Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Andriole
THE COLLABORATE/INTEGRATE
BUSINESS TECHNOLOGY
STRATEGY
85
processing. The potential efficiencies and cost sav- The combinations of products that can be sold
and the products that dont mix well with other
ings are enormousassuming that value and supply
products;
chains are mapped accurately and integrated effectively. Understanding where the leverage is and how The short-term and longer-term life events that
influence purchase decisions; and
it can be optimized in supply chains is essential to
successful collaboration [5]. Pieces needed to make The forms and service options preferred by each
customer.
it work include supply chain planning, supplier
management, demand forecasting, analytics, and
Personalization and customization should not be
metrics.
An important point is that connections occur per- limited to customers. The same analytical approaches
ceptually, procedurally, and technically. All three must taken in profiling customers can be used to profile
exist for supply chain planning and management to employees, suppliers, and partners. The personalizawork. Perceptually, the members of a supply chain tion and customization of employees, suppliers, partmust want to collaborate; that is, they must identify ners, and customers are the core of the collaboration
clear vested interests in their participation. Procedu- process. While mass marketing and communications
rally, its important for them to model alternative will not disappear, mass customization and personalization will grow dramatiwork, product, distribucally over the next few
tion, and service flows,
Inside/Outside
years. Customization and
then check them for accuCollaboration
personalization will also
racy and long-term validC
drive development of new
ity. Technically, its Personalization
and
o
Invest
Customization
l
customer service models.
essential that they align
l
Supply Chain
a
hardware, software, and
Planning and
b
Assess
Management
o
communications with the
REAL-TIME ANALYTICS
r
supply chain models and
Analytics enable business
Real-Time
a
Analytics and
t
Cease
processes, doing so in a
intelligence. The location
Optimization
i
o
way thats scalable and
and quality of data about
Automation
n
extensible. Supply chain
customers, employers,
I n t e g ra t io n
Trust ...
strategists should avoid
suppliers, and partners
using
models
and
determine how effectively
Back Office, Front Office, and Virtual Office
processes
that
will
a company is able to anaApplications, Integration, and Interoparabilitiy
become obsolete or build
lyze its business processes.
Data, Information, Content, and Knowledge
supply chain technology
If its data is all over the
Integration
architectures that are
placeugly, dirty, in any
Pervasive Communications
inflexible.
number of proprietary
vendor silosbusiness
intelligence
is
difficult.
Data
warehousing vendors
PERSONALIZATION
Figure 1. Business technology
investment
priorities.
are happy to sell software, gear, and services to
Companies are able to
Andriole address
fig 1 (5-06)
the problem. But it makes more sense to
personalize contact with
their customers, suppliers, partners, and employees avoid the nasty integration process altogether by
through telemarketing, advertising, paper, and standardizing on a single (or, at worst, a few) data
email. Over time, given the low cost of digital trans- management platforms.
Real-time analytics is the ability to convert realactions, it makes sense to reassess the cost-effectiveness of their channels to these people. Which ones time analyses into immediate action. For example, if
pay best? Which ones cost the most? Important the raincoats a company expected to sell were sitting
dimensions for analysis are the depth, location, and on a shelf, supply chain visibility would permit it to
quality of customer data. For example, several can be see that the coats are not moving. Analytical tools
could help predict sales demand over the next few
determined for individual customers:
weeks, given, say, unexpected drought conditions in
the companys target market. The company could roll
When to digitally interrupt and when not to
out some price changes then (almost) immediately
interrupt them with deals (via browsers, cell
calibrate their sales impact. Predictive analyses can be
phones, wireless PDAs, pagers, and email);
enormously valuable as companies navigate their way
The size of discounts, by person, season of the
out of such a mess.
year, customer location, and time of day;
86
Ideal capabilities include hypothesis testing, pattern analyses, simulations, and what-if sensitivity
analyses. Predictive analyses are not just useful for
averting disasters; they also help proactively optimize
prices. For example, the real-time generation of
demand curves can enable upward price adjustments
for goods and services whose prices would otherwise
be static. Optimization software may be used for
dynamic pricing, but lots of things must be true for it
to work as advertised. For example, the supply chain
mindset needs to be entrenched, data needs to be
clean and accessible, and the technology to access and
analyze the data must be reliable. Vendors sell strategies and technologies embedded in a variety of applications that slice and dice clean, available, organized
data in creative ways.
AUTOMATION
Do customers, partners, employers, or suppliers
want to go to the Web to execute the same transactions day after day, week after week? What about
technology infrastructures? Why not monitor their
condition and effectiveness automatically, fixing
them when a problem is detected? Back-office systems can also automatically transact all sorts of business. All thats necessary is to engineer them to
accept dynamic instructions.
Dynamic instructions, as well as other flavors of
automation, can be developed and integrated into
larger transaction processing engines in several ways.
For example, simple if-then rules can be integrated
directly into large transaction processing applications
(such as enterprise resource planning applications)
through rules engines that support development
and activation of if-then instructions. Other, more
sophisticated systems technology (such as neural networks and semantic processors) can also be used to
increase the width and depth of automation in the
context of emerging collaborative business models.
Sales force automation and customer relationship
management front-office applications can also exploit
automation. Once patterns are discovered, profiles
developed, and rules specified, smart applications can
automate a marketing campaign or follow-up a customer service inquiry.
Infrastructures involving applications, data, computing, and communications must all work together
reliably and securely, but many things can go wrong.
Companies need insight into infrastructure operations with a set of rules designed to react to anticipated and unanticipated conditions. So when the
amount of Web traffic is unexpectedly high, a rule
might fire that says: When incoming sales traffic is
high and server capacity is low, then reroute or queue
nonessential transactions. Web traffic can be monitored for spikes; sales inquiries can receive priority
over other transactions; and unusually heavy customer
traffic is allowed through no matter what, even if it
means queuing a large number of non-sales-related
transactions.
Ideally, infrastructures know about themselves and
the state of their health. For example, they should
know how many computers exist, what versions of
which software are running, and which ones have too
much and which ones too little power. They should
know which devices fail most often (expensively or
inexpensively) and take steps (such as alerts) to anticipate failures. All of these back-office, front-office, and
infrastructure tasks can be at least quasi-automated
through preprogrammed events < > response routines.
The evolution of collaboration through supply
chain management, personalization, and customization will stimulate further automation. As consumer,
supplier, employee, and partner profiles deepen, it will
be possible and desirable to automate all sorts of customized transactions. Assuming that privacy laws and
preferences are worked out, customers will empower
retailers to execute transactions they know theyll like.
As the number of digital transactions increases,
trust among collaborators will be even more important, primarily due to the physical distance between
transacting parties. When we buy something through
the Web, for example, we need to trust the vendor
more than when we buy something in person. Trust
assumes security, and security assumes the ability to
authenticate users, protect data, control access to networks and applications, and the avoidance of viruses.
Trust is what companies want their collaborative
teams to feel when they interact within their transaction networks; if theres any doubt about privacy or
securitywhile protecting the infrastructure from
viruses and other problemscollaboration will fail.
TECHNOLOGY INTEGRATION
In order to optimize new collaborative business
models, computing and communications technology must integrate and interoperate. Most companies have not consistently worried about integration
and interoperability. Accounting systems, claims
processing systems, database management systems,
word processing systems, inventory control systems,
and shop floor manufacturing systems were
deployed one on top of the other. Consequently,
companies built huge data centers housing many
island applications maintained by scores of talented
technologists. Over a quarter of a century ago they
began asking questions about integration. Today, the
COMMUNICATIONS OF THE ACM May 2006/Vol. 49, No. 5
87
Mining ...
Data Warehouses
and Data Marts
OLAP
Tools
Mining
Tools
by different people. Translation results in the develop- actions, business-to-government transactions, tethment of data warehouses and smaller datamarts that ered and untethered communications, intelligent faxsupport all varieties of online analytical processing based communications, electronic data interchange,
and ultimately data mining, or the ability to ask all radio frequency identification-based monitoring and
kinds of questions about employees, customers, sup- tracking, supply chain planning and management,
pliers, and partners, facilitating the kind of analytics continuous transaction processing, eLearning, automated customer service, local area/wide area/virtual
and business intelligence described earlier.
Eventually, structured, unstructured, hierarchical, private networks/personal information networks, and
relational, object-oriented data, information, and the Semantic Web.
The distinction between shared communications
knowledge will be ubiquitously accessible. While we
are a few years away from universal data access (UDA), and collaboration is important; for example, when a
companies should understand this goal and adapt their company emails lots of people (and ccs even more) its
sharing communications,
business models to its
but when it creates a thread
capability.
Microsoft,
Integrated Security Requirements
of communication based
IBM, and Oracle all plan
on action/reaction, its
to provide UDA. Its
Technologies
Products
Services
moving toward collaboraimportant to stay abreast
tive computing. Internet
of their progress, along
Policy
bidding will soon be comwith the implications for
monplace, triggering round
emerging collaborative
Architecture
after round of action/interbusiness models and
Authentication
action. All action/reaction
processes requiring UDA.
collaboration
requires
Disparate data integration
shared communications.
is the short-term path to Authorization
Another notable trend is
that goal. Longer-term, if Administration
the integration of voice and
acquisition decisions are
data on Internet Protocol
made properly, there
Recovery
(IP) networks. As employshould be less need to
ees, customers, suppliers,
integrate disparate dataand partners are connected
bases. In other words, the
immediate data-integra- Figure 3. Integrated security and through the same data and voice transport networks
recovery requirements..
infrastructure, costs will fall, even as collaborative
tion strategy is to reduce
communications capabilities improve. The addition
the number of database
management platforms and databases to enable cus- of voice-to-IP networks or voice-over-IP (VoIP) will
tomization, personalization, analytics, business intelli- save money and provide more flexibility than todays
Andriole fig multi-network
3 (5/ 06) configurations for collaboration, comgence, and automation.
plex networks that carry voice, data, and applications.
While many issues (such as security, quality, and interPERVASIVE COMMUNICATIONS
All of these collaborative business trends assume networking) must be resolved through the creative
ubiquitous, reliable, secure communications, and all exploitation of integrated voice/data networks, they
of these technologies require integrated communica- will provide significant competitive advantage. Once
tions technologies. Collaboration and communica- broadband wireless communication is pervasive and
tion are almost synonymous. Personalization and secure we can expect the full realization of these colcustomization require communications; so do sup- laborative business models.
ply chain planning and management, real-time analytics and optimization, automation, and trust. ADAPTIVE INFRASTRUCTURES
Some of this communication is organic and some is Applications and communication architectures must
digital; the most effective is blended.
be designed and supported [11]. When these designs
We need to recognize changing work models, are done holistically, referencing collaborative busiprocesses, and technologies, including: telecommut- ness strategy, they inevitably support agility, scalabiling, mobile commuting, small office/home office ity, and extensibility. The future infrastructures must
computing, business-to-consumer, business-to-busi- have these capabilities. But integrated design is comness, transaction processing, internal workflow, plex. Adaptive infrastructures involve hardware, softgroupware applications, business-to-employee trans- ware, processes, and the discipline to faithfully
COMMUNICATIONS OF THE ACM May 2006/Vol. 49, No. 5
89
References
1. Andriole, S. The 2nd Digital Revolution. IGI Publishing Group, Hershey, PA, 2005.
2. Andriole, S. The golden rule of business technology investments. Datamation (Nov. 2002).
3. Andriole, S. Managing Systems Requirements: Methods, Tools & Cases.
McGraw-Hill Book Co., New York, 1996.
4. Evans, N. Business Innovation & Disruptive Technology. Financial
Times Prentice Hall, Upper Saddle River, NJ, 2003.
5. Grover, V. and Kettinger, W. Business Process Change: Reengineering
Concepts, Methods, and Technologies. Idea Publishing Group, Harrisburg, PA, 1995.
6. Hanfield, R. and Nichols, E. Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems. Financial Times Prentice Hall,
Upper Saddle River, NJ, 2002.
7. Hares, J. and Royle, D. Measuring the Value of Information Technology.
John Wiley & Sons, Inc., New York, 1994.
8. Hogue, F. The Alignment Effect: How to Get Business Value Out of Technology. Financial Times Prentice Hall, Upper Saddle River, NJ, 2002.
9. Howe, R. Investing in Information Technology. McGraw-Hill Book
Company, New York, 1994.
10. Tozer, E. Strategic IS/IT Planning. Butterworth Heinemann, Boston,
MA, 1996.
11. Weill, P. and Broadbent, M. Leveraging the New Infrastructure: How
Market Leaders Capitalize on Information Technology. Harvard Business
School Press, Boston, MA, 1998.