logo jabes

Command & Control Realisations


🎭 Summary & Indices Elucidation 👁 Foreword Vitae 🎭

👐 C-Steer C-Serve C-Shape 👁 I-C6isr I-Jabes I-Know👐
👐 r-steer r-serve r-shape 👁 r-c6isr r-jabes r-know👐

🔰 Contents I_Floor  C_Tasks  H_Culture C_Theory CMM0-SIM 🔰
  
🚧  👁-GAP T_Value C_Steer C_Culture ✅-logic CMM3-SIM 🚧
  
🎯 I_Sage I_Serve C_Edge C_Vision ✅-dimensions CMM5-SIM 🎯


W-1 Command & Control - acting on situations


W-1.1 Contents

W-1.1.1 Global content
Building data design data devops meta devops bianl design meta design math The data explosion. The change is the ammount we are collecting measuring processes as new information (edge).

📚 Information requests.
⚙ measurements monitoring.
🎭 Agility for changes?
⚖ solution & performance acceptable?

🔰 Too fast .. previous.
W-1.1.2 Local content
Reference Squad Abbrevation
W-1 Command & Control - acting on situations
W-1.1 Contents contents Contents
W-1.1.1 Global content
W-1.1.2 Local content
W-1.1.3 Guide reading this page
W-1.1.4 Progress
W-1.2 Floor plans, ordered dimensions C6autist_02 I_Floor
W-1.2.1 Context information technology: master data
W-1.2.2 Definitions products, goods, services: master data
W-1.2.3 Services orientation at information technology
W-1.2.4 Roles tasks levels in Information Services
W-1.3 Steering roles tasks C6autist_03 C_Tasks
W-1.3.1 Technical "how to" for understanding steering
W-1.3.2 The what to start operational steering
W-1.3.3 Understanding the data flow, data lineage
W-1.3.4 Roles tasks levels supporting Information Services
W-1.4 Culture building people C6autist_04 H_Culture
W-1.4.1 Project management, the change challenges
W-1.4.2 Project into Programme into Portfolio (3P)
W-1.4.3 Managing flow in activities, portfolios
W-1.4.4 CPO, CPE, Managing living viable systems
W-1.5 Sound underpinned theory, foundation C6autist_05 C_Theory
W-1.5.1 Chosen colours and shapes for the floor plans
W-1.5.2 The viable system, conscious decisions
W-1.5.3 The viable system, autonomic technology
W-1.5.4 The viable system, autonomy mediation
W-1.6 Maturity 0: Strategy impact understood C6autist_06 CMM0-SIM
W-1.6.1 Determining the position, the situation
W-1.6.2 Individual logical irrational together
W-1.6.3 Value stream VaSM vs Viable system ViSM
W-1.6.4 Flexibility in architecture, engineering, design
W-2 Command & Control working on gaps for solutions
W-2.1 Understanding ICT Service Gap types C6authow_01 👁-GAP
W-2.2.1 Understanding the technical design processes
W-2.2.2 Understanding technical performance choices
W-2.2.3 Data governance, knowing wat is going on
W-2.2.4 Data governance, knowing who is acting at what
W-2.2 Floor plans, understanding ICT operating value streams C6authow_02 T_Value
W-2.2.1 Technology quality & risk rating
W-2.2.2 Information process: Identities, Access, incident response
W-2.2.3 Safety Monitoring for anamolies by open source issues
W-2.2.4 Safety Monitoring for anamolies known internal processes
W-2.3 Information systems: Actuators - Steers C6authow_03 C_Steer
W-2.3.1 Communicating a shared value, mission for understanding
W-2.3.2 Communications, variety & velocity and regulators
W-2.3.3 Communications, variety & velocity within systems
W-2.3.4 Product vs Service provider & Top-down vs Bottom-up
W-2.4 Roles tasks in the organisation C6authow_04 C_Culture
W-2.4.1 Team member and organic system roles
W-2.4.2 The ignored Engineer executing everything
W-2.4.3 Mediation technology: functionality - functioning
W-2.4.4 Interactions in the organic viable system
W-2.5 Sound underpinned anatomy of a viable system C6authow_05 ✅-logic
W-2.5.1 Fundaments of activities processes (0-1-2, 4-5)
W-2.5.2 Operational deliveries, functioning portfolio (1-2)
W-2.5.3 Changing products, services, functionality portfolio (2-3)
W-2.5.4 Autonomic compliancy control & conscious decisions (3-4)
W-2.6 Maturity 3: Enable strategy to operations C6authow_06 CMM3-SIM
W-2.6.1 SIMF-VSM Safety with Technology at Technology
W-2.6.2 SIMF-VSM Uncertainties imperfections at processes, persons
W-2.6.3 Dichotomy: generic approaches vs local in house
W-2.6.4 SIMF-VSM Multidemensional perspectives & revised context
W-3 Command & Control planning for innovations
W-3.1 Information processing in the information age C6autsll_01 I_Sage
W-3.1.1 Master data, understanding information
W-3.1.2 Requesting data - Information as pull
W-3.1.3 Data lineage as a value stream
W-3.1.4 Strategy conflicts securing platforms
W-3.2 Floor plans, optimizing value streams C6autsll_02 I_Serve
W-3.2.1 Information quality & risk rating
W-3.2.2 Chain of Information change & Master data Context
W-3.2.3 Information knowledge qualities by product, service
W-3.2.4 Information impact by product, service
W-3.3 Why to steer in the information landscape C6autsll_03 C_Edge
W-3.3.1 ...........................treams
W-3.3.2 ...........................
W-3.3.3 ...........................
W-3.3.4 ...........................des asteroide world
W-3.4 Visions & missions from the boardroom C6autsll_04 C_Vision
W-3.4.1 ..............................nterprise
W-3.4.2 ..............................& multiple dimensions
W-3.4.3 ..............................straints
W-3.4.4 ..............................gn, production
W-3.5 Sound underpinned theory, improvements C6autsll_05 ✅-dimensions
W-3.5.1 A structured enterprise, the organic cycle
W-3.5.2 A structured enterprise, Input Ideas perspective
W-3.5.3 A structured enterprise, the hidden organisation
W-3.5.4 A structured enterprise, result request perspective
W-3.6 Maturity 5: Strategy visions adding value C6autsll_06 CMM5-SIM
W-3.6.1 SIMF-VSM Safety with Information at Technology
W-3.6.2 ............ service positioned within a system
W-3.6.3 ............tem structures following procucts, services
W-3.6.4 ............ innovation for products, services
W-3.6.5 Following steps

M-1.1.3 Guide reading this page
Avoiding the tooligan trap.
What's a 'Tooligan'? How often do you find yourself falling in love with a tool and then finding a problem so that you can use it?
Whenever I learn something new, I often want to go and try it out and test it on the peeps or systems that I work with, so I start with the tools and look for a problem.
I see this in many organisations and teams that I have worked with. I was talking to a friend expressing my frustration about the number of tools they used that didn't seem to solve any problem but were just there for the sake of a tool.
As humans, we are innately tool makers and users. Tools can help us express our ideas better, allow us to create beautiful things and solve real problems. We might want to ask a different question: This is a great question, but probably not the first one to ask.
👉🏾 How will we know what we do is getting us what we want?
Before deciding what we will do, we might want to ask… And so before we decide how to shift the system, we must understand what we value.

 The Spine Model.
What are the system's needs?
This brings us to possibly the first question we want to ask:
👉🏾 "What problems are we solving here?"
When we look at things this way, we use a model that I love, The Spine Model. The Spine Model encourages us to start with understanding the system of work and the Needs of that system or the problem we are trying to solve. It asks us to identify what we Value and what we want to optimise for.
  1. Once we know what we like to optimise, we can look for Principles and levers that apply.
  2. Once we know what we value/want to optimise and what principles are necessary, we can decide what to do.
  3. What Practices will we use?
  4. Then, finally, we can choose the tools that will support all of this.
Let's walk an example through and see.

Getting the tooligans into the system's needs
"If you want a straight spine, you have to start at the top, at Needs and work down iteratively."
😱 I have seen so many organisations do the opposite. They start with a tool (Jira, Pivotal Tracker, Microsoft Azure, etc.), and then that tool defines their practices.
😲 Those practices shape the principles that apply and determine what optimisations are possible. More often than not, the original problem remains, and sometimes, the cycle continues with the following tool.
“The value of the Spine Model is to enable thinking and communication, heterodoxy.”
😉 The Spine Model can help us put our critical thinking hats on and ensure we are solving the right problem. It's about communication and shared understanding, which can save us time and money on useless tools and unsolved problems in the long term.
👉🏾 When I find myself being a "tooligan", I remind myself to begin with Needs.

M-1.1.4 Progress
done and currently working on:

Planning to do & changes:

Build modern01

W-1.2 Floor plans, ordered dimensions

Building any non trivial construction is going by several stages. These are: Non trivial means it will be repeated for improved positions.
Before any design, tools are needed for measuring what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

W-1.2.1 Context information technology: master data
Functional data governance 101.
There is no options in avoiding accountability. Foundation managing information processes products services for data, information is functional about:
  1. The context purpose: 📚 it is describing.
  2. Who is using and when: 🎭 access control and monitoring
  3. Reliability availability: 👁 Transactional integirty, optional system recovery
  4. Relationships: ⚙ between logical elements (meta context plan)
  5. An inventory: ⚖ What is really being important & used

SQL liefe
Technical data governance 101.
Using a relational database for managing information is one of the many technical options to realize the functional information processing.
The technical translation of the functional context uses a different language:
  1. DDL Data Declaring: 📚 The translation from logical to technical has functional impact. Transactional processing is very different compared to analytics.
  2. DCL Data Control: 🎭 This is partially "access control", "information security".
    That is a generic functional topic for another level of tasks & responsibilities.
  3. TCL Transaction Control: 👁 Loosing information can be catastrofal when it is about legal agreements. An example of critical systems is payments.
  4. DML Data Manipulation: ⚙ Modification
  5. DQL Data Querying: ⚖ Usage

Avoiding misunderstanding: platforms & applications
What is a "platform" is as confusing by lack of a shared definition as "the application". Not clear anymore if tangible are machines, servers.
In IT, a platform is any hardware or software used to host an application or service. ... The term platform may also go beyond simply describing the underlying architecture to also include software that is built upon the architecture. For example, the adoption of virtual machines in an enterprise requires a hypervisor platform. ...
Tools are software but inseparatable parts of a platform. Even though an application may require an underlying computing system, such as a particular OS and server or storage hardware, an application may be considered a platform when it is used as a tool for performing meaningful work. ... For example: The goal of platform engineering is to create organized groups of resources and services that developers can use without needing to deeply understand or directly manage them. These organized groups, called platforms, are often built using many of the same software development skills and abilities found across DevOps teams.
The "system programmer" role as defined by IBM in the mainframe context (80's).
The platform team uses tool experts to understand developer needs, select the best tools for the required tasks, perform integrations and automations, and troubleshoot and maintain the established platform over time. ...
But platforms don't just happen, and one size never fits all. Platforms themselves are typically considered a product, and they must be created and maintained for the business and its specific software development and productivity needs. Because platforms are composed of discrete components and services, they can be changed and enhanced over time.
Using a shared environment, shared way of practices, controlled quality for the production environment, there is no other option than a regulated centralised approach for platforms. It are the equivalents of machinery in the industry. These should usually not be installed nor maintained by the intended operators of the machinery. It is far too demanding to combine those skills to excel.
W-1.2.2 Definitions products, goods, services: master data
Products, Goods, Services, what is it about?
There is not a good single reference understanding the mastedata object container "service". Combining multiple sources is the best option. Links with ideas about services, goods for products: Using chatgpt result for the definition of Services and from the linked sources: Services are intangible activities or benefits that an organization provides to consumers in exchange for money or something else of value.
Products: Goods vs Services
Differences are: Unique characteristics of Services:
Products, Goods, Services: types and quality
The human factor is often the key success factor in service provision.
Types of Services: Types of Services: Service quality can be measured through various dimensions such as: Both inputs and outputs to the processes involved providing services are highly variable, as are the relationships between these processes, making it difficult to maintain consistent service quality. Many services involve variable human activity, rather than a precisely determined process.
Service-commodity goods continuum
The distinction between a good and a service remains disputed. Classical economists contended that goods were objects of value over which ownership rights could be established and exchanged. Ownership implied tangible possession of an object that had been acquired through purchase, barter or gift from the producer or previous owner and was legally identifiable as the property of the current owner.
😲 Adam Smith's famous book, The Wealth of Nations, published in 1776, distinguished between the outputs of what he termed "productive" and "unproductive" labor. The former, he stated, produced goods that could be stored after production and subsequently exchanged for money or other items of value. The latter, however useful or necessary, created services that perished at the time of production and therefore did not contribute to wealth. Building on this theme, French economist Jean-Baptiste Say argued that production and consumption were inseparable in services, coining the term "immaterial products" to describe them.
🤔 In the modern day, Gustofsson & Johnson describe a continuum with pure service on one terminal point and pure commodity good on the other. Most products fall between these two extremes. For example, a restaurant provides a physical good (the food), but also provides services in the form of ambience, the setting and clearing of the table, etc.
W-1.2.3 Services orientation at information technology
Managing service gaps
Consequently, customers evaluation of overall service quality is based on a combination of all five aspects outlined above. Knowing the way customers evaluate service, it is important to understand, identify and measure the potential gaps that may exist in the service delivery process.
  1. knowledge gap This occurs when there is a disconnect between what a customer wants or expects in service quality and what the management team of the service provider thinks the customer wants or expects from the service delivery.
  2. standards gap This occurs when there is a difference between what the management team wants and the actual service delivery specification that management develops for employees to follow in delivering the service.
  3. delivery gap This gap can occur when there is a disconnect between the service standard and the actual service delivered to the customer.
  4. communications gap This happens when there is a difference in what the customer is told they can expect and what service is actually delivered.
  5. Expectation gap This gap can appear when there is a difference in what the customer expects from the service (prior to consumption or purchase) and what the customer perceives of the service after it has been provided.
Service Gaps


The soll in infomration service provision
Changes in the way of working are needed at a lot of levels. Bottom-up from technology perspective starts at 6. The columns are: Customer Focus, Processes & Tools, Continuous Learning & Improvements, Team structure, Value stream management, Culture.
👉🏾 The "soll" in a matrix (top-details, context-bottom):
data literacy RRU data literacy ACA
Customer P&T CLI Teams VSM Culture
➡ What ➡ How ➡ Where ➡ Who ➡ When ➡ Which
6 5 ➡ seek satisfaction continuous improvement quickly actions organic autonomy eliminate bottlenecks diversity in thinking
7 4 ➡ visible deliveries automate: no defects evolving skills knowledge sharing balance: speed - quality shared visions missions
8 3 ⟳ feedback loops effective efficiency small iterations breaking hierarchy informed decisions safe, blame-free
8 3 ⟲
9 2 ⬅ value creation collaboration mistakes = learning responsible autonomy flow measurements trust & openess
0 1 ⬅ Understand needs lean: avoid 3m adaption culture diversity in teams lean: flow optimisation transparancy

🎯💡 Promoting this way of working can be only succesfull by showing it by example.
W-1.2.4 Roles tasks levels in Information Services
Building up the Information service bottom-up
Every floor level is build on the next one by logical dependencies. When a task has not found its destination on the intended floor, ad-hoc bypasses are used.

Execution machines floor 0/1, the how for the organisation
operational Tech

Execution processes floor 1/2, the how in value streams
operational Tech

Change enacting floor 2/3, the what for value streams
operational Tech

Change control floor 3/4, the what quality & quantity for the organisation
operational Tech
In a mature situation all levels are in place and aligned with their antipodes.
Build modern01

W-1.3 Steering roles tasks

Managing the building any non trivial construction follows several stages. These are: Non trivial means it will be repeated for improved positions.
Managing the process, information is needed for understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

W-1.3.1 Technical "how to" for understanding steering
Build modern03
The V-model extended to a W-model
Organizing, planning the work in the primary value stream is a common activity. Time is important for delivering results.
In engineering using the V-model is the standard, doing as much as possible in parallel. There is no final design for every detail during construction. The most important things at high level are however defined for achieving a defined goal.
To be extended to:
BI_transforms01.jpg
Transactional operations - Normalization
In transactional systems it is important to avoid any duplication of an artefact, element, because it is too complex to keep duplications synchronized. Details: 👓
The concept of database normalization is generally traced back to E.F. Codd, an IBM researcher who, in 1970, published a paper describing the relational database model.
Definion of the third Normal Form (3NF):
Reporting Business Intelligence (BI)- Denormalization
Denormalization is the process of reversing the transformations made during normalization for performance reasons. It's a topic that stirs controversy among database experts; Tthere are those who claim the cost is too high and never denormalize, and there are those that tout its benefits and routinely denormalize.
Classic Business Intelligence are reshaping all operational data into new dedicated data models. The reason for this is taht facts and dimension used in the operational process are not suited for reporting and analyses.
The concepts of a transactional operational data design with normalization are followed.
schedule job flow
National language Support (NLS)
National Language Support (NLS) and localized versions are frequently confused. NLS is about: In the moment the NLS options are propagating into logical constructs the logic has become dependent on a NLS setting. Many tools are suffering from this not wanted effects.
This also has impact on the realisation in the data processing. 👓 details
Examples:
W-1.3.2 The what to start operational steering
Scheduling, planning operations.
Scheduling is the other part of running processes. Instead of defining blocks of code in a program it is about defining blocks of programs for a process. Processes are planed in time to run in time windows with dependencies.
avoiding confusion by same word other context:
Building a process flow
Building a process flow (job) is defining the order how to run code units (jobs). See figure, link 👓, details.
schedule job flow
Time events schedule
Operational control process flows I
Operational task: Monitoring the progress within a running process.
When automated there is only human interaction needed when there is signal of things going wrong. Andon , stop the line , and do not push the problem downstream.
Human intervention ready for action (Andon).

Running planned proces flows
Having process flow defined the planning is: In the example, see figure: Developing a system like this is more easy, understandable when the scheduling and program units are designed and build as a system.
See figure, link 👓, details
What is processed are indicators of deliveries, results for information products.
W-1.3.3 Understanding the data flow, data lineage
data lineage following the cycle
Knowing what information from what source is processed into new information at a new location is lineage (derivation), "data lineage" .
Understanding changes in data requires understanding the data chain, the rules that have been applied to data as it moves along the data chain, and what effects the rules have had on the data. Data lineage includes the concept of an origin for the data—its original source or provenance—and the movement and change of the data as it passes through systems and is adopted for different uses (the sequence of steps within the data chain through which data has passed). Pushing the metaphor, we can imagine that any data that changes as it moves through the data chain includes some but not all characteristics of its previous states and that it will pick up other characteristics through its evolution. Data lineage is important to data quality measurement because lineage influences expectations.
full pull push request service delivery
In a figure,
See right side.

Details 👓


Capacity Considerations, the enterprise data warehouse (EDW)
A standardised location in normal information processes using data is brings normal capacity questions. Change data - Transformations
More in details the transport of data, flow goes:
This breaks with the common acceptance of using a data ware house. The data warehouse is not used for operational processes but only for doing analytics to inform decision makers. In normal industrial approaches the ware house is used for operational processes. Measuring what is going on, informing decision makers is a different topic, different information flow.
The enterprise warehouse 3.0: df_csd01.jpg In a figure,
See right side.

Details 👓
In a figure,
See right side.

When the Collecting and sending area's of the EDW 3.0 are the ones that are most limiting the flow, the planning is best done for traffic by managing this service.
Data lineage, data quality, information quality is "by design" of the information products.
W-1.3.4 Roles tasks levels supporting Information Services
Building up the Information lineage bottom-up
Every floor level is build on the next one by logical dependencies. When a task has not found its destination on the intended floor, ad-hoc bypasses are used.
Information quality, service product
A specification can be clearly and completely, consistently and concisely specified by means of standard attributes that conform to the MECE principle (Mutually Exclusive, Collectively Exhaustive). The MECE principle is used in mapping process wherein the optimum arrangement of information is exhaustive and does not double count at any level of the hierarchy. By reorganizing the information using MECE and the related storytelling framework, the point of the topic can be addressed quickly and supported with appropriate detail.
SCQA: Situation, Complication, Question, and Answer, a brief overview: From this a generic approach for pruducts, goods and/or services: In a mature situation all levels of support are in place and aligned with their antipodes.
Confused-2

W-1.4 Culture building people

Managing the working force at any non trivial construction is moving to the edges. The cultural changes are: Non trivial means it will be repeated for improved positions.
Managing the working force at processes, information is needed for understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

W-1.4.1 Project management, the change challenges
Culture by frameworks, hypes
There is for a many years a fight going on in the information technology world how work should get managed. Instead of learning from other STEM, Science Technology Engineering Mathematics, what they have learned and what is is possbile, reinventing the wheel is common.
No such thing as Waterfall (A.Dooley 2024)
The Agile movement has greatly enriched the project management landscape. Unfortunately the ‘cult of Agile’ is doing more harm than good with its narrow evangelical views. ...
It was perhaps naïve of me to not anticipate that there are many, many different views of what the term 'Waterfall' actually means. That shouldn't have been a surprise since there is a similar lack of common understanding of what 'Agile' actually is, so if Waterfall is the antonym of something that isn't well defined, why would I expect the term Waterfall itself to be well defined? ...
All of this has reinforced my view that in the world of project and programme management, we should stop using the terms Agile and Waterfall (and, as a consequence, Hybrid) and just talk about agility. All projects demonstrate some degree of agility at some point in their life cycle and agility can take many forms.
Feel lost The confusion of: Development life cycles focus on the delivery phase of a project or programme and often arise from particular domains such as construction, engineering or IT. They should not be confused with governance life cycles or specialist life cycles. ... As uncertainty about the detail of objectives increases, development life cycles need to be more iterative so they can adapt as more information becomes available.
Future for project, programme management
Vision is linking Innovation and value (L.Bourne)
The key is an effective and viable strategic planning process that is capable of developing a realistic strategy that encompasses both support and enhancements for business as usual, and innovation. Strategic planning is a complex and skilled process outside of the scope of this post, for now we will assume the organisation is capable of effective strategic planning. ...
There is a close link between the portfolio management processes and strategic planning, what's actually happening in the organisation's existing projects and programs is one of the baselines needed to maintain an effective strategic plan (others include the current operational baseline and changes in the external environment). In the other direction, the current/updated strategy informs the portfolio decision making processes.
linking innovation to value
In a figure:
See right side.

The strategic plan is the embodiment of the organisation’s intentions for the future and the role of portfolio management is to achieve the most valuable return against this plan within the organisation’s capacity and capability constraints. ...
👉🏾 The long term viability of any organisation depends on its ability to innovate.

W-1.4.2 Project into Programme into Portfolio (3P)
Planning, a life cycle for a product, service
life-cycle Project, programme and portfolio management (P3M) is the application of methods, procedures, techniques and competence to achieve a set of defined objectives. The goals of P3 management are to: Investment in effective P3 management will provide benefits to both the host organisation and the people involved in delivering the work. It will: A consistent approach to P3 management, coupled with the use of competent resources is central to developing organisational capability maturity. A mature organisation will successfully deliver objectives on a regular and predictable basis.
A P3 life cycle illustrates the distinct phases that take an initial idea, capture stakeholder requirements, develop a set of objectives and then deliver those objectives.
The goals of life cycle management are to: Projects and programmes are the primary mechanisms for delivering objectives while portfolios are more focused on co-ordinating and governing delivery of multiple projects and/or programmes.
As a result the project and programme life cycles have many similarities and follow the same basic approach. The simplest life cycle is a project life cycle that is only concerned with developing an output.

Programme
A typical programme life cycle is shown.
praxis life cycle
Steps: Benefits realisation start at the first delivery.

See figure.
It all starts with someone having an idea that is worth investigation. This triggers high level requirements management and assessment of the viability of the idea to create a business case. At the end of the phase there is a gate where a decision made whether or not to proceed to more detailed (and therefore costly) definition of the work. ...
The full product life cycle also includes: In a parallel project life cycle, most of the phases overlap and there may be multiple handovers of interim deliverables prior to closure of the project.

praxis portfolio life cycle
Portfolio
Unlike projects and programmes, portfolios are less likely to have a defined start and finish. Portfolio management is a more continual cycle coordinating projects and programmes. It may, however, be constrained by a strategic planning cycle that reviews strategy over a defined period.
If an organisation has, for example, a three-year strategic planning cycle, then the portfolio cycle will have compatible time constraints.
👉🏾 The portfolio management team may be responsible not only for co-ordinating the projects and programmes to deliver strategic objectives, but also for improving the maturity of project, programme and portfolio management.

W-1.4.3 Managing flow in activities, portfolios
TOC Theory of constraints
BlueDolphins Love the FLOW
To make the long story (s. above) short, "the current accounting is so complex because it tries to optimize everything! The main assumption of accounting is: But that is impossible because every system has exactly one constraint. Without a constraint, it would grow with infinite speed, explode or exhaust all resources. And will die immediately. ...
This algorithm based on the Theory of Constraints (TOC) and Throughput Accounting (TA) is easier because every step is deterministic and easy to understand for everyone.

TOC Dolphins book: Management 4.0, Handbook for Agile Practices (3.0 )
The buzzwords “Agility, Agile or Agile Management” are often interpreted as miracle-workers. But the number of different meanings attributed to these terms is immense: There are thousands of experts and tens of thousands of books and articles on what agile work actually is.
Subject of agility: everyone is an expert, everyone knows how to do it best. ...
This book was conceived as a manual or "handbook" and ended up as a "brain book". It is full of concepts and principles, some rough and coarse, some fine polished. But all help to understand and put into practice the agile movement, and to ride this great wave without sinking!
Highlights:
Managing a living viable system
Current enterprises are, to a great extent, pushed by a permanent demand for change and adaption. One of their main requirements therefore is their ability to react accurately and precisely to dynamic and quickly changing market demands.
BlueDolphin VSM
Cybernetic combined with a hierarchy 6w1h.

Management cybernetics provides a structural framework of managerial functions and the required interactions that will enable the long-term success of businesses. ... changing the normative setting in an organization is crucial for reaching the desired synergy effects, i.e. initiating a process where “the whole is greater than the sum of its parts” (Aristotle).
The main driver for a collective interconnection between people, is ... We cannot stress strongly enough how important it is from our point of view that any increase in S1’s self-organizing capabilities should always be accompanied by an agile reshaping of the higher management functions S2 through S5 in the sense described above.

W-1.4.4 CPO, CPE, Managing living viable systems
Lean Product and Process Development (LPPD)
LPPD Guiding Principles (Jim Morgan, Lara Harrington, Steve Shoemaker) CPO Chief product officer, the goal focus on the product, good or service.
The LPPD Guiding Principles provide a holistic framework for effective and efficient product and service development, enabling you to achieve your development goals.
  1. Putting People First: Organizing your development system and using lean practices to support people to reach their full potential and perform their best sets up your organization to develop great products and services your customers will love.
  2. Understanding before Executing: Taking the time to understand your customers and their context while exploring and experimenting to develop knowledge helps you discover better solutions that meet your customers’ needs.
  3. Developing Products Is a Team Sport: Leveraging a deliberate process and supporting practices to engage team members across the enterprise from initial ideas to delivery ensures that you maximize value creation.
  4. Synchronizing Workflows: Organizing and managing the work concurrently to maximize the utility of incomplete yet stable data enables you to achieve flow across the enterprise and reduce time to market.
  5. Building in Learning and Knowledge reuse: Creating a development system that encourages rapid learning, reuses existing knowledge, and captures new knowledge to make it easier to use in the future helps you build a long-term competitive advantage.
  6. Designing the Value Stream: Making trade-offs and decisions throughout the development cycle through a lens of what best supports the success of the future delivery value stream will improve its operational performance.
Lppd Putting 1 People
In a figure:
See right side.


Scaling without sacrificing innovation
👉🏾 Developing adaptiveness in a changing world (Sandrine Olivencia) Chief product Engineers take on the critical role of balancing customer value technology and also finance to craft their products. Actually a chief product engineer is not tied to a specific role like in agile.
Product manager or Tech lead is more of a responsibility or and a mindset.
CPE: Chief product Engineers can emerge from any part of the organization

3 Practices to scale artisanship (19m06): Chief product engineer (22m42) : The goal of this mentorship system is for experienced leaders to pass on their knowledge their vision and their artisanship to the next generation. The Cornerstone of the system is the chief product role the chief product engineer role.
Product-led approach (262m42) :
Dimensions Floor

W-1.5 Sound underpinned theory, foundation

Knowing the position situation in by observing several types of associated information . These are: Non trivial means it will be repeated for improved positions.
Command & control needs information for what understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

W-1.5.1 Chosen colours and shapes for the floor plans
SIMF colours for area's
An organisation in two dimensional blueprints for a three (and more) dimensions needs elaboration. Presenting idea's by only figures is too difficult to understand without an explanatory reference.
Explanation for the areas Image
Steer: An orange colour are organisational command & control for:
  • high abstracted level to the operational floor activities
  • for functionality, the change and functioning getting the value.
Area Steer
Serve: A green colour are technology aspects for:
  • high abstracted level to the operational floor activities
  • for functionality, the change and functioning getting the value.
Area Serve
Shape: A blue colour are mediation aspects for:
  • high abstracted level to the operational floor activities
  • for functionality, the change and functioning getting the value.
Area Shape
Synapse: A gray colour are the logical communication aspects for:
  • The short term, quick communication, quick reaction at the same floor level.
  • The short term, quick communication, quick reaction over floor levels.
This area is the equivalent of command & control of a viable system. The viable system theory is mentions a fifth level. Questions for that one:
Who are our customers? What problems do we solve for them? What are they really willing to pay money for? This is crucial because answering those provides the primary control criterion that anchors accountability.
Area Synapse


SIMF structure in shapes
Explanation for the areas Image structures
Steer: Structures:
  • Circles
    ➡ Interactions
    related to:
    • Organisation
      magenta
    • Technology
      green
    • Consumer focus
      brown
    • Supplier focus
      indigo
  • A circle of circles, controlled
  • Hexagons
    ➡ defined actions
  • collection
    delegated actions, controlled
  • duality
    ➡ Materialised information
    vs processing information
Act Process Act Delegate
Serve: Structures:
  • Circles
    ➡ Interactions
    related to:
    • Organisation
      magenta
    • Technology
      green
    • Consumer focus
      brown
    • Supplier focus
      indigo
  • A tree of circles, controlled
  • A V-shape control
    ➡ adaptive change
  • Hexagons
    ➡ defined actions
  • Hexagon flow
    ➡ fast closed loops
Act React Planned Act React Learn
Shape: Structures:
  • Hexagons
    ➡ defined actions
  • Hexagon flow
    ➡ fast closed loops
  • Circles
    ➡ Interactions
    related to:
    • Organisation
      magenta
    • Technology
      green
    • Consumer focus
      brown
    • Supplier focus
      indigo
  • A collection of circles, controlled
Act Flow Act Planned
Synapse: Structures:
  • Circles
    ➡ Interactions
    Same floor defined orientation:
    • Organization
      magenta
    • Technology
      green
    • Consumer focus
      brown
    • Supplier focus
      indigo
  • Hexagons
    ➡ defined actions
  • Rectangles
    ➡external influence
  • Antennas
    ➡ receiving signals
Act Nerve Act External Act Antenna


W-1.5.2 The viable system, conscious decisions
SIMF the organisation for realisations, outside view
👁 Industrial age: the manager knows everything, workers are resources similar to machines.
👁 Information age, required change: a shift to distributed knowledge, power to the edges.
Understanding the business, organisation in their four levels.
The complete area of information processing for the organisation in a figure: SIMF building build-run


W-1.5.3 The viable system, autonomic technology
SIMF the processing for realisations, outside view
👁 Industrial age: the manager knows everything, workers are resources similar to machines.
👁 Information age, required change: a shift to distributed knowledge, power to the edges.
Understanding the technology service in their four levels.
Some peculiar interesting attention points: The complete area of information processing for technology in a figure: SIMF building operations


W-1.5.4 The viable system, autonomy mediation
SIMF Improving the product, service
👁 Industrial age: the manager knows everything, workers are resources similar to machines.
👁 Information age, required change: a shift to distributed knowledge, power to the edges.
Understanding the support change in products, goods, service, in their four levels.
It are connections at the backend and frontend where the value, purpose is generated. By the inside perspective a direction clockwise or counter clockwise is missing.
Some peculiar interesting attention points: The complete area of changing products, goods, services at information processing in a figure: SIMF improving external


Confused-2

W-1.6 Maturity 0: Strategy impact understood

From the three PPT, People, Process, Technology interrelated areas in scopes.
Only having the focus on others by Command and Control is not complete understanding of all laysers, not what Comand & Control should be.
Each layer has his own dedicated characteristics.

W-1.6.1 Determining the position, the situation
Don't waste your precious time on creating something that is not serving the greater good: Start moving beyond the “toolbox mentality” or "my Lean-thinking" and unlock real potential.
W-1.6.2 Individual logical irrational together
LGC devilstriangle
Paradoxes in lean, agile
Thinking about Lean Thinking Part IV Paradox Mindset At 12m40 there is a nice list of paradoces in defining lean (see 12m40) A complete list: Lean Global 2024 Here's a terrific collection of paradoxes that are inherent in Lean, compiled by Rachel Reuter and Eric O. Olsen. Rachel presented it, with John Shook, at last week's Lean Global Connection event.
Paradox, or apparent contradictions, can be in the challenge statement of the Improvement Kata model, or pop up just about anywhere along the way (Figure 2 below). Practicing Toyota Kata teaches you to work toward challenges with a scientific mindset and approach, making you more accustomed to the discomfort that uncertainties and paradoxes bring. It enhances your ability to create 'both/and' solutions rather than limiting yourself to 'either/or' options. Scientific thinking and what Rachel and John refer to as 'paradox mindset' are closely related.
  1. Customers-focused yet employee empowering Lean is driven by delivering value to the customer. Employees focus which ultimately benefits the customer.
    Yet empowering and engaging employees to reach their full potential is the focus.
  2. Structured yet flexible Lean views structure, including standardisation and stability as key enablers for flexibility, adaptability creativity and innovation.
    The framework provides a foundation for continuous improvement.
  3. Bottom-up, yet top down Lean requires leadership to provide clear direction and create an environment where all workers drive innovation and improvements.
    Both leadership and individual contribution are essential.
  4. People-centric, respectful yet challenging Lean shows respect for people by challenging them to learn, grow, and never settle for the status quo. Respect includes providing physical professional and emotional safety to enable development.
    The level of challenge is tailored to the individual's role and abelites, to stretch them appropriately.
  5. Stop, yet flow Lean requires stopping to immediately address problems, yet this enables unsurpassed efficiency, productivity and flow. You cannot have flow without quality vice versa.
  6. Reflection-seeking yet failure-tolerant lean pursues perfection and defined by providing on demand detect free one by-one , waste free, safe products and services.
    Yet it recognizes the importance of surfacing problems and learning from mistakes through continuous improvement, rather than wating for perfection.

LGC devilstriangle do
Dominiating: "either-Or"
Befudding us for at leat 25000 years ... With "Either-Or" explicitly dominiating much of our, especially western, thinking for centuries. No grey: no allowance for uncertaintity.
W-1.6.3 Value stream VaSM vs Viable system ViSM
Project, Programme, Portfolio (P3)
Project, Programme, and Portfolio Management (P3M) is the application of methods, procedures, techniques, and competencies to achieve a set of defined objectives. It encompasses three key areas: Effective P3M ensures that initiatives are aligned with organizational strategy, resources are used efficiently, and desired outcomes are achieved.
Cybernetics S1-S5 into S1-S6

Command & control a viable system
"The commander must work in a medium which his eyes cannot see, which his best deductive powers cannot always fathom, and with which, because of constant changes, he can rarely become familiar." Carl von Clausewitz, 1832. On War.
To put effective command and control into practice, we must first understand its fundamental nature—its purpose, characteristics, environment, and basic functioning.
We often think of command and control as a distinct and specialized function—like logistics, intelligence, electronic warfare, or administration—with its own peculiar methods, considerations, and vocabulary, and occurring independently of other functions. But in fact, command and control encompasses all military functions and operations, giving them meaning and harmonizing them into a meaningful whole. None of the above functions, or any others, would be purposeful without command and control. Command and control is not the business of specialists—unless we consider the commander a specialist—because command and control is fundamentally the business of the commander.
Command and control is the means by which a commander recognizes what needs to be done and sees to it that appropriate actions are taken. Other forms may require such a degree of judgment and intuition that they can be performed only by skilled, experienced people—as in devising tactics, operations, and strategies.
Furthermore, planning increases knowledge and elevates situational awareness. Effective training and education, which make it more likely that subordinates will take the proper action in combat, establish command and control before the fact. The immediate-action drill mentioned earlier, practiced beforehand, provides command and control. A commander’s intent, expressed clearly before the evolution begins, is an essential part of command and control. Likewise, analysis after the fact, which ascertains the results and lessons of the action and so informs future actions, contributes to command and control. Some forms of command and control are primarily procedural or technical in nature—such as the control of air traffic and air space, the coordination of supporting arms, or the fire control of a weapons system. Others deal with the overall conduct of military actions, whether on a large or small scale, and involve formulating concepts, deploying forces, allocating resources, supervising, and so on. This last form of command and control, the overall conduct of military actions, is our primary concern in this manual. Unless otherwise specified, it is to this form that we refer. ...
An effective command and control system provides the means to adapt to changing conditions. We can thus look at command and control as a process of continuous adaptation. We might better liken the military organization to a predatory animal—seeking information, learning, and adapting in its quest for survival and success—than to some “lean, green machine.” Like a living organism, a military organization is never in a state of stable equilibrium but is instead in a continuous state of flux—continuously adjusting to its sur- roundings. ...
Second, the action-feedback loop makes command and control a continuous, cyclic process and not a sequence of discrete actions—as we will discuss in greater detail later. Third, the action-feedback loop also makes command and control a dynamic, interactive process of cooperation. As we have discussed, command and control is not so much a matter of one part of the organization “getting control over” another as something that connects all the elements together in a cooperative effort. All parts of the organization contribute action and feedback—“command” and “control”—in overall cooperation. Command and control is thus fundamentally an activity of reciprocal influence—give and take among all parts, from top to bottom and side to side.
(MCDP6 1996).
W-1.6.4 Flexibility in architecture, engineering, design
Fixed mindset trivial systems

Example St-Pauls cathedral
A cathedral is a non trivial construction, for example: St Pauls Cathedral . (to visit) and (wikipedia)
StPauls warrant The task of designing a replacement structure was officially assigned to Sir Christopher Wren on 30 July 1669. Charged by the Archbishop of Canterbury, in agreement with the Bishops of London and Oxford, to design a new cathedral that was "Handsome and noble to all the ends of it and to the reputation of the City and the nation". The design process took several years, but a design was finally settled and attached to a royal warrant, with the proviso that Wren was permitted to make any further changes that he deemed necessary. The cathedral was declared officially complete by Parliament on 25 December 1711 (Christmas Day).

StPauls result
The final design as built differs substantially from the official Warrant design. Many of these changes were made over the course of the thirty years as the church was constructed, and the most significant was to the dome.
After the Great Model, Wren resolved not to make further models and not to expose his drawings publicly, which he found did nothing but "lose time, and subject [his] business many times, to incompetent judges". The Great Model survives and is housed within the cathedral itself.
The cathedral is one of the most famous and recognisable sights of London. Its dome, surrounded by the spires of Wren's City churches, has dominated the skyline for over 300 years. At 365 ft (111 m) high, it was the tallest building in London from 1710 to 1963. The dome is still one of the highest in the world.

StPauls result The St Paul’s Collection of Wren Office drawings is unrivalled as a record of the design and construction of a single great building by one architect in the early modern era. Consisting of 217 drawings for St Paul’s dating between 1673 and 1752 (nine others, catalogued in the final section, are unconnected with the building), the Collection was originally part of a much larger corpus. This included 67 drawings now in the Wren Collection at All Souls College, Oxford, and a single plan at Sir John Soane’s Museum in London. The whole corpus is only a fraction of what must originally have existed, for it contains very few executed designs and just one full-sized profile for construction, although hundreds – if not thousands – of such drawings must have been made.
He revised the design stage by stage as work moved from one part of the building to the next. The entire design process depended on close collaboration between Wren and his draughtsmen. Often working in pairs, they produced finished or alternative schemes for his approval and made large-scale working drawings for construction.

Race to the moon
The Space race was a 20th-century competition between two Cold War rivals, the United States and the Soviet Union, to achieve superior spaceflight capability. It had its origins in the ballistic missile-based nuclear arms race between the two nations following World War II and had its peak with the more particular Moon Race to land on the Moon between the US moonshot and Soviet moonshot programs. The technological advantage demonstrated by spaceflight achievement was seen as necessary for national security and became part of the symbolism and ideology of the time. ...
Gagarin's flight led US president John F. Kennedy to raise the stakes on May 25, 1961, by asking the US Congress to commit to the goal of "landing a man on the Moon and returning him safely to the Earth" before the end of the decade. The US successfully deploying the Saturn V, which was large enough to send a three-person orbiter and two-person lander to the Moon. Kennedy's Moon landing goal was achieved in July 1969, with the flight of Apollo 11.

It is this program met those many launches that initiated the project management as we know these days (2024) for information technology. The used computers in those days were the first ones that could be used enabling those projects.
The Learning the Lessons of Apollo 13 appollo 13 ITIL The story of Apollo 13 is one of hope, inspiration and perseverance, and one that holds many useful parallels for those in the field of information system project management.
Open mindset non trivial systems
What we can learn from these kind of great examples: More examples like this one of a non trivial project, non trivial construction can be found.
The questions for this is: why should we do it different for non trivial information systems?
Organisational culture
BlueDelphins: Hence, it is dependent above all, on the leadership skills of management, to implement a vivid corporate culture, which embraces change as a steady companion of agile living.
SIMF understanding the management improvement cycle
  1. A vision: Product / Service
  2. Geo-mapped roles
  3. Persons methodologies
  4. Flows, value streams
  5. Optimizing at constraints
  6. Functionality, technology
  7. Safety, technology
  8. Product Service knowledge
SIMF framework
in a figure: See right side.
🔰 Contents I_Floor  C_Tasks  H_Culture C_Theory CMM0-SIM 🔰
  
🚧  👁-GAP T_Value C_Steer C_Culture ✅-logic CMM3-SIM 🚧
  
🎯 I_Sage I_Serve C_Edge C_Vision ✅-dimensions CMM5-SIM 🎯


W-2 Command & Control working on gaps for solutions


Alchemie

W-2.1 Understanding ICT Service Gap types

Preparing the building of any non trivial construction sould include safety.
❗Aspect: People, safety, functioning topics are: A viable system is non trivial, it will be repeated in structures in every layer. Conscious leading a system by command & control needs only the information for what is relevant in understanding what is going on. The shared vison mission defines a direction.

W-2.1.1 Understanding the technical design processes
Development of products and processes as a single effort
A confusion: What is called ‘waterfall’ or sometimes ´v-cycle’ is in fact systems engineering.
It is not project management although the links and connections are tight.
(Jean-Charles Savornin) See ISO ISO 15288 on: Systems and software engineering — System life cycle processes
Systems Thinking in Project Management
The term "system" is often used to describe a collection of processes. However, it is only sometimes used in the form defined by Systems Engineers. INCOSE definition: There are shorter ones, my favorite is... The point of these two definitions is that when someone speaks of "systems," they don't always speak of the processes that go along with the products.
Separation of product from process is the basis of some "world views", that is not a system view.
Another confusion: A critically missing process in many IT projects, especially Agile development projects, is the principles of Systems Engineering. Systems Engineering dominates the programs in Space Flight, Embedded Systems, Software Intensive Systems of Systems.
In these domains, 12 principles are used to increase the probability of success.
These principles come from Section 3.2 of Engineering Elegant Systems: Theory of Systems Engineering, A Whitepaper, Michael D. Watson, NASA Marshall Space Flight Center (2020).

Systems Engineering activities Principles
  1. Systems engineering integrates the system and the disciplines considering the budget and schedule constraints
  2. Complex Systems build Complex Systems
  3. The focus of systems engineering during the development phase is a progressively more profound understanding of the interactions, sensitivities, and behaviors of the system.
    Sub-Principles:
    1. Requirements and models reflect the knowledge of the system
    2. Requirements are specific, agreed to preferences by the developing organization
    3. Requirements and design are progressively defined as the development progresses
    4. Hierarchical structures are not sufficient to fully model system interactions and couplings
    5. A Product Breakdown Structure (PBS) provides a structure to integrate cost and schedule with system functions
  4. Systems engineering has a critical role throughout the entire system life cycle.
    Sub-Principles Systems engineering :
    1. obtains an understanding of the system
    2. models the system
    3. designs and analyzes the system
    4. tests the system
    5. has an essential role in the assembly and manufacturing of the system
    6. has an indispensable role during operations and decommissioning
  5. Systems engineering is based on a middle-range set of theories.
    Sub-Principles Systems engineering has:
    1. a physical/logical basis specific to the system
    2. a mathematical basis Sub-Principle
    3. a sociological basis particular to the organization
  6. Systems engineering maps and manages the discipline interactions within the organization

Systems Engineering managing Principles
  1. Decision quality depends on the coverage of the system knowledge present in the decision-making process
  2. Both Policy and Law must be adequately understood, not overly to constrain or under constrain the system implementation
  3. Systems engineering decisions are made under uncertainty, accounting for risk
  4. Verification is a demonstrated understanding of all the system functions and interactions in the operational environment
  5. Validation is a demonstrated understanding of the system's value to the system stakeholders
  6. Systems engineering solutions are constrained based on the decision timeframe needed for the system

nasa domains quadrants
Agility Project Management and Systems View.
In the search for a definition of Agile Project Management, the Declaration of Interdependence (DoI) proposed a set of principles.
We are, in fact, "engineering a system" when we develop software and manage the project that develops the software. Are these principles compatible with the systems engineering view?
Realizing successful systems (products) is undoubtedly the goal. So why does the Agile Project Management world still need to have a connection to the Systems Engineering worldview? It seems like a natural connection.
A much better connection than to the linear, silo-focused set of processes described in PMBOK. In PMBOK, the customer is connected to the process loop at the start and at the end.
There is however no connection made, more work needed.
Definitions of terms like value, rapid, early, customer, frequent, innovation, performance, effectiveness, and reliability are used by the DoI. When these terms are given "units of measure," and those units of measure are connected to analytical outcomes for the business, Agile Project Management will have moved into the system engineering domain. A domain where the "trade space" of decisions is where management and engineers live every day.
Asking questions like:

W-2.1.2 Understanding technical performance choices
Performance & Tuning - Software, Hardware.
Solving performance problems requires understanding of the operating system and hardware. This is basic classic, the architecture was set by von Neumann.
vonNeumann_perftun01.jpg Optimizing is balancing between choosing the best algorithm and the effort to achieve that algorithm. The time differences between those resources are in magnitudes factor 100-1000.
➡ A single CPU,
these days many.
➡ limited internal memory,
these days capable of holding massive data.
➡ The external storage.
these days several types for speed and purpose even more massive data.

vonNeumann_perftun02.jpg Neglecting performance questions could be justified by advance in hardware the knowledge of tuning processes is ignored. Those days are gone, a Fundamental Turn Toward Concurrency in Software,
By Herb Sutter. (2009) The Free Lunch Is Over .
If you haven´t done so already, now is the time to take a hard look at the design of your application, determine what operations are CPU-sensitive now or are likely to become so soon, and identify how those places could benefit from concurrency. Now is also the time for you and your team to grok concurrent programming´s requirements, pitfalls, styles, and idioms.
❗ Moore's law is about the number of components, not speed. More: 👓 details
Additional components:
➡ multiple CPU's and the GPU farm for processing.
➡ external storage using the internal memory types avoiding mechanical delays.
➡ Storage in a network cam be a SAN (Storage attached Network) or a NAS (Network attached Storage). They are different in behaviour and performance.

Performance Data processing
Performance is impacted by:
IBM db2 dio cio ➡ Use of keys indexes, positieve and negative effects
➡ The order of sorting. For bulk processing presorted works the best. Transactional applications are better with a random spread.
➡ Set in Limited physical sizing. Saving all history in a single space will have a negative impact. There are more reasons to split spaces by historical values.
➡ Cache setting for both the OS level and DBMS.
For managing tables a DBA should be aware of the effects by choices.
File system caching configurations 👓 Use concurrent I/O to improve DB2 database performance (ibm 2012)
In some cases, caching at the file system level and in the buffer pools causes performance degradation because of the extra CPU cycles required for the double caching. To avoid this double caching, most file systems have a feature that disables caching at the file system level.
This is generically referred to as non-buffered I/O. On UNIX, this feature is commonly known as Direct I/O (or DIO). On Windows, this is equivalent to opening the file with the FILE_FLAG_NO_BUFFERING flag.

query concurrency management To ensure that heavier workloads that use column-organized data do not overload the system when many queries are submitted simultaneously, there is a limit on the number of heavyweight queries that can run against a database at the same time.
You can implement the limit on the number of heavyweight queries by using the default workload management concurrency threshold. This threshold is automatically enabled on new databases if you set the value of the DB2_WORKLOAD registry variable to ANALYTICS. You can manually enable the threshold on existing databases. The processing of queries against column-organized tables is designed to run fast by using the highly parallelized in-memory processing of data.

W-2.1.3 Data governance, knowing wat is going on
ELT processing pre & post steps
Doing Extract / Load processing there are many tools due to 👓 CWM (Common Warehouse Metadata specification). The standard is almost forgotten in all hypes for tools. Extract Transform Load ELT, Data Integration, control & performance usually only focus on the technical behaviour. However doing ELT in real life something is missing, that is functional control & monitoring: This kind of logic is only possible by having an adjusted pre and post process in place. That kind if fucntional logic is impossible to be solved by an external generic provision. It is relative easy with local customisations and using local naming conventions.
DI control performance
In a figure:
See right side.

More Details 👓

Transport of data - information
Having systems in place the usual question is how to propagate the data -information- from one system to another in a reliable way. A technical service, "micro service" is a direct interactive way with no need for storage and building up an inventory with time delay. Not every process is an interactive needing immediate response. Dedicated transfer steps are other options.
In any case a well defined storage location is needed with an associated security alignment.
In any case a well defined Functional control & monitoring is needed: receiving safe data
Transferring moving information's conform moving goods.
More 👓 details

Any business application has little value when there are no interactions, no consumers.
feel_brains_05
W-2.1.4 Data governance, knowing who is acting at what
DevOps ICT - Transformations
Kim Cameron In 2000 he became the architect of Microsoft’s Active Directory, which evolved into the most widely deployed identity technology used in enterprises globally. As the growth of the Internet made the importance of identity increasingly evident, his role expanded to become chief architect of identity for Microsoft. In 2004 he wrote the Laws of Identity, a document that has long influenced both technologists and regulators, and which Microsoft adopted to guide its innovation.
blog See: "laws of identity in brief".
The Laws Of Identity
Several types of usage an identity: Any application developer, department, enterprise, or group of enterprises can create policies.
What is Azure Active Directory B2C? Then applications and portals can, depending on their context, invoke the identity experience engine passing the name of a policy and get precisely the behavior and information exchange they want without any muss, fuss or risk.
(nov 2015)

PIM, Privileged Identity Management
What is privileged identity management (PIM)? PIM is a process or program for identifying the privileged accounts, also known as superuser accounts, within an organization. Doing this can help with the monitoring, control and management of the access privileges each superuser has to the organization's resources in order to protect those resources from harm.
Superusers, such as database administrators and system administrators, can perform actions on an enterprise system that a typical end user cannot. For example, a superuser can change other users' passwords; add, remove or modify user profiles; change device or network configurations; install new programs on enterprise endpoints; or modify enterprise databases or servers.

Business continuity management
BCM ( "Business and IT Continuity: Overview and Implementation Principles" (2008) a part of risk management.
Business Continuity is the term applied to the series of management processes and integrated plans that maintain the continuity of the critical processes of an organisation, should a disruptive event take place which impacts the ability of the organisation to continue to provide its key services. ICT systems and electronic data are crucial components of the processes and their protection and timely return is of paramount importance.
Business Continuity (BC) is now recognised as an integral part of good management practice and corporate governance.

SFluchs Enabele Secure
Structured defined Cyber Security.
blog (Sarah Fluchs).
The least amount of information is needed at the pyramid top. If you want to communicate a product’s security to a consumer who only needs to use a product securely, you don’t need to communicate much. A list of features is fine. A cybersecurity label assuring the list of features is met is fine too. This is what all the consumer IoT labels are for.
If you want to communicate a product’s security to an authority, they will want to know more.
At the pyramid bottom, your addressees need to make security decisions themselves for two reasons. First, because they’re regulated themselves, as many critical infrastructure operators are. They need to do their own threat models and risk assessment, and they need to explain their security measures to authorities themselves. Second, because they often do a fair share of engineering themselves. The products they buy are just building blocks that are further integrated into complex systems of systems
Interesting are the labels for the products, they give an idea of content within a managed portfolio supporting this kind of items.
Build modern02

W-2.2 Understanding ICT operating value streams

Building any non trivial construction is going by several stages.
❗Aspect: Machines, technology topics are: A viable system is non trivial, it will be repeated in structures in every layer. Conscious leading a system by command & control needs only the information for what is relevant in understanding what is going on. A shared vison mission is a pre-req.

W-2.2.1 Technology quality & risk rating
operational Tech safe1
Communication acting at the viable system
CapCom: the primary point of contact and source of truth about the state of the system.
In IT Service management the goal of acting reacting got lost, incidents, problems, changes.
👉🏾 CapCom these are not the attributes known from ITIL but are reverted to the source: the incident with apollo 13. The time to react on an issue is important. Variations: Able to communicate within all levels is a prerequisite for able to react in time.
👉🏾 There is a duality in being very safe but not having the service available and running the service but that service has known safety issues. To balance in the conflicts is a task role not to combine with either of the conflicting sides, segregation in duties.
Incident response readiness, education mandatatory internal
EU directive NIS2, the CapCom: article 1
Member States adopt national cybersecurity strategies and to designate or establish competent authorities, cyber crisis management authorities, single points of contact on cybersecurity (single points of contact) and computer security incident response teams (CSIRTs).
EU directive NIS2, Also requires educations for executives: article 20
Member States shall ensure that the members of the management bodies of essential and important entities are required to follow training, and shall encourage essential and important entities to offer similar training to their employees on a regular basis, in order that they gain sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices and their impact on the services provided by the entity.
Confusing: prodcuts with digital elements
is not technology neutral defined. The assumption of simple devices would be different to complicated and complex or even chaotic is not underpinned.
Risk rating, readiness
This is a standard activity. A split in technology related risk and fucntionality risks is not made yet although this is by nature of a system logical to do. An open source option: Ravib
Risk matrix The purpose of this tool is to register risks in order to control them. Controlling risks requires knowing your risks, assigning them to people who actively deal with them and keeping track of the measures that mitigate those risks. This tool supports in that. This register is just a tool.
👉🏾 How well risks are controlled depends on how well the responsible people deal with them.


Technical resource qualities
Metrics: kpis
W-2.2.2 Information process: Identities, Access, incident response
operational Tech safe1
Continuity planning
This goal and drivers are not about technology but driven by the business organisation.
Business continuity (r-steer) measures are however technology related such as backup management, emergency planning, and crisis management. The recovery time objective (RTO) amd recovery point objective (RPO) (techtarget) are described from technology perspectives.
Metrics:
  • Portfolio, without an accurate inventory, there is no way having a complete BIA.
  • 👉🏾 Simplistic if a computer, system or network goes down as a result of a hardware, program or communications failure:
    👉🏾 The simplistic idea for a DR is missing the intentional actions disabling components.
    Identity & access
    The "Devils Triangle" on its own with IAM: Conflicting types of interests, focus areas.
    Frictions:
    secure_relate01.jpg
    In a figure:
    See left side

    IAM (C-Serve).

    The issue is not the execution of the actions implementing something, these are at the S1 level floor 0-1. The issue is definining well defined policies that are aligning all area's with the frictions solving the higer level goals of the viable system as the organisation technology and change as a whole. That is control S4 at level 3-4 and conscious choices S5 at 4-5.
    Well defined policy challenges:
    W-2.2.3 Safety Monitoring for anomalies by open source issues
    operational Tech safe1
    Security operations Processes
    The security operations center is often outsourced, not being an indespensible part of the viable system. This is possible by the more generic aspects of safety. What functionality in details is needed is different for each system at a moment.
    👉🏾 An outsourced SOC introduces a problem in more complicated systems where the anomalies of the internal processes is decisive for understanding a healty situation recognizing unhealty signals.

    Security operations: The Team
    Cybersecurity's the Team (linkedin post)
    Critics: The ciso is missing the trainers on the side line like risk managers compliance managers. The people watching the game employees operaton managers and ofcourse the club owners in the skybox paying top dollars for the players which resembles the business owner or board. The FIFA as regulatory compliance institutions. Imagine a football team, but instead of players, we have cybersecurity heroes on the field, each playing a vital role to secure the "goal" (protecting systems and data)! Here's how the ultimate Cybersecurity Dream Team shapes up:
    The security team
    1. Incident Handler: The goalkeeper, always ready to block threats and recover from attacks.
    2. Malware Analyst: The defender who tackles malicious players (malware) and keeps them off the field.
    3. SOC Analyst: The sweeper, constantly scanning the field for suspicious activity to prevent attacks.
    4. Threat Intelligence Engineer: The playmaker, analyzing the opponent's strategy and planning countermeasures.
    5. Security Engineer: The solid midfielder, building a resilient defense and ensuring the game flows securely.
    6. CISO: The captain, leading the team with strategy, vision, and oversight.
    7. Security Architect: The tactician, designing the winning formation (secure infrastructure).
    8. Security Consultant: The team’s engine, delivering expert advice and strategic "passes" to ensure both defense and attack operate at peak performance.
    9. Pentester: The striker, finding and exploiting weak spots in the defense (but for good!).
    10. Ethical Hacker: The winger, always pushing boundaries to test the team’s resilience.
    11. Red Teamer: The challenger, simulating real-world attacks to prepare the team for anything.
    Together, they form an unbeatable force, each with a unique role to ensure every play (whether defense or attack) is executed flawlessly. (Credits to @Aliou FALL.)

    W-2.2.4 Continuity monitoring with anomalies known internal processes
    operational Tech safe1
    Monitoring, Network - Storage
    Organizations are debating the need of a SOC, what kind of SOC and which components their SOC should include. SOC Roles and Responsibilities .
    SOCs can provide continuous protection with uninterrupted monitoring and visibility into critical assets across the attack surface.
    They can provide a fast and effective response, decreasing the time elapsed between when the compromise first occurred and the mean time to detection.

    Product & Service continuity
    The effects of the SOC centre is directly related to what external customers are experiencing. Therefor colour brown is chosen although the others in this area are green, technology.
    There is a continuously feed back knowledge needed of the organisational needs. Therefor an activity with the colour magenta is present in the SOC interaction.

    Monitoring, Processes - value stream flows
    Knowing how processes are normal functioning, how value streams are normally behaving is learning from measurements. Learning from information, data. This is contionously changing evolving approach, applying AI is in a hype.
    Secure AI Access by Design , enabling Safe Usage of GenAI Apps. The rapid proliferation of GenAI apps, coupled with their unique characteristics and evolving AI ecosystems have introduced new security challenges. Empower your security teams to not only keep pace with the latest GenAI apps but make informed risk-based decisions about which apps to sanction or tolerate.
    These policies can be customized based on user roles, departments or specific data uploads, helping ensure that AI apps are used in compliance with your organization’s security and governance standards.
    The questions in this: what are the " organization’s security and governance standards"?
    From: "How CISOs Are Supercharging Their Teams With Generative AI Augments" (gartner 2024, William Dupre, Anthony Carpino, Nader Henein, Kevin Schmidt), notes for GenAI.
    The initial hype around GenAI rushed many organizations into adopting the technology without much in terms of planning. Scenarios like this come with a high rate of risk because, outside of some fringe cases, the reward will never match the hype. The results are often months of trial and error, followed by a retroactive assessment, a financial write-off and potentially a sacrificial executive departure, depending on the size of the write-off. The bigger impact will come later, in the form of opportunities lost when the rollout of generative capabilities is delayed. The paradox, failure by: "We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run." ( Amara's law)
    Feel lost Several examples for AI usage, one of them (no 3): The assumption of the required creativity could be automated trustworthy is questionable.
    Build modern02

    W-2.3 Information systems: Actuators - Steers

    Using a system is simpler than designing those actuators in the construction.
    ❗Aspect Processes topics are: A viable system is non trivial, a repeated structure in every layer. Every layer has their actuators to manage by observing for what is needed. Without knowing the shared goal, mission, there is no hope in achieving a destination by improvements.

    W-2.3.1 Communicating a shared value, mission for understanding
    A history for he most complex social system: top-down
    A short extract from the introduction "conversations for action" (fernando flores). Argues that certain speech acts, particularly requests, promises, offers, assessments, and declarations, serve as building blocks for activating and fulfilling commitments in working relationships and, hence, in organizations.
    The essays in his book are all about how to effectively make commitments that allow us to create something of value, to generate value for ourselves and for others in the world. In essence, they are about instilling a culture of commitment in our work with others, whether that be in an organization, our own start up, or even in working together as a family to get ahead or raise children. He was anticipating what would become the greatest challenge of capitalism hence far: unregulated free markets that coexist with value creation for the world at large.
    The point is that people work together to produce value, not just for self interest.
    The networks of commitments/conversations for action framework for designing organizations makes explicit who is creating value and for whom value is being created, and what are the promises being completed that act as value producers at every step of the way.
    The core business has to think about how its products, manufacturing processes, business processes, employee relations, services, and role in the community impact the world.
    Designing work to produce value is very different from designing work for maximizing the self-interest of each party involved. Fernando Flores developed a unique theory of work and organizations that has had numerous practical applications.
    The seeds of these classic works were first developed in his dissertation, “Management and the Office of the Future,” which was written in 1980.

    A system without classical hierarchy: Cybersyn
    A viable system according CyberSyn (1970-s) ViSM is a different context than the value stream VaSM.
    On July 13th 1971 Stafford Beer received a letter from Fernando Flores, then President of the Instituto Technologico de Chile, and Technical General Manager of Chile's equivalent of the National Enterprise Board, which had been charged with the wholesale nationalisation of the economy. Flores spoke of the "complete reorganisation of the public sector of the economy" and said he was "in a position from which it is possible to implement, on a national scale, at which cybernetic thinking becomes a necessity, scientific views on management and organisation". ...
    The entire story has been told on several occasions, but some accounts miss the essential nature of this, and indeed all VSM applications: the key is to enhance and encourage autonomy at all levels (as the only way of dealing with environmental variety) but to ensure that the autonomous parts work together in a harmonious, coherent fashion and thus enjoy the synergy which comes when parts join together to create a whole-system.
    Simple ViSM
    The viable system as a whole
    A viable system according Stafford Beer (1960-s) ViSM is a different context than the value stream VaSM.
    An understanding of the theory begins with the observation that operational units must be as autonomous as possible, and thus Beer's model of sees any organisation as a cluster of autonomous operational parts which bind together in mutually supportive interactions to create a new, larger whole system.
    The job of management is to provide the "glue" which enables this to happen. he diagram shows the three main elements: System-1: The operation. The operational units are given as much autonomy as possible so they can respond quickly and effectively. This is limited only by the requirements of system cohesion.
    System-2: There will be conflicts of interest which must be resolved. Harmonise interactions, to keep the peace, to deal with the problems. Without this the system would shake itself to pieces.
    System-3: is concerned with synergy. Look at the whole interacting cluster of operational units from its meta-systemic perspective. Considering ways to maximise effectiveness through collaboration.
    System-4: ensures the whole system can adapt to a rapidly changing and sometimes hostile environment. It scans the outside world in which it operates, looks for threats and opportunities, undertakes research and simulations, and proposes plans to guide the system through the various possible pathways it could follow.
    System-5: Rules come from System 5: not so much by stating them firmly, as by creating a corporate ethos, atmosphere: identity, ethos, ground rules under which everyone operates.
    Re-thinking the workings of any organisation in these terms. Take any enterprise and identify the operational parts. Questions to answer: As the process continues a diagram something like the figure shown above will develop. Once this is complete, the diagnosis can begin:
    This is a real holistic way to look at organisations, systems, it avoid the technical beliefs.
    W-2.3.2 Communications, variety & velocity and regulators
    VSM, multiple information channels
    Viable System Model (Michael Frahm)
    The static facet of the VSM involves analyzing present systems using its framework. The VSM is a strong homeostat. The VSM can be very well combined with other methods like lean management, scrum, OKR and others.
    This framework process goes beyond system viability, addressing issues within the corporate structure, and the structural and procedural organization. The objective is to uncover cybernetic insights and pinpoint any absent elements by employing a cybernetics oriented checklist. This serves as a foundation for the conceptual design of an enhanced system, ensuring a comprehensive consideration without the risk of overlooking crucial asp ects. The VSM can be used for design, analysis and diagnosis. ...
    and six vertical information channels:
    1. Intervention Regulation
    2. Allocation of Resources
    3. Operational Interrelationships
    4. Interrelationships of the Environment
    5. Coordination (Sympathicus) System 2
    6. Monitoring (Parasympathicus)
    Moreover, within the Viable System Model, there exists an algedonic channel and transducers. Algedonic signals, serving as alarm signals, convey either positive or negative messages directly into System-5. Transducers, acting as converters, establish the interface between subsystems, guaranteeing the preservation of information authenticity.

    Autonomy vs. Alignment: an important conflict wherof the outcome should never be resolved.
    Viable System Model (Michael Frahm)
    The organizational management can only be as good as the model on which it is based. ... Dealing with megaprojects means dealing with the functioning of complex systems.
    There two basic priniples aside a lot of others:
    W-2.3.3 Communications, variety & velocity within systems
    viablity the ability to survive or live successfully
    The viable system (VSM) as a whole VSM (Michael Frahm, Dr. Martin Pfiffner - research gate)
    The predominant model of organizations in the past was the machine: A more or less complicated construction designed to perform a more or less well-defined task. We still use this model when drawing organizational charts and describing processes. But a machine does what it does. Its predetermined behaviour keeps its variety low.
    A model of much higher variety is the model of the living organism. ...
    Simple'VSM system-3 operations Todays management practice deals only with two of three organizational dimensions. As a rule, however, we neglect the third dimension: the neurology of the organism. Variety is both in horizontal and vertical lines in the strcuture. The system can contain subsystems in the same structure. Reducing variety at the higher and lower level at the cost of the complexity managing subsystems.
    Simple VSM recursive This is the most important dimension in modern projects because it helps managers cope with complexity and dynamics. System 3 (i.e. operational management) has several communication channels at its disposal. These allow it to take well-informed decisions as well as to implement them even if they restrict the autonomy of System 1 (i.e. operations).
    Please note that we are talking about a control and communication structure here, and not about boxes in an organizational chart. In the VSM, we no longer enter names in the System 3 box.
    Instead, we ask a crucial question: What mission-critical tasks must System 3 perform, and who is involved? Quite often, the same person is involved in different control functions, and thus "wears different hats".

    The viable system as a whole, floor level 0-1
    Categorizing an inventory of processing topics for secure information management (SIMF). The result presenting it using nine areas is (see figure):
    SIMF n3

    There was no immediate associations with ViSM (Viable System Model), but:
    W-2.3.4 Product vs Service provider & Top-down vs Bottom-up
    Autonomy vs. Alignment: an important conflict whereof the outcome should never be resolved.
    The identity has important consequeunces. Produktanbieter oder Dienstleister? (blog Conny dethloff "Diagnosis of organizations with the VSM")
    When breaking down an organization into operational units, the VSM systems-1, this question is crucial:
    Knowing that most product providers also offer services around their products, this 0-1 decision should still be made as it has implications for the organizational design, namely: Let's take a trading organization and go through both cases. Because of the necessary differences between the operational units, it is easy to see that the "commerce" and "platform" business models should not be executed by one and the same organization, otherwise neither of the two can really be served well from an organizational design perspective.
    Paradoxes in an organization increase variety and the range of actions. One could also say that without paradoxes an organization would operate in a way that is too simplistic and would neither be able to react appropriately to market surprises nor provide them with any. Organizations need paradoxes. Task force mode therefore only works for a short time at best.
    .
    Hierarchy levels VSM person to conglomerate
    Top-down VSM vs bottom-up VSM.
    Having the idea on what viable systems is about there are the following questions: What is seen in many examples is about analyzing systems top-down.
    A bottom-up design and build is missing for viable systems. The natural evolution is building those from the bottom into complex systems, going into complex systems build on complex systems.
    The bottom-up approach has become to live.
    New insights: The first start for building new planes is when the team becomes too big. A stable point is achieved when a division is completed.
    explore landscape

    W-2.4 Roles tasks in the organisation

    Managing the working force at any non trivial construction is moving to the edges.
    ❗Aspect: Communication, cultural changes are: Every layer has their actuators people to manage for what is needed. Only knowing the shared goal, mission, there is hope in achieving a destination by improvements.

    W-2.4.1 Team member and organic system roles
    team diversity - roles I
    Belbin Team Roles Building Effective and Balanced Teams for Success.
    Dr Meridith Belbin developed the Belbin Team Roles Theory in the 1970s, based on how individuals perform in a team environment. ... What came out of the experiment was that particular individuals gravitated towards certain roles when working in a team context. Role balance within a team was found to be crucial to the positive and timely outcome of a task.
    It is easy to see this in everyday life. When a team performs well, be it in sport, school, projects or general business, you can see that there is a degree of uniformity, whereby everyone knows what they are doing and how to do it. Everything looks easy and well-structured and success typically flows through the team. ...
    Belbin Team Roles can be split into three different behaviours: Each function is associated with typical team work behaviour and interpersonal strengths and weaknesses.
    The goal:
    Belbin Team roles three layers
    team diversity - roles II
    The Belbin Team Roles are as follows: Belbin team roles are a good indication; a great way to analyse the makeup of your team, but you should not use this model as set in stone. After all, we rarely live in a perfect world and what looks good on paper proves tricky to perfect in reality.
    Another belbin reference part of a training knowledge, Belbin Team Roles explained . Competencies includes a vast array of skills, from IT expertise to an understanding of production methodologies. This is what we call the 'task focus', the primary force behind accomplishing the job at hand. This relates to how something collaborates within a group and boosts its overall efficacy. It's not just about getting the job done; it's about the process and the dynamics of how it's achieved.
    Belbin Team roles 9 areas
    The original Belbin figure is modified to align to the SIAR model supporting a full cycle in the PDCA and 10 detailed steps.

    Except for the coordinator there are no two of the same group at the sno In a figure:
    see right side


    W-2.4.2 The ignored Engineer executing everything
    ViSM: some important principles
    Aside the principles about variety in the system and velocity of the communication signals there are many more principles in Viable System Model (Michael Frahm):
    Theorem of recursive systems: If a viable system contains a viable system, then the organizational structure must be recursive. Using the same organizational genetic code by applying the VSM, complexity is thus managed.
    Self organization principle:

    W-2.4.3 Mediation technology: functionality - functioning
    ViSM balances
    VSM principles and balances
    When discussing variety flows, we are qualitatively addressing the organization's ability to manage the ratio between disturbance variety and system reaction within each relationship. It also pertains to the organization's capacity to cope with the inherent variety or com plexity. In a dynamic VSM perspective, understanding variety in systems is akin to interpreting a weather map, with fluctuations in low and high pressure areas that evolve over time.
    To gain a deeper understanding of the VSM's dynamic perspective, consider these five significant variety balances:
    1. Workload
    2. Line balancing
    3. Autonomy vs. Cohesion
    4. Change Rate
    5. Change vs. Status Quo

    ViSM: recognizing problematic patterns
    Viable System Model (Michael Frahm)
    The following is just a brief introduction to recurring problematic patterns, which are referred to as pathological archetypes and are suitable for identifying and communicating problems in systems through the viable system model:
    W-2.4.4 Interactions in the organic viable system
    Power and the edge
    Power to the Edge (David S. Alberts, Richard E. Hayes 2003) The source is defence but mentioned is that is generic appplicable.
    An organization's power is also a function of the power of its members and the nature of the interactions among those members. Organizations realize their potential power by instantiating mission capability packages. ... In a hierarchical organization, one with a topology organized by status and power, those at the top are at the center and those at the bottom are at the edge. In addition, there is a significant portion of the organization in the middle. Those at the top have the power to command, to set the direction for the organization, allocate its resources, and control the reward structure. Information flows along the axes of power, hence these flows are vertical. Information collected at the bottom flows vertically to the top, and directives flow vertically from the top to the bottom. The middle is needed to deal with the practical limits on span of control. The middle serves to mediate and interpret information flows in both directions, allocate resources, and delegate authority. ... Worst of all, stovepipes result in cultural differences and tensions between and among different parts of the organization. ...
    In the Industrial Age, stovepipes were necessary because the economics of information made it prohibitively costly to support widespread information sharing and peer-to-peer interactions. ... The adverse affects of stovepipes often come to light as a result of a catastrophic failure. ... The only way to ensure that information will be shared and that individuals and organizations will work together appropriately is to move power to the edge.
    (page 173- 176)
    Beyond individuals
    The puzzles were meant to be so demanding that no individual could possibly complete them all. But immediately after the discovery of the game on the Web, teams of curious players developed organically across the country. Working together, their combined knowledge allowed them to complete the first 3 months' worth of game content in only 1 day. These teams excelled at solving problems, and they could do so at surprising speeds. However, learning the work processes associated with information sharing, exploiting collective knowledge, and conducting the efficient, authoritative collaboration will require establishing new mind sets (education and training) as well as new tools.
    Without being able to fall back on traditional approaches to strategic planning, without being able to rely on intuition, from where does leadership and direction now come? The answer for industry is the same as for the military; constantly dealing with unfamiliar situations places a premium on agility in all of its dimensions. The approach to developing the agile organization, the Information Age approach to command and control presented in this book, is based on the application of power to the edge principles. This enables an enterprise to bring all of its available information and its brain power to bear by allowing information to be recombined in untold ways and by allowing individuals to interact in unplanned ways to create understandings and options not previously possible. ...
    Four minimum essential capabilities are required for a given operation:
    1. The ability to make sense of the situation;
    2. The ability to work in a coalition environment including nonmilitary (interagency, international organizations and private industry, as well as contractor personnel) partners;
    3. Possession of the appropriate means to respond; and
    4. The ability to orchestrate the means to respond in a timely manner.
    Three of these four essential capabilities involve command and control. The third is about the tools of war and policy implementation.
    (page 90-98)
    Power to the edge
    Power to the edge involves changes in the way we think about the value of entities and desirable behaviors and interactions. Ultimately, this involves a redefinition of self and the relationship between self and others, and self and the enterprise. Thus, in order to move power to the edge, we need to do more than redraw an organization chart; we also need to change what is valued and the way individuals think and behave. We need to rethink the way the enterprise is motivated and led. We need to revamp processes and the systems that support these processes. We need to reeducate and retrain. ...
    The concept of adaptability (changes in organization and work processes) is a crucial element of agility. However, it directly contradicts Industrial Age solutions of complexity, decomposition, deconfliction, specialization, and optimization. ... However, a network topology alone will not achieve the desired result; it does not create the conditions necessary to achieve productive self-synchronization. To complete the package, a suitable approach to command and control must be developed to leverage the capabilities provided by a robustly connected network topology.
    (page 181- 186)
    Dimensions Floor

    W-2.5 Sound underpinned anatomy of a viable system

    Understanding the position, situation by understanding the system.
    ❗Aspect: Information, types of association relations: A viable system is non trivial, it will be repeated in structures in every layer.
    Conscious lead of a system needs only the information for what is relevant for understanding what is going on. Using the knowledge of the anatomy enables to limit the set of information flow for improvements.

    W-2.5.1 Fundaments of activities processes (0-1-2, 4-5)
    The enterpise organisation, viable system model
    👁 Industrial age: the manager knows everything, workers are resources similar to machines.
    👁 Information age, required change: a shift to distributed knowledge, power to the edges.
    A viable system according Stafford Beer ViSM Added to the usual viable system model is:
    The enterpise organisation, system-5 executive
    When the product service is what is about, the CPO (Chief Product Officer) has a pivotal role.
    An abstracted proposal for a structure: All of them are universal exchangeable to other type of enterprise.
    Positions within the green areas are changed when the context is changed between operational or change, innovation.
    hierachy 9 areas
    Top-down theoretical view:

    Figure, see right side

    The enterpise organisation, system-5 executions
    When the product service is what is about, the CPO (Chief Product Officer) has a pivotal role. A CPO is also accountable responsible for the coordination at the floor, empowering people.
    An abstracted proposal for a structure: All of them are universal exchangeable to other type of enterprise.
    Positions within the green areas are changed when the context is changed between operational or change, innovation. Lean 9 areas
    Bottom-up practical view:

    Figure, see right side

    SIMF the foundation floor 0-1
    Some peculiar interesting attention points: In a figure: SIMF n3


    W-2.5.2 Operational deliveries, functioning portfolio (1-2)
    SIMF the value stream in information processing
    A full complete generic value stream flow in a cycle with a pull-push.
    Some peculiar interesting attention points: In a figure: SIMF run build  devops complete


    W-2.5.3 Changing products, services, functionality portfolio (2-3)
    SIMF changing the vale stream
    A full complete approach for creating & changing value streams in managed suggestions, backlog for requirements in a cycle with a pull-push. This is a segregated from system-4 and
    Some peculiar interesting attention points: In a figure: SIMF modify build  devops complete


    W-2.5.4 Autonomic compliancy control & conscious decisions (3-4)
    SIMF the foundation antipode, controlled change.
    When C&C gets more mature there are options in proactive starting activities by risk evaluated changes (system-4). What gets attention and what gets ignored is the identity, ethos, ground rules. These should be an indispensable part of the vision.
    The technical peculiar interesting attention points: In a figure: SIMF c3 command control


    Confused-2

    W-2.6 Maturity 3: Enable strategy to operations

    From theoretical to practical needing the collaboration.
    ❗Aspect: Purpose, value, interrelated areas in scopes: Only having the focus on others by Command and Control is not complete understanding of all laysers, not what Comand & Control should be.
    Each layer has his own dedicated characteristics.

    W-2.6.1 SIMF-VSM Safety with Technology at Technology
    How to act in a situation, plan driven vs goal driven
    When to choose a plan or a goal, Agile Cynefin
    I believe the simplest explanation of Agile has its roots in military warfare. Understanding Agile begins with understanding friction and how it affects our plans, actions and results. ...
    Why does this matter? Well, the level of friction we face determines the amount of surprises and the extent to which we can rely on planning and prediction. When what we’re doing is Clear or Complicated, plan-driven approaches work well.

    Clear or complicated, is what I have labelled as: trivial. A plan driven approach will work but is an overkill for the clear situation.
    When plan-driven approaches work, where we can plan and predict while leaving the goal implicit and embedded in our plans, then we don't need Agile approaches.
    Complex Those , complex or chaotic, is what I have labelled as: non-trivial.
    It is important to don't get lost in confusion.
    When we want to people to do what is expected of them, let them define the plans and actions, and report them back to the higher levels. When our actions don't pan out as expected, let the people that do the work adjust plans and actions as necessary in line with the intent of the original plan. ...
    When we can't adequately plan and predict to achieve the desired results, we should switch towards goal-driven approaches. We should start with humble plans that are adjusted as we learn and discover what’s necessary while we do the work.
    Why does it matter?
    In complex systems there exists algedonic channels and transducers.
    Principles: Safety with Technology at Technology

    W-2.6.2 SIMF-VSM Uncertainties imperfections at processes, persons
    Two-valued logic and liveliness
    Viable systems and Polycontextual Logic (PCL), "The Viable System Model as a transclassical organizational model" ( PKL VSM Conny Dethloff 2017)
    I was asked to explore and describe the similarities between Stafford Beer’s Viable System Model (VSM) and Gotthard Gunther's Polycontextual Logic (PCL). My suspicion of some similarities was certainly there, since the VSM is a model for liveliness and the PKL is a formal language for modeling liveliness. The PCL, designed by Gotthard Günther, represents a formal theory that makes it possible to model complex, self-referential processes that are characteristic of all life processes in a non-reductionist and logically consistent manner.
    The problem at modelling human actions: This is why this fact of trivialization is so dangerous.
    Please do not confuse this with multi-valued logic.
    Kore The PCL includes the person making the statement and does not just deal with the statement itself. That's why this logic is often called multi-digit or location-dependent logic. Often, "place" is used instead of "location". It therefore addresses where someone is standing who is making a statement. Each person making a statement makes their statement on the basis of two-valued logic.
    Now here comes the trick. dillema in duality With two-valued logic, this quasi-objectification is created outside the logic framework because this framework does not know any mediation. Only when this mediation has been done, for example in values of "yes", "no", "maybe", etc., can the logic be applied. ...
    The clue, novelty of VSM is not the individual systems 1 to 5, but the reflexive, interrelated structure between the individual systems. ... We humans are capable of acting polycontextually because we are alive. However, since we are not able to model this ability in the classic sense.
    As a result, people in binary systems are always caught "between the devil and the deep blue sea". Dichotomous poles: There must be no hierarchy and therefore no priority between these pairs of values. They must be treated equally, but this is not possible in the classic models.
    Why does it matter?
    Because the real world is full of uncertainties imperfections we should not ignore that in our models and assumptions. When we ignore that will create bad systems with undesired behaviour.

    Principles: dichotomies, uncertainties for inputs and results

    W-2.6.3 Dichotomy: generic approaches vs local in house
    Project manager centric
    Product-based vs Project-based
    A project managers perspective by a nice cycle in the same orientation that is used following the SIAR model. The post attention was for the image, agility for projects: Topic: Project Manager in a Product Based Company? Key difference: Product-based PMs work on roadmap-driven initiatives, while project-based PMs focus on client-specific solutions.
    Team member balancing the construction of a system
    The Belbin figure is adjusted in the related paragraph (W-2.4.1). Goal: fit into the SIAR orientation and directions. Communication between persons in a system will impact the system.
    Details on topics that made in the paste
    Data information chain links:
    feel_longroad01.jpg
    Reference Topic
    👓 Performance OS Performance OS level
    👓 EL constructs Etl constructs & performance
    👓 Data flow Data lineage & xml, json
    👓 NLS National language support
    👓 Scheduling Scheduling

    Master data links:
    feel_longroad02.jpg
    Reference Topic
    👓 naming conventions Naming artifacts
    👓 data receive&send Transport of data - information
    👓 information pull request Requesting data -information as pull
    👓 private metadata a private metadata approach
    👓 Securing applications Securing Technical & Business (SAS)

    Dichotomy: generic approaches that are insufficient secure and special local builds to get it secure. personal frustrations resulted in some local builds. Examples using SAS, code: feel_brains_06
    Source Description
    xkeypsw having a password that could be reused in a wrong way
    Using a manageable Password vault without needing obscurity.
    xgetsetpsw Synchronise account stored obfuscated
    reading re-using and storing a obfuscated user password combination.
    xmetadirlst Definitions of data connection obfuscated
    reading to visible usable syntax.
    .. failing home dir definition, missing saswork, wrong pwd, java /tmp
    correcting run time settings.
    .. Dictionary database processing synchronise (users/rights).

    W-2.6.4 SIMF-VSM Multidemensional perspectives & revised context
    SIMF ViSM: system-2 & three dimensions
    Principles: dichotomies, uncertainties for inputs and results

    SIMF ViSM: the functional perspective.
    In a figure: SIMF ViSM functional


    SIMF ViSM: the technical perspective.
    In a figure: SIMF ViSM technical


    SIMF ViSM The sympathic verticals extended to the floors.

    🎯 I_Sage I_Serve C_Edge C_Vision ✅-dimensions CMM5-SIM 🎯
      
    🚧  👁-GAP T_Value C_Steer C_Culture ✅-logic CMM3-SIM 🚧
      
    🔰 Contents I_Floor  C_Tasks  H_Culture C_Theory CMM0-SIM 🔰


    W-3 Command & Control planning for innovations


    Alchemie

    W-3.1 Information processing in the information age

    Information processing, administration using machines tools is a rather novelty for mankind. Status: Exceptions are successful organisation everyone wants to copy.
    👉🏾 Preach: set the purpose, customer central. ✅ When the service for a customer is the core value dot it in a effective efficient way: no overburdening, no unnecessary complexity.

    W-3.2.1 Master data, understanding information
    Naming artefacts
    Naming conventions, when done correctly, are narrowing down a complex environment into many smaller environments. Smaller environments with less challenges are more easy to solve.

    A book library has a fine tuned labelling (naming) convention to be able to find and store a huge number of books.
    For a information system is needed:
    sheltered area.jpg
    Invented in house or a bought solutions.
    👓 A proposal for a naming convention. My intention once to bring this fully into a production environment.

    The important segregation of the tool from the business process was after that clear.
    feel_brains_06
    Invented in house or a bought solutions.
    When the problem to solve is a standard well known one there would be a good chance there is commercial software available for that. Building and maintaining once for many is usually cheaper and giving more functionality than building it yourself.

    When buying a solution for a process:
    There is no way out in avoiding responsibility for the own organsiation.
    Requesting data - Information as pull, Volatile metadata
    The full stack request interactions of information starts with questions: This is similar to defining the pull question.
    receiving safe data
    👓 A full stack information flow including the request and the basic delivery. Executed as small project at a regulator. Starting at IV goes to III connecting to better known I and II. The order got mixed up by historical BI approaches I and II.

    Delphi_odenon.jpg
    W-3.2.2 Definitions information technology: master data
    What is a business application?
    A business application is defined by:
    1. Composed of two complementary components.
      • Information at the value stream seen materialised as "data".
      • Transformations of information in the value stream, "processes".
    2. Materialised data is seen at some type of storage.
    3. Transformations are processed by tools, platforms.
    4. Covers the value stream for customers and
      all related activities, documentation, registrations.

    What is a Platform?
    Platforms are the combination of tangible goods (hardware) and intangible and services (software & support) that are enabling the business applications.
    Detailed atributes are:
    1. A platform is composed of many complementary components.
      • Tangible products, goods (hardware): servers CPU-s GPU-s-s memory, network components, cables, storage, etc.
      • Intangible products, services (software): operating system, databases, communication, programming tools, etc.
      • All products, goods &services, are at some support level by a suplier for support
    2. Have a defined functionality.
      Specficiations are how functionality is defined and communicated.
    3. Have a defined way for functioning.
      Usage instructions are how that is defined. An education and certfication program is a way for communication when usage is non-trivial.
    4. have a defined set of maintenance instructions.

    Business applications, transformation types
    Three types of business applications transformations:
    1. ALC-V1 A process that is run once.
      When after each run many adjustments are needed, then it is also a one-off.
    2. ALC-V2 processes with transformations are based on rules set by human decisions. Processes are repeated many times without change. A change in processes is versioned with specifications. Development and verifications is done with fake, synthetic information.
      ❗ Only the production environment uses operational information.
    3. ALC-V3 processes are based on what is seen in the operational information and what is known by operational examples. Processes are repeated many times without change. A change in processes is versioned with specifications. Development and verifications are done with operational information.
      ❗ All environments are using operational information. Segregation between the stages is important but not the same as at ALC-V2.

    Business applications, context
    Two contexts of business applications:
    log_legal1.jpg
    W-2.3.3 Data lineage as a value stream
    Realizing data lineage with understanding data.
    Data lineage is often mentioned as being important. The goal is following the flow of information in the logical process.
    During technical realisations it gets lost by the limited focus on the technical tools.
    A private metadata approach
    The challenge is how to manage the metadata when the data -information- doesn&acutt follow the well known solutions.
    Describing the problem that is solved.
    receiving safe data 👓 A private metadata naming solution.

    Executed as small project at a regulator.
    Technical details what has done.
    All this is based on private metadata tables. Some have the workable "valid-from" "valid-thru" indicators. The basic metadata table is based on a naming convention hierarchy for elements that can be a number or a string. The table being exchanges is having just three columns. Within that table being exchange there are string elements that are defining the delivery type and origin.
    There are many other often used approaches. This one has several advantages over those.
    feel_brains_06
    Data lineage, commercial standard tools
    There is something weird with commercials solutions for metadata and data lineage. There is a duality in the type of artefacts being stored and maintained.

    That is: Those dedicated topics should be handled and discussed separately.
    Olympia_odenon.jpg
    W-2.3.4 Strategy conflicts securing platforms
    Data - Software, Security Access (SAM).
    Using standard commercial solutions get along with the external guidelines of the supplier. These guidelines are possible conflicting with the organisations goals standards and compliancy by regulations.
    Some challenges are:
    1. preventing data breaches (leaking information).
    2. Having the availability as needed by the organisation.
    3. Ease of the requested functionality by the organisations.
    4. Underpinning of behaviour by monitoring and logs for the organisation.

    Example securing SAS
    SAS is delivering a complex environment with a lot of components. Their solutions are build of comments and than adding some dedicated logic and/or data to that.
    The process of installing and configuring has many steps and is never fully complete.

    setting up SAS mediated access 👓 In my ING era (banking / insurance) a complete design and setup was done.
    The requirements of the organisations being in the lead over the instructions of the external vendor.

    Other issues aroused with architects not wanting to be compliant for the set regulations. Reviewing the issues and my approach I am convinced it is still correct.
    Pitfalls with middleware application systems.
    Some generic ones are:

    Build modern03

    W-3.2 Floor plans, optimizing value streams

    Building any non trivial construction is going by several stages. These are: Non trivial means it will be repeated for improved positions.
    👉🏾 Practice what your preach. ✅ When as a service provider the real lean culture is promoted for customers the service should be according the real lean service culture.

    W-3.2.1 Information quality & risk rating
    operational Tech safe1
    Service as a Product, Information processing
    Communication acting at the viable system
    CapCom: the primary point of contact and source of truth about the state of the system.
    In IT Service management the goal of acting reacting got lost, incidents, problems, changes.
    👉🏾 CapCom these are not the attributes known from ITIL but are reverted to the source: the incident with apollo 13. The time to react on an issue is important. Variations: Able to communicate within all levels is a prerequisite for able to react in time.
    👉🏾 There is a duality in being very safe but not having the service available and running the service but that service has known safety issues. To balance in the conflicts is a task role not to combine with either of the conflicting sides, segregation in duties.
    Incident response readiness, education mandatatory internal
    EU directive NIS2, the CapCom: article 1
    Member States adopt national cybersecurity strategies and to designate or establish competent authorities, cyber crisis management authorities, single points of contact on cybersecurity (single points of contact) and computer security incident response teams (CSIRTs).
    EU directive NIS2, Also requires educations for executives: article 20
    Member States shall ensure that the members of the management bodies of essential and important entities are required to follow training, and shall encourage essential and important entities to offer similar training to their employees on a regular basis, in order that they gain sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices and their impact on the services provided by the entity. Confusing: prodcuts with digital elements
    is not technology neutral defined. The assumption of simple devices would be different to complicated and complex or even chaotic is not underpinned.
    Risk rating, readiness
    This is a standard activity. A split in technology related risk and fucntionality risks is not made yet although this is by nature of a system logical to do. An open source option: Ravib
    Risk matrix The purpose of this tool is to register risks in order to control them. Controlling risks requires knowing your risks, assigning them to people who actively deal with them and keeping track of the measures that mitigate those risks. This tool supports in that. This register is just a tool.
    👉🏾 How well risks are controlled depends on how well the responsible people deal with them.


    Technical resource qualities
    Metrics: kpis
    W-3.2.2 Chain of Information change & Master data Context
    operational Tech safe1
    Service as a Product, Information processing

    Security operations Storage

    Security operations Processes
    On the basis of the cybersecurity risk assessment referred to in Article 13(2) and where applicable, products with digital elements shall: (a) be made available on the market without known exploitable vulnerabilities; (b) be made available on the market with a secure by default configuration, unless otherwise agreed between manufacturer and business user in relation to a tailor-made product with digital elements, including the possibility to reset the product to its original state; (c) ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-out mechanism, through the notification of available updates to users, and the option to temporarily postpone them; (d) ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access; (e) protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means; (f) protect the integrity of stored, transmitted or otherwise processed data, personal or other, commands, programs and configuration against any manipulation or modification not authorised by the user, and report on corruptions; (g) process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation); (h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks; (i) minimise the negative impact by the products themselves or connected devices on the availability of services provided by other devices or networks; (j) be designed, developed and produced to limit attack surfaces, including external interfaces; (k) be designed, developed and produced to reduce the impact of an incident using appropriate exploitation mitigation mechanisms and techniques; (l) provide security related information by recording and monitoring relevant internal activity, including the access to or modification of data, services or functions, with an opt-out mechanism for the user; (m) provide the possibility for users to securely and easily remove on a permanent basis all data and settings and, where such data can be transferred to other products or systems, ensure that this is done in a secure manner. Manufacturers of products with digital elements shall: (1) identify and document vulnerabilities and components contained in products with digital elements, including by drawing up a software bill of materials in a commonly used and machine-readable format covering at the very least the top-level dependencies of the products; (2) in relation to the risks posed to products with digital elements, address and remediate vulnerabilities without delay, including by providing security updates; where technically feasible, new security updates shall be provided separately from functionality updates; (3) apply effective and regular tests and reviews of the security of the product with digital elements; (4) once a security update has been made available, share and publicly disclose information about fixed vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities; in duly justified cases, where manufacturers consider the security risks of publication to outweigh the security benefits, they may delay making public information regarding a fixed vulnerability until after users have been given the possibility to apply the relevant patch; (5) put in place and enforce a policy on coordinated vulnerability disclosure; (6) take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements; (7) provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner; (8) ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.

    W-3.2.3 Information knowledge qualities by product, service
    operational Tech safe1
    Applicable correctness, traceability
    Those interacting to the external customers should have this in liablity of the organisation.
    Purpose explainable for impact

    Innovation impediment
    Information knowleddge
    Why 'If It Works, Don’t Touch It' Limits Potential
    Many programmers and organizations stick to the "If it works, don’t touch it" mindset. It feels safe and reliable; after all, if something isn’t broken, why change it? But this way of thinking has its limits. Instead of exploring why and how things work, it can lead us to avoid improvement and miss opportunities to innovate.
    In dynamic fields like cybersecurity, AI, and technology, this approach can actually prevent us from keeping up with new challenges. On the other hand, the scientist’s mindset pushes us to constantly question, investigate, and refine. Scientists don’t stop at "It works." They ask, “Why does it work?” and “How can it work even better?” This curiosity leads to breakthroughs and solutions we wouldn’t find if we only focused on the status quo.
    By shifting from “If it works, don’t touch it” to a mindset of discovery, we open doors to growth and advancement. Let’s embrace the scientist’s curiosity to not just keep things running, but to improve and evolve them.
    (Credits to @Cyber Writes)

    W-3.2.4 Information impact by product, service
    operational Tech safe1
    Applicable correctness, traceability
    Those interacting to the external customers should have this in liablity of the organisation.
    Purpose explainable for impact
    Those interacting to the external customers should have this in liablity of the organisation. https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#anx_III Class I 1. Identity management systems and privileged access management software and hardware, including authentication and access control readers, including biometric readers 2. Standalone and embedded browsers 3. Password managers 4. Software that searches for, removes, or quarantines malicious software 5. Products with digital elements with the function of virtual private network (VPN) 6. Network management systems 7. Security information and event management (SIEM) systems 8. Boot managers 9. Public key infrastructure and digital certificate issuance software 10. Physical and virtual network interfaces 11. Operating systems 12. Routers, modems intended for the connection to the internet, and switches 13. Microprocessors with security-related functionalities 14. Microcontrollers with security-related functionalities 15. Application specific integrated circuits (ASIC) and field-programmable gate arrays (FPGA) with security-related functionalities 16. Smart home general purpose virtual assistants 17. Smart home products with security functionalities, including smart door locks, security cameras, baby monitoring systems and alarm systems 18. Internet connected toys covered by Directive 2009/48/EC of the European Parliament and of the Council (1) that have social interactive features (e.g. speaking or filming) or that have location tracking features 19. Personal wearable products to be worn or placed on a human body that have a health monitoring (such as tracking) purpose and to which Regulation (EU) 2017/745 or (EU) No 2017/746 do not apply, or personal wearable products that are intended for the use by and for children Class II 1. Hypervisors and container runtime systems that support virtualised execution of operating systems and similar environments 2. Firewalls, intrusion detection and prevention systems 3. Tamper-resistant microprocessors 4. Tamper-resistant microcontrollers
    Build modern01

    W-3.3 Why to steer in the information landscape

    Managing the goal for any non trivial construction follows several stages. These are: Non trivial means it will be repeated for improved positions.
    Managing the process, information is needed for understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

    W-3.3.1 Customer centricity value streams
    The AI act, what is an algorithm
    To classify an AI system as high-risk under the AI Act. This is a formal process: either you are a regulated product (Annex I) or a high-risk use case (Annex III), or you are not. There's little room for debate. There are four exceptions to this classification: When a data scientist manually builds these models, selecting variables and validating results step by step, it's clearly traditional statistical analysis. But modern credit scoring systems are a different beast entirely.
    They use automated logistic regression that: This autonomous inference of patterns from data is exactly what art. 3(1) AI Act targets when it defines AI systems as those that "infer, from the input it receives, how to generate outputs such as predictions." The logistic regression algorithm itself is performing this inference by mathematically determining which combinations of input variables best predict creditworthiness, without being explicitly programmed with these relationships.

    The AI act, what is an algorithm
    The distinction between "pure statistics" and "automated inference" isn't about the mathematical technique, it's about how autonomously the system operates in drawing conclusions from data. Consider three phases in actuarial evolution: This mirrors exactly why logistic regression can be "just math" and qualify as an AI system under Art. 3(1) AIA, it depends on the level of autonomy in "inferring from input how to generate outputs.". He amusingly noted how people viewed early actuarial systems as "fortune-telling machines" where "you insert a coin, and out rolls a paper predicting the future with infallible certainty.
    "They were shocked when two actuaries, calculations differed by 10&percent, as if writing down formulas could somehow eliminate the variation in underlying assumptions.
    AI is not about how much math you put in or how many nodes your neural net has. It's about letting computers loose, making up their rules and allowing them to inflict output on the world. ...
    Generative AI and the Ethical Risks Associated with Human-Computer Symbiosis
    The central philosophy of the tech pioneers proposed a synergy, a symbiosis or a partnership between humans and computers. For them, it would be preferable for humans and machines to work together cooperatively instead of not at all. That can be formulated as the central question for evaluating GenAI use: Is it better for a person to use GenAI or not? There exist multiple ways of understanding that question. At the big-picture level, it questions whether society would be better if people were to use GenAI. It may also be considered in a much more nuanced, detailed way; that is, for a particular use in a particular way at a partic ular time by a particular person, is it preferable to use or not use GenAI?
    While it may not be necessary to maintain the exact same values, it is important to note their early cautions. Their philosophy urges us to foreground education on the ethical use of AI—leaving a potential choice not to use it as the preferred ethical choice—and emphasizes the priority and value of human thought, creativity, and responsibility. Together with education, the social responsibility of tech companies and the need for rigorous governance systems have been highlighted in support of successful human-computer symbiosis using GenAI

    7s mckinsey model
    The 7S Model is designed to help organizations achieve their goals and implement change. It focuses on the importance of coordination over rigid structure in driving effectiveness. 7-s-framework
    To use the 7S Model effectively:
    1. Identify the seven key elements.
    2. Assess each element.
    3. Align them and identify gaps.
    4. Develop improvement strategies.
    5. Implement changes.
    6. Monitor and adjust as needed.
    7s 9s mckinsey
    It is a nice good model. Updating this model to what is seen and evaluted since then.
    Added: Combined: Achieved is alignment with the SIAR model an all other with the 4 quadrants and 9 areas as structure.
    When introduced in the late 1970s, the 7-S framework was a watershed in thinking about organizational effectiveness. A previous focus of managers was on organization as structure: who does what, who reports to whom, and the like. As organizations grew in size and complexity, the more critical question became one of coordination.
    Featured in the book In Search of Excellence, by former McKinsey consultants Thomas J. Peters and Robert H. Waterman, the framework maps a constellation of interrelated factors that influence an organization's ability to change. The lack of hierarchy among these factors suggests that significant progress in one part of the organization will be difficult without working on the others. Some 30 years later, 7-S remains an important tool to understand the complexity of organizations. Today, more than ever, structure alone isn't organization. 7-s-framework
    W-3.3.2 Customer centricity value streams
    W-3.3.3 Customer centricity value streams
    Changing products, services
    Obeya is a team spirit improvement tool at an administrative level, originating from a long history of learning & improving. It is considered a component of lean manufacturing. Obeya objectives are rapid decision-making, reduction in rework and reconsiderations, and reduction in unnecessary discussions. The Obeya Association enumerates 11 Obeya Principles that define Obeya and guide its improvement. ... A variety of different analogies have been drawn between an obeya and other real life systems and structures. One such example is the bridge of a ship, where many different crewmates come together to support the operation of a complex entity by allowing all roles to be connected and understood. Obeya has been described as "the brain of the system".
    Changing the organisational structure
    Unleashing the power of small, independent teams (2017)
    Small, independent teams are the lifeblood of the agile organization. Top executives can unleash them by driving ambition, removing red tape, and helping managers adjust to the new norms. hat does it take to set loose the independent teams that make agile organizations hum? These teams are the organizational units through which agile, project-based work gets done.
    The empowering executive:
    1. Focuses small teams in customer-facing areas
    2. Stacks small teams with top performers
    3. Gives teams a clear, direct view of customers
    4. Allocates resources up front, then holds teams accountable
    The independent team:
    1. Authorized to conduct activities without first seeking approval
    2. Has minimal dependencies on internal functions
    3. Builds and launches digital solutions on its own
    4. Draws on preassigned funding with no formal budget requested
    The enabling manager:
    1. Defines outcomes for teams to pursue as they see fit
    2. Acts as a steward rather than superior
    3. Prioritises problem solving over decision making
    4. Spends more time than usual on coaching and learning

    W-3.3.4 The question 6C-Control specific or generic?
    Risk and impact at results
    correctly manage the work
    Like the Roman God Janus, we gain perspective by looking both backward and forward. In looking forward we conclude that marketing is undergoing another paradigm shift and is increasingly characterised by having an institutional-wide focus. Balmer (1998, 2001, 2006) in observing the above, has given the label “corporate marketing” to the area. ...
    A corporate marketing philosophy represents a logical stage of marketing’s evolution and introduce a revised corporate marketing mix (the 6Cs) as an illustrative framework representing the key concerns that underpin this expanded viewpoint of marketing. ... "Can we, as an institution, have meaningful, positive and profitable bilateral on-going relationships with customers, and other stakeholder groups and communities?”.
    Each model employs different assumptions about the power/balance in the marketplace, the origin of consumer needs and desires, the type of consumer power exercised, the “warning” to consumers or business that pervades the marketplace, and the role of the marketer. To us, corporate marketing represents a logical fourth stage in terms of the above. ...
    For this reason the mix elements should be seen as informing an organisational-wide philosophy rather than as encompassing a mix of elements to be orchestrated by a department of corporate marketing. In essence, the philosophy of corporate-level marketing should permeate how people in the organisation think and behave on its behalf.
    ^c marketing framework
    in a figure: See right side.


    Water found

    W-3.4 Visions & missions from the boardroom

    Managing the working force at any non trivial construction is moving to the edges. The cultural changes are: Non trivial means it will be repeated for improved positions.
    Managing the working force at processes, information is needed for understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

    W-3.4.1 Structuring, engineering the enterprise
    Inseparable product documentation layer.

    W-3.4.2 Structuring, engineering the enterprise
    High performance organisations
    high performance organisations with steve spear (murray robinson)

    Agile project management
    agile project management with johanna rothman (murray robinson)

    W-3.4.3 Structuring, engineering the enterprise
    Haier’s Decentralized Autonomous Enterprises
    haier model william malek (murray robinson)
    the Haier model Institute wanted me to do a presentation at their annual events called nine 20, and they said Oh, I’ve read your stuff. Would you be interested in telling us what our organization look like from an outsider’s perspective. ... And so bottom line is I had an existential crisis. What I was teaching was obsolete, irrelevant. I realized this is so radically different. The genesis was the appliance world. So washing machine, stoves, and refrigerators and things like this at the very beginning and the appliance part of the business is still there, but that’s just the product. They could go in any direction, as a product manufacturer, because now I can add services on top of that through ecosystem partners. ...
    Now, what they're known for is the services that they develop in the marketplace that are what I call ecosystemic based services where they’ve allowed themselves to have a whole new operating model, a boundary-less organization. They are not afraid of working with competitors to bring solutions to the marketplace that are rather unique and different. ...
    More importantly, they have about 5,700 micro enterprises. The entire organization is comprised of these micro enterprises. Which are small entrepreneurial teams. And that is the primary DNA of the organization that’s delivering these ecosystemic services and products into the marketplace driven by a decentralized operating model. And, part of this is due to the fact that strategy doesn’t come from the top. It comes directly from the micro enterprises. It’s bottom up. ...
    But more importantly they have double digit growth with gross margin. Now that happens to be because of the ecosystemic approach. What they do is they co create with other partners to deliver services. They share in the risk, but it’s not a contract relation where I have to pay for the service. So they’re able to lower and optimize their operating costs, the value chain that they’re delivering a service on. This is how they can actually get the gross margins while they’re growing. And that’s because one, the ecosystem strategy externally, and then internally they have a whole mechanism of an internal marketplace where people compete, they get the lowest price, but yet the highest value is the goal out of the system.

    Tribal politics turning the situation
    Surviving organisational politics with John Cutler (murray robinson)

    W-3.4.4 Structuring, engineering the enterprise
    Hoshin Kanri Simple
    Hoshin kanri loop.
    👉🏾 Discovering Hoshin Kanri - X matric (Verka Alexieva) Chief product Engineers can emerge from any part of the organization Ho Shin, Kan RI (13m14) some translations: In a translation the intended meaning gets easily lost. The name X-matrix is meaningless.
    The validation is the last bottom right corner, getting to little attention. We identified the need for more regular reviews and adaption of objectives - min Quarterly!
    Leadership is the key to ensure Commitment.
    (21m55, 25m55)
    Dimensions Floor

    W-3.5 Sound underpinned theory, improvements

    Knowing the position situation in by observing several types of associated information . These are: Non trivial means it will be repeated for improved positions.
    Command & control needs information for what understanding what is going on. Without knowing the situation or direction there is no hope in achieving a destination by improvements.

    W-3.5.1 A structured enterprise, the organic cycle
    Mastering the purpose knowing the tools
    SIMF understanding the management improvement cycle
    1. A vision: Product / Service
    2. Geo-mapped roles
    3. Persons methodologies
    4. Flows, value streams
    5. Optimizing at constraints
    6. Functionality, technology
    7. Safety, technology
    8. Product Service knowledge

    SIMF understanding the organisational improvement cycle
    SIMF improve org goal framework
    in a figure: See right side.

    SIMF understanding the technical improvement cycle
    SIMF improve org tech framework
    in a figure: See right side.

    W-3.5.2 A structured enterprise, Input Ideas perspective
    Mastering the purpose knowing the tools
    Given tools working bottom-up to the purpose. Both tools and purpose are left out in the generic approach, four of the six levels are left. in a figure: SIMF building build-run



    W-3.5.3 A structured enterprise, the hidden organisation
    Improving the organisation
    Given a purposes working top-down to tools. Both tools and purpose are left out in the generic approach, four of the six levels are left. in a figure: SIMF improving internal



    W-3.5.4 A structured enterprise, result request perspective
    Mastering to get tools knowing the purpose
    Given a purposes working top-down to tools. Both tools and purpose are left out in the generic approach, four of the six levels are left. in a figure: SIMF building operations



    Confused-2

    W-3.6 Maturity 5: Strategy visions adding value

    From the three PPT, People, Process, Technology interrelated areas in scopes.
    Only having the focus on others by Command and Control is not complete understanding of all layers, not what Command & Control should be.
    Each layer has his own dedicated characteristics.

    W-3.6.1 SIMF-VSM Safety with Information at Technology
    A Paradigm Shift in the Information and Cybersecurity Mindset
    correctly manage the work
    Heisenberg’s Paradox in Information Security
    Focusing on compliance offers a challenge that parallels the uncertainty principle, also known as Heisenberg’s indeterminacy principle, introduced in quantum mechanics. The principle explains that we cannot simultaneously measure two complementary properties of a system, such as position and momentum, with absolute precision. The more accurately you measure one property, the less precise the measurement of the other becomes.
    In the context of information security, this principle offers an insightful analogy. By focusing intensely on measuring and documenting compliance (a static attribute of security), organizations lose clarity on the more dynamic and contextual aspects of security: This creates a paradox: When organizations pour resources into proving compliance, they often fail to anticipate future risks. These blind spots leave them vulnerable to emerging threats, as their efforts focus on past performance rather than adaptive resilience. Measuring and documenting security is important, but it shouldn’t come at the expense of actually being secure.

    Principles: Safety with Information at Technology

    W-3.6.2 The product, service positioned within a system
    Fail safe state in results

    Systems thinking, differences between the systems
    correctly manage the work
    There's a vast difference in types of work. There are two fundamental mistakes people make, especially in the hashtag#management and hashtag#consulting space:
    1. Misunderstanding the nature of the work, thus not understanding why the outcomes are suboptimal.
    2. Misapplying management approaches that are intended for a specific type of work to others - that leads, at best to waste. And at worst, to complete and utter failure.
    Now, the difficulty is that you may need to be an expert in the work itself to determine which is which. And that's why the concept of "manager experts" is fundamental to complex environments where all types of work are present.
    Can you classify what percentage of the work your team is doing belongs to which category? That's already hard.
    But can you correctly predict it for everything being worked on? That's hardly possible - as a simple routine might explode in complexity when circumstances suddenly change!

    Systems thinking, optimizing KISS principle
    Kiss "Keep It Super Simple" is the fundament for many good viable systems.
    Introduction to Karakuri Kaizen
    Industry 4.0 is currently all the rage (maybe except on this blog here or there). Yet, karakuri kaizen with its focus on mechanical solutions is pretty much the opposite! These gadgets are not connected wirelessly, and not online as part of the internet of things or cyber physical systems. Heck, they don’t even have a microchip! So why use them? After all, any of these actions can also be done using sensors , actuators, and processors. Yet, karakuri is often better. In my view, there are a few advantages. Hence, karakuri devices allow for a grass-roots continuous improvement in lots of little steps. Computer systems are big steps, usually initiated by management when they notice the problem (often too late, and only the biggest ones), and implemented by engineers and programmers when they have the time (rarely). In sum: Kaizen is so much easier with karakuri!

    In the information landscape there are no known nice examples. Why not?
    Value Chain Analysis
    Value chains streamline the processes that take a product from concept to market. The integral linkages are supported by both structure and effective communication between direct, indirect, and support components. Direct activities, such as hiring and training human capital, are further supported through appropriate indirect activities, such as record keeping and quality control.
    When analyzing the effectiveness of a value chain model, the economist Michael Porter introduced the following 10 cost drivers that help identify areas for improvement:
    1. Economies of Scale: A true picture of need includes cost analysis for the size of the demand, whether local, national, or global.
    2. Learning: Activities that change the environment for efficiency or improvement, such as scheduling, asset use, and office or warehouse layout.
    3. Capacity Utilization: Procedures that keep capacity at efficient levels to prevent under-utilization or the addition of unnecessary capacity.
    4. Linkages among Activities: Identifying areas of cross-functional improvement through coordination and optimization.
    5. Interrelationships among Business Units: Opportunities to share information and resources.
    6. Degree of Vertical Integration: Identifying areas of joint integration or, in some cases, de-integration.
    7. Timing of Market Entry: Driven by economic or world conditions and competitive position in the marketplace.
    8. Firm's Policy of Cost or Differentiation: Identified value integrated into the process.
    9. Geographic Location: This includes wages, climate, and raw materials.
    10. Institutional Factors: These include taxes, unions, and regulations.
    Ultimately, value chain modeling offers the following benefits: The figure below takes Porter's value chain model and shows primary and support activities that may relate to an organisation, Porter support and primary activities

    W-3.6.3 Changing system structures following procucts, services
    W-3.6.4 Improving vs innovation for products, services
    W-3.6.5 Following steps
    Missing link devops bianl devops meta design data design meta design math
    These are practical data experiences.

    MetaData Information generic - previous
    bianl, Business Intelligence & Analytics 👓 next.



    Others are: concepts requirements: 👓
    Data Meta Math


    🎯 I_Sage I_Serve C_Edge C_Vision ✅-dimensions CMM5-SIM 🎯
      
    🚧  👁-GAP T_Value C_Steer C_Culture ✅-logic CMM3-SIM 🚧
      
    🔰 Contents I_Floor  C_Tasks  H_Culture C_Theory CMM0-SIM 🔰

    © 2012,2020,2024 J.A.Karman
    🎭 Summary & Indices Elucidation 👁 Foreword Vitae 🎭