7:1 [email protected]@stevens.edu, attributed copies permitted ES/SDOE 678...

64
[email protected] , attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis, Synthesis, and Performance Session 7 – Quality: Principles, Reality, Strategy School of Systems and Enterprises Stevens Institute of Technology, USA File File Your Class web-page: www.parshift.com/678/678-150219L3.htm Support docs & links: www.parshift.com/678/support.htm File File

Transcript of 7:1 [email protected]@stevens.edu, attributed copies permitted ES/SDOE 678...

Page 1: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:1 [email protected], attributed copies permitted

ES/SDOE 678Reconfigurable Agile Systems and EnterprisesFundamentals of Analysis, Synthesis, and Performance

Session 7 – Quality: Principles, Reality, Strategy

School of Systems and EnterprisesStevens Institute of Technology, USA

File

File

Your Class web-page: www.parshift.com/678/678-150219L3.htm Support docs & links: www.parshift.com/678/support.htm File

File

Page 2: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:2 [email protected], attributed copies permitted

Before starting…Your mid-term was just completed. Some of you had difficulty. That’s what the text book is for – learning usually requires study. D1 was a “heads-up”, intended to show you what you don’t know. A poor showing on D1 will not be held against you … but no improvement on D2 will.40 hours in class + 80 hours out of class (engaged study) is what earns course credit. Following the Instructions (when you don’t, the impression is that you are winging the whole thing):1. You are required to read and study and demonstrate that you have learned something –

in addition to showing up for class, writing something, and putting words on forms. Winging it won’t work .

2. Name your file(s): 678D<1 or 2>-<last name><first name>V<version #> Example: 678D1-DoeJohnV1.doc (version numbers insure distinction if revisions occur).

3. Some of you did not take your instructions and tool templates from SDOE678-Unit11.ppt as suggested.

4. Two-page operational story: clear evidence of a plug-and-play, drag-and-drop agile system demonstrated with response objectives, requirements, values, response enabling principles, and operational/integrity management – all wrapped inside a story of the system-in-operation, delivering its values.

The operational story is supposed to reflect a scenario after deployment, not what has to be considered for design. As a result, some of you who did design time stories instead of operational time stories had problems with your RS Analysis that is supposed to only reflect operational time issues, and this will cause problems in the Closure Matrix for the final, unless fixed.

Heads up: You will have an exercise early in the next unit (8) that will require you to develop the strategic objectives/themes from your (or what should have been) Deliverable #1 story.

Page 3: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:3 [email protected], attributed copies permitted

"Make no little plans; they have no magic to stir men's blood and probably will themselves not be realized.

Make big plans; aim high in hope and work, remembering that a noble, logical diagram

once recorded will not die, but long after we are gone will be a living thing, asserting itself with ever-growing insistency"

[Daniel Burnham, architect].

FEEDBACK REVIEWUnit 6 Exercise Feedback in Unit 8 – Now 4-or-so mid-term feedbacks instead

Page 4: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:4 [email protected], attributed copies permitted

Nov2011: www.tassimodirect.com/home-brewing-machines/hot-beverage-brewers

REVIEW

Page 5: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:5 [email protected], attributed copies permitted

Response IssuesTassimo BrewBot Operational System

Response Type

Correction

Variation

Reconfig-uration

Expansion(Capacity)

Migration

Improve-ment

Modification(Capability)

Creation

Rea

ctiv

e

Response SituationsWhat must the system be creating or eliminating in the course of its operational activity?• Make different types of hot coffee and tea drinks (t,q,s)

What performance characteristics will the system be expected to improve during operational life cycle?• Match drink flavor to user taste (t,s)

What major events coming down the road will require a change in the system infrastructure?• Multi-lingual display text option (c,s)• Larger size water container capacity option (t,s)

What modifications/evolutions in modules might be needed during the operational life cycle?New drink brewing recipes ((t,q,s) • New drink discs (t,q,s)• User wants manual recipe capability (q,s)What can go wrong that will need an automatic systemic detection and response?• Available disc selection not satisfactory to user (t)• Improperly place disc and/or RFID registration (q)

What process variables will range across what values and need accommodation?• Pressure of water called for by recipe (q,s)• Temperature of water called for by recipe (t,q,s)What are “quantity-based” elastic-capacity needs on resources/output/activity/other?• Small to large drink quantity (t,q,s)• Cup size physically accommodated (t,c,s)• What types of resource relationship configurations will need changed during operation?• Recipe brewing steps and sequence (t)• Multiple discs for a single drink (t,q)

Pro

acti

ve

• Water filtration option (c)• Cold drinks? Cocktail discs?

• User intelligence (q,s)• Amount of wate (t,q)

Page 6: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:6 [email protected], attributed copies permitted

Reconfigurable

Sca

lab

leR

eusab

le

Encapsulated Modules Modules are encapsulated independent units loosely coupled through the passive infrastructure.• Base units• Flavor discs• Display language• Recipes

Facilitated Interfacing (Pluggable) Modules & infrastructure have features facilitating easy modules insertion/removal.• RFID recipe designator on bottom of disc

Facilitated Reuse Modules are reusable and/or replicable; with supporting facilitation for finding and employing appropriate modules.• Foolproof easy in-and-out of discs• Product mktng mgr responsible for module inventory

Peer-Peer Interaction Modules communicate directly on a peer-to-peer relationship; parallel rather than sequential relationships are favored.

•Recipes drive brew subsystems directly step by step

Deferred Commitment Module relationships are transient when possible; decisions & fixed bindings are postponed until necessary.• Brew is determined by disc-inserted RFID recipe

Evolving Infrastructure Standards Module interface and interaction standards and rules that evolve slowly.• Brewing sub-systems• Water quality standards• Recipe code• Product eng mgr responsible for evolution

Redundancy and Diversity Duplicate modules provide fail-soft & capacity options; diversity provides functional options.• Many different types of discs• User inventories as many duplicates as desired

Elastic Capacity Module populations & functional capacity may be increased and decreased widely within the existing infrastructure.• Recipe designates small to large amount of water• Cup size is adjustable with base elevator• No limit to variety of discs• Alternate base unit capabilities may be added

Distributed Control & Information Decisions made at point of maximum knowledge; information accessible globally but kept locally.• Control is in each RFID recipe, not in the base unit

Self-Organization Module relationships are self-determined; and component interaction is self-adjusting or negotiated. • Recipe reorganizes brewing steps

(Think: Plug-and-Play, Drag-and-drop)RRS Principles for: Tassimo Brewbot Operational System

• RFID reader

Items here generally address issues of RS Analysis directly and indirectly

Page 7: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:7 [email protected], attributed copies permitted

Tassimo BrewBot In-Operation System

base units brew stepsdiscs

Infrastructure evolution

System assembly

Component evolution

Component readiness

Infrastructure

Components

Rules/Standards

IntegrityManagement

Active

Passive

Prod eng mgr

Automated recipe

Product eng mgr

Product mktng mgr

recipes display text

2-step lattechocolate

espressocrème

multilingual display

Disc holder, RFID placementRFID scan contentConsumer product regsIgnoredOwners manual

Sockets Signals Safety Security Service

Nov2011: www.tassimodirect.com/home-brewing-machines/hot-beverage-brewers

Agile Architecture Pattern

Page 8: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:8 [email protected], attributed copies permitted

Reusable, Reconfigurable, ScalableExpansion/Contraction: Unbounded Capacity

http://videos2view.net/xM-WLT.htmhttp://kranringen.no/content/download/295/1456/version/4/file/

Assembling a custom “truck” for moving strange/large/heavy things

A building1,790 tons,75 feet high

File5.5File8.25

Page 9: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:9 [email protected], attributed copies permitted

Tall Buildings in a Single BoundZhang Yue, founder and chairman of Broad Sustainable Building, built a 30 story building in 15 days with modular construction. His system concept is not discussed as Agile system construction, but it could be, and maybe he has discovered that. He could use the same modules developed for his 30-story building in a different configuration building that might be shorter yet broader and longer. Reusability is in the plans for constructing modules, not in the modules themselves. Reconfigurability is in the use of the modules to solve a different building configuration. See “Case Modular 30-Story Building in 15 Days.pptx”

Scalable structures can be build1// Identical modulesThe floors and ceilings of the skyscraper are built in sections, each measuring 15.6 by 3.9 meters, with a depth of 45 centimeters.Illustration: Jason Lee

Encapsulate Modules2// Preinstalled fixtures Pipes and ducts are threaded through each floor module while it's still in the factory. The client's choice of flooring is also preinstalled on top. Illustration: Jason Lee

Case

Page 10: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:10 [email protected], attributed copies permitted

www.muralmosaic.com/Cochrane.html

File2.5

Page 11: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:11 [email protected], attributed copies permitted

Modular?Agile?Why?

Page 12: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:12 [email protected], attributed copies permitted

Universal Jigsaw Puzzlewww.tenyo.co.jp/jigazo/

300 identically shaped pieces in varying shades of a single color, a few with gradations. Out of the box, you can make Mona Lisa, JFK, etc, configuring according to symbols printed on the back. Or, e-mail a photo to the company, and they will send you back a pattern that will recreate that photo.

300 pixels: an infinite number of pictures

Modular? Agile? Why?

Page 13: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:13 [email protected], attributed copies permitted

Moon Rocket forGoogle Lunar X-Prize

http://mstl.atl.calpoly.edu/~jfoley/Summer2009/Sun_1320_TubeSat%20Utah%20August%202009%201.pdf and http://www.interorbital.com/

Page 14: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:14 [email protected], attributed copies permitted

Interorbital SystemsPersonal Satellite Kit

http://spacefellowship.com/2009/08/01/interorbital-syatems-tubesat-personal-satellite-kit/ http://mstl.atl.calpoly.edu/~jfoley/Summer2009/Sun_1320_TubeSat%20Utah%20August%202009%201.pdf

$8,000 kit includes launch intolow-earth-orbit on an IOS NEPTUNE 30

after a few weeks,re-entry & burn-up

Orbit-friendlylaunches begin

in Q4 2010

Page 15: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:15 [email protected], attributed copies permitted

Plug and Play Labs, Faster Science04Apr2010 Discovery News, Ian O’Neill

http://news.discovery.com/space/shuttle-to-launch-plug-and-play-micro-labs-on-space-station.html

This is the first attempt at designing and building a standardized, cheap and lightweight technology to be used by multiple organizations for a variety experiments."When the rack is installed, you'd plug in the lab via USB," said Kris Kimel, President of Kentucky Space. By giving "CubeLabs" this capability, "they basically become 'plug and play' laboratories," Kimel said, emphasizing the convenience of the NanoRack/CubeLab concept. Up to 16 individual CubeLabs can be installed on each NanoRack, each capable of carrying out independent experiments.The most appealing thing about these mini laboratories is that they are very lightweight, so they can be easily unplugged, stowed and transported to and from the station by the next available flight. Currently, space station experiments are often too unwieldy, forcing research groups to wait for long periods of time before they can retrieve their experiments from space, no matter how interesting or important their science results may be.Also, due to their design and function, NanoRacks allow a higher pace of microgravity experimentation, stimulating more "high risk" experiments, potentially boosting low-cost space research.

A Space Science ‘Mash-Up’ - Kimel expects to have a second NanoRack installed on the ISS in May. "Almost all of our space tech is built by students. NASA has very stringent quality controls, so this is a huge achievement," he added. Kentucky Space and NanoRacks will offer their system to research groups to house their own experiments (while still providing CubeLab support), but Kimel pointed out that his organization will be carrying out experiments of their own, focusing on the microgravity biomedical field.Space Research can be Ubiquitous - The first orbital CubeSat is scheduled to be launched in November 2010. The NanoRack/CubeLab concept opens the doors to entrepreneurial space research, joining the upward trend of commercialized spaceflight while getting students, researchers, entrepreneurs and NASA to work together toward a common goal

The NanoRack plus CubeLab

Page 16: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:16 [email protected], attributed copies permitted

Murray Gell-Mann brings visibility to a crucial aspect of our existence that we can't actually see: elemental particles. He won the Nobel Prize in Physics for introducing quarks, one of two fundamental ingredients for all matter in the universe.He's been called "the man with five brains" -- and Murray Gell-Mann has the resume to prove it. In addition to being a

Nobel laureate, he is an accomplished physicist who's earned numerous awards, medals and honorary degrees for his work with subatomic particles, including the groundbreaking theory that the nucleus of an atom comprises 100 or so fundamental building blocks called quarks.Gell-Mann's influence extends well beyond his field: He's a member of the National Academy of Sciences, the American Academy of Arts and Sciences, and the Council on Foreign Relations. He also serves on the board of the Wildlife Conservation Society and is a director of Encyclopedia Britannica. Gell-Mann, a professor emeritus of Caltech, now heads the evolution of human languages program at the Santa Fe Institute, which he cofounded in 1984.A prolific writer -- he's penned scores of academic papers and several books, including The Quark and the Jaguar -- Gell-Mann is also the subject of the popular science biography Strange Beauty: Murray Gell-Mann and the Revolution in 20th-Century Physics.

Video and text above at: www.ted.com/index.php/talks/murray_gell_mann_on_beauty_and_truth_in_physics.html

Guest Speaker – Murray Gell-MannBeauty and truth in physics (16 min)

Page 17: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:17 [email protected], attributed copies permitted

BREAK

Page 18: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:18 [email protected], attributed copies permitted

Integration

Fundamentals

Tools

Perspective

Analysis

Synthesis

Course Roadmap

Have You Signed The Attendance Roster?

Session 1 – Overview and Introduction to Agile SystemsSession 2 – Problem Space and Solution Space

Session 3 – Response Types, Metrics, Values Session 4 – Situational Analysis and Strategy Exercise

Session 5 – Architecture and Design PrinciplesSession 6 – Design Exercise and Strategy Refinement

Session 7 – Quality: Principles, Reality, StrategySession 8 – Operations: Closure and Integrity Management

Session 9 – Culture and Proficiency DevelopmentSession 10 – The Edge of Knowledge, Projects

Page 19: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:19 [email protected], attributed copies permitted

Quality: Principles, Reality, Strategy

Quality principlesRequisite VarietyParsimonyHarmony

Reality Recognition

Agile-Strategy ConOps

Page 20: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:20 [email protected], attributed copies permitted

Design Quality PrinciplesRequisite Variety (Functional Quality)

Ashby's Law: "The larger the variety of actions available to a control system, the larger the variety of perturbations it is able to compensate....variety must match variety."

Any effective system must be as agile as its environmental forces.Reality-compatible (rational) policy, procedure, and practice.

Parsimony (Economic Quality)Occam's Razor: Given a choice between two ... choose the simplest.Unintended consequences are the result of complexity.Humans can only deal with 5-9 items simultaneously.Bounded rationality (Herb Simon).Reduces perceived Risk.

Harmony/Delight (Aesthetic Quality)Perception: non-negative impact on personal productivity and goal priorities. Perception: non-negative impact on org's productivity and goal priorities.Rationalized with natural human and org behavior.Engenders feelings of user Trust and Respect and Compatibility.

Page 21: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:21 [email protected], attributed copies permitted

Drug Catapult Found at U.S.-Mexico Border26Jan2011, www.foxnews.com/us/2011/01/26/drug-catapult-mexico-border/

Drug smugglers trying to get marijuana across the Arizona-Mexico border apparently are trying a new approach -- a catapult.National Guard troops operating a remote video surveillance system at the Naco Border Patrol Station say they observed several people preparing a catapult and launching packages over the International Border fence last Friday evening."It looks like a medieval catapult that was used back in the day," Tucson sector Border Patrol spokesman David Jimarez told Reuters.Tucson TV station KVOA said Border Patrol agents working with the National Guard contacted Mexican authorities, who went to the location and disrupted the catapult operation.The 3-yard tall catapult was found about 20 yards from the U.S. border on a flatbed towed by a sports utility vehicle, according to a Mexican army officer with the 45th military zone in the border state of Sonora.The catapult was capable of launching 4.4 pounds of marijuana at a time, the officer said Wednesday, speaking on condition of anonymity for security reasons.--------- http://insightcrime.org/insight-latest-news/item/1785-mexicos-army-finds-catapults-used-to-fire-drugs-into-us

02 Nov 2011: For the second time this year, Mexican authorities have found catapults used by drug traffickers to fling marijuana across the U.S.-Mexico border fence. Troops from Mexico’s army discovered two portable catapults, along with more than a ton of marijuana, at a residence in Agua Prieta, close to the Arizona border. These kind of low-tech means to get drugs across the border, like packaging drugs to fit through gaps in the fence, illustrates the shortcomings of the border fence as a means to stop traffickers.

Page 22: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:22 [email protected], attributed copies permitted

Why?The Death of the US-Mexico Virtual Fence – Slashdot: March 17, 2010“A couple of years ago it was announced that the Boeing-built virtual fence at the US-Mexico border didn't work. Started in 2006, SBInet has been labeled a miserable failure and finally halted. A soon-to-be-released GAO report is expected to be overwhelmingly critical of SBInet, causing DHS Chief Janet Napolitano to announce yesterday that funding for the project has been frozen. It's sad that $1.4 billion had to be spent on the project before the discovery that this poorly conceived idea would not work.”

Irresponsible Systems Engineers at:contractor and acquirer

1: “my boss told me to do it” didn’t work at the Nuremberg Holocaust trials2: we hang the architect who designs a faulty bridge

Page 23: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:23 [email protected], attributed copies permitted

Requisite VarietyCode of Hammurabi (2200 BC)

King of Babylonia Translated by R.F. Harper

If a builder builds a house for a man and do not make its construction firm and the house which he has built collapse and cause the death of the owner of house – the builder shall be put to death.

If it cause the death of the son of the owner of the house – they shall put to death a son of that builder.

If it destroy property, he shall restore whatever it destroyed, and because he did not make the house which he built firm and it collapsed, he shall rebuild the house which collapsed at his own expense.

Common Law in England (15th Century)If a carpenter undertakes to build a house and does it ill (not well), an action will lie against himNapoleonic Code (1804)If there is a loss in serviceability in a constructed project within 10 years of its completion because of a foundation failure or from poor workmanship, the contractor and architect will be sent to prison

Forensic Engineering, D. Fowler (slide presentation has been removed from the Internet)

Page 24: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:24 [email protected], attributed copies permitted

Parsimony

“Perfection is achieved not when there is nothing more to add, but when there is nothing left to take away.”

Ch. III: L'Avion, pg 60, Antoine de Saint-Exupery,French novelist and aviator (1900 – 1944)

Author of The Little Prince

Page 25: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:25 [email protected], attributed copies permitted

Balancing Requisite Variety & Parsimony(sometimes on the head of a pin)

Marc Stiegler, www.infoq.com/presentations/Security-vs-Security-Architecture

More Authority

SecurityEffectiveness

Give person/object everything they needand nothing else

Principle of Least Authority (POLA)

Page 26: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:26 [email protected], attributed copies permitted

Frank Lloyd Wright – On Harmony...only when we know what constitutes a

good building...when we know that the good building is not one that hurts the landscape, but is one that makes the landscape more beautiful than it was before that building was built.

Still regarded as the greatest 20th Century house ever built. Responding to the geological strata of the site, his mastlike tower of stacked shale stone seemingly held aloft three cantilevered levels hovering over Bear Run, a tiny river.

He expressed the rocky site by metaphorically lifting the stones out of the riverbed to create the interior floor planes, using the largest rock, the Kaufman's choice spot to sunbathe, as the hearthstone for the living room fireplace. And instead of orienting the structure to face the falls, Wright floated the entire structure over the falls, merging the house inseparably into the total natural picture.

Excerpted from David Jameson, www.architechgallery.com/arch_info/artists_pages/frank_lloyd_wright.html

Page 27: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:27 [email protected], attributed copies permitted

Reusable-Reconfigurable Architectural ThemesFredrich Frobel was a German educationalist who founded a series of educational tools, one of which was a set of geometric blocks that could be assembled in various combinations to form three-dimensional compositions.Wright was himself educated in the Frobel system as a child. But, early in his career, when he began having children of his own and teaching them the Frobel method, he began re-reading the instructional material and teacher

handbook. This helped him to realize a methodology he would use throughout his life.After Wright revisited the Frobel method, he turned to the cruciform (two elongated interlocking spaces in the shape of a cross) as a fundamental floor-plan unit. By unit, I mean a basic entity that is manipulated according to context. It may be stretched, contorted, and multiplied to construct higher-order compositions. A unit is also a pathway to knowledge, a systematic method of conceptualizing a problem, and may lead to the discovery of radically new pathways that may, in turn, become units in themselves. In Wright’s case, the turn to the cruciform led to the Prairie House, a “type of house characterized by a degree of both spatial freedom and formal order previously unknown in either the Old or New World”.

Darwin Martin House of 1904.

The Unit in Wright’s Scientific Method, Brett Holverstott, www.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.doc

Page 28: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:28 [email protected], attributed copies permitted

The systematic composition of unique placesA unit is useful because it may be modified in a variety of ways to fit a context. Its features may be systematically explored. For instance, a wing of the cruciform may become a staircase and closet, or it may be divided into two bedrooms, or it may be pushed up along one side of the

plan and made into a cantilevered dining room, or it may be stretched out to form a living room with a series of windows looking out to a garden.A project for Wolf Lake proposed a series of pavilions arranged around a semicircular canal and on the circular island at the center. Close examination of these pavilions, as Wright designed them in plan and perspective, reveals plan fragments matching Unity Temple, the Martin House, the Ullman House, and even a small Imperial Hotel. Here in 1895, almost the entire set of plan types that Wright would utilize in the Prairie Period were projected in the pavilions of this unbuilt design, as numerous geometrically rigorous and systematically developed variations on the theme of the cruciform interlocking of spaces and the rhythmic disposition of pier groups. This astonishing project may be considered as Wright’s equivalent of Piranesi’s ‘Campo Marzio’ etching; the repository and record for all manner of speculative forms to be utilized and realized in later designs.”

Darwin Martin House of 1904.

The Unit in Wright’s Scientific Method, Brett Holverstott, www.parshift.com/AgileSysAndEnt/Papers/FrankLloydWright02TheUnit.doc

Page 29: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:29 [email protected], attributed copies permitted

The Usonian HouseAt the beginning of his career, Frank Lloyd Wright became known for his custom dream homes for the wealthy. But by the mid-nineteen thirties he felt that quality design should not be dependent on a large budget. He invented a spare, efficient, modular based concept for building that would provide a homeowner all the luxuries that counted in his early houses: interpenetrating spaces, extravagant light, varied ceiling heights and the all-important central hearth. His name for this type of building was a modified acronym for 'United States of North America.' That the 'Usonian' House was an alliterative cousin to 'utopian' could only enhance its marketing appeal. Built on a concrete slab, it was closer to the ground and thus more interactive with nature. Early Usonians abandoned the pinwheel plan of the Prairie houses, opting for L-shaped or linear plans that reduced the sleeping areas into cells and opened the kitchen or 'workspace' into the largest floor areas devoted to living and dining. Traditional walls built of 2 x 4 studs were replaced inside and out with layered plywood and board panels that self-insulated against wind or sound.So many people vied to have the master design their houses that Wright had the luxury to choose which clients would have that privilege. He customized his Usonian houses to a wider range of wealth than those initial utopian versions for the common man, expanding the modules into myriad triangles, circles and parallelograms.

David Jameson, ArchiTech Gallery, www.architechgallery.com/arch_info/artists_pages/frank_lloyd_wright.html

Page 30: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:30 [email protected], attributed copies permitted

Even the Use of the Home was reconfigurableThe first Frank Lloyd Wright house that I ever experienced was a Usonian - the Hanna House built at Stanford University. This house evolved as the Hanna’s requirements, lifestyle and income did. It started off as a “middle-class” dwelling for a young family, and became, over a twenty year period, a spacious, eloquent home for a successful professional couple. The first small Master Bedroom became the Hanna’s study; the three children’s Bed Rooms morphed into a new Master Bed Room; and the Family Room became a large formal Dining Room for entertainment. A shop and garden room was added as income allowed. All this was accomplished with minor reconstruction; the entire scope of work having been programmed, and structurally provided for, from the beginning.

Professor Hanna was clearly in love with his environment which evolved with him and Mrs Hanna as they raised a family and built individual careers. I could see that it had become an integral part of their life and that living in it had deeply effected their view of life. He talked about the impact the environment had on his children as they were growing up.

The Post Usonian Project, Matt Taylor, 1999, http://www.matttaylor.com/public/PostUsonian.htm

Page 31: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:31 [email protected], attributed copies permitted

Aesthetic QualityFrank Lloyd Wright’s rapidly-done sketches for Fallingwater were a wonderful tour de force of architectural drawing under pressure.  As one of Wright’s admiring apprentices, Edgar Tafel recalls it, Wright was at his  Wisconsin studio on September 22, 1935,  when he got an unexpected call from Edgar Kaufmann, his impulsive client and the

owner of  the Pittsburgh department store.   Kaufmann was in Milwaukee a few hours away, and announced he was driving out to see Wright’s progress on the drawings for the summerhouse at Bear Run, Pennsylvania. “Come right along E.J., we’re ready for you,” Wright said.  At that moment he had no drawings of Fallingwater. Always resourceful, the 69-year-old architect gathered his colored pencils, went to the drafting board, and while admiring apprentices watched, rapidly drew the plans of a house that became an icon of American architecture.  As fast as his pencils wore out or broke, he reached for new ones. His style when drawing was to deliver running commentaries about the clients.  For Kaufmann he knew what was needed. “The rock on which E.J sits will be the hearth, coming right out of the floor, the fire burning just behind it.  The warming kettle will fit into the wall here…  Steam will permeate the atmosphere.  You will hear the hiss….”

http://carnegiemuseums.org/cmag/bk_issue/1999/marapr/feat1.htmDove’s interpretation: Wright had a storehouse of reusable functional modular concepts/patterns in his head that allowed him to focus his creative energy on insightful quality issues that would delight a client’s personal sense, rather than the mundane issues of functional design – which he could quickly assemble and arrange to meet the higher level aesthetic-quality objectives.

Page 32: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:32 [email protected], attributed copies permitted

Harmony: Attractive Things Work Better“Noam Tractinsky, an Israeli scientist, was puzzled. Attractive things certainly should be preferred over ugly ones, but why would they work better? Yet two Japanese researchers, Masaaki Kurosu and Kaori Kashimura, claimed just that. They developed two forms of automated teller machines. Both forms were identical in function, the number of buttons, and how they worked, but one had the buttons and screens arranged attractively, the other unattractively. Surprise! The Japanese found that the attractive ones were easier to use. Tractinsky was suspicious. Maybe the experiment had flaws. Or perhaps the result would be true of Japanese, but certainly not of Israelis. “Clearly,” said Tractinsky, “aesthetic preferences are culturally dependent.” Moreover, he continued, “Japanese culture is known for its aesthetic tradition,” but Israelis? Nah, Israelis are action oriented—they don’t care about beauty. So Tractinsky redid the experiment. He got the ATM layouts from Kurosu and Kashimura, translated them from Japanese into Hebrew, and designed a new experiment, with rigorous methodological controls. Not only did he replicate the Japanese findings, but the results were stronger in Israel than in Japan, contrary to his belief that beauty and function “were not expected to

correlate” –Tractinsky was so surprised that he put that phrase “were not expected” in italics, an unusual thing to do in a scientific paper. This is a surprising conclusion. In the early 1900s, Herbert Read, who wrote numerous books on art and aesthetics stated that "it requires a somewhat mystical theory of aesthetics to find any necessary connection between beauty and function,” and that belief is still common today. How could aesthetics affect how easy something is to use?

Book Chapter: www.jnd.org/dn.mss/CH01.pdf

Page 33: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:33 [email protected], attributed copies permitted

Wearable electronics self-powered by using human body heat06Nov09, Vladimir Leonov and Ruud Vullers J Renewable and Sustainable Energy, http://jrse.aip.org/jrsebh/v1/i6/p062701_s1?view=fulltext

An energy harvester (or an energy scavenger) is a small power generator that uses energy available in the ambient, such as electromagnetic energy, wind, water flow, or a temperature gradient. … a true energy harvester is not only a microgenerator that uses energy available in the ambient. It also does not consume sensible amounts of primary energy required in a host/neighbor object/subject so there is no need to compensate for any adverse effect caused by the harvester.Example: Necessity of a wireless remote control for a television pushed American physicist Robert Adler born in Austria to invent in 1956 a device which was converting mechanical energy of pushing the button on a remote control device into acoustic signals that controlled functions on the television set i.e., it used the principle similar to that of tuning folks. The device called “Zenith space command” stayed in use for over 2 decades.Example: The modern self-powered watches consume a power in between several and 1 μW, a very low power. However, if we look back into the history, we can find out that even the first self-winding watches consumed extremely low power, too. Indeed, walking with such a watch in the pocket for just a few tens of minutes completely wound the mainspring.A human being generates more than 100 W of heat; therefore, a quite useful electrical power still can be obtained using a person as a heat generator. The tool for converting heat flow into electricity is a thermoelectric generator (TEG), the heart of which is a thermopile. Typically, only a few watts of heat flow can be harvested unobtrusively on a person and thermoelectrically converted into several milliwatts in a form of electricity. If we recall that watches consume 1000 times less, it is fairly good power.

Page 34: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:34 [email protected], attributed copies permitted

The parking footprint of ultrasmall vehicles like the CityCar is significantly smaller than that of traditional cars. USVs can fold and stack, creating efficient urban footprints.

The CityCar’s folding capabilities drastically reduce its footprint, freeing up urban space for other uses. It also weighs a fraction of other vehicles.

17Mar2010, www.metropolismag.com/story/20100317/a-complete-rethink

Page 35: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:35 [email protected], attributed copies permitted

Complete RethinkPaul Makovsky, www.metropolismag.com/story/20100317/a-complete-rethink

Reinventing the Automobile: Personal Urban Mobility for the 21st Century (MIT Press), William J. Mitchell, directs the Smart Cities research group at MIT’s Media Lab, GM’s Christopher E. Borroni-Bird and Lawrence D. Burns (formerly of GM). Interview here with Mitchell about … why designers need to start thinking more holistically.

It’s important to get the technology and the policy right, but in the end, the way you break a logjam is by engaging people’s imagination, people’s desire, by creating things that they never thought of before. This is something that Apple has led the way in. Create sexy prototypes and convincing small-scale pilot projects in sympathetic environments.

It’s about systems thinking, about how everything is related to everything else. How do you get designers—whether they’re car designers or architects or urban planners—to take this bigger-picture, more holistic approach? One of the huge problems with design is the traditionally defined disciplines. You’re an architect or a graphic designer or a silicon-chip designer or an interaction designer, blah blah, blah. The big, important design issues just don’t fall in these categories anymore. So…we take architects, urban designers, economists, mechanical engineers, electrical geeks, and we put them together into an intense multidisciplinary design environment, and it’s everyone’s responsibility to contribute to everything and educate the rest of the group as necessary on the issues that you know most about.” We knew nothing about battery technology when we started, but one of the great adventures of MIT is you can walk down the hall and find the world’s leading expert. The strategy is to go out, find what you need to know, and bring it back to the design project.The fundamental professional skill of a designer these days is strategically investing learning time. You must be able to say, “OK, there is an immensity of stuff out there to learn, but this is what’s important to instantly learn for this project.” You can never say, “Well, I’m an architect, so I don’t do battery technology.” Engineering and business schools are starting to learn how important design is, how the most effective way of adding economic value is to do clever design, but they don’t have a clue yet how to do it.

GM/Segway PUMA concept car (left) -- MIT Media Lab’s CityCar (middle and right)

Page 36: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:36 [email protected], attributed copies permitted

Embraceable SecurityBullet-proof cars are an example of aesthetic values applied to security against an intelligent attacker.

Why? Perhaps because the car is not bought for its functional transport as much as for its self-expression statement. An armored military vehicle would do better, but not be especially acceptable, nor personally expressive in the natural value dimensions (macho militia minds excepted).

Page 37: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:37 [email protected], attributed copies permitted

Synergistic Security – EmbraceableThe Evergreen Aviation and Space Museum – home of the world-famous Spruce Goose airplane – constructed a new facility with a 232-seat IMAX theater, conference center and open gallery space for displaying aircraft. An 80-foot tall atrium is enclosed by glass on the north and south sides, and the lobby and two mezzanine levels open onto it, where biplanes and triplanes are suspended from the ceiling. To provide sweeping views of the interior and preserve the expansive feel of the space, the architects designed two open staircases. An enclosed staircase set in the back of the building would provide emergency egress in case of a fire. During construction, the building management team requested a design change that eliminated the enclosed emergency stairs at the back of the building. To meet building codes, the architects were required to redesign one of the existing open staircases to provide a fire-safe exit. That late in the project, enclosing one of the very prominent staircases with masonry, gypsum or similar fire-blocking materials would have conflicted with the overall building design and marred a dramatic feature

– three-story-high stairs that opened onto the atrium. To address this challenge, the architects proposed instead to use fire-rated glass and frames to enclose the stairs. To meet the various design and code requirements for the enclosed staircase, the fire-rated glass had to do quadruple duty: 1) be clear and wireless with frames that matched the building’s exterior glazed curtain wall as closely as possible; 2) block the spread of flames and smoke for up to two hours; 3) shield people exiting the building from the high heat of a structural fire; and 4) provide safety impact resistance since the glass would be in a floor-to-ceiling configuration. Scott/Edwards found the solution with Pilkington Pyrostop™ fire-rated glass and Fireframes® Curtainwall Series fire-rated frames from Technical Glass Products, Snoqualmie, Washington. The glass looks like ordinary window glass and provides a clear view in and out of the stairs. The curtain wall frames and doors are sleek and slender, unlike the bulky wrap-around style of traditional hollow metal steel. Together, the glass and frames are fire-rated for two hours and meet the highest impact safety ratings for glazing .

Why does construction architecture exhibit and cater to aesthetic values? Perhaps because practitioners are schooled in the arts and human needs as well as structural engineering.

Page 38: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:38 [email protected], attributed copies permitted

Agility Faces Reality

Cyber Security StrategyProvides an Example

Default Diagnostic Mode PasswordUsed to Reprogram ATM

(20 September 2006 – but still happening in lots of devices)

Someone reprogrammed an ATM in Virginia to dispense US$20 bills in place of US$5 bills. 

The machine remained in the revised mode for nine days before a clerk in the store that houses the ATM

was alerted to the situation.  An investigation determined that the password allowing access

to the ATM's diagnostic mode was the default one;the manual for the machine lists this password.

http://www.securityfocus.com/brief/310

Page 39: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:39 [email protected], attributed copies permitted

Maintaining Systems in Unstable States

Takes Constant Energy Input

Expecting or enforcing ideal and repetitive behavior ignores reality...not a substitute for effective strategy

Page 40: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:40 [email protected], attributed copies permitted

Decision Making

People make decisions every day, all day long ... about:

What to do next and how to do itWhat is expedient vs what "ought to happen"What is most important (to them) at the momentWhere to apply scarce time and resources

These decisions impact:

Security investments by the organizationSecurity practices by the organization – at the immediate momentSecurity practices by the individual – at the immediate moment

Page 41: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:41 [email protected], attributed copies permitted

Effective Strategy Requires New Understanding

A rational view of the problem:

Reality bites – what is its nature?The problem is bigger than technology – what is its nature?The situation is in constant flux – what is its nature?

A rational view of the solution:

You are compromised – now what?Situation in constant flux – what is proactive response ability?Effective strategy – what is its nature?

Page 42: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:42 [email protected], attributed copies permitted

Reality Factors Issues

Human Behavior – Human error, whimsy, expediency, arrogance...

Organizational Behavior – Survival rules rule, nobody's in control...

Technology Pace – Accelerating vulnerability-introductions...

System Complexity – Incomprehensible, unintended consequences...

Globalization – Partners with different ethics, values, infrastructures...

Agile Enterprise – Outsourcing, web services, cots, transparency...

Agile Adversaries/Competitors/Customers – Distributed, collaborative, self organizing, proactive, impatient, innovative…

Page 43: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:43 [email protected], attributed copies permitted

Page 45: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:45 [email protected], attributed copies permitted

Brad C March 2nd, 2010 at 10:34 amI’ll admit that it is a bit of a strawman argument. But this actually happened to me yesterday (hence the screenshots). I think it resonates with people because from time to time DRM goes from being a security precaution to a complete and total pain in the ass and it’s happened to all of us at least once.

www.bradcolbow.com/archive.php/?p=205

Page 46: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:46 [email protected], attributed copies permitted

http://www.geekologie.com/2010/02/25/piracy-full.jpg

Page 47: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:47 [email protected], attributed copies permitted

Piracy: Reality Factor RecognizedValve boss says service, not price, the big issue for consumers and publishers

25 Nov 2011, http://games.ign.com/articles/121/1213357p1.html

"In general, we think there is a fundamental misconception about piracy. Piracy is almost always a service problem and not a pricing problem. For example, if a pirate offers a product anywhere in the world, 24 x 7, purchasable from the convenience of your personal computer, and the legal provider says the product is region-locked, will come to your country 3 months after the U.S. release, and can only be purchased at a brick and mortar store, then the pirate's service is more valuable. Most DRM solutions diminish the value of the product by either directly restricting a customers use or by creating uncertainty.Our goal is to create greater service value than pirates, and this has been successful enough for us that piracy is basically a non-issue for our company. For example, prior to entering the Russian market, we were told that Russia was a waste of time because everyone would pirate our products. Russia is now about to become our largest market in Europe.Our success comes from making sure that both customers and partners feel like they get a lot of value from those services. They can trust us not to take advantage of the relationship that we have with them. We usually think of ourselves as customer centric rather than production centric. Most of our decisions are based on the rapidly evolving opportunities to better serve our customers, and not on optimizing to be a better game company or digital distributor. The latter focus would be more of a straitjacket than conceptual aid.

Page 48: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:48 [email protected], attributed copies permitted

So Long, And No Thanks for the Externalities:The Rational Rejection of Security Advice by Users

Cormac Herley. 2009. In Proceedings of the New Security Paradigms Workshop 2009. http://research.microsoft.com/en-us/um/people/cormac/papers/2009/solongandnothanks.pdf

It is often suggested that users are hopelessly lazy and unmotivated on security questions. They chose weak passwords, ignore security warnings, and are oblivious to certificates errors. We argue that users' rejection of the security advice they receive is entirely rational from an economic perspective. The advice offers to shield them from the direct costs of attacks, but burdens them with far greater indirect costs in the form of effort.Looking at various examples of security advice we find that the advice is complex and growing, but the benefit is largely speculative or moot. For example, much of the advice concerning passwords is outdated and does little to address actual treats, and fully 100% of certificate error warnings appear to be false positives. Further, if users spent even a minute a day reading URLs to avoid phishing, the cost (in terms of user time) would be two orders of magnitude greater than all phishing losses.Thus we find that most security advice simply offers a poor cost-benefit tradeoff to users and is rejected. Security advice is a daily burden, applied to the whole population, while an upper bound on the benefit is the harm suffered by the fraction that become victims annually. When that fraction is small, designing security advice that is beneficial is very hard. For example, it makes little sense to burden all users with a daily task to spare 0.01% of them a modest annual pain."

Page 49: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:49 [email protected], attributed copies permitted

Senior Managers Worst Information Security OffendersAs companies look for solutions to protect the integrity of their networks, data centers, and computer systems, an unexpected threat is lurking under the surface — senior management. According to a new survey, 87% of senior managers frequently or occasionally send work materials to a personal email or cloud account to work remotely, putting that information at a much higher risk of being breached. 58% of senior management reported having accidentally sent the wrong person sensitive information (PDF), compared to just 25% of workers overall.

Nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber-attacks.Yet, 52% of this same group indicated they are falling down on the job, rating corporate America’s ability to respond to cyber-threats at a “C” grade or lower.Rank-and-file workers differ in their opinions about cyber security accountability, with 54% of those respondents saying IT professionals are responsible for putting the right safeguards in place

2013 study

Page 50: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:50 [email protected], attributed copies permitted

Getting Help is only a Click Away

Page 51: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:51 [email protected], attributed copies permitted

Nothing is Too Hard

Phony Cisco Equipment Made in ChinaSANS NewsBites, December 8, 2009 -- Two men have been charged in connection with a scheme in which they allegedly passed off networking equipment purchased in China as Cisco products. Christopher Myers and Timothy Weatherly allegedly packaged the equipment in boxes with phony Cisco labels and included copies of Cisco manuals. They allegedly sold the equipment online. Both have been charged with conspiracy, trafficking in counterfeit goods, and trafficking in counterfeit labels. Myers is also accused of accessing a website to obtain Cisco serial numbers to attach to the products he and Weatherly sold.

Counterfeit chips from China sold to NavySlashdot 25 Nov 2009: “Neil Felahy of Newport Coast, California, has pleaded guilty to conspiracy and counterfeit-goods trafficking for his role in a chip-counterfeiting scam. Felahy, along with his wife and her brother, operated several microchip brokerage companies under a variety of names, including MVP Micro, Red Hat Distributors, Force-One Electronics and Pentagon Components. 'They would buy counterfeit chips from China or else take legitimate chips, sand off the brand markings and melt the plastic casings with acid to make them appear to be of higher quality or a different brand,' the US Department of Justice said in a press release. The chips were then sold to Naval Sea Systems Command, the Washington, DC group responsible for maintaining the US Navy's ships and systems, as well as to an unnamed vacuum-cleaner manufacturer in the Midwest.”

Page 52: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:52 [email protected], attributed copies permitted

Who You Gonna Trust?

Olympus Ships Cameras with Virus on Memory CardSlashdot June 08, 2010: "Olympus Japan has issued a warning to customers who have bought its Stylus Tough 6010 digital compact camera that it comes with an unexpected extra — a virus on its internal memory card. The Autorun worm cannot infect the camera itself, but if it is plugged into a Windows computer's USB port, it can copy itself onto the PC, then subsequently infect any attached USB device. Olympus says it 'humbly apologizes' for the incident, which is believed to have affected some 1,700 units. The company said it will make every effort to improve its quality control procedures in future. Security company Sophos says that more companies need to wake up to the need for better quality control to ensure that they don't ship virus-infected gadgets. At the same time, consumers should learn to always ensure Autorun is disabled, and scan any device for malware before they use it on their computer."

HTC Android Phones Found With Malware Pre-InstalledSlashdot March 09, 2010: "Security researchers have found that Vodafone, one of the world's larger wireless providers, is distributing some HTC phones with malware pre-installed on them. The phone, HTC's Magic, runs the Google Android mobile operating system, and is one of the more popular handsets right now. A researcher at Panda Software received one of the handsets recently, and upon attaching it to her PC, found that the phone was pre-loaded with the Mariposa bot client. Mariposa has been in the news of late thanks to some arrests connected to the operation of the botnet."

Page 53: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:53 [email protected], attributed copies permitted

Reality Factors

Organizational Behavior Reality – Survival rules rule, nobody's in absolute control...

Human (including customer) Behavior Reality – Human error, whimsy, expediency, arrogance...

Technology Pace Reality – Accelerating technology and security-vulnerability introductions, sparse testing, new agile SE methods and knowledge...

System Complexity Reality – Incomprehensible, highly networked, unintended consequences, emergent behavior...

Globalization Reality – Partners with different ethics, values, infrastructures, cultural assumptions...

Agile Customers/Competitors/Adversaries – Distributed, collaborative, self organizing, proactive, impatient, innovative…

Partially-Agile Enterprise Reality (Faddish Practices) – Outsourcing, web services, SOA, process and progress transparency, COTs policies and affects...

Environmental Reality AnalysisRSA exercises often assume a reasonably behaved and supportive environment, and tend to focus on the system’s

internal functional response situations. This framework tool moves the analysis into the external environment.

Page 54: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:54 [email protected], attributed copies permitted

In-Class Tool Applications

Class Warm-ups Team Trials Team ProjectUnit 2

Unit 3

Unit 4

Unit 5

Unit 6

Unit 7

Unit 8

Unit 9

Unit 10

ConOps: Objectives

Reactive/Proactive

RS Analysis

Framework/Modules

RRS + Integrity

RS Analysis: TWS

RRS Analysis: TWS

Reality Factors: Case

RS Analysis: Case

RRS Analysis: Case

Reality + ActivitiesTSA

Integrity: TWS Closure

AAP Analysis: Case

Page 55: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:55 [email protected], attributed copies permitted

Reality Factors – TSA Screening Vulnerabilities… as You See It

Organizational Behavior Reality – Survival rules rule, nobody's in absolute control...• Performance metrics, knee jerk open ended reaction• Counterproductive incentives, airline circumvention

Human (Including Customer) Behavior Reality – Human error, whimsy, expediency, arrogance...• Hangover isn’t paying attention, routine produces boredom, fatigue, care of the job• Overreaction and stereotyping, subjective standards, training exercises that test only expected procedures

Technology Pace Reality – Accelerating technology and security vulnerability...• Scanning machine BS

System Complexity Reality – Incomprehensible, networked, unintended consequences, emergence...• Training for all reasonably possible threats

Globalization Reality – Partners with different ethics, values, infrastructures, cultural assumptions...• Ethical and cultural differences, passengers of all kinds of background • Reliance on flight origin for certain standards

Other?• ?

Agile Customers/Competitors/Adversaries – Distributed, collaborative, impatient, innovative...• Bad guys watch and find weaknesses in repetitive patterns, share info on Internet

Partially-Agile Enterprise Reality (Faddish Practices) – Outsourcing, web services, COTS policies...• xxxx

Page 56: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:56 [email protected], attributed copies permitted

Reality Factors

Organizational Behavior – Survival rules rule, nobody's in control...• The “get it done, I don’t care how” attitude that is sometimes present.• The idea to keep work load high but manpower minimal.• Counterproductive monetary incentives that put schedule over quality.

Human Behavior – Human error, whimsy, expediency, arrogance...• Lack of attention to detail by production and engineers.• Fatigue due to long hours with short breaks.• Arrogant less experienced mechanics not seeking the advice of more experience mechanics.

Technology Pace – Accelerating vulnerability-introductions, sparse testing, new agile SE methods...• Electronic drilling machine.• Work instruction-delivery changing with technology pace.

System Complexity – Incomprehensible, highly networked, unintended consequences, emergence...• High knowledge/experience required.• Level of complexity leads to unintended consequences such as additional damage by the mechanics.

Globalization – Partners with different ethics, values, infrastructures, cultural assumptions...• Diverse ethnicities and cultural beliefs and values among customers.• Priority lists are different due to diversity.

Agile Adversaries/Competitors/Customers – Distributed, collaborative, impatient, innovative...• Competitors may provide a more agile operation.• Customer desires maximum agility.

Partially Agile Enterprise (Faddish Practices) – Outsourcing, web services, SOA, process and progress transparency, COTS policies and affects...

• Outsourcing manufacturing.• Using Components off the shelf (COTS).

Example: Agile SE For Aircraft Refurb Company(L3 student master’s project)

Page 57: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:57 [email protected], attributed copies permitted

Porter on Strategy

LimitedPassenger

Service

HighAircraft

Utilization

Lean, HighlyProductiveGround andGate Crews

Very LowTicketPrices

Short HaulPoint-to-Point

Mid-sized CitiesSecondary

Airports

Frequent,Reliable

Departures

Flexibleunion

contract

Highemployee

stockownership

"Southwestthe low-fare

airline"

Highemployee

pay

Automaticticketingmachines

Limiteduse oftravelagents

No seatassignments

Nomeals

15 minutegate

turnaroundStandard737 fleet

Noconnections

with otherairlines

No baggagetransfers

Strategic differentiation…cornerstone characteristics

Page 58: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:58 [email protected], attributed copies permitted

CustomerCompatible

StrategyDeliveryMgmnt

CulturalEngineering

Mgmnt

LeadershipService

Transparent

ITInfrastruct.

Mgmnt

Reliable

ServiceInteraction

Mgmnt

Mix andCapacityMgmnt

StrategyDevel'ment

Mgmnt

TalentRelationship

Mgmnt

Trustworthy

ProcessDevel'ment

Mgmnt

BestValue

CustomerSatisfaction

Mgmnt

ProductionMasteryMgmnt

ITAdaptation

Mgmnt

AgileSystemsMgmnt

SecurityEvolutionMgmnt

Strategy Activity ConOps WebInspired by Porter’s Activity Web

Emphasizes Process Activity

Semiconductor Foundry

Lines show synergisticdependencies

- Strategic Objectives- Agile Activities – Initial- Agile Activities - Later

“Active” continuousoutcome management (uses verbs)

CustomerCompatible

StrategyDeliveryMgmnt

CulturalEngineering

Mgmnt

LeadershipService

Transparent

ITInfrastruct.

Mgmnt

Reliable

ServiceInteraction

Mgmnt

Mix andCapacityMgmnt

StrategyDevel'ment

Mgmnt

TalentRelationship

Mgmnt

Trustworthy

ProcessDevel'ment

Mgmnt

BestValue

CustomerSatisfaction

Mgmnt

ProductionMasteryMgmnt

ITAdaptation

Mgmnt

AgileSystemsMgmnt

SecurityEvolutionMgmnt

Page 59: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:59 [email protected], attributed copies permitted

On the Strategic Activity ConOps WebThis web of synergistic activities, that creates values, is a system in its own right.This web graphic is a way of depicting the architecture of a ConOps.Strategic objectives/values (red): do not have a large number, 3-7, or focus is lost.Activities (yellow): these are continuous day-in-and-day-out processes that ensure the objectives are realized. They are not things or concepts. Again, keep the number smallish or the critical activities get lost in the noise.The few words used to label a red or yellow bubble are critical – they must capture and focus the essence of intent succinctly. Synergistic Dependencies: more is (often) better - multiple lines attached to every bubble – this provides robustness. And, according to Porter, makes it a lot harder for any competitor to duplicate.

Note that this is not an agile architecture if Porter’s advice is taken. Porter encourages dependencies and tight coupling as ways to make competitor duplication difficult – providing a meaningful strategy. Not a good idea if the ConOps values (environment) evolve faster than the ConOps activities (system) can.So … carefully choose timeless values, and think about the activity relationship interfaces.

Page 60: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:60 [email protected], attributed copies permitted

"When I am working on a problem,I never think about beauty, but when I have finished, if the solution is not beautiful, I know it is wrong."-- R. Buckminster Fuller

“Quality is practical, and factories and airlines and hospital labs must be practical. But it is also moral and aesthetic. And it is also perceptual and subjective.”-- Tom Peters

ProjectedOperational

Story

ArchitecturalConcept

& Integrity

ResponseSituation Analysis

RRSPrinciples Synthesis

ConOpsObjectives& Activities

Reality Factors

Identified

ClosureMatrixDesign

QualityEvaluation

RAPTools & Process

Page 61: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:61 [email protected], attributed copies permitted

In-Class Tool Applications

Class Warm-ups Team Trials Team ProjectUnit 2

Unit 3

Unit 4

Unit 5

Unit 6

Unit 7

Unit 8

Unit 9

Unit 10

ConOps: Objectives

Reactive/Proactive

RS Analysis

Framework/Modules

RRS + Integrity

RS Analysis

RRS Analysis

Reality Factors: Case

RS Analysis: Case

RRS Analysis: Case

Reality + Activities

Integrity Closure

AAP Analysis: Case

Page 62: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:62 [email protected], attributed copies permitted

EXERCISE

1. Review your RRS exercise results from the end of Unit 62. Identify reality issues3. Build/refine preliminary ConOps Web: use the “strategic

objectives” from the very first exercise and add the activities necessary to deliver the values

Generate two slides:1: Reality Factors – 8 categories2: ConOps Web – red and yellow bubbles

Page 63: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:63 [email protected], attributed copies permitted

Reality Factors

Organizational Behavior – Survival rules rule, nobody's in absolute control...• ?

Human (Including Customer) Behavior – Human error, whimsy, expediency, arrogance...• ?

Technology Pace – Accelerating technology and security-vulnerability introductions, sparse testing...• ?

System Complexity – Incomprehensible, highly networked, unintended consequences, emergence...• ?

Globalization – Partners with different ethics, values, infrastructures, cultural assumptioms...• ?

Other?• ?

Agile Customers/Competitors/Adversaries – Distributed, collaborative, self organizing, proactive, impatient, innovative...• ?

Partially-Agile Enterprise Faddish Practices – Outsourcing, web services, transparency, COTS policies/affects...• x

System ____________________________

Page 64: 7:1 rick.dove@stevens.edurick.dove@stevens.edu, attributed copies permitted ES/SDOE 678 Reconfigurable Agile Systems and Enterprises Fundamentals of Analysis,

7:64 [email protected], attributed copies permitted

System _____________________

?

?

?

??

? ?

?

?

?

?

?

- Strategic Themes/Values

- Functional Activities

Change the lines and bubbles,this is not a fill-in-the-blank model (Think: Plug-and-Play, Drag-and-drop)

Strategic Activity ConOps Web