Presentation is loading. Please wait.

Presentation is loading. Please wait.

7:1 attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

Similar presentations


Presentation on theme: "7:1 attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,"— Presentation transcript:

1 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis, Synthesis, and Performance ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis, Synthesis, and Performance Session 7 – Quality: Principles, Reality, Strategy School of Systems and Enterprises Stevens Institute of Technology, USA File Your Class web-page:www.parshift.com/678/678-150219L3.htmwww.parshift.com/678/678-150219L3.htm Support docs & links:www.parshift.com/678/support.htmwww.parshift.com/678/support.htm File

2 7:2 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Before starting… Your mid-term was just completed. Some of you had difficulty. That’s what the text book is for – learning usually requires study. D1 was a “heads-up”, intended to show you what you don’t know. A poor showing on D1 will not be held against you … but no improvement on D2 will. 40 hours in class + 80 hours out of class (engaged study) is what earns course credit. Following the Instructions (when you don’t, the impression is that you are winging the whole thing): 1. You are required to read and study and demonstrate that you have learned something – in addition to showing up for class, writing something, and putting words on forms. Winging it won’t work. 2. Name your file(s): 678D - V Example: 678D1-DoeJohnV1.doc (version numbers insure distinction if revisions occur). 3. Some of you did not take your instructions and tool templates from SDOE678-Unit11.ppt as suggested. 4. Two-page operational story: clear evidence of a plug-and-play, drag-and-drop agile system demonstrated with response objectives, requirements, values, response enabling principles, and operational/integrity management – all wrapped inside a story of the system-in-operation, delivering its values. The operational story is supposed to reflect a scenario after deployment, not what has to be considered for design. As a result, some of you who did design time stories instead of operational time stories had problems with your RS Analysis that is supposed to only reflect operational time issues, and this will cause problems in the Closure Matrix for the final, unless fixed. Heads up: You will have an exercise early in the next unit (8) that will require you to develop the strategic objectives/themes from your (or what should have been) Deliverable #1 story.

3 7:3 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted "Make no little plans; they have no magic to stir men's blood and probably will themselves not be realized. Make big plans; aim high in hope and work, remembering that a noble, logical diagram once recorded will not die, but long after we are gone will be a living thing, asserting itself with ever-growing insistency" [Daniel Burnham, architect]. FEEDBACK REVIEW Unit 6 Exercise Feedback in Unit 8 – Now 4-or-so mid-term feedbacks instead

4 7:4 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Nov2011: www.tassimodirect.com/home-brewing-machines/hot-beverage-brewers REVIEW

5 7:5 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Response Issues Tassimo BrewBot Operational System Response Type Correction Variation Reconfig- uration Expansion (Capacity) Migration Improve- ment Modification (Capability) Creation Reactive Response Situations What must the system be creating or eliminating in the course of its operational activity? Make different types of hot coffee and tea drinks (t,q,s) What performance characteristics will the system be expected to improve during operational life cycle? Match drink flavor to user taste (t,s) What major events coming down the road will require a change in the system infrastructure? Multi-lingual display text option (c,s) Larger size water container capacity option (t,s) What modifications/evolutions in modules might be needed during the operational life cycle? New drink brewing recipes ((t,q,s) New drink discs (t,q,s) User wants manual recipe capability (q,s) What can go wrong that will need an automatic systemic detection and response? Available disc selection not satisfactory to user (t) Improperly place disc and/or RFID registration (q) What process variables will range across what values and need accommodation? Pressure of water called for by recipe (q,s) Temperature of water called for by recipe (t,q,s) What are “quantity-based” elastic-capacity needs on resources/output/activity/other? Small to large drink quantity (t,q,s) Cup size physically accommodated (t,c,s) What types of resource relationship configurations will need changed during operation? Recipe brewing steps and sequence (t) Multiple discs for a single drink (t,q) Proactive Water filtration option (c) Cold drinks? Cocktail discs? User intelligence (q,s) Amount of wate (t,q)

6 7:6 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reconfigurable Scalable Reusable Encapsulated Modules Modules are encapsulated independent units loosely coupled through the passive infrastructure. Base units Flavor discs Display language Recipes Facilitated Interfacing (Pluggable) Modules & infrastructure have features facilitating easy modules insertion/removal. RFID recipe designator on bottom of disc Facilitated Reuse Modules are reusable and/or replicable; with supporting facilitation for finding and employing appropriate modules. Foolproof easy in-and-out of discs Product mktng mgr responsible for module inventory Peer-Peer Interaction Modules communicate directly on a peer-to- peer relationship; parallel rather than sequential relationships are favored. Recipes drive brew subsystems directly step by step Deferred Commitment Module relationships are transient when possible; decisions & fixed bindings are postponed until necessary. Brew is determined by disc-inserted RFID recipe Evolving Infrastructure Standards Module interface and interaction standards and rules that evolve slowly. Brewing sub-systems Water quality standards Recipe code Product eng mgr responsible for evolution Redundancy and Diversity Duplicate modules provide fail- soft & capacity options; diversity provides functional options. Many different types of discs User inventories as many duplicates as desired Elastic Capacity Module populations & functional capacity may be increased and decreased widely within the existing infrastructure. Recipe designates small to large amount of water Cup size is adjustable with base elevator No limit to variety of discs Alternate base unit capabilities may be added Distributed Control & Information Decisions made at point of maximum knowledge; information accessible globally but kept locally. Control is in each RFID recipe, not in the base unit Self-Organization Module relationships are self-determined; and component interaction is self-adjusting or negotiated. Recipe reorganizes brewing steps (Think: Plug-and-Play, Drag-and-drop) RRS Principles for: Tassimo Brewbot Operational System RFID reader Items here generally address issues of RS Analysis directly and indirectly

7 7:7 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Tassimo BrewBot In-Operation System base units brew steps discs Infrastructure evolution System assembly Component evolution Component readiness Infrastructure Components Rules/Standards Integrity Management Active Passive Prod eng mgr Automated recipe Product eng mgr Product mktng mgr recipes display text 2-step latte chocolate espresso crème multilingual display Disc holder, RFID placement RFID scan content Consumer product regs Ignored Owners manual Sockets Signals Safety Security Service Nov2011: www.tassimodirect.com/home-brewing-machines/hot-beverage-brewerswww.tassimodirect.com/home-brewing-machines/hot-beverage-brewers Agile Architecture Pattern

8 7:8 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reusable, Reconfigurable, Scalable Expansion/Contraction: Unbounded Capacity http://videos2view.net/xM-WLT.htm http://kranringen.no/content/download/295/1456/version/4/file/ http://videos2view.net/xM-WLT.htm http://kranringen.no/content/download/295/1456/version/4/file/ Assembling a custom “truck” for moving strange/large/heavy things A building 1,790 tons, 75 feet high File5.5 File8.25

9 7:9 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Tall Buildings in a Single Bound Zhang Yue, founder and chairman of Broad Sustainable Building, built a 30 story building in 15 days with modular construction. His system concept is not discussed as Agile system construction, but it could be, and maybe he has discovered that. He could use the same modules developed for his 30-story building in a different configuration building that might be shorter yet broader and longer. Reusability is in the plans for constructing modules, not in the modules themselves. Reconfigurability is in the use of the modules to solve a different building configuration. See “Case Modular 30-Story Building in 15 Days.pptx” Scalable structures can be build 1// Identical modules The floors and ceilings of the skyscraper are built in sections, each measuring 15.6 by 3.9 meters, with a depth of 45 centimeters. Illustration: Jason Lee Encapsulate Modules 2// Preinstalled fixtures Pipes and ducts are threaded through each floor module while it's still in the factory. The client's choice of flooring is also preinstalled on top. Illustration: Jason Lee Case

10 7:10 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted www.muralmosaic.com/Cochrane.html File2.5

11 7:11 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Modular? Agile? Why?

12 7:12 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Universal Jigsaw Puzzle www.tenyo.co.jp/jigazo/ www.tenyo.co.jp/jigazo/ 300 identically shaped pieces in varying shades of a single color, a few with gradations. Out of the box, you can make Mona Lisa, JFK, etc, configuring according to symbols printed on the back. Or, e-mail a photo to the company, and they will send you back a pattern that will recreate that photo. 300 pixels: an infinite number of pictures Modular? Agile? Why?

13 7:13 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Moon Rocket for Google Lunar X-Prize http://mstl.atl.calpoly.edu/~jfoley/Summer2009/Sun_1320_TubeSat%20Utah%20August%202009%201.pdfhttp://mstl.atl.calpoly.edu/~jfoley/Summer2009/Sun_1320_TubeSat%20Utah%20August%202009%201.pdf and http://www.interorbital.com/http://www.interorbital.com/

14 7:14 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Interorbital Systems Personal Satellite Kit http://spacefellowship.com/2009/08/01/interorbital-syatems-tubesat-personal-satellite-kit/ http://mstl.atl.calpoly.edu/~jfoley/Summer2009/Sun_1320_TubeSat%20Utah%20August%202009%201.pdf $8,000 kit includes launch into low-earth-orbit on an IOS NEPTUNE 30 after a few weeks, re-entry & burn-up Orbit-friendly launches begin in Q4 2010

15 7:15 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Plug and Play Labs, Faster Science 04Apr2010 Discovery News, Ian O’Neill http://news.discovery.com/space/shuttle-to-launch-plug-and-play-micro-labs-on-space-station.html http://news.discovery.com/space/shuttle-to-launch-plug-and-play-micro-labs-on-space-station.html This is the first attempt at designing and building a standardized, cheap and lightweight technology to be used by multiple organizations for a variety experiments. "When the rack is installed, you'd plug in the lab via USB," said Kris Kimel, President of Kentucky Space. By giving "CubeLabs" this capability, "they basically become 'plug and play' laboratories," Kimel said, emphasizing the convenience of the NanoRack/CubeLab concept. Up to 16 individual CubeLabs can be installed on each NanoRack, each capable of carrying out independent experiments. The most appealing thing about these mini laboratories is that they are very lightweight, so they can be easily unplugged, stowed and transported to and from the station by the next available flight. Currently, space station experiments are often too unwieldy, forcing research groups to wait for long periods of time before they can retrieve their experiments from space, no matter how interesting or important their science results may be. Also, due to their design and function, NanoRacks allow a higher pace of microgravity experimentation, stimulating more "high risk" experiments, potentially boosting low-cost space research. A Space Science ‘Mash-Up’ - Kimel expects to have a second NanoRack installed on the ISS in May. "Almost all of our space tech is built by students. NASA has very stringent quality controls, so this is a huge achievement," he added. Kentucky Space and NanoRacks will offer their system to research groups to house their own experiments (while still providing CubeLab support), but Kimel pointed out that his organization will be carrying out experiments of their own, focusing on the microgravity biomedical field. Space Research can be Ubiquitous - The first orbital CubeSat is scheduled to be launched in November 2010. The NanoRack/CubeLab concept opens the doors to entrepreneurial space research, joining the upward trend of commercialized spaceflight while getting students, researchers, entrepreneurs and NASA to work together toward a common goal The NanoRack plus CubeLab

16 7:16 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Murray Gell-Mann brings visibility to a crucial aspect of our existence that we can't actually see: elemental particles. He won the Nobel Prize in Physics for introducing quarks, one of two fundamental ingredients for all matter in the universe. He's been called "the man with five brains" -- and Murray Gell-Mann has the resume to prove it. In addition to being a Nobel laureate, he is an accomplished physicist who's earned numerous awards, medals and honorary degrees for his work with subatomic particles, including the groundbreaking theory that the nucleus of an atom comprises 100 or so fundamental building blocks called quarks. Gell-Mann's influence extends well beyond his field: He's a member of the National Academy of Sciences, the American Academy of Arts and Sciences, and the Council on Foreign Relations. He also serves on the board of the Wildlife Conservation Society and is a director of Encyclopedia Britannica. Gell-Mann, a professor emeritus of Caltech, now heads the evolution of human languages program at the Santa Fe Institute, which he cofounded in 1984.Santa Fe Institute A prolific writer -- he's penned scores of academic papers and several books, including The Quark and the Jaguar -- Gell-Mann is also the subject of the popular science biography Strange Beauty: Murray Gell-Mann and the Revolution in 20th- Century Physics.The Quark and the JaguarStrange Beauty: Murray Gell-Mann and the Revolution in 20th- Century Physics Video and text above at: www.ted.com/index.php/talks/murray_gell_mann_on_beauty_and_truth_in_physics.html Guest Speaker – Murray Gell-Mann Beauty and truth in physics (16 min)16 min

17 7:17 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted BREAK

18 7:18 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Integration Fundamentals Tools Perspective Analysis Synthesis Course Roadmap Have You Signed The Attendance Roster? Session 1 – Overview and Introduction to Agile Systems Session 2 – Problem Space and Solution Space Session 3 – Response Types, Metrics, Values Session 4 – Situational Analysis and Strategy Exercise Session 5 – Architecture and Design Principles Session 6 – Design Exercise and Strategy Refinement Session 7 – Quality: Principles, Reality, Strategy Session 8 – Operations: Closure and Integrity Management Session 9 – Culture and Proficiency Development Session 10 – The Edge of Knowledge, Projects

19 7:19 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Quality: Principles, Reality, Strategy Quality principles Requisite Variety Parsimony Harmony Reality Recognition Agile-Strategy ConOps

20 7:20 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Design Quality Principles Requisite Variety (Functional Quality) Ashby's Law: "The larger the variety of actions available to a control system, the larger the variety of perturbations it is able to compensate....variety must match variety." Any effective system must be as agile as its environmental forces. Reality-compatible (rational) policy, procedure, and practice. Parsimony (Economic Quality) Occam's Razor: Given a choice between two... choose the simplest. Unintended consequences are the result of complexity. Humans can only deal with 5-9 items simultaneously. Bounded rationality (Herb Simon). Reduces perceived Risk. Harmony/Delight (Aesthetic Quality) Perception: non-negative impact on personal productivity and goal priorities. Perception: non-negative impact on org's productivity and goal priorities. Rationalized with natural human and org behavior. Engenders feelings of user Trust and Respect and Compatibility.

21 7:21 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Drug Catapult Found at U.S.-Mexico Border 26Jan2011, www.foxnews.com/us/2011/01/26/drug-catapult-mexico-border/www.foxnews.com/us/2011/01/26/drug-catapult-mexico-border/ Drug smugglers trying to get marijuana across the Arizona-Mexico border apparently are trying a new approach -- a catapult. National Guard troops operating a remote video surveillance system at the Naco Border Patrol Station say they observed several people preparing a catapult and launching packages over the International Border fence last Friday evening. "It looks like a medieval catapult that was used back in the day," Tucson sector Border Patrol spokesman David Jimarez told Reuters. Tucson TV station KVOA said Border Patrol agents working with the National Guard contacted Mexican authorities, who went to the location and disrupted the catapult operation. The 3-yard tall catapult was found about 20 yards from the U.S. border on a flatbed towed by a sports utility vehicle, according to a Mexican army officer with the 45th military zone in the border state of Sonora. The catapult was capable of launching 4.4 pounds of marijuana at a time, the officer said Wednesday, speaking on condition of anonymity for security reasons. --------- http://insightcrime.org/insight-latest-news/item/1785-mexicos-army-finds-catapults-used-to-fire-drugs-into-us 02 Nov 2011: For the second time this year, Mexican authorities have found catapults used by drug traffickers to fling marijuana across the U.S.-Mexico border fence. Troops from Mexico’s army discovered two portable catapults, along with more than a ton of marijuana, at a residence in Agua Prieta, close to the Arizona border. These kind of low-tech means to get drugs across the border, like packaging drugs to fit through gaps in the fence, illustrates the shortcomings of the border fence as a means to stop traffickers.

22 7:22 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Why? The Death of the US-Mexico Virtual FenceThe Death of the US-Mexico Virtual Fence – Slashdot: March 17, 2010 “A couple of years ago it was announced that the Boeing-built virtual fence at the US-Mexico border didn't work. Started in 2006, SBInet has been labeled a miserable failure and finally halted. A soon-to-be-released GAO report is expected to be overwhelmingly critical of SBInet, causing DHS Chief Janet Napolitano to announce yesterday that funding for the project has been frozen.didn't workSBInetfunding for the project has been frozen It's sad that $1.4 billion had to be spent on the project before the discovery that this poorly conceived idea would not work.” Irresponsible Systems Engineers at: contractor and acquirer 1: “my boss told me to do it” didn’t work at the Nuremberg Holocaust trials 2: we hang the architect who designs a faulty bridge

23 7:23 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Requisite Variety Code of Hammurabi (2200 BC) King of Babylonia Translated by R.F. Harper If a builder builds a house for a man and do not make its construction firm and the house which he has built collapse and cause the death of the owner of house – the builder shall be put to death. If it cause the death of the son of the owner of the house – they shall put to death a son of that builder. If it destroy property, he shall restore whatever it destroyed, and because he did not make the house which he built firm and it collapsed, he shall rebuild the house which collapsed at his own expense. Common Law in England (15 th Century) If a carpenter undertakes to build a house and does it ill (not well), an action will lie against him Napoleonic Code (1804) If there is a loss in serviceability in a constructed project within 10 years of its completion because of a foundation failure or from poor workmanship, the contractor and architect will be sent to prison Forensic Engineering, D. Fowler (slide presentation has been removed from the Internet)

24 7:24 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Parsimony “Perfection is achieved not when there is nothing more to add, but when there is nothing left to take away.” Ch. III: L'Avion, pg 60, Antoine de Saint-Exupery, French novelist and aviator (1900 – 1944) Author of The Little Prince

25 7:25 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Balancing Requisite Variety & Parsimony (sometimes on the head of a pin) Marc Stiegler, www.infoq.com/presentations/Security-vs-Security-Architecture More Authority Security Effectiveness Give person/object everything they need and nothing else Principle of Least Authority (POLA)

26 7:26 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Frank Lloyd Wright – On Harmony...only when we know what constitutes a good building...when we know that the good building is not one that hurts the landscape, but is one that makes the landscape more beautiful than it was before that building was built. Still regarded as the greatest 20th Century house ever built. Responding to the geological strata of the site, his mastlike tower of stacked shale stone seemingly held aloft three cantilevered levels hovering over Bear Run, a tiny river. He expressed the rocky site by metaphorically lifting the stones out of the riverbed to create the interior floor planes, using the largest rock, the Kaufman's choice spot to sunbathe, as the hearthstone for the living room fireplace. And instead of orienting the structure to face the falls, Wright floated the entire structure over the falls, merging the house inseparably into the total natural picture. Excerpted from David Jameson, www.architechgallery.com/arch_info/artists_pages/frank_lloyd_wright.html

27 7:27 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reusable-Reconfigurable Architectural Themes Fredrich Frobel was a German educationalist who founded a series of educational tools, one of which was a set of geometric blocks that could be assembled in various combinations to form three-dimensional compositions. Wright was himself educated in the Frobel system as a child. But, early in his career, when he began having children of his own and teaching them the Frobel method, he began re-reading the instructional material and teacher handbook. This helped him to realize a methodology he would use throughout his life. After Wright revisited the Frobel method, he turned to the cruciform (two elongated interlocking spaces in the shape of a cross) as a fundamental floor-plan unit. By unit, I mean a basic entity that is manipulated according to context. It may be stretched, contorted, and multiplied to construct higher-order compositions. A unit is also a pathway to knowledge, a systematic method of conceptualizing a problem, and may lead to the discovery of radically new pathways that may, in turn, become units in themselves. In Wright’s case, the turn to the cruciform led to the Prairie House, a “type of house characterized by a degree of both spatial freedom and formal order previously unknown in either the Old or New World”. Darwin Martin House of 1904. The Unit in Wright’s Scientific Method, Brett Holverstott, www.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.docwww.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.doc

28 7:28 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted The systematic composition of unique places A unit is useful because it may be modified in a variety of ways to fit a context. Its features may be systematically explored. For instance, a wing of the cruciform may become a staircase and closet, or it may be divided into two bedrooms, or it may be pushed up along one side of the plan and made into a cantilevered dining room, or it may be stretched out to form a living room with a series of windows looking out to a garden. A project for Wolf Lake proposed a series of pavilions arranged around a semicircular canal and on the circular island at the center. Close examination of these pavilions, as Wright designed them in plan and perspective, reveals plan fragments matching Unity Temple, the Martin House, the Ullman House, and even a small Imperial Hotel. Here in 1895, almost the entire set of plan types that Wright would utilize in the Prairie Period were projected in the pavilions of this unbuilt design, as numerous geometrically rigorous and systematically developed variations on the theme of the cruciform interlocking of spaces and the rhythmic disposition of pier groups. This astonishing project may be considered as Wright’s equivalent of Piranesi’s ‘Campo Marzio’ etching; the repository and record for all manner of speculative forms to be utilized and realized in later designs.” Darwin Martin House of 1904. The Unit in Wright’s Scientific Method, Brett Holverstott, www.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.docwww.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.doc

29 7:29 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted The Usonian House At the beginning of his career, Frank Lloyd Wright became known for his custom dream homes for the wealthy. But by the mid-nineteen thirties he felt that quality design should not be dependent on a large budget. He invented a spare, efficient, modular based concept for building that would provide a homeowner all the luxuries that counted in his early houses: interpenetrating spaces, extravagant light, varied ceiling heights and the all- important central hearth. His name for this type of building was a modified acronym for 'United States of North America.' That the 'Usonian' House was an alliterative cousin to 'utopian' could only enhance its marketing appeal. Built on a concrete slab, it was closer to the ground and thus more interactive with nature. Early Usonians abandoned the pinwheel plan of the Prairie houses, opting for L-shaped or linear plans that reduced the sleeping areas into cells and opened the kitchen or 'workspace' into the largest floor areas devoted to living and dining. Traditional walls built of 2 x 4 studs were replaced inside and out with layered plywood and board panels that self-insulated against wind or sound. So many people vied to have the master design their houses that Wright had the luxury to choose which clients would have that privilege. He customized his Usonian houses to a wider range of wealth than those initial utopian versions for the common man, expanding the modules into myriad triangles, circles and parallelograms. David Jameson, ArchiTech Gallery, www.architechgallery.com/arch_info/artists_pages/frank_lloyd_wright.htmlwww.architechgallery.com/arch_info/artists_pages/frank_lloyd_wright.html

30 7:30 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Even the Use of the Home was reconfigurable The first Frank Lloyd Wright house that I ever experienced was a Usonian - the Hanna House built at Stanford University. This house evolved as the Hanna’s requirements, lifestyle and income did. It started off as a “middle- class” dwelling for a young family, and became, over a twenty year period, a spacious, eloquent home for a successful professional couple. The first small Master Bedroom became the Hanna’s study; the three children’s Bed Rooms morphed into a new Master Bed Room; and the Family Room became a large formal Dining Room for entertainment. A shop and garden room was added as income allowed. All this was accomplished with minor reconstruction; the entire scope of work having been programmed, and structurally provided for, from the beginning. Professor Hanna was clearly in love with his environment which evolved with him and Mrs Hanna as they raised a family and built individual careers. I could see that it had become an integral part of their life and that living in it had deeply effected their view of life. He talked about the impact the environment had on his children as they were growing up. The Post Usonian Project, Matt Taylor, 1999, http://www.matttaylor.com/public/PostUsonian.htmhttp://www.matttaylor.com/public/PostUsonian.htm

31 7:31 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Aesthetic Quality Frank Lloyd Wright’s rapidly-done sketches for Fallingwater were a wonderful tour de force of architectural drawing under pressure. As one of Wright’s admiring apprentices, Edgar Tafel recalls it, Wright was at his Wisconsin studio on September 22, 1935, when he got an unexpected call from Edgar Kaufmann, his impulsive client and the owner of the Pittsburgh department store. Kaufmann was in Milwaukee a few hours away, and announced he was driving out to see Wright’s progress on the drawings for the summerhouse at Bear Run, Pennsylvania. “Come right along E.J., we’re ready for you,” Wright said. At that moment he had no drawings of Fallingwater. Always resourceful, the 69-year-old architect gathered his colored pencils, went to the drafting board, and while admiring apprentices watched, rapidly drew the plans of a house that became an icon of American architecture. As fast as his pencils wore out or broke, he reached for new ones. His style when drawing was to deliver running commentaries about the clients. For Kaufmann he knew what was needed. “The rock on which E.J sits will be the hearth, coming right out of the floor, the fire burning just behind it. The warming kettle will fit into the wall here… Steam will permeate the atmosphere. You will hear the hiss….” http://carnegiemuseums.org/cmag/bk_issue/1999/marapr/feat1.htm Dove’s interpretation: Wright had a storehouse of reusable functional modular concepts/patterns in his head that allowed him to focus his creative energy on insightful quality issues that would delight a client’s personal sense, rather than the mundane issues of functional design – which he could quickly assemble and arrange to meet the higher level aesthetic- quality objectives.

32 7:32 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Harmony: Attractive Things Work Better “Noam Tractinsky, an Israeli scientist, was puzzled. Attractive things certainly should be preferred over ugly ones, but why would they work better? Yet two Japanese researchers, Masaaki Kurosu and Kaori Kashimura, claimed just that. They developed two forms of automated teller machines. Both forms were identical in function, the number of buttons, and how they worked, but one had the buttons and screens arranged attractively, the other unattractively. Surprise! The Japanese found that the attractive ones were easier to use. Tractinsky was suspicious. Maybe the experiment had flaws. Or perhaps the result would be true of Japanese, but certainly not of Israelis. “Clearly,” said Tractinsky, “aesthetic preferences are culturally dependent.” Moreover, he continued, “Japanese culture is known for its aesthetic tradition,” but Israelis? Nah, Israelis are action oriented— they don’t care about beauty. So Tractinsky redid the experiment. He got the ATM layouts from Kurosu and Kashimura, translated them from Japanese into Hebrew, and designed a new experiment, with rigorous methodological controls. Not only did he replicate the Japanese findings, but the results were stronger in Israel than in Japan, contrary to his belief that beauty and function “were not expected to correlate” –Tractinsky was so surprised that he put that phrase “were not expected” in italics, an unusual thing to do in a scientific paper. This is a surprising conclusion. In the early 1900s, Herbert Read, who wrote numerous books on art and aesthetics stated that "it requires a somewhat mystical theory of aesthetics to find any necessary connection between beauty and function,” and that belief is still common today. How could aesthetics affect how easy something is to use? Book Chapter: www.jnd.org/dn.mss/CH01.pdfwww.jnd.org/dn.mss/CH01.pdf

33 7:33 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Wearable electronics self-powered by using human body heat 06Nov09, Vladimir Leonov and Ruud Vullers J Renewable and Sustainable Energy, http://jrse.aip.org/jrsebh/v1/i6/p062701_s1?view=fulltext http://jrse.aip.org/jrsebh/v1/i6/p062701_s1?view=fulltext An energy harvester (or an energy scavenger) is a small power generator that uses energy available in the ambient, such as electromagnetic energy, wind, water flow, or a temperature gradient. … a true energy harvester is not only a microgenerator that uses energy available in the ambient. It also does not consume sensible amounts of primary energy required in a host/neighbor object/subject so there is no need to compensate for any adverse effect caused by the harvester. Example: Necessity of a wireless remote control for a television pushed American physicist Robert Adler born in Austria to invent in 1956 a device which was converting mechanical energy of pushing the button on a remote control device into acoustic signals that controlled functions on the television set i.e., it used the principle similar to that of tuning folks. The device called “Zenith space command” stayed in use for over 2 decades. Example: The modern self-powered watches consume a power in between several and 1 μW, a very low power. However, if we look back into the history, we can find out that even the first self-winding watches consumed extremely low power, too. Indeed, walking with such a watch in the pocket for just a few tens of minutes completely wound the mainspring. A human being generates more than 100 W of heat; therefore, a quite useful electrical power still can be obtained using a person as a heat generator. The tool for converting heat flow into electricity is a thermoelectric generator (TEG), the heart of which is a thermopile. Typically, only a few watts of heat flow can be harvested unobtrusively on a person and thermoelectrically converted into several milliwatts in a form of electricity. If we recall that watches consume 1000 times less, it is fairly good power.

34 7:34 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted The parking footprint of ultrasmall vehicles like the CityCar is significantly smaller than that of traditional cars. USVs can fold and stack, creating efficient urban footprints. The CityCar’s folding capabilities drastically reduce its footprint, freeing up urban space for other uses. It also weighs a fraction of other vehicles. 17Mar2010, www.metropolismag.com/story/20100317/a-complete-rethinkwww.metropolismag.com/story/20100317/a-complete-rethink

35 7:35 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Complete Rethink Paul Makovsky, www.metropolismag.com/story/20100317/a-complete-rethinkwww.metropolismag.com/story/20100317/a-complete-rethink Reinventing the Automobile: Personal Urban Mobility for the 21st Century (MIT Press), William J. Mitchell, directs the Smart Cities research group at MIT’s Media Lab, GM’s Christopher E. Borroni-Bird and Lawrence D. Burns (formerly of GM). Interview here with Mitchell about … why designers need to start thinking more holistically.MIT’s Media Lab It’s important to get the technology and the policy right, but in the end, the way you break a logjam is by engaging people’s imagination, people’s desire, by creating things that they never thought of before. This is something that Apple has led the way in. Create sexy prototypes and convincing small-scale pilot projects in sympathetic environments. It’s about systems thinking, about how everything is related to everything else. How do you get designers—whether they’re car designers or architects or urban planners—to take this bigger- picture, more holistic approach? One of the huge problems with design is the traditionally defined disciplines. You’re an architect or a graphic designer or a silicon-chip designer or an interaction designer, blah blah, blah. The big, important design issues just don’t fall in these categories anymore. So…we take architects, urban designers, economists, mechanical engineers, electrical geeks, and we put them together into an intense multidisciplinary design environment, and it’s everyone’s responsibility to contribute to everything and educate the rest of the group as necessary on the issues that you know most about.” We knew nothing about battery technology when we started, but one of the great adventures of MIT is you can walk down the hall and find the world’s leading expert. The strategy is to go out, find what you need to know, and bring it back to the design project. The fundamental professional skill of a designer these days is strategically investing learning time. You must be able to say, “OK, there is an immensity of stuff out there to learn, but this is what’s important to instantly learn for this project.” You can never say, “Well, I’m an architect, so I don’t do battery technology.” Engineering and business schools are starting to learn how important design is, how the most effective way of adding economic value is to do clever design, but they don’t have a clue yet how to do it. GM/Segway PUMA concept car (left) -- MIT Media Lab’s CityCar (middle and right)

36 7:36 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Embraceable Security Bullet-proof cars are an example of aesthetic values applied to security against an intelligent attacker. Why? Perhaps because the car is not bought for its functional transport as much as for its self-expression statement. An armored military vehicle would do better, but not be especially acceptable, nor personally expressive in the natural value dimensions (macho militia minds excepted).

37 7:37 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Synergistic Security – Embraceable The Evergreen Aviation and Space Museum – home of the world-famous Spruce Goose airplane – constructed a new facility with a 232-seat IMAX theater, conference center and open gallery space for displaying aircraft. An 80-foot tall atrium is enclosed by glass on the north and south sides, and the lobby and two mezzanine levels open onto it, where biplanes and triplanes are suspended from the ceiling. To provide sweeping views of the interior and preserve the expansive feel of the space, the architects designed two open staircases. An enclosed staircase set in the back of the building would provide emergency egress in case of a fire. During construction, the building management team requested a design change that eliminated the enclosed emergency stairs at the back of the building. To meet building codes, the architects were required to redesign one of the existing open staircases to provide a fire-safe exit. That late in the project, enclosing one of the very prominent staircases with masonry, gypsum or similar fire-blocking materials would have conflicted with the overall building design and marred a dramatic feature – three-story-high stairs that opened onto the atrium. To address this challenge, the architects proposed instead to use fire-rated glass and frames to enclose the stairs. To meet the various design and code requirements for the enclosed staircase, the fire-rated glass had to do quadruple duty: 1) be clear and wireless with frames that matched the building’s exterior glazed curtain wall as closely as possible; 2) block the spread of flames and smoke for up to two hours; 3) shield people exiting the building from the high heat of a structural fire; and 4) provide safety impact resistance since the glass would be in a floor-to-ceiling configuration. Scott/Edwards found the solution with Pilkington Pyrostop™ fire-rated glass and Fireframes® Curtainwall Series fire-rated frames from Technical Glass Products, Snoqualmie, Washington. The glass looks like ordinary window glass and provides a clear view in and out of the stairs. The curtain wall frames and doors are sleek and slender, unlike the bulky wrap-around style of traditional hollow metal steel. Together, the glass and frames are fire-rated for two hours and meet the highest impact safety ratings for glazing. Why does construction architecture exhibit and cater to aesthetic values? Perhaps because practitioners are schooled in the arts and human needs as well as structural engineering.

38 7:38 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Agility Faces Reality Cyber Security Strategy Provides an Example Default Diagnostic Mode Password Used to Reprogram ATM (20 September 2006 – but still happening in lots of devices) Someone reprogrammed an ATM in Virginia to dispense US$20 bills in place of US$5 bills. The machine remained in the revised mode for nine days before a clerk in the store that houses the ATM was alerted to the situation. An investigation determined that the password allowing access to the ATM's diagnostic mode was the default one; the manual for the machine lists this password. http://www.securityfocus.com/brief/310

39 7:39 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Maintaining Systems in Unstable States Takes Constant Energy Input Expecting or enforcing ideal and repetitive behavior ignores reality... not a substitute for effective strategy

40 7:40 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Decision Making People make decisions every day, all day long... about: What to do next and how to do it What is expedient vs what "ought to happen" What is most important (to them) at the moment Where to apply scarce time and resources These decisions impact: Security investments by the organization Security practices by the organization – at the immediate moment Security practices by the individual – at the immediate moment

41 7:41 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Effective Strategy Requires New Understanding A rational view of the problem: Reality bites – what is its nature? The problem is bigger than technology – what is its nature? The situation is in constant flux – what is its nature? A rational view of the solution: You are compromised – now what? Situation in constant flux – what is proactive response ability? Effective strategy – what is its nature?

42 7:42 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reality Factors Issues Human Behavior – Human error, whimsy, expediency, arrogance... Organizational Behavior – Survival rules rule, nobody's in control... Technology Pace – Accelerating vulnerability-introductions... System Complexity – Incomprehensible, unintended consequences... Globalization – Partners with different ethics, values, infrastructures... Agile Enterprise – Outsourcing, web services, cots, transparency... Agile Adversaries/Competitors/Customers – Distributed, collaborative, self organizing, proactive, impatient, innovative…

43 7:43 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted

44 7:44 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted www.bradcolbow.com/archive.php/?p=205

45 7:45 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Brad CBrad C March 2nd, 2010 at 10:34 am I’ll admit that it is a bit of a strawman argument. But this actually happened to me yesterday (hence the screenshots). I think it resonates with people because from time to time DRM goes from being a security precaution to a complete and total pain in the ass and it’s happened to all of us at least once.March 2nd, 2010 at 10:34 am www.bradcolbow.com/archive.php/?p=205

46 7:46 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted http://www.geekologie.com/2010/02/25/piracy-full.jpg

47 7:47 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Piracy: Reality Factor Recognized Valve boss says service, not price, the big issue for consumers and publishers 25 Nov 2011, http://games.ign.com/articles/121/1213357p1.htmlhttp://games.ign.com/articles/121/1213357p1.html "In general, we think there is a fundamental misconception about piracy. Piracy is almost always a service problem and not a pricing problem. For example, if a pirate offers a product anywhere in the world, 24 x 7, purchasable from the convenience of your personal computer, and the legal provider says the product is region-locked, will come to your country 3 months after the U.S. release, and can only be purchased at a brick and mortar store, then the pirate's service is more valuable. Most DRM solutions diminish the value of the product by either directly restricting a customers use or by creating uncertainty. Our goal is to create greater service value than pirates, and this has been successful enough for us that piracy is basically a non-issue for our company. For example, prior to entering the Russian market, we were told that Russia was a waste of time because everyone would pirate our products. Russia is now about to become our largest market in Europe. Our success comes from making sure that both customers and partners feel like they get a lot of value from those services. They can trust us not to take advantage of the relationship that we have with them. We usually think of ourselves as customer centric rather than production centric. Most of our decisions are based on the rapidly evolving opportunities to better serve our customers, and not on optimizing to be a better game company or digital distributor. The latter focus would be more of a straitjacket than conceptual aid.

48 7:48 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users Cormac Herley. 2009. In Proceedings of the New Security Paradigms Workshop 2009. http://research.microsoft.com/en-us/um/people/cormac/papers/2009/solongandnothanks.pdf http://research.microsoft.com/en-us/um/people/cormac/papers/2009/solongandnothanks.pdf It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore security warnings, and are oblivious to certificates errors. We argue that users' rejection of the security advice they receive is entirely rational from an economic perspective. The advice offers to shield them from the direct costs of attacks, but burdens them with far greater indirect costs in the form of effort. Looking at various examples of security advice we find that the advice is complex and growing, but the benefit is largely speculative or moot. For example, much of the advice concerning passwords is outdated and does little to address actual treats, and fully 100% of certificate error warnings appear to be false positives. Further, if users spent even a minute a day reading URLs to avoid phishing, the cost (in terms of user time) would be two orders of magnitude greater than all phishing losses. Thus we find that most security advice simply offers a poor cost-benefit tradeoff to users and is rejected. Security advice is a daily burden, applied to the whole population, while an upper bound on the benefit is the harm suffered by the fraction that become victims annually. When that fraction is small, designing security advice that is beneficial is very hard. For example, it makes little sense to burden all users with a daily task to spare 0.01% of them a modest annual pain."

49 7:49 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Senior Managers Worst Information Security Offenders As companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface — senior management. According to a new survey, 87% of senior managers frequently or occasionally send work materials to a personal email or cloud account to work remotely, putting that information at a much higher risk of being breached. 58% of senior management reported having accidentally sent the wrong person sensitive information (PDF), compared to just 25% of workers overall.87% of senior managers frequently or occasionally send work materials to a personal emailreported having accidentally sent the wrong person sensitive information Nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber- attacks. Yet, 52% of this same group indicated they are falling down on the job, rating corporate America’s ability to respond to cyber-threats at a “C” grade or lower. Rank-and-file workers differ in their opinions about cyber security accountability, with 54% of those respondents saying IT professionals are responsible for putting the right safeguards in place 2013 study

50 7:50 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Getting Help is only a Click Away

51 7:51 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Nothing is Too Hard Phony Cisco Equipment Made in China SANS NewsBites, December 8, 2009 -- Two men have been charged in connection with a scheme in which they allegedly passed off networking equipment purchased in China as Cisco products. Christopher Myers and Timothy Weatherly allegedly packaged the equipment in boxes with phony Cisco labels and included copies of Cisco manuals. They allegedly sold the equipment online. Both have been charged with conspiracy, trafficking in counterfeit goods, and trafficking in counterfeit labels. Myers is also accused of accessing a website to obtain Cisco serial numbers to attach to the products he and Weatherly sold. Counterfeit chips from China sold to Navy Slashdot 25 Nov 2009: “Neil Felahy of Newport Coast, California, has pleaded guilty to conspiracy and counterfeit-goods trafficking for his role in a chip- counterfeiting scam. Felahy, along with his wife and her brother, operated several microchip brokerage companies under a variety of names, including MVP Micro, Red Hat Distributors, Force-One Electronics and Pentagon Components. 'They would buy counterfeit chips from China or else take legitimate chips, sand off the brand markings and melt the plastic casings with acid to make them appear to be of higher quality or a different brand,' the US Department of Justice said in a press release. The chips were then sold to Naval Sea Systems Command, the Washington, DC group responsible for maintaining the US Navy's ships and systems, as well as to an unnamed vacuum-cleaner manufacturer in the Midwest.”chip- counterfeiting scamcounterfeit chips from China

52 7:52 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Who You Gonna Trust? Olympus Ships Cameras with Virus on Memory Card Slashdot June 08, 2010: "Olympus Japan has issued a warning to customers who have bought its Stylus Tough 6010 digital compact camera that it comes with an unexpected extra — a virus on its internal memory card. The Autorun worm cannot infect the camera itself, but if it is plugged into a Windows computer's USB port, it can copy itself onto the PC, then subsequently infect any attached USB device. Olympus says it 'humbly apologizes' for the incident, which is believed to have affected some 1,700 units. The company said it will make every effort to improve its quality control procedures in future. Security company Sophos says that more companies need to wake up to the need for better quality control to ensure that they don't ship virus-infected gadgets. At the same time, consumers should learn to always ensure Autorun is disabled, and scan any device for malware before they use it on their computer."a virus on its internal memory card HTC Android Phones Found With Malware Pre-Installed Slashdot March 09, 2010: "Security researchers have found that Vodafone, one of the world's larger wireless providers, is distributing some HTC phones with malware pre-installed on them. The phone, HTC's Magic, runs the Google Android mobile operating system, and is one of the more popular handsets right now. A researcher at Panda Software received one of the handsets recently, and upon attaching it to her PC, found that the phone was pre-loaded with the Mariposa bot client. Mariposa has been in the news of late thanks to some arrests connected to the operation of the botnet."distributing some HTC phones with malware pre-installedpre-loaded with the Mariposa bot clientsome arrests

53 7:53 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reality Factors Organizational Behavior Reality – Survival rules rule, nobody's in absolute control... Human (including customer) Behavior Reality – Human error, whimsy, expediency, arrogance... Technology Pace Reality – Accelerating technology and security-vulnerability introductions, sparse testing, new agile SE methods and knowledge... System Complexity Reality – Incomprehensible, highly networked, unintended consequences, emergent behavior... Globalization Reality – Partners with different ethics, values, infrastructures, cultural assumptions... Agile Customers/Competitors/Adversaries – Distributed, collaborative, self organizing, proactive, impatient, innovative… Partially-Agile Enterprise Reality (Faddish Practices) – Outsourcing, web services, SOA, process and progress transparency, COTs policies and affects... Environmental Reality Analysis RSA exercises often assume a reasonably behaved and supportive environment, and tend to focus on the system’s internal functional response situations. This framework tool moves the analysis into the external environment.

54 7:54 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted In-Class Tool Applications Class Warm-upsTeam TrialsTeam Project Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10 ConOps: Objectives Reactive/Proactive RS Analysis Framework/Modules RRS + Integrity RS Analysis: TWS RRS Analysis: TWS Reality Factors: Case RS Analysis: Case RRS Analysis: Case Reality + Activities TSA Integrity: TWSClosure AAP Analysis: Case

55 7:55 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reality Factors – TSA Screening Vulnerabilities… as You See It Organizational Behavior Reality – Survival rules rule, nobody's in absolute control... Performance metrics, knee jerk open ended reaction Counterproductive incentives, airline circumvention Human (Including Customer) Behavior Reality – Human error, whimsy, expediency, arrogance... Hangover isn’t paying attention, routine produces boredom, fatigue, care of the job Overreaction and stereotyping, subjective standards, training exercises that test only expected procedures Technology Pace Reality – Accelerating technology and security vulnerability... Scanning machine BS System Complexity Reality – Incomprehensible, networked, unintended consequences, emergence... Training for all reasonably possible threats Globalization Reality – Partners with different ethics, values, infrastructures, cultural assumptions... Ethical and cultural differences, passengers of all kinds of background Reliance on flight origin for certain standards Other? ? Agile Customers/Competitors/Adversaries – Distributed, collaborative, impatient, innovative... Bad guys watch and find weaknesses in repetitive patterns, share info on Internet Partially-Agile Enterprise Reality (Faddish Practices) – Outsourcing, web services, COTS policies... xxxx

56 7:56 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reality Factors Organizational Behavior – Survival rules rule, nobody's in control... The “get it done, I don’t care how” attitude that is sometimes present. The idea to keep work load high but manpower minimal. Counterproductive monetary incentives that put schedule over quality. Human Behavior – Human error, whimsy, expediency, arrogance... Lack of attention to detail by production and engineers. Fatigue due to long hours with short breaks. Arrogant less experienced mechanics not seeking the advice of more experience mechanics. Technology Pace – Accelerating vulnerability-introductions, sparse testing, new agile SE methods... Electronic drilling machine. Work instruction-delivery changing with technology pace. System Complexity – Incomprehensible, highly networked, unintended consequences, emergence... High knowledge/experience required. Level of complexity leads to unintended consequences such as additional damage by the mechanics. Globalization – Partners with different ethics, values, infrastructures, cultural assumptions... Diverse ethnicities and cultural beliefs and values among customers. Priority lists are different due to diversity. Agile Adversaries/Competitors/Customers – Distributed, collaborative, impatient, innovative... Competitors may provide a more agile operation. Customer desires maximum agility. Partially Agile Enterprise (Faddish Practices) – Outsourcing, web services, SOA, process and progress transparency, COTS policies and affects... Outsourcing manufacturing. Using Components off the shelf (COTS). Example: Agile SE For Aircraft Refurb Company (L3 student master’s project)

57 7:57 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Porter on Strategy Limited Passenger Service High Aircraft Utilization Lean, Highly Productive Ground and Gate Crews Very Low Ticket Prices Short Haul Point-to-Point Mid-sized Cities Secondary Airports Frequent, Reliable Departures Flexible union contract High employee stock ownership "Southwest the low-fare airline" High employee pay Automatic ticketing machines Limited use of travel agents No seat assignments No meals 15 minute gate turnaround Standard 737 fleet No connections with other airlines No baggage transfers Strategic differentiation …cornerstone characteristics

58 7:58 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted CustomerCompatible Strategy Delivery Mgmnt Cultural Engineering Mgmnt LeadershipService Transparent IT Infrastruct. Mgmnt Reliable Service Interaction Mgmnt Mix and Capacity Mgmnt Strategy Devel'ment Mgmnt Talent Relationship Mgmnt Trustworthy Process Devel'ment Mgmnt BestValue Customer Satisfaction Mgmnt Production Mastery Mgmnt IT Adaptation Mgmnt Agile Systems Mgmnt Security Evolution Mgmnt Strategy Activity ConOps Web Inspired by Porter’s Activity Web Emphasizes Process Activity Semiconductor Foundry Lines show synergistic dependencies - Strategic Objectives - Agile Activities – Initial - Agile Activities - Later “Active” continuous outcome management (uses verbs) CustomerCompatible Strategy Delivery Mgmnt Cultural Engineering Mgmnt LeadershipService Transparent IT Infrastruct. Mgmnt Reliable Service Interaction Mgmnt Mix and Capacity Mgmnt Strategy Devel'ment Mgmnt Talent Relationship Mgmnt Trustworthy Process Devel'ment Mgmnt BestValue Customer Satisfaction Mgmnt Production Mastery Mgmnt IT Adaptation Mgmnt Agile Systems Mgmnt Security Evolution Mgmnt

59 7:59 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted On the Strategic Activity ConOps Web This web of synergistic activities, that creates values, is a system in its own right. This web graphic is a way of depicting the architecture of a ConOps. Strategic objectives/values (red): do not have a large number, 3-7, or focus is lost. Activities (yellow): these are continuous day-in-and-day-out processes that ensure the objectives are realized. They are not things or concepts. Again, keep the number smallish or the critical activities get lost in the noise. The few words used to label a red or yellow bubble are critical – they must capture and focus the essence of intent succinctly. Synergistic Dependencies: more is (often) better - multiple lines attached to every bubble – this provides robustness. And, according to Porter, makes it a lot harder for any competitor to duplicate. Note that this is not an agile architecture if Porter’s advice is taken. Porter encourages dependencies and tight coupling as ways to make competitor duplication difficult – providing a meaningful strategy. Not a good idea if the ConOps values (environment) evolve faster than the ConOps activities (system) can. So … carefully choose timeless values, and think about the activity relationship interfaces.

60 7:60 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted "When I am working on a problem, I never think about beauty, but when I have finished, if the solution is not beautiful, I know it is wrong." -- R. Buckminster Fuller “Quality is practical, and factories and airlines and hospital labs must be practical. But it is also moral and aesthetic. And it is also perceptual and subjective.” -- Tom Peters Projected Operational Story Architectural Concept & Integrity Response Situation Analysis RRS Principles Synthesis ConOps Objectives & Activities Reality Factors Identified Closure Matrix Design Quality Evaluation RAP Tools & Process

61 7:61 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted In-Class Tool Applications Class Warm-upsTeam TrialsTeam Project Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10 ConOps: Objectives Reactive/Proactive RS Analysis Framework/Modules RRS + Integrity RS Analysis RRS Analysis Reality Factors: Case RS Analysis: Case RRS Analysis: Case Reality + Activities IntegrityClosure AAP Analysis: Case

62 7:62 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted EXERCISE 1.Review your RRS exercise results from the end of Unit 6 2.Identify reality issues 3.Build/refine preliminary ConOps Web: use the “strategic objectives” from the very first exercise and add the activities necessary to deliver the values Generate two slides: 1: Reality Factors – 8 categories 2: ConOps Web – red and yellow bubbles

63 7:63 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted Reality Factors Organizational Behavior – Survival rules rule, nobody's in absolute control... ? Human (Including Customer) Behavior – Human error, whimsy, expediency, arrogance... ? Technology Pace – Accelerating technology and security-vulnerability introductions, sparse testing... ? System Complexity – Incomprehensible, highly networked, unintended consequences, emergence... ? Globalization – Partners with different ethics, values, infrastructures, cultural assumptioms... ? Other? ? Agile Customers/Competitors/Adversaries – Distributed, collaborative, self organizing, proactive, impatient, innovative... ? Partially-Agile Enterprise Faddish Practices – Outsourcing, web services, transparency, COTS policies/affects... x System ____________________________

64 7:64 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted System _____________________ ? ? ? ?? ?? ? ? ? ? ? - Strategic Themes/Values - Functional Activities Change the lines and bubbles, this is not a fill-in-the-blank model (Think: Plug-and-Play, Drag-and-drop) Strategic Activity ConOps Web


Download ppt "7:1 attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,"

Similar presentations


Ads by Google