Research and Advances
Architecture and Hardware

The Collaborate/Integrate Business Technology Strategy

Before investing in the technology, business managers must focus on their collaborative business future and the extent to which their technology can be integrated.
Posted
  1. Introduction
  2. Supply Chain Management
  3. Personalization
  4. Real-Time Analytics
  5. Automation
  6. Technology Integration
  7. Pervasive Communications
  8. Adaptive Infrastructures
  9. Security and Privacy
  10. Conclusion
  11. References
  12. Author
  13. Figures

There are two strategic business technology investment priorities today: collaborative business modeling and technology integration. Collaboration includes supply chain management, personalization, customization, optimization, automation, and transaction trust. These components take on special importance because transactions have morphed from discrete events into continuous processes, permitting thinking in terms of whole customer/supplier/employee/partner management. Technology integration supports collaborative business modeling, including back-office/front-office/virtual-office data and application integration, development of cross-platform security architectures, and integrated communications infrastructure.

Connectivity among employees, suppliers, customers, and partners enables interactive customer relationships, integrated supply chains, and the business analytics that will eventually permit real-time tinkering with inventory, distribution, and pricing [2, 5].

Figure 1 identifies red, yellow, and green investment zones. Companies should work to stay out of the red zone and live comfortably in the yellow and ideally the green zones [1]. The figure suggests that investment in business technology needs to be evaluated along two broad criteria: collaboration and integration. If projects score low in them, consideration of the projects should cease. Projects that may contribute measurably to collaboration and integration outcomes should be assessed (then perhaps made), and projects that may contribute to collaboration and integration should be pursued aggressively. In effect, collaboration and integration should be used as filters through which to pass business technology investment options.

Back to Top

Supply Chain Management

Supply chain optimization is achieved through customization, personalization, dynamic pricing, and automated transaction processing. The potential efficiencies and cost savings are enormous—assuming that value and supply chains are mapped accurately and integrated effectively. Understanding where the leverage is and how it can be optimized in supply chains is essential to successful collaboration [5]. Pieces needed to make it work include supply chain planning, supplier management, demand forecasting, analytics, and metrics.

An important point is that connections occur perceptually, procedurally, and technically. All three must exist for supply chain planning and management to work. Perceptually, the members of a supply chain must want to collaborate; that is, they must identify clear vested interests in their participation. Procedurally, it’s important for them to model alternative work, product, distribution, and service flows, then check them for accuracy and long-term validity. Technically, it’s essential that they align hardware, software, and communications with the supply chain models and processes, doing so in a way that’s scalable and extensible. Supply chain strategists should avoid using models and processes that will become obsolete or build supply chain technology architectures that are inflexible.

Back to Top

Personalization

Companies are able to personalize contact with their customers, suppliers, partners, and employees through telemarketing, advertising, paper, and email. Over time, given the low cost of digital transactions, it makes sense to reassess the cost-effectiveness of their channels to these people. Which ones pay best? Which ones cost the most? Important dimensions for analysis are the depth, location, and quality of customer data. For example, several can be determined for individual customers:

  • When to digitally interrupt and when not to interrupt them with deals (via browsers, cell phones, wireless PDAs, pagers, and email);
  • The size of discounts, by person, season of the year, customer location, and time of day;
  • The combinations of products that can be sold and the products that don’t mix well with other products;
  • The short-term and longer-term life events that influence purchase decisions; and
  • The forms and service options preferred by each customer.

Personalization and customization should not be limited to customers. The same analytical approaches taken in profiling customers can be used to profile employees, suppliers, and partners. The personalization and customization of employees, suppliers, partners, and customers are the core of the collaboration process. While mass marketing and communications will not disappear, mass customization and personalization will grow dramatically over the next few years. Customization and personalization will also drive development of new customer service models.

Back to Top

Real-Time Analytics

Analytics enable business intelligence. The location and quality of data about customers, employers, suppliers, and partners determine how effectively a company is able to analyze its business processes. If its data is all over the place—ugly, dirty, in any number of proprietary vendor silos—business intelligence is difficult. Data warehousing vendors are happy to sell software, gear, and services to address the problem. But it makes more sense to avoid the nasty integration process altogether by standardizing on a single (or, at worst, a few) data management platforms.

Real-time analytics is the ability to convert real-time analyses into immediate action. For example, if the raincoats a company expected to sell were sitting on a shelf, supply chain visibility would permit it to see that the coats are not moving. Analytical tools could help predict sales demand over the next few weeks, given, say, unexpected drought conditions in the company’s target market. The company could roll out some price changes then (almost) immediately calibrate their sales impact. Predictive analyses can be enormously valuable as companies navigate their way out of such a mess.

Ideal capabilities include hypothesis testing, pattern analyses, simulations, and what-if sensitivity analyses. Predictive analyses are not just useful for averting disasters; they also help proactively optimize prices. For example, the real-time generation of demand curves can enable upward price adjustments for goods and services whose prices would otherwise be static. Optimization software may be used for dynamic pricing, but lots of things must be true for it to work as advertised. For example, the supply chain mindset needs to be entrenched, data needs to be clean and accessible, and the technology to access and analyze the data must be reliable. Vendors sell strategies and technologies embedded in a variety of applications that slice and dice clean, available, organized data in creative ways.

Back to Top

Automation

Do customers, partners, employers, or suppliers want to go to the Web to execute the same transactions day after day, week after week? What about technology infrastructures? Why not monitor their condition and effectiveness automatically, fixing them when a problem is detected? Back-office systems can also automatically transact all sorts of business. All that’s necessary is to engineer them to accept dynamic instructions.

Dynamic instructions, as well as other flavors of automation, can be developed and integrated into larger transaction processing engines in several ways. For example, simple if-then rules can be integrated directly into large transaction processing applications (such as enterprise resource planning applications) through “rules engines” that support development and activation of if-then instructions. Other, more sophisticated systems technology (such as neural networks and semantic processors) can also be used to increase the width and depth of automation in the context of emerging collaborative business models.

Sales force automation and customer relationship management front-office applications can also exploit automation. Once patterns are discovered, profiles developed, and rules specified, smart applications can automate a marketing campaign or follow-up a customer service inquiry.

Infrastructures involving applications, data, computing, and communications must all work together reliably and securely, but many things can go wrong. Companies need insight into infrastructure operations with a set of rules designed to react to anticipated and unanticipated conditions. So when the amount of Web traffic is unexpectedly high, a rule might fire that says: “When incoming sales traffic is high and server capacity is low, then reroute or queue nonessential transactions.” Web traffic can be monitored for spikes; sales inquiries can receive priority over other transactions; and unusually heavy customer traffic is allowed through no matter what, even if it means queuing a large number of non-sales-related transactions.

Ideally, infrastructures know about themselves and the state of their health. For example, they should know how many computers exist, what versions of which software are running, and which ones have too much and which ones too little power. They should know which devices fail most often (expensively or inexpensively) and take steps (such as alerts) to anticipate failures. All of these back-office, front-office, and infrastructure tasks can be at least quasi-automated through preprogrammed events <    > response routines.

The evolution of collaboration through supply chain management, personalization, and customization will stimulate further automation. As consumer, supplier, employee, and partner profiles deepen, it will be possible and desirable to automate all sorts of customized transactions. Assuming that privacy laws and preferences are worked out, customers will empower retailers to execute transactions they know they’ll like.

As the number of digital transactions increases, trust among collaborators will be even more important, primarily due to the physical distance between transacting parties. When we buy something through the Web, for example, we need to trust the vendor more than when we buy something in person. Trust assumes security, and security assumes the ability to authenticate users, protect data, control access to networks and applications, and the avoidance of viruses. Trust is what companies want their collaborative teams to feel when they interact within their transaction networks; if there’s any doubt about privacy or security—while protecting the infrastructure from viruses and other problems—collaboration will fail.

Back to Top

Technology Integration

In order to optimize new collaborative business models, computing and communications technology must integrate and interoperate. Most companies have not consistently worried about integration and interoperability. Accounting systems, claims processing systems, database management systems, word processing systems, inventory control systems, and shop floor manufacturing systems were deployed one on top of the other. Consequently, companies built huge data centers housing many island applications maintained by scores of talented technologists. Over a quarter of a century ago they began asking questions about integration. Today, the questions (and answers) are no longer optional [4].

Enterprise application integration (EAI) and migration is a multibillion-dollar business that aims to get databases and applications designed to ignore each other to instead be friends. This is very tricky and complex, and vendors and consultants make all sorts of promises about integration and migration problems and solutions. They will come in and build custom glue to connect packaged applications with their homegrown counterparts. Companies that take this path are certain to limit future flexibility, since the glue is custom-made and therefore expandable only by the vendor that created it. A better approach is to exploit some of the interfaces built into the more popular applications that make it easier to connect disparate databases and applications, though such flexibility also depends on how far a particular vendor goes to make its applications work with other applications. A third option is to deploy generic, or agnostic, glue designed to connect lots of applications and databases. The advantage is that it “works” with lots of databases and applications, though it almost always needs tweaking to work in a production environment. A number of vendors specialize in generic glue and glue-application services.

The glue comes in many flavors. One data glue is known as data extraction, transformation, and loading, or ETL, technology; another is based on application programming interfaces; a third is based on existing messaging applications often described as communications middleware; and a fourth is generic glue known as EAI tools. EAI and application migration are two critical new core competencies. This is not to say that every company needs to hire hundreds of EAI/migration professionals, but companies must understand what EAI is, how it works, what it costs, and when (and when not) to deploy it.

The good news is the industry is moving toward adoption of technology integration standards known as Web Services. The idea behind Web Services is to get the industry to adopt a set of common technology standards to make applications (and data) integrate and interoperate. At least three XML-based standards define Web Services: Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery, and Integration (UDDI). SOAP permits applications to talk to one another. WSDL is a kind of self-description of a process that allows other applications to use it. And UDDI is like a Yellow Pages that lists services.

Web Services is a collection of capabilities that allow primarily newer applications to work with each other over the Internet. Due to the agreement about the standards that define Web Services there’s potential efficiency in their adoption. Conventional glue may, for example, consist of middleware, EAI technology, and portals, whereas Web Services (due to being standards-based) can reduce the number of data and transaction hops by reducing the number of necessary protocols and interfaces. Eventually, the plan is to extend Web Services to the entire collaborative world, including suppliers, partners, customers, and employees. Web Services (theoretically at least) reduces the need for conventional integration technology.

The underlying Web Services integration technology is potentially more powerful than many realize. As it matures, it may well change the way software is acquired, deployed, and supported. The new idea involves a concept called Service Oriented Architecture that essentially describes a process through which transactions occur locally (on a computer one owns and operates) and virtually (through the ability to call new capabilities into transactions). Web Services and Service Oriented Architectures are important pieces of technology integration; pilots should be developed around them to determine the role they might play in collaborative transaction processing.

Figure 2 outlines a way for managers, as well as technologists, to think about data integration. Most companies have data in a variety of places. Some may be in Oracle databases, some in IBM/DB2 databases, some in Microsoft’s Sequel Server, and some in Sybase and Informix databases. This “operational data,” especially if it is in a variety of forms, often needs to be translated into a form from which it can be used by different people. Translation results in the development of data warehouses and smaller datamarts that support all varieties of online analytical processing and ultimately data mining, or the ability to ask all kinds of questions about employees, customers, suppliers, and partners, facilitating the kind of analytics and business intelligence described earlier.

Eventually, structured, unstructured, hierarchical, relational, object-oriented data, information, and knowledge will be ubiquitously accessible. While we are a few years away from universal data access (UDA), companies should understand this goal and adapt their business models to its capability. Microsoft, IBM, and Oracle all plan to provide UDA. It’s important to stay abreast of their progress, along with the implications for emerging collaborative business models and processes requiring UDA. Disparate data integration is the short-term path to that goal. Longer-term, if acquisition decisions are made properly, there should be less need to integrate disparate databases. In other words, the immediate data-integration strategy is to reduce the number of database management platforms and databases to enable customization, personalization, analytics, business intelligence, and automation.

Back to Top

Pervasive Communications

All of these collaborative business trends assume ubiquitous, reliable, secure communications, and all of these technologies require integrated communications technologies. Collaboration and communication are almost synonymous. Personalization and customization require communications; so do supply chain planning and management, real-time analytics and optimization, automation, and trust. Some of this communication is organic and some is digital; the most effective is blended.

We need to recognize changing work models, processes, and technologies, including: telecommuting, mobile commuting, small office/home office computing, business-to-consumer, business-to-business, transaction processing, internal workflow, groupware applications, business-to-employee transactions, business-to-government transactions, tethered and untethered communications, intelligent fax-based communications, electronic data interchange, radio frequency identification-based monitoring and tracking, supply chain planning and management, continuous transaction processing, eLearning, automated customer service, local area/wide area/virtual private networks/personal information networks, and the Semantic Web.

The distinction between shared communications and collaboration is important; for example, when a company emails lots of people (and cc’s even more) it’s sharing communications, but when it creates a thread of communication based on action/reaction, it’s moving toward collaborative computing. Internet bidding will soon be commonplace, triggering round after round of action/interaction. All action/reaction collaboration requires shared communications.

Another notable trend is the integration of voice and data on Internet Protocol (IP) networks. As employees, customers, suppliers, and partners are connected through the same data and voice transport networks infrastructure, costs will fall, even as collaborative communications capabilities improve. The addition of voice-to-IP networks or voice-over-IP (VoIP) will save money and provide more flexibility than today’s multi-network configurations for collaboration, complex networks that carry voice, data, and applications. While many issues (such as security, quality, and internetworking) must be resolved through the creative exploitation of integrated voice/data networks, they will provide significant competitive advantage. Once broadband wireless communication is pervasive and secure we can expect the full realization of these collaborative business models.

Back to Top

Adaptive Infrastructures

Applications and communication architectures must be designed and supported [11]. When these designs are done holistically, referencing collaborative business strategy, they inevitably support agility, scalability, and extensibility. The future infrastructures must have these capabilities. But integrated design is complex. Adaptive infrastructures involve hardware, software, processes, and the discipline to faithfully convert strategic requirements into robust, reliable, secure, scalable networks, databases, and applications. Infrastructures that are able to adapt to evolving collaborative requirements must be designed and deployed.

Infrastructure planning begins with a driving concept and a set of assumptions about what the gear must do. Strategic requirements are collaborative; tactical requirements are integrative. All decisions about infrastructure must converge with collaboration and integration. Here are several considerations:

  • Collaborative applications. Access to collaborative applications (such as supply chain, customization, personalization, business analytics, and automated) must be ubiquitous, and communications networks must be designed to work with all collaborative stakeholders;
  • Gear. The gear, including hardware, software, and communications, must support collaboration and integration; we must therefore rethink anything that does only one thing (such as a cell phone that isn’t also a pager and a PDA);
  • Personal computers. We must be able to think about buying desktop computers and not think about replacing them for at least 36 months; laptops, though they cost more than desktops, make more sense for collaborating employees; and
  • Infrastructure. Infrastructure should encourage integration and interoperability across device, applications, data, communications, and security environments; whoever supports the infrastructure should push collaborative processes and invest in integrative solutions.

Back to Top

Security and Privacy

A particular set of technologies, processes, and services constitute a security strategy. Many companies publish privacy policies because the government tells them to, but these policies do not protect the data of their collaborators as thoroughly as they should. In particular, the natural tension between personalization and privacy must be continuously assessed.

Figure 3 outlines the security landscape; each cell in the matrix demands attention because it must work with all the others. As more and more transactions become continuous and collaborative, the importance of security and privacy become that much more important as well. Not long ago, security was often a poor relative, receiving only enough budget to satisfy less-than-picky auditors, but after the terrorist attacks in the U.S. Sept. 11, 2001, companies reassessed their security vulnerabilities, as well as their disaster-recovery requirements. Terrorism will remain a threat to digital transaction processing. But other threats, including cyber-espionage and increasingly sophisticated hacking, will perhaps become even more commonplace and threatening.

Back to Top

Conclusion

Figure 1 outlines a high-level business technology investment strategy. Business collaboration and technology integration are the priorities, but the specifics differ from company to company [8]. The key to success depends on the extent to which companies understand the collaborative business models they need to support integrated technology [1, 7, 9, 10]. Companies looking for a compass to guide their technology investment strategies must consider the collaborate/integrate destination.

Back to Top

Back to Top

Back to Top

Figures

F1 Figure 1. Business technology investment priorities.

F2 Figure 2. Raw data to data mining to customization, personalization, automation, and real-time analytics.

F3 Figure 3. Integrated security and recovery requirements.

Back to top

    1. Andriole, S. The 2nd Digital Revolution. IGI Publishing Group, Hershey, PA, 2005.

    2. Andriole, S. The golden rule of business technology investments. Datamation (Nov. 2002).

    3. Andriole, S. Managing Systems Requirements: Methods, Tools & Cases. McGraw-Hill Book Co., New York, 1996.

    4. Evans, N. Business Innovation & Disruptive Technology. Financial Times Prentice Hall, Upper Saddle River, NJ, 2003.

    5. Grover, V. and Kettinger, W. Business Process Change: Reengineering Concepts, Methods, and Technologies. Idea Publishing Group, Harrisburg, PA, 1995.

    6. Hanfield, R. and Nichols, E. Supply Chain Redesign: Transforming Supply Chains into Integrated Value Systems. Financial Times Prentice Hall, Upper Saddle River, NJ, 2002.

    7. Hares, J. and Royle, D. Measuring the Value of Information Technology. John Wiley & Sons, Inc., New York, 1994.

    8. Hogue, F. The Alignment Effect: How to Get Business Value Out of Technology. Financial Times Prentice Hall, Upper Saddle River, NJ, 2002.

    9. Howe, R. Investing in Information Technology. McGraw-Hill Book Company, New York, 1994.

    10. Tozer, E. Strategic IS/IT Planning. Butterworth Heinemann, Boston, MA, 1996.

    11. Weill, P. and Broadbent, M. Leveraging the New Infrastructure: How Market Leaders Capitalize on Information Technology. Harvard Business School Press, Boston, MA, 1998.

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More