Conway’s Law – Change or Fail?

We were recently discussing Conway’s Law in the context of the ongoing transition towards solutions which are digital in their core. The law is named after programmer Melvin Conway who first introduced it in 1967 and said: ‘ organizations which design systems … are constrained to produce designs which are copies of the communication structures of these organizations.’  If Conway is right, then this means that implementing a new inherently digital solution requires organizations to change structures or at least their ways to communicate.  Sounds like change is inevitable … 
Related:

Noisy Channel(s) to Channel-less

binary-2926088__340
From single channel to omni channel the intent was to enable enterprises to seamlessly engage with their clients across them, improve client experience by ensuring context and history are in all channels seamlessly. To date there are 3000 apps available for download from the Apple App Store.  Do we really need an exuberance of micro capabilities of each app across different channels in order to interact/ fulfill our daily lives? And if so how many are truly interconnected and contextualised? Or should the importance be of maintaining the social-connectedness from the events happening around the client’s ecosystem in order to ubiquitously interact and communicate? Channel-less is simply a window into the core client experiences.
With the exponential increase in the sophistication and proliferation of technology current communication are just not adapted to the client’s needs. Some require an intensive publishing cycle and don’t provide the necessary features as offered by other platforms. At the same time multitude of information sources makes it difficult to fill them all. Rather than adding more channels creating subsets of it, enterprises should think about orchestrating the experience base on the client’s interaction.
Defining personalized touchpoints for the client represents the journey a client engross in association to the brand which reflects precious insightful moments of truth. Regardless of channel(s), the interaction(s) be it via a channel or an IOT appliance or VR or AR, the interaction(s) should continuously be able to recognise and support the concurrency in which a client can be interacting through multiple mediums at the same time or span across but it is as if he/she is interacting as one.
In the forseable future digital assistant(s), which are permeable and omnipresent, will share and perform the responsibilities of the physical client. Acitivities will be perform by many digital assistants representing the client taking place concurrently in the various interaction mediums. E.g. a client maybe in front of a digital device performing a transaction while at the same time his/her digital assistant discusses wealth planning with a financial advisor while another is engaged with other administrative activity. Or be be it starting an activity through one interaction and finishing the same activity in another.
Simplicity is the key to remain flexible and able to rapidly change as the next wave of digital disruption takes hold. What the client wants is to connect/interact seamlessly in their ecosystem. It is not about a channel(s) it is is about providing and making the connection seamless and ubiquitous.

Homomorphic Encryption

safety-2890768_1280

Background

What is Homomorphic encryption? The ability to perform data exchange and transformations exclusively with encrypted data, only decrypting it when an authorised person needs to see a result. It is a method of performing calculations on encrypted data without decrypting them first. It converts data into encrypted text that can be analysed and worked with as if it were still in its original form. It enables complex operations/processing to be performed on encrypted data without compromising the encryption.

Storing datasets in fully homomorphic repositories removes all chances for unplanned disclosures. Only those entities with a private key can query the database, run analytics on the data and see results. This offers a secure leeway to make use of the distributed ledger technology in an as-is basis. With homomorphic encryption techniques used to store data such as smart contracts, positions, transactions over the blockchain, there won’t be any significant changes in the public distributed ledger (eg blockchain) properties and taking care of privacy concerns associated.

Usage

The use of homomorphic encryption technique will not only offer privacy protection, but readily access to encrypted data over public blockchain for auditing and other purposes (eg add-on services). Use cases can be via C2C, B2B, B2C, C2B from 3rd party services such as ride-sharing, digital marketplace, search services, or medical services.

Using the example of electronic payment protocol* for customer merchant (or a non established trusted entity). Current situation requires a trusted (signed) payment description that be sent from the merchant to the customer. Using homomorphic encryption, this is no longer required and the destination “account” number for the payment is solely created on the customer side. It eliminates the need for any encrypted or authenticated communication in the protocol and is secure even if the merchant’s digital infrastructure is compromised. Payment transaction in itself serves as a time stamped receipt for the customer.

Real life applications are not limited to providers, but as well consumers (eg financial institutions, research organisations, education, dat miners) anyone/entity who wants to be able to share data without compromising data security regardless of the environmental or other differences in context.

The impact of homomorphic encryption in the digital ecosystem will increasingly enable co-operation/collaboration between multiple parties possible especially when there is limited to no trust established as it protects and renders it not vulnerable to unauthorised access and full privacy.

Related material:
* Homomorphic payment addresses and the pay-to-contract protocol
* A Survey on Homomorphic Encryption Schemes: Theory and Implementation
* How to make Fully Homomorphic Encryption “practical and usable”

Change is inevitable ….

Evolution, tranformation or beginning revolution – open your mind, think and act!

Change is the only constant. Have you thought about the types of changes we are experiencing now? Is it evolutionary, transformational or even the coming of a revolution?
  • Evolution – the gradual development or formation of
  • Transformation – a dramatic change of state of being
  • Revolution – a dramatic and wide-reaching change in conditions, attitudes, or current establishment
Today many use the term ‘digital transformation‘ to mean the transformation of the current state into a state which is digital in its core. A state where information is continuously collected, exchanged and analyzed allowing to create smart and interconnected products which adapt and learn.
Some refer to the ‘4th industrial revolution‘ and mean a fundamental and wide reaching change affecting the life of all of us, the society and its values. What happens when smart machines perform the work and humans have time? Do we then focus on our intrinsic motivation? It is clear that many of the paradigms and trained thinking patterns we are used to immediately become invalid.
If you look around and open up your mind – enabling you to notice what you belief is possible – thus you then sense that we are probably quite close to a revolution where many things we consider as naturally given today will be replaced by a new normal.
  • Start by looking at a one example: self-driving electric cars and its implications. Soon we will transition from car ownership to co-sharing where you pay per use via a simply request which matches your current needs. There is no need for personal parking spaces or garages; With connected self driving cars, there will be substantially transformation of current governance and road infrastructure, less cars and accidents; insurances business model will need to be different.
  • Other additional examples to ponder upon such as the increase in automation or the on-demand replication of goods and imagine how the implications of these scenarios interfere and influence each other.
The changes are combinatorial and the consequences are profound and complex. They will most likely happen much faster than expected once its trigger point is reached.
Are we really in a transformation or at the beginning of a revolution?   Are you ready for the change? Are we ready for the change? Is your company making the future happen or busy running a red queen’s race?

 

Change happens …. change is happening …. progress in optional