=dec45762-0330-4d14-8e46-06bd5923bbc0"&gt;Nathan Wallace&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;I  found a weblog rant &lt;a href="http://blogs.salon.com/0001549/2003/09/19.html#a959" mce_href="http://blogs.salon.com/0001549/2003/09/19.html#a959"&gt;here&lt;/a&gt; to the effect that Power to the Edge is all about speeding up information flow, just another name for Reengineering. In my view, this is a fundamental misunderstanding. Obviously Power to the Edge may call for improved flow of information: quality and complexity as well as quantity and speed. But Power to the Edge is not the improved flow itself but what it enables - which is a fundamental transformation in the geometry of the organization away from a hierarchical command-and-control structure. And such structures are still as common in civilian/commercial organizations as in the military, if not more so.&lt;/p&gt; &lt;p&gt;Further comment: &lt;a title="Demise of the Super Star" target="_blank" href="http://knowledgeanduncertainty.blogspot.com/2004/08/demise-of-super-star.html" mce_href="http://knowledgeanduncertainty.blogspot.com/2004/08/demise-of-super-star.html"&gt;Demise of the Super Star&lt;/a&gt;,  &lt;a title="Governance at the Edge" target="_blank" href="http://rvsoapbox.blogspot.com/2004/08/governance-at-edge.htm" mce_href="http://rvsoapbox.blogspot.com/2004/08/governance-at-edge.htm"&gt;Governance at the Edge&lt;/a&gt;.&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-109189162233417920?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/109189162233417920/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=109189162233417920' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109189162233417920'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109189162233417920'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/08/power-to-edge.htm' title='Power to the Edge'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-109140805488728839</id><published>2004-08-02T01:32:00.000+01:00</published><updated>2004-08-02T02:19:12.953+01:00</updated><title type='text'>Tethering</title><content type='html'>Tethering is the creation of a dependence (tight coupling, binding) by a supplier, in a situation where a consumer may have a reasonable expectation of independence (loose coupling, zero coupling).&lt;br /&gt;&lt;br /&gt;Example 1. RealNetworks has recently launched a service to download music onto Apple iPods. Apple regards this as an invasion of its tethering. The blogs I read are generally supportive of RealNetworks.&lt;br /&gt;&lt;ul&gt;   &lt;li&gt;&lt;a href="http://www.nyu.edu/classes/siva/2004/07/trouble-with-tethering.html"&gt;Siva Vaidhyanathan&lt;/a&gt; &lt;a href="http://features.engadget.com/entry/6314322665586411/"&gt;The Trouble with Tethering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Ernie the Attorney &lt;a href="http://www.ernietheattorney.net/ernie_the_attorney/2004/07/crushing_the_co.html"&gt;Reverse Engineering&lt;/a&gt;&lt;/li&gt;  &lt;/ul&gt;Example 2. It is alleged that some brands of printer automatically reduce print quality when they detect third-party ink cartridges.&lt;br /&gt;&lt;br /&gt;Example 3. Off-shore software developers may put in unauthorized coupling between software modules/components, in order to increase subsequent maintenance revenues.&lt;br /&gt;&lt;br /&gt;Tethering represents a clash between the supplier's view of the world and the consumers' view. (We call this Asymmetric Demand.) Sometimes it stems from a deliberate plan to exploit a commercial position or from bloodymindedness. But sometimes the supplier feels that the position is morally defensible and in the best interests of consumers (if they but knew it.) Surely iTunes provides all the flexibility and functionality anyone could want??&lt;br /&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-109140805488728839?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/109140805488728839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=109140805488728839' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109140805488728839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/109140805488728839'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/08/tethering.htm' title='Tethering'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-108872654296455885</id><published>2004-07-02T00:52:00.000+01:00</published><updated>2008-02-02T02:24:36.691Z</updated><title type='text'>Clinical Validation</title><content type='html'>&lt;span style="font-size:85%;"&gt;crossposted to &lt;a href="http://rvtrustblog.blogspot.com/2004/07/clinical-validation.html"&gt;TrustBlog&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Hypotheses are checked not against impersonal trials of their adequacy but against testimonials, case studies and assessments of success made by parties with a stake in their outcome.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.nybooks.com/articles/article-preview?article_id=17234"&gt;&lt;br /&gt;Frederick C. Crews, Out, Damned Blot! New York Review July 15 2004&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Drug companies only publish the results of favourable trials.  Some people argue they should be forced to publish all results, whether favourable or otherwise. However, this could simply cause the drug companies to engineer the trials more carefully in advance, to reduce the risk that the trials might reveal anything inconvenient to their commercial agenda.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.nybooks.com/articles/17244"&gt;Marcia Angell, The Truth About the Drug Companies, New York Review July 15 2004&lt;br /&gt;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-108872654296455885?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/108872654296455885/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=108872654296455885' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108872654296455885'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108872654296455885'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/07/clinical-validation.htm' title='Clinical Validation'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-108759959781579625</id><published>2004-06-18T23:48:00.000+01:00</published><updated>2008-02-04T10:31:51.834Z</updated><title type='text'>Transference</title><content type='html'>&lt;span style="font-size:85%;"&gt;cross-posted to &lt;a href="http://leadershipandchange.blogspot.com/2004/06/transference-and-counter-transference.html"&gt;Leadership and Change&lt;/a&gt; blog&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Within psychoanalytic theory, there has been a great deal written about the phenomenon of transference, where the client uses the relationship with the therapist to replace something else, and becomes as it were addicted to the therapy/therapist.  A related phenomenon also occurs with management consultancy. &lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.psybox.com/web_dictionary/transference.htm"&gt;Psychoanalytic Definition&lt;/a&gt;&lt;br /&gt;&lt;a href="http://rvtrustblog.blogspot.com/2004/01/trust-and-transference.html"&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href="http://rvtrustblog.blogspot.com/2004/01/trust-and-transference.html"&gt;Trust and Transference&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.rider.edu/%7Esuler/psycyber/transference.html"&gt;Transference Among People Online&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://csmaclab-www.uchicago.edu/philosophyProject/goodman/nominalism.html"&gt;Metaphor as Transference&lt;br /&gt;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-108759959781579625?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/108759959781579625/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=108759959781579625' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108759959781579625'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108759959781579625'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/06/transference.htm' title='Transference'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-108756572944602119</id><published>2004-06-18T14:30:00.000+01:00</published><updated>2004-06-18T15:46:07.590+01:00</updated><title type='text'>Fractal Loading</title><content type='html'>Fractal loading means that each high-level exchange also carries with it simultaneous exchanges on many smaller levels, and implies the coexistence of different but related things at different levels of scale. &lt;br /&gt;&lt;br /&gt;The opposite case of monofunctional planning forces many separate and competing exchanges of the same type into a single communications channel, thus maximizing the capacity of uniform communications channels dedicated to a single type of exchange. An example of this is a choked highway, or the overloading of subway cars at rush hour. Not only is this inefficient, but it excludes other types of exchange.&lt;br /&gt;&lt;br /&gt;[source: &lt;a href="http://applied.math.utsa.edu/~salingar/InfoCities.html"&gt;Information Architecture of Cities&lt;/a&gt;, Coward &amp; Salingaros]&lt;br /&gt;See also &lt;a href="http://www.nooranch.com/synaesmedia/wiki/wiki.cgi?TheCityAsInformationSystem"&gt;Phil Jones wiki&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Customer relationship management illustrates the alternative between fractal loading and monofunctional planning. A call centre or other customer-facing operation may aspire to identify additional products and services to sell to customers. But this conflicts with a series of aspirations related to the efficiency and speed of a single transaction type – e.g. maximum throughput, minimum transaction times, and minimum queueing time.&lt;br /&gt;&lt;br /&gt;Management-by-walking-around (MBWA) is an appeal to fractal loading.  Knowledge management and trust benefit from fractal loading.&lt;br /&gt;&lt;br /&gt;Fractal loading represents a major challenge to traditional bureaucratic assumptions about information processing and management.  It helps us understand why traditional approach can never deliver adequate levels of adaptability.&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-108756572944602119?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/108756572944602119/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=108756572944602119' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108756572944602119'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108756572944602119'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/06/fractal-loading.htm' title='Fractal Loading'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7302924.post-108719039678519751</id><published>2004-06-14T06:12:00.001+01:00</published><updated>2009-03-27T19:31:37.555Z</updated><title type='text'>Stress</title><content type='html'>Stress affects all sorts of outcomes, including biological fertility and workplace productivity.&lt;br /&gt;&lt;br /&gt;There are many observable symptoms of stress - both in individuals and in organizations.&lt;br /&gt;&lt;br /&gt;Stress is itself often a symptom of some underlying problem.  Sometimes one of the most destructive things we can do is alleviate or suppress the symptoms of individual stress, while ignoring the organizational or social context that generates this stress.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://veryard.wikispaces.com/stress"&gt;More discussion on my website&lt;/a&gt;.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/7302924-108719039678519751?l=www.veryard.com%2Fnotions%2Flatest.htm' alt='' /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/108719039678519751/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.blogger.com/comment.g?blogID=7302924&amp;postID=108719039678519751' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108719039678519751'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7302924/posts/default/108719039678519751'/><link rel='alternate' type='text/html' href='http://www.veryard.com/notions/2004/06/stress.htm' title='Stress'/><author><name>Richard Veryard</name><email>noreply@blogger.com</email><gd:extendedProperty xmlns:gd='http://schemas.google.com/g/2005' name='OpenSocialUserId' value='17114481989564238818'/></author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></entry></feed>