Blog

The C-Suite

WHO they are, What the do, Why they exist, How they add value

In corporate leadership, the C-Suite stands as the command centre, where strategic decisions are made, and the future of the company is shaped. Comprising key executives with specialised roles, the C-Suite plays a crucial role in steering organisations towards success. In this blog post, we’ll delve into the world of the C-Suite, shedding light on the responsibilities and value each role brings to the table.

  1. CEO – Chief Executive Officer

The CEO, or Chief Executive Officer, is the captain of the ship, responsible for charting the company’s course and ensuring its overall success. The CEO sets the vision, mission, and strategy, providing leadership to the entire organisation. They are the ultimate decision-maker, accountable to the board of directors and stakeholders.

  1. CFO – Chief Financial Officer

The CFO, or Chief Financial Officer, is the financial maestro of the C-Suite. Tasked with overseeing the financial health of the organisation, the CFO manages budgets, financial planning, and investment strategies. They play a pivotal role in risk management, ensuring sustainable growth and profitability.

  1. COO – Chief Operating Officer

The COO, or Chief Operating Officer, is the executor of the CEO’s vision. Responsible for day-to-day operations, the COO ensures that the company’s processes and systems align with strategic goals. They focus on efficiency, productivity, and scalability, optimising internal functions for maximum performance.

  1. CIO – Chief Information Officer

In the digital age, the CIO, or Chief Information Officer, holds a critical role. Charged with managing the company’s technology infrastructure, the CIO ensures that information systems align with business objectives. They play a pivotal role in driving innovation and digital transformation.

  1. CHRO – Chief Human Resources Officer

The CHRO, or Chief Human Resources Officer, is the guardian of the company’s most valuable asset—its people. Responsible for talent acquisition, employee development, and creating a positive work culture, the CHRO plays a key role in shaping the organisation’s human capital strategy.

  1. CMO – Chief Marketing Officer

The CMO, or Chief Marketing Officer, is the storyteller-in-chief. Charged with building and promoting the company’s brand, the CMO develops marketing strategies to drive growth and customer engagement. They are instrumental in shaping the company’s public image and market positioning.

  1. CRO – Chief Revenue Officer

The CRO, or Chief Revenue Officer, is the architect of revenue streams. Focused on driving sales and revenue growth, the CRO collaborates with sales, marketing, and other departments to optimise customer acquisition and retention strategies.

  1. CTO – Chief Technology Officer

The CTO, or Chief Technology Officer, is the technology visionary. Tasked with leading technological innovation, the CTO develops and implements technology strategies that align with the company’s business goals. They often play a crucial role in product development and ensuring technological competitiveness.

  1. CLO – Chief Legal Officer

The CLO, or Chief Legal Officer, is the legal guardian of the organisation. Responsible for managing legal risks and ensuring compliance with laws and regulations, the CLO provides legal counsel to the executive team and oversees matters such as contracts, intellectual property, and litigation.

Summary – Cheat sheet

Conclusion

The C-Suite represents a powerhouse of expertise, each member contributing their unique skills to the overall success of the organisation. By understanding the roles and responsibilities of the CEO, CFO, COO, CIO, CHRO, CMO, CRO, CTO, and CLO, we gain insights into the intricate workings of corporate leadership. Together, these leaders form a cohesive unit, steering the ship through the complexities of the business world, adding significant value to the organisation and its stakeholders.

Embracing Fractional Technology Leadership Roles: Unlocking Business Potential

In today’s fast-paced and ever-evolving business landscape, companies are increasingly turning to fractional technology leadership roles to drive innovation, streamline operations, and maintain a competitive edge. But what exactly are these roles, and what benefits do they offer to organisations? Let’s explore.

What are Fractional Technology Leadership Roles?

Fractional technology leadership roles involve hiring experienced tech leaders on a part-time or contract basis to fulfil critical leadership functions without the full-time commitment. These roles can include fractional Chief Information Officers (CIOs), Chief Technology Officers (CTOs), and other senior IT positions. Unlike traditional full-time roles, fractional leaders provide their expertise for a fraction of the time and cost, offering flexibility and specialised knowledge tailored to specific business needs.

Benefits of Fractional Technology Leadership

  1. Cost-Effective Expertise
    • Budget-Friendly: Small and medium-sized enterprises (SMEs) often struggle with the high costs associated with full-time C-suite executives. Fractional leaders provide top-tier expertise at a fraction of the cost, making it financially feasible for businesses to access high-level strategic guidance.
    • No Long-Term Commitment: Companies can engage fractional leaders on a project basis or for a specified period, eliminating the financial burden of long-term employment contracts, benefits, and bonuses.
  2. Flexibility and Scalability
    • Adaptable Engagements: Businesses can scale the involvement of fractional leaders up or down based on project demands, budget constraints, and strategic priorities. This flexibility ensures that companies can adapt to changing market conditions without the rigidity of permanent roles.
    • Specialised Skills: Organisations can tap into a diverse pool of talent with specialised skills tailored to their current needs, whether it’s implementing a new technology, managing a digital transformation, or enhancing cybersecurity measures.
  3. Accelerated Innovation and Growth
    • Fresh Perspectives: Fractional leaders bring fresh ideas and perspectives from their diverse experiences across industries. This can foster innovation and help companies identify new opportunities for growth and improvement.
    • Immediate Impact: With their extensive experience, fractional technology leaders can hit the ground running, delivering immediate value and accelerating the pace of technology-driven initiatives.
  4. Reduced Risk
    • Expert Guidance: Navigating the complexities of technology implementation and digital transformation can be daunting. Fractional leaders provide expert guidance, reducing the risk of costly mistakes and ensuring that projects are executed efficiently and effectively.
    • Crisis Management: In times of crisis or technological disruption, fractional leaders can step in to provide stability, strategic direction, and crisis management expertise, helping businesses navigate challenges with confidence.
  5. Focus on Core Business Functions
    • Delegate Complex Tasks: By entrusting technology leadership to fractional experts, business owners and executives can focus on core business functions and strategic goals, knowing that their technology initiatives are in capable hands.
    • Enhanced Productivity: With dedicated fractional leaders managing tech projects, internal teams can operate more efficiently, leading to enhanced productivity and overall business performance.

Unlock Your Business Potential with renierbotha Ltd

Are you ready to drive innovation, streamline operations, and maintain a competitive edge in today’s dynamic business environment? Look no further than renierbotha Ltd for exceptional fractional technology leadership services.

At renierbotha Ltd, we specialise in providing top-tier technology leaders on a part-time or contract basis, delivering the expertise you need without the full-time commitment. Our experienced fractional CIOs, CTOs, and senior IT leaders bring fresh perspectives, specialised skills, and immediate impact to your organisation, ensuring your technology initiatives are executed efficiently and effectively.

Why Choose renierbotha Ltd?

  • Cost-Effective Expertise: Access high-level strategic guidance at a fraction of the cost.
  • Flexibility and Scalability: Adapt our services to your project demands and strategic priorities.
  • Accelerated Innovation: Benefit from fresh ideas and rapid implementation of technology-driven initiatives.
  • Reduced Risk: Navigate the complexities of technology with expert guidance and crisis management.
  • Enhanced Focus: Delegate complex tech tasks to us, allowing you to concentrate on your core business functions.

Take the Next Step

Don’t let the challenges of technology hold your business back. Partner with renierbotha Ltd and unlock the full potential of fractional technology leadership. Contact us today to discuss how our tailored services can help your organisation thrive.

Contact Us Now

Conclusion

Fractional technology leadership roles offer a compelling solution for businesses seeking high-level expertise without the financial and logistical challenges of full-time executive hires. By leveraging the flexibility, specialised skills, and strategic insights of fractional leaders, companies can drive innovation, accelerate growth, and navigate the complexities of today’s technology landscape with confidence.

Embrace the future of technology leadership and unlock your business’s potential with fractional technology roles.

Experience the future of technology leadership with renierbotha Ltd. Let’s drive your business forward together!

Agile Fixed Price Projects

The Agile fixed price is a contractual model agreed upon by suppliers and customers of IT projects that develop software using Agile methods. The model introduces an initial concept & scoping phase after which budget, due date, and the way of steering the scope within the framework is agreed upon. This differs from traditional fixed-price contracts in that fixed-price contracts usually require a detailed and exact description of the subject matter of the contract in advance.

Fixed price contracts are evil – this is what can often be heard from agilest. On the other hand, those contracts are reality which many agile teams have to face. But what if we try to embrace and manage it instead of fighting against it? How can a company execute this kind of contract using agile practices to achieve better results with lower risk? This article will try to answer those questions.

Fixed Price, Time and Scope

Fixed price contracts freeze three project factors at once – money, time and scope – but this should not be a problem for agile teams. In fact, time boxing is common agile practice. Limiting money simply makes time boxing work better.

A real problem with fixed price contracts is the scope, which is fixed in terms of what should exactly be built instead of how much should we build.

Why are clients so obsessed with fixing the scope? We understand that they want to know how much they will pay (who does not want to know that) and when they will get the product. The only thing they don’t know, even if they will not always admit it, is what exactly they want as the final product.

The reason for fixing the scope has its roots in:

  • Lack of trust between the contractors.
  • Lack of understanding about how the agile software development methodology and processes work.
  • Misunderstanding what the scope means.

Every fixed price contract has a companion document, the “Requirements Specification” or something similar. Most of the time, working in an Agile way, the business requirements are relatively light weight criptic notes captured on stickies or story boards and not in comprehensive Business Requirement Documents (BRDs) pre-approved by business before developemnt commences. Documented requirements tries to reduce the risk of forgetting something important and tries to set a common understanding of what should be done to provide an illusion of predictability of what the business actually wants and needs in the final product.

Key wrong assumptions in fixing the scope are:

  • The more detail we include in the requirements and scope definition up front, the better we understand each other.
  • Well-defined scope will prevent changes.
  • A fixed scope is needed to better estimate price and time.

Converting the Fixed Scope into Fixed Budget

In understanding that the main conflict between application of an agile mindset and a fixed price contract lies in the fixed scope, we can now focus on converting the fixed scope into the fixed budget.

A well defined scope is done by capturing business requirements in as many user stories instead of providing a detailed specification of requirements. These stories are built into a product backlog. The effort required to deliver each story is estimated using one of many story point techniques, like planning poker.

It is key to understand that a higher level of detail in software requirements specifications, means two completely different things for both parties within a contract. Software companies (vendors / supplier), responsible for developing applications, will usually focus on technical details while the company using the software (buying party / customer) is more user focussed and business outcome oriented.

In compiling specifications four key aspects are in play:

  • User stories is a way of expressing requirements, understandable for both suppliers and customers. The understanding builds trust and a sense of common vision. User stories are quick to write and quick to destroy, especially written on an index card. They are also feature oriented, so they can provide a good view on the real scope of a project, and we can compare them with each other in terms of size or effort.
  • Acceptance Ctiteria, captured for each user story, are a formalised list of requirements that ensires a user story is completed with all scenarios taken into account – it specifies the conditions under which a story is fulfilled.
  • Story points as a way of estimating stories, are units of measure for expressing an estimate of the overall effort required to fully implement a user story or other pieces of work on the product backlog. The team will access the effort to deliver a story against the acceptance criteria and in relation to other stories. Various proven estimation techniques can be adopted by the team for example effort can be expressed as a T-shirt size (i.e. Large, Medium, Small). To quantify the effort, each T-shirt size can be assigned a number of story points i.e. Large = 15 storypoints, Medium 5 storypoints and Small = 2 story points. (See also the section on Estimation below). The intention of using story points, instead of man hours, is to lower the risk of underestimating the scope because, story points in their nature are relative and focused on the whole scope or on a group of stories, while traditional estimation (usually done in man-hours) tries to analyse each product feature in isolation.
  • Definition of done is another way of building trust and common understanding about the process and all the future plans for the project. It’s usually the first time clients see user stories and while they may like the way the stories are written, it may not be so obvious what it means to implement a story. Development teams who confirm with the client their definition of done, in conjunction with the acceptance criteria with, illustrate that they know better what the client’s expectations are.Development on a story will be completed when the defenition of done is achieved. This supports better estimation. In addition on the client side, the definition of done, in conjunction with the accpetance criteria, sets the criteria for user story acceptance.

Using the above four aspects, will provide the building blocks to define the scope budget in story points. This story point budget and not the stories behind it, is the first thing that should be fixed in the contract.

This sets the stage for change.

While we have the scope budget fixed (in terms of story points) we still want to embrace change, the agile way. As we are progressing with the project delivery, and especially during backlog refinement, we have the tools (user stories and points) which we can use to compare one requirement with another. This allows us to refine stories and change requirements along the way within a defined story point budget limit. And if we can stay within that limit, we can also stay within the fixed price and time.

Before Estimation

The hardest part in preparing a fixed price contract is to define the price and schedule that will be fixed based on, in most cases, not so well-defined requirements but preferably a well defined scope.

How can you prepare the project team (customer & supplier) to provide the best possible initial estimation?

Educate: Meet with your client and describe the way you’re going to work. We need to tell what the stories are all about, how we are going to estimate them and what is the definition of done. We might even need to do that earlier, when preparing an offer for the client’s Request For Proposal (RFP). Explain the agile delivery mothodology and you will use it to derive the proposal.

Capture user stories: This can be arranged as a time-boxed sessions, usually not taking no more than 1 or 2 days. This is long enough to find most of the stories forming the product vision without falling into feature creep. At this point it is also very important to discuss the definition of done, acceptance criteria for stories, iterations and releases with the client.

We need to know:

  • The environment in which stories should be tested (like the number of browsers or mobile platforms, or operating systems)
  • What kind of documentation is required
  • Where should finished stories be deployed so that the client can take a look at them
  • What should the client do (i.e. take part in a demo session)
  • How often do we meet and who participates
  • etc.

This and probably many more project specific factors will affect the estimation and will set a common understanding about the expectations and quality on both sides. They will also make the estimation less optimistic as it often happens when only the technical aspects of story implementation are considered by the team.

Estimation

Having discussed with the client a set of stories and a definition of done, we can now start the estimation. This is a quite well-known part of the process. The most important activity here is to engage as many future team members as possible so that the estimation is done collectively. Techniques like planning poker are known to lower the risk of underestimation because of some particular team member’s point of view, especially if this team member is also the most experienced-one, which is usually the case when estimations are done be one person. It is also important that the stories are estimated by the people who will actually implement the system.

Apart from T-shirt sizes to expressed effort estiamtion, as mentioned under Story Points above, the Fibonacci-like scale (1, 2, 3, 5, 8, 13, 20, 40, 100) comes in handy for estimating stories in points. Relative estimation starts with finding a set of easiest or smallest stories. They will get 1 or 2 points as a base level for further estimation.

In fact during the initial estimation it is often hard to estimate stories using the lowest values like 1 or 2. The point is, the higher the estimation, the less we know about the story. This is also why estimating in points is easier at this early stage, because it is far easier to tell that a story A is 2x as complicated as story B than to tell that story A will take 25 man-hours to get it Done (remember the definition of done?) and the story B will take 54 hours.

This works well even if we choose 3 or 5 point stories as the base level and if we do that, then it will be easier to break them down into smaller stories later during the development phase. Beware however the stories of 20, 40 or 100 points. This kind of estimation suggests that we know nothing about what is to be implemented, so it should be discussed with the client here and now in a little more detail instead of just happily putting it in the contract.

The result of the estimation is a total number of story points describing the initial scope for a product to be built. This is the number that should be fixed in terms of scope for the contract, not the particular stories themselves.

Deriving the Price and Time

Total number of points estimated based on the initial set of stories does not give us the price and time directly. To translate story points into commercial monetory numbers we need to know more about the development team’s makeup described in the number of differently skilled resources within a team, and the team’s ability to delivery work which is expresessed in an agile KPI referred to as the Team Capacity and/or Velocity.

The team’s velocity refers to the pace, expressed in story points per development cycle or sprint, at which a team can deliver work. The team’s capacity is defined by the average number of story points the team can deliver within a development cycle or sprint. An increase in the velocity, as a result of increased efficiency and higher productivity, will over time increase the teams capacity. Understandably, changing the makeup of the team will impact the team’s velocity/capacity. The team’s capacity and velocity is established through experience on previous projects the team delivered. A mature agile team is characterised by a stable and predictable velocity/capacity.

Let’s use a simple example to demonstrate how the team makeup and velocity are used to determine the project cost and time.

Assume we have:

  • Estimated our stories for a total of 300 story points.
  • The team makeup consists of 5 resources – 3 developers, 1 tester and a team leader.
  • Agile Scrum will be team’s delivery methodology.
  • Experience has shown this teams capacity / velocity is 30 story points over development cycle or sprint length of 2 weeks.

Determine the predicted Timeline

Time = <Points> / <Velocity> * <Sprint length>

Thus…

Time = 300 / 30 * 2 = 20 weeks (or 10 sprints)

Many factors during the project may affect the velocity, however if the team we’re working with is not new, and the project we’re doing is not a great unknown for us, then this number might be actually given based on some evidence and observations of the past.

Now we may be facing one of the two constraints that the client could want to impose on us in the contract:

  • The client wants the software as fast as we can do it (and preferably even faster)
  • The client wants as much as we can do by the date X (which is our business deadline)

If the calculated time is not acceptable then the only factor we can change is the team’s velocity. To do that we need to change the teams makeup and extend the team, however this is not working in a linear way i.e. doubling the team size will nor necessarily double its velocity but it should increase the velocity as the team should be able to do more work within a development cycle.

Determine the predicted Price

Calculating the price is based on the makeup of the team and the assocaited resource/skill set rate card (cost per hour).

The teams cost per sprint is calculated by the % of time or number of hours each reasurce will spend on the project within a sprint.

For our eaxmple, let assume:

  • A Sprint duration of 2 weeks has 10 working days and working 8 hours per day = 80h per sprint.
  • Developer 1 will work 100% on the project at a rate of £100 per hour.
  • Developer 2 will work 50% of his time on the project at a rate of £80 per hour.
  • Developer 3 will also work 100% on the project at a rate of £110 per hour.
  • The Team Leader will work 100% on the project at a rate of £150 per hour.
  • The Tester will be 100% on the project at £80 per hour.

The team cost per sprint (cps) will thus be…

Resource cost per sprint (cps) = <hours of resource per sprint> * <resource rate per hour>

  • Developer 1 cps = 80h * £100 = £8,000
  • Developer 2 cps = 40h (50% of 80h) * £80 = £3,200
  • Developer 3 cps = 80h * £110 = £8,800
  • Team Leader cps = 80h * £150 = £12,000
  • Tester cps = 80h * £80 = £6,400

Total team cost per sprint = (sum of the above) = £38,400 per sprint

Project predicted Price = <Number of sprints (from Predicted Timeline calculation)> * <Team cost per sprint>

Project predicted Price = 10 sprint * £38,400 per sprint = £384,000

So the Fix Price Contract Values are:

  • Price: £576,000
  • Time: 20 weeks (10 x 2 week sprints)
  • Scope: 300 Story Points

These simplistic calculations are of course just a part of the cost that will eventually get into the contract, but they are also the part that usually is the hardest to define. The way in which these cost are calculated also shows how delivering agile projects can be transferred into the contract negotiations environment.

Negotiating on Price

“So why is it so expensive?”, most customers ask.

This is where negotiations actually start.

The only factor a software company is able to change is its man-hour cost rate. It is the rate card that we are negotiating. Not the length of our iteration, not even the number of iterations. Developers, beyond popular believe, has no superhero powers and will not start working twice as fast just because it is negotiated this way. If we say we can be cheaper it is because we will earn less not because we will work faster.

The other factor that can influence the price is controlled by the customer – the scope.

Tracking Progress and Budget

Now that we have our contract signed, it is time to actually build the software within the agreed constraints of time and budget.

Delivering your fixed price project in an agile way is not a magic wand that will make all your problems disappear but it if measured correctly it will give you early visisbility. That is where the project metrics and more specific the burndown graphs come in to play. Early visibility provides you with the luxury of early corrective action ensuuring small problems do not turn into large expesive one’s.

One such a small mistake might be the team velocity used when the project price was calculated. Burndown charts are a very common way of tracking progress in many agile projects. It shows the predicted/forecasted completion of work rate (velocity) against the actual velocity to determine if the project is on track.

Figure 1 – Planned scope burndown vs. real progress.

They are good to visualize planned progress versus the reality. For example the burndown chart from Figure 1 looks quite good:

We are a little above the planned trend but it does not mean that we made a huge mistake when determining our velocity during the contract negotiations. Probably many teams would like their own chart to look like this. But the problem is that this chart shows only two out of three contract factors – scope ( presented as a percentage of story points) and time (sprints). So what about money?

Figure 2 – Scope burndown vs budget burndown.

The chart on Figure 2 shows two burndowns – scope and budget. Those two trends are expressed here as percentages for the purpose. There is no other way to compare those two quantities calculated (one in story points and the other in man-hours or money spent).

To track the scope and budget this way we need to:

  • Track the story points completed (done) in each iteration.
  • Track the real time spent (in man-hours) in each iteration.
  • Recalculate the total points in your project into 100% of our scope and draw a burndown based on percentage of the total scope.
  • Recalculate the budget fixed in the contract (or its part) into a total available man-hours – this is our 100% of a budget – and draw a budget burndown based on percentage of the total budget usedto date.

The second chart does not look promising. We are spending more money to stay on track than we expected. This is probably because of using some extra resources to actually achieve the expected team’s velocity. So having all three factors on one chart makes problems visible and iteration (sprint) 4 in this example is where we start to talk with the client and agree on mitigating actions, before it is too late.

Embracing Change

Agile embraces change, and what we want to do is to streamline change management within the fixed price contract. This has always been the hard part and it still is, but with a little help through changing the focus from the requirements analysis into some boundary limits early in the process, we want to welcome change at any stage of the project.

Remember earlier in the process changed fixed scope into fixed budget. The 300 story points from the example allows us to exchange the contents of the initial user story list without changing the number of story points. This is one of the most important aspects that we want to achieve with a fixed price contract done the agile way.

The difficulty here is to convince the client that stories can be exchanged because they should be comparable in the terms of effort required to complete them. So if at any point client has a new great idea that we can express as some new set of stories (worth for example 20 points) then it is again up to the client if we are going to remove stories worth 20 points from the end of our initial backlog to make a place for the new ones.

Or maybe the client wants to add another iteration (remember the velocity of 30 points per iteration?). It is quite easy to calculate the price of introducing those new stories, as we have already calculated the cost of a sprint.

What still is the most difficult in this kind of contracts is when we find out during the project that some stories will take longer than expected because they were estimated as epics and now we know more about them than we did at the beginning. But still this might not always be the case, because at the same time some stories will actually take less. So again tracking during the contract execution will provide valuable information. Talking about the problems earlier helps negotiating as we can talk about actions that need to be taken to prevent them instead of talking about the rescue plans after the huge and irreversible disaster.

Earning Mutual Trust

All the techniques discussed, require one thing to be actually used succesfully with a fixed price contract and that is – trust. But as we know, trust is not earned by describing but by actually doing. Use the Agile principles to demonstrate the doing, to show the progress and point out the problems early.

With every iteration we want to build value for the client. But what is more important, we focus on delivering the most valuable features first. So, the best way to build the trust of a client might be to divide the contract.

Start small, with some pilot development of 2 or 3 iterations (which will also be fixed price, but shorter). The software delivered must bring an expected value to the client. In fact it must contain some working parts of the key functionalities. The working software proves that you can build the rest. It also gives you the opportunity to verify the first assumptions about the velocity and eventually renegotiate the next part.

The time spent on the pilot development, should also be relatively small when compared to the scope left to be done. This way if our clients are not satisfied with the results, they can go away before it is too late and they no longer need to continue the contract and eventually fail the project.

Summary

Fixed price contracts are often considered very harmful and many agile adopters say that we should simply avoid them. But most of the time and as long as customers request them, they cannot be avoided, so we need to find ways to make them work for the goal, which is building quality software that can demonstrably increase business value propositions and competitive advantage.

I believe that some aspects of a fixed price agile contract are even good and healthy for agile teams, as it touches on the familiar while instilling commercial awareness. Development teams are used to working with delivery targets and business deadlines. That is exactly what the fixed date and price in the contract are – healthy time boxes and boundaries keeping us commercially aware and relevant.

Keep the focus on scope and you can still deliver your agile project within a fixed time and budget.

The intention of this article was not to suggest that agile is some ultimate remedy for solving the problem of fixed price contracts but to show that there are ways to work in this context the agile way.

Case Study: Renier Botha’s Transformational Work at BCA and Constellation Automotive Group

Overview

Renier Botha’s tenure at BCA (British Car Auctions), part of the Constellation Automotive Group, highlights his strategic and operational expertise in leveraging technology to enhance business functions. His initiatives have significantly influenced BCA’s financial and operational landscapes, aligning them with modern e-commerce and compliance frameworks.

Project Objectives

The overarching goal of Botha’s projects at BCA was to enable the financial teams with innovative and integrated cloud-based tools that automate and streamline financial operations and e-commerce. Key objectives included:

  • Enhancing expense management through cloud platforms.
  • Integrating diverse IT estates into a unified service offering.
  • Ensuring compliance with new tax legislation.
  • Streamlining vehicle documentation processes.
  • Improving operational efficiency through technology alignment.

Key Projects and Achievements

1. Deployment of Chrome River Expense Management

Botha managed the enterprise-wide deployment of the Chrome River Expense Management cloud platform. This initiative provided BCA’s financial teams with advanced tools to automate expense reporting and approvals, thereby reducing manual interventions and enhancing operational efficiency.

2. System Integration Strategy with MuleSoft

Under Botha’s guidance, BCA adopted MuleSoft as their API management, automation, and integration toolset. This critical move facilitated the integration of previously disconnected IT estates, creating a cohesive and efficient environment that supported robust service delivery across the organisation.

3. Making Tax Digital Project

Botha played a pivotal role in managing the delivery of the Making Tax Digital project, a key legislative requirement. His leadership ensured that BCA’s systems were fully compliant with new tax regulations, thereby avoiding potential legal and financial repercussions.

4. Vehicle Life Cycle Services Dashboard Project

Another significant achievement was the delivery of the Vehicle Life Cycle Services Dashboard replacement project. This was part of the preparation for an extensive ERP migration aimed at modernising the core operational systems.

5. Integration with VW Financial Services

Botha successfully implemented the integration of VW Financial Services and BCA finance estates. This project enabled the secure automation of vehicle documentation exchanges, which is crucial for maintaining data integrity and streamlining vehicle sales processes.

6. Portfolio Management Office Development

Finally, Botha supported the growth and maturity of BCA’s Portfolio Management Office. He introduced new working practices that aligned technology delivery with business operations, optimising efficiency and effectiveness across projects.

Impact and Outcomes

The initiatives led by Botha have transformed BCA’s financial and operational frameworks. Key impacts include:

  • Increased Operational Efficiency: Automated systems reduced manual workload, allowing staff to focus on more strategic tasks.
  • Enhanced Compliance and Security: Projects like Making Tax Digital and the integration with VW Financial Services ensured that BCA stayed compliant with legislative mandates and enhanced data security.
  • Improved Decision-Making: The new systems and integrations provided BCA’s management with real-time data and analytics, supporting better decision-making processes.

Conclusion

Renier Botha’s strategic vision and execution at BCA have significantly boosted the company’s technological capabilities, aligning them with modern business practices and legislative requirements. His work not only streamlined operations but also set a foundation for future innovations and improvements, demonstrating the critical role of integrated technology solutions in today’s automotive and financial sectors.

Case Study: Renier Botha’s Leadership in the Winning NHS Professionals Tender Bid for Beyond

Introduction

Renier Botha, a seasoned technology leader, spearheaded Beyond’s successful response to a Request for Proposal (RFP) from NHS Professionals (NHSP) for outsourced data services. This case study examines the strategic approaches, leadership, and technical expertise employed by Botha and his team in securing this critical project.

Context and Challenge

NHSP sought to outsource its data engineering services to enhance data science and reporting capabilities. The challenge was multifaceted, requiring a deep understanding of NHSP’s current data operations, stringent data governance and GDPR compliance, and the integration of advanced cloud technologies.

Strategy and Implementation

1. Stakeholder Engagement:
Botha led the initial stages by conducting key stakeholder interviews and meetings to gauge the current state and expectations. This hands-on approach ensured alignment between NHSP’s needs and Beyond’s proposal.

2. Gap Analysis:
By understanding the existing Data Engineering function, Botha identified inefficiencies and gaps. His team offered strategic recommendations for process improvements, directly addressing NHSP’s operational challenges.

3. Infrastructure Assessment:
Botha’s review of the current data processing systems uncovered dependencies that could impact future scalability and integration. This was crucial for designing a solution that was not only compliant with current standards but also adaptable to future technological advancements.

4. Data Governance Review:
Given the critical importance of data security in healthcare, Botha prioritised a thorough review of data governance practices, ensuring all proposed solutions were GDPR compliant.

5. Future State Architecture:
Utilising cloud technologies, Botha proposed a high-level architecture and design for NHSP’s future data estate. This included a blend of strategic and BAU tasks aimed at transforming NHSP’s data handling capabilities.

6. Team and Service Delivery Design:
Botha defined the composition of the Data Engineering team necessary to deliver on NHSP’s objectives. This included detailed job descriptions and a clear division of responsibilities, ensuring a match between team capabilities and service delivery goals.

7. KPIs and Service Levels:
Critical to the project’s success was the definition of KPIs and proposed service levels. Botha’s strategic vision included measurable outcomes to track progress and ensure accountability.

8. RFP Response and Roadmap:
Botha’s provided a detailed response to the RFP, outlining a clear and actionable data engineering roadmap for the first two years of service, broken down into six-month intervals. This detailed planning demonstrated a strong understanding of NHSP’s needs and showcased Beyond’s commitment to service excellence.

9. Technical Support:
Beyond also supported NHSP with system architecture queries, ensuring that all technical aspects were addressed comprehensively.

Results and Impact

Under Botha’s leadership, Beyond won the NHSP contract by effectively demonstrating a profound understanding of the project requirements and crafting a tailored, forward-thinking solution. The strategic approach not only aligned with NHSP’s operational goals but also positioned them for future scalability and innovation.

Conclusion

Botha’s expertise in data engineering and project management was pivotal in Beyond’s success. By meticulously planning and executing each phase of the RFP response, he not only led his team to a significant business win but also contributed to the advancement of data management practices within NHSP. This project serves as a benchmark in effective stakeholder management, strategic planning, and technical execution in the field of data engineering services.

Strategic Vendor Selection and IT Deployment Projects: The Crucial Role of IT from Day One

Why IT should be involved in vendor selectiona and the associated deployment projects from the very beginning.

Delivering an enterprise wide project might seem like a daunting task but in reality, successful projects, all follow similar and common project management processes. In broad strokes hese processes are:

  • Concept and Initiation
  • Defenition and Planning
  • Execution and Delivery
  • Monitor and Control
  • Closing and Evaluation

In the intricate web of modern business, vendor selection and IT deployment projects stand as pivotal milestones. Traditionally, these tasks were viewed as solely within the purview of procurement and operations. However, in today’s digital landscape, the strategic involvement of Information Technology (IT) from the very beginning of these processes is indispensable. Let’s explore the reasons why IT should be at the heart of vendor selection and project definition right from the outset:

Technology Expertise in Vendor Assessment:

IT professionals possess in-depth knowledge about various technologies and vendor capabilities. Involving IT from the beginning ensures a thorough evaluation of potential vendors, taking into account factors such as compatibility, scalability, security features, and long-term technological viability.

Alignment with Business Objectives:

IT understands the intricate link between technology and business objectives. By involving IT in vendor selection and project definition, businesses can ensure that chosen vendors align with the overarching strategy, thus contributing to the achievement of organizational goals and milestones.

Risk Mitigation and Compliance:

IT experts are well-versed in cybersecurity, data privacy, and regulatory compliance. Their involvement from the outset ensures that selected vendors meet industry standards and adhere to legal requirements. This proactive approach mitigates risks associated with data breaches and regulatory non-compliance.

Seamless Integration with Existing Systems:

One of the critical challenges in any deployment project is the integration of new systems with existing ones. IT professionals, when engaged early, can devise integration strategies, minimizing disruptions and ensuring a seamless transition. This proactive planning is key to maintaining operational continuity.

Customisation and Scalability:

Businesses often require customized solutions that can adapt and scale with the company’s growth. IT’s early involvement allows for discussions with vendors regarding customization options and scalability features. This ensures that the chosen solutions can evolve alongside the business, saving costs on future upgrades.

Optimised Resource Utilization:

IT professionals assess the technical requirements of deployment projects. Their early involvement enables accurate resource planning, ensuring that hardware, software, and human resources are allocated optimally. This efficient resource utilization is instrumental in meeting project deadlines and budgets.

Realistic Project Scope and Timelines:

IT’s practical experience in implementation projects allows for the creation of realistic project scopes and timelines. Their input in project definition ensures that objectives are achievable within the given timeframe, preventing overcommitment and subsequent project delays.

Post-Implementation Support and Training:

IT is not only concerned with project initiation but also with post-implementation support. Involving IT from the beginning ensures that considerations for training, support mechanisms, and troubleshooting protocols are integrated into the project plan, guaranteeing a smooth post-deployment phase.

In conslusion, the strategic involvement of IT in vendor selection and project definition is a game-changing approach that can make the difference between project success and failure. By recognizing IT as a core stakeholder from day one, businesses can leverage technology expertise, mitigate risks, ensure seamless integrations, optimize resources, and ultimately, achieve successful deployment outcomes. This collaborative approach not only enhances project efficiency but also fosters a culture of innovation and adaptability, positioning businesses for sustainable growth and success in the ever-evolving digital landscape.

Empowering Business Growth: The Strategic Integration of IT in Business Development and Sales Initiatives

Why IT should be involved in business development initiatives and new sales opportunities, from the very beginning.

In the dynamic landscape of modern business, the integration of Information Technology (IT) from the inception of business development and sales initiatives is not just a trend but a strategic necessity. This approach transforms IT from a mere support function to a driving force that shapes and propels business strategies. Let’s delve deeper into the reasons why involving IT from the outset is pivotal and explore the substantial benefits it brings to organisations:

Strategic Alignment and Innovation:

Early IT involvement ensures that technological strategies align seamlessly with business objectives. IT professionals, when engaged in the initial planning phases, can identify innovative solutions and technologies that can revolutionise products, services, and customer experiences.

Data-Driven Decision Making and Predictive Analytics:

IT experts excel in harnessing the power of data. By involving them early, businesses gain access to advanced analytics and predictive modeling. These capabilities empower data-driven decision-making, enabling businesses to anticipate market trends, customer preferences, and sales patterns.

Customer-Centric Solutions:

IT plays a pivotal role in creating customer-centric solutions. Through early involvement, businesses can leverage IT expertise to develop personalized interfaces, mobile apps, and e-commerce platforms tailored to customer needs. This customer-focused approach enhances user satisfaction and loyalty.

Operational Efficiency and Process Optimisation:

IT professionals optimise operational processes through automation, streamlining workflows, and integrating various systems. Early IT involvement ensures that business processes are designed with efficiency in mind, reducing manual errors and improving overall productivity.

Scalability and Flexibility:

Scalability is a cornerstone of successful businesses. IT architects systems that are scalable and flexible, allowing businesses to expand seamlessly. By involving IT early, companies can future-proof their solutions, saving costs in the long run and ensuring adaptability to market changes.

Cybersecurity and Compliance:

Security breaches can have devastating consequences. IT experts, when involved in the initial stages, design robust cybersecurity frameworks. They ensure compliance with industry regulations and standards, safeguarding sensitive data and building trust with customers and partners.

Collaborative Culture and Knowledge Sharing:

Early collaboration between IT, business development, and sales fosters a culture of open communication and knowledge sharing. Cross-functional teams collaborate on ideas and solutions, leading to holistic strategies that encompass technical and business aspects.

Continuous Improvement and Feedback Loops:

IT’s involvement from the beginning enables the establishment of feedback loops. Through continuous monitoring and analysis, businesses can gather insights, identify areas of improvement, and adapt strategies swiftly. This iterative approach drives continuous innovation and business growth.

In conlusion, the strategic integration of IT in business development and sales initiatives is a game-changer for organisations aiming to thrive in the digital age. By recognising IT as a core driver of business strategies, companies can harness innovation, enhance customer experiences, optimise operations, and ensure long-term success. Embracing this collaborative approach not only positions businesses as industry leaders but also fosters a culture of innovation and adaptability, crucial elements for sustained growth and competitiveness in today’s challenging business landscape.

Mastering the Art of Risk Management: Navigating Business Uncertainties

In the fast-paced realm of business, uncertainties are inevitable. From market fluctuations to unforeseen challenges, every venture encounters risks that can potentially impact its success. To mitigate these risks effectively, businesses employ a strategic approach called Risk Management. In this blog, we will explore how risks in business are identified, documented within a risk register, and assessed using a risk score matrix, ultimately ensuring a resilient and adaptive business model.

Identifying Risks: The Foundation of Risk Management

Identifying risks is the first crucial step in the risk management process. Businesses need to be vigilant in recognising potential threats that could hinder their objectives. Risks can stem from various sources such as financial instability, technological vulnerabilities, legal issues, or even natural disasters. Through thorough analysis and scenario planning, businesses can anticipate these risks and prepare proactive strategies.

Documenting Risks: The Risk Register

Once risks are identified, it is imperative to document them systematically. The tool commonly used for this purpose is a Risk Register. A Risk Register is a detailed document that compiles all identified risks, their potential impact, and the strategies devised to mitigate them. Each risk is carefully categorised, providing a comprehensive overview for stakeholders. This document serves as a roadmap for risk management efforts, enabling businesses to stay organised and focused on addressing potential challenges. The Risk Register should align with the RIsk components within the project RAID Logs. The Risk Register should also be covered as a standard agenda item for Board meetings.

Assessing Risks: The Risk Score Matrix

To prioritise risks within the Risk Register, businesses often employ a Risk Score Matrix. This matrix evaluates risks based on two essential factors: Likelihood and Severity.

  1. Likelihood: This factor assesses how probable it is for a specific risk to occur. Likelihood is usually categorised as rare, unlikely, possible, likely, or almost certain, each with a corresponding numerical value.
  2. Severity: Severity measures the potential impact a risk could have on the business if it materialises. Impact levels may range from insignificant to catastrophic, with corresponding numerical values.

Each of factors can rated on a scale from 1 to 5, where Likelihood and Severity respectively can be:

  • 1 – Rear / Negligible
  • 2 – Unlike / Minor
  • 3 – Posible / Moderate
  • 4 – Likely / Major
  • 5- Almost Certain / Catastrophic

By combining these two factors, a Risk Score is calculated for each identified risk. The formula typically used is:

Risk Score = Likelihood * Severity

This numerical value indicates the level of urgency in addressing the risk. The risk score can be color coded. An example of a risk score matrix is indicated below.

Risks with higher scores require immediate attention and robust mitigation strategies.

Effective Risk Mitigation Strategies

After assessing risks using the Risk Score Matrix, businesses can implement appropriate mitigation strategies. These strategies can include risk avoidance, risk reduction, risk transfer, or acceptance.

  1. Risk Avoidance: Involves altering business practices to sidestep the risk entirely. For instance, discontinuing a high-risk product or service.
  2. Risk Reduction: Implements measures to decrease the probability or impact of a risk. This might involve enhancing security systems or diversifying suppliers.
  3. Risk Transfer: Shifts the risk to another party, often through insurance or outsourcing. This strategy is common for risks that cannot be avoided but can be financially mitigated.
  4. Risk Acceptance: Acknowledges the risk and its potential consequences without taking specific actions. This approach is viable for low-impact risks or those with high mitigation costs.

Conclusion

In today’s volatile business environment, mastering the art of risk management is paramount. By diligently identifying risks, documenting them within a structured Risk Register, and assessing them using a Risk Score Matrix, businesses can navigate uncertainties with confidence. A proactive approach to risk management not only safeguards the business but also fosters resilience and adaptability, ensuring long-term success in an ever-changing market landscape. Remember, in the realm of business, preparation is the key to triumph over uncertainty.

The Significance of RAID Logs: Keeping Projects on Course

Navigating Projects with Precision: The In-Depth Guide to RAID Logs

In the intricate tapestry of project management, where uncertainties are the norm and challenges are the companions, a tool that stands out for its efficacy is the RAID log. Comprising Risks, Assumptions, Issues, and Dependencies, a RAID log is more than just a document; it is a strategic asset that can steer a project towards success. In this comprehensive guide, we will explore not only what a RAID log is and why it’s important but also how to compile and maintain it effectively.

Components of a RAID Log: A Closer Look

Risks: Risks in a project context are uncertainties that have the potential to impact project objectives, whether it’s the timeline, budget, or quality of deliverables. These can include technological challenges, market fluctuations, or even human factors like team dynamics.

Assumptions: Assumptions are the foundational beliefs upon which the project is built. These can encompass anything from customer behaviour patterns to market trends. If assumptions change, they can necessitate a reevaluation of the entire project strategy.

Issues: Issues are problems that have already surfaced during the course of the project. They can range from technical glitches to conflicts within the team. Addressing these in a timely manner prevents them from escalating and affecting project progress.

Dependencies: Dependencies highlight the relationships between different project tasks or elements. Understanding these dependencies is vital for proper project sequencing. For example, Task B might be dependent on Task A’s completion.

The Purpose Unveiled: Why RAID Logs are Indispensable

Centralised Information Hub: A RAID log serves as a central repository, offering a bird’s eye view of the project’s landscape. Having all crucial information in one place enhances project team visibility and coordination.

Proactive Risk Management: By identifying potential risks and uncertainties early, project managers can proactively develop strategies to mitigate these challenges. This anticipatory approach is key to project success.

Informed Decision Making: A well-maintained RAID log empowers project managers and stakeholders to make informed decisions. Whether it’s tweaking project timelines or reallocating resources, decisions are grounded in the reality of the project’s challenges and opportunities.

Transparent Communication: Transparency is the bedrock of effective project management. The RAID log fosters transparent communication among team members, stakeholders, and sponsors. It ensures that everyone is on the same page regarding the project’s progress and challenges.

Creating and Maintaining an Effective RAID Log: A Step-by-Step Approach

Compilation:

  • Identify Risks: Engage with the project team to identify potential risks. Brainstorming sessions and historical data analysis can help in foreseeing possible challenges.
  • Document Assumptions: List down all the assumptions made during the project planning phase. Regularly revisit these assumptions to ensure they are still valid.
  • Track Issues: Implement a robust issue tracking system. Regular team meetings and progress reports can help in identifying and documenting issues as they arise.
  • Map Dependencies: Work closely with team leads and subject matter experts to map out task dependencies accurately. Tools like Gantt charts can be invaluable in visualising these relationships.

Maintenance:

  • Regular Updates: The RAID log is not a one-time creation. It needs regular updates. Schedule periodic reviews to assess the status of identified risks, assumptions, issues, and dependencies.
  • Impact Assessment: Whenever a change request or an unexpected event occurs, assess its impact on the RAID log. New risks or dependencies may emerge, requiring immediate attention.
  • Stakeholder Engagement: Keep stakeholders informed about changes to the RAID log. Their input can provide valuable insights and ensure that all perspectives are considered.
  • Lessons Learned: After the project’s completion, analyse the RAID log retrospectively. Identify what risks materialised, which assumptions held, and how issues were resolved. These insights can be invaluable for future projects.

In conclusion, a well-compiled and meticulously maintained RAID log is a linchpin in the project manager’s toolkit. It encapsulates the essence of project uncertainties, providing a roadmap for navigating through challenges. By understanding the nuances of risks, assumptions, issues, and dependencies, and by actively managing this information, project managers can lead their teams with confidence, ensuring that projects not only survive but thrive in the face of complexity and change.

Case Study: Driving Transformation and Innovation at Shawbrook Bank

Background:
Shawbrook Bank, a specialised savings and lending institution, faced the challenge of enhancing its service delivery, operational efficiency, and fostering a culture of innovation. In late 2019, Renier Botha, the Head of Delivery and Innovation (Central Functions), took charge to lead the bank’s central functions, including Risk & Regulatory, Compliance, Finance, Human Resources, Procurement, Cyber Security, and IT Infrastructure, towards achieving annual growth and service delivery targets.

Challenge:
Renier Botha was tasked with initiating and sustaining strategic changes across various departments. The objective was not just to meet the annual growth and service delivery targets but also to establish a culture of innovation and excellence within the bank.

Solution:
1. Strategic Change Leadership:
Renier Botha played a pivotal role in overseeing a £5.5m Central Functions strategic & continuous change portfolio. Under his guidance, 16 programmes, projects, and continuous change workstreams were executed, resulting in a 10.1% saving against the budget.

2. Talent Empowerment:
Botha’s key initiative involved building a highly skilled and customer-focused core change team. By empowering the team and ensuring knowledge retention, Shawbrook Bank could rely on a group of experts capable of driving change and innovation forward.

3. Vendor Management and Partnerships:
Effective negotiation of commercial and Service Level Agreements (SLAs) ensured strong relationships with vendors and flexible resource partners. This approach guaranteed specialised service delivery and viable solutions for the bank’s diverse needs.

4. Innovation and Automation:
The establishment of the Change Portfolio Management Office (PMO), under Renier Botha’s leadership, marked a significant milestone. Skilled staff, mentored by Botha, collected key performance metrics to produce real-time Management Information (MI). Automation and data-driven insights facilitated proactive governance, setting new standards for efficiency and decision-making.

5. Mentorship and Coaching:
Renier Botha took on the responsibility of coaching and mentoring technology and project management staff. This personalised approach not only helped individuals achieve their career objectives but also aligned their goals with the broader business strategy.

Results:

  • Operational Efficiency: Streamlining processes and embracing automation led to a substantial increase in operational efficiency. Issues that previously took over 30 days to resolve were now tackled within 2 days, ensuring uninterrupted services.
  • Innovation Culture: The bank’s culture shifted towards innovation, with the establishment of the Testing Capability initiative being a testament to this. By reducing regression testing efforts by 95%, continuous delivery became a reality, fostering a culture of innovation and rapid adaptation.
  • Recognition and Acclaim: Shawbrook Bank’s transformation efforts, especially the successful Ambit Enterprise upgrade, received accolades from the board, positioning the bank as a leader in managed delivery practices.

Conclusion:
Under the leadership of Renier Botha, the Head of Delivery and Innovation, Shawbrook Bank successfully reshaped its central functions. By embracing change and cultivating a culture of excellence and innovation, Shawbrook Bank not only met its growth and service delivery targets but also set new industry standards, positioning itself as a beacon of success and innovation in the competitive financial sector. Renier Botha’s strategic vision and hands-on leadership were instrumental in this transformative journey, making Shawbrook Bank a leader in the ever-evolving landscape of banking and finance.

What makes a good Technical Specification Document

Writing a technical spec increases the chances of having a successful project, service, or feature that all stakeholders involved are satisfied with. It decreases the chances of something going horribly wrong during implementation and even after you’ve launched your product. 

As a software engineer, your primary role is to solve technical problems. Your first impulse may be to immediately jump straight into writing code. But that can be a terrible idea if you haven’t thought through your solution. 

You can think through difficult technical problems by writing a technical spec. Writing one can be frustrating if you feel like you’re not a good writer. You may even think that it’s an unnecessary chore. But writing a technical spec increases the chances of having a successful project, service, or feature that all stakeholders involved are satisfied with. It decreases the chances of something going horribly wrong during implementation and even after you’ve launched your product. 

Developing software solutions using the Agile delivery methodology, your technical specification document is a living document that will be continuously updated as you progressing through the development sprints and the specifics solution designs and associate technical specifications aspects are being confirmed. Initially the tech spec will be describing he the solution at a high level, making sure all requirements are addressed within the solution. As requirements changes through the delivery life-cycle or as the technical solution evolves to working acceptance, the technical specifications are updated accordingly. Every agile story describing a functional piece, will cover requirements, acceptance criteria, solution architecture and technical specification. All the specs are included in the evolving technical specification. At the end of a development project the technical specifications are a good reference point for ongoing improvement development and support.

What is a technical specification document?

A technical specification document outlines how you’re going to address a technical problem by designing and building a solution for it. It’s sometimes also referred to as a technical design document, a software design document, or an engineering design document. It’s often written by the engineer who will build the solution or be the point person during implementation, but for larger projects, it can be written by technical leads, project leads, or senior engineers. These documents show the engineer’s team and other stakeholders what the design, work involved, impact, and timeline of a feature, project, program, or service will be. 

Why is writing a technical spec important?

Technical specs have immense benefits to everyone involved in a project: the engineers who write them, the teams that use them, even the projects that are designed off of them. Here are some reasons why you should write one. 

Benefits to engineers

By writing a technical spec, engineers are forced to examine a problem before going straight into code, where they may overlook some aspect of the solution. When you break down, organize, and time box all the work you’ll have to do during the implementation, you get a better view of the scope of the solution. Technical specs, because they are a thorough view of the proposed solution, they also serve as documentation for the project, both for the implementation phase and after, to communicate your accomplishments on the project. 

With this well-thought out solution, your technical spec saves you from repeatedly explaining your design to multiple teammates and stakeholders. But nobody’s perfect;  your peers and more seasoned engineers may show you new things from them about design, new technologies, engineering practices, alternative solutions, etc. that you may not have come across or thought of before. They may catch exceptional cases of the solution that you may have neglected, reducing your liability. The more eyes you have on your spec, the better. 

Benefits to a team

A technical spec is a straightforward and efficient way to communicate project design ideas between a team and other stakeholders. The whole team can  collaboratively solve a problem and create a solution. As more teammates and stakeholders contribute to a spec, it makes them more invested in the project and encourages them to take ownership and responsibility for it. With everyone on the same page, it limits complications that may arise from overlapping work. Newer teammates unfamiliar with the project can onboard themselves and contribute to the implementation earlier.  

Benefits to a project

Investing in a technical spec ultimately results in a superior product.  Since the team is aligned and in agreement on what needs to be done through the spec, big projects can progress faster. A spec is essential in managing complexity and preventing scope and feature creep by setting project limits. It sets priorities thereby making sure that only the most impactful and urgent parts of a project go out first. 

Post implementation, it helps resolve problems that cropped up within the project, as well as provide insight in retrospectives and postmortems. The best planned specs serve as a great guide for measuring success and return on investment of engineering time. 

What to do before writing a technical spec

Gather the existing information in the problem domain before getting started. Read over any product/feature requirements that the product team has produced, as well as technical requirements/standards associated with the project. With this knowledge of the problem history, try to state the problem in detail and brainstorm all kinds of solutions you may think might resolve it. Pick the most reasonable solution out of all the options you have come up with. 

Remember that you aren’t alone in this task. Ask an experienced engineer who’s knowledgeable on the problem to be your sounding board. Invite them to a meeting and explain the problem and the solution you picked. Lay out your ideas and thought process and try to persuade them that your solution is the most appropriate. Gather their feedback and ask them to be a reviewer for your technical spec.

Finally, it’s time to actually write the spec. Block off time in your calendar to write the first draft of the technical spec. Usea collaborative document editor that your whole team has access to. Get a technical spec template (see below) and write a rough draft. 

Contents of a technical spec

There are a wide range of problems being solved by a vast number of companies today. Each organization is distinct and creates its own unique engineering culture. As a result, technical specs may not be standard even within companies, divisions, teams, and even among engineers on the same team. Every solution has different needs and you should tailor your technical spec based on the project. You do not need to include all the sections mentioned below. Select the sections that work for your design and forego the rest.

From my experience, there are seven essential parts of a technical spec: front matter, introduction, solutions, further considerations, success evaluation, work, deliberation, and end matter. 

1. Cover Page

  • Title 
  • Author(s)
  • Team
  • Reviewer(s)
  • Created on
  • Last updated
  • Epic, ticket, issue, or task tracker reference link

2. Introduction

2.1 Overview, Problem Description, Summary, or Abstract

  • Summary of the problem (from the perspective of the user), the context, suggested solution, and the stakeholders. 

2.2 Glossary  or Terminology

  • New terms you come across as you research your design or terms you may suspect your readers/stakeholders not to know.  

2.3 Context or Background

  • Reasons why the problem is worth solving
  • Origin of the problem
  • How the problem affects users and company goals
  • Past efforts made to solve the solution and why they were not effective
  • How the product relates to team goals, OKRs
  • How the solution fits into the overall product roadmap and strategy
  • How the solution fits into the technical strategy

2.4 Goals or Product and Technical Requirements

  • Product requirements in the form of user stories 
  • Technical requirements

 2.5 Non-Goals or Out of Scope

  • Product and technical requirements that will be disregarded

2.6 Future Goals

  • Product and technical requirements slated for a future time

2.7 Assumptions

  • Conditions and resources that need to be present and accessible for the solution to work as described. 

3. Solutions

3.1 Current or Existing Solution Design

  • Current solution description
  • Pros and cons of the current solution

3.2 Suggested or Proposed Solution Design 

  • External components that the solution will interact with and that it will alter
  • Dependencies of the current solution
  • Pros and cons of the proposed  solution 
  • Data Model or Schema Changes
    • Schema definitions
    • New data models
    • Modified data models
    • Data validation methods
  • Business Logic
    • API changes
    • Pseudocode
    • Flowcharts
    • Error states
    • Failure scenarios
    • Conditions that lead to errors and failures
    • Limitations
  • Presentation Layer
    • User requirements
    • UX changes
    • UI changes
    • Wireframes with descriptions
    • Links to UI/UX designer’s work
    • Mobile concerns
    • Web concerns
    • UI states
    • Error handling
  • Other questions to answer
    • How will the solution scale?
    • What are the limitations of the solution?
    • How will it recover in the event of a failure?
    • How will it cope with future requirements?

3.3 Test Plan

  • Explanations of how the tests will make sure user requirements are met
  • Unit tests
  • Integrations tests
  • QA

3.4 Monitoring and Alerting Plan 

  • Logging plan and tools
  • Monitoring plan and tools
  • Metrics to be used to measure health
  • How to ensure observability
  • Alerting plan and tools

3.5 Release / Roll-out and Deployment Plan

  • Deployment architecture 
  • Deployment environments
  • Phased roll-out plan e.g. using feature flags
  • Plan outlining how to communicate changes to the users, for example, with release notes

3.6 Rollback Plan

  • Detailed and specific liabilities 
  • Plan to reduce liabilities
  • Plan describing how to prevent other components, services, and systems from being affected

3.7 Alternate Solutions / Designs

  • Short summary statement for each alternative solution
  • Pros and cons for each alternative
  • Reasons why each solution couldn’t work 
  • Ways in which alternatives were inferior to the proposed solution
  • Migration plan to next best alternative in case the proposed solution falls through

4. Further Considerations

4.1 Impact on other teams

  • How will this increase the work of other people?

4.2 Third-party services and platforms considerations

  • Is it really worth it compared to building the service in-house?
  • What are some of the security and privacy concerns associated with the services/platforms?
  • How much will it cost?
  • How will it scale?
  • What possible future issues are anticipated? 

4.3 Cost analysis

  • What is the cost to run the solution per day?
  • What does it cost to roll it out? 

4.4 Security considerations

  • What are the potential threats?
  • How will they be mitigated?
  • How will the solution affect the security of other components, services, and systems?

4.5 Privacy considerations

  • Does the solution follow local laws and legal policies on data privacy?
  • How does the solution protect users’ data privacy?
  • What are some of the tradeoffs between personalization and privacy in the solution? 

4.6 Regional considerations

  • What is the impact of internationalization and localization on the solution?
  • What are the latency issues?
  • What are the legal concerns?
  • What is the state of service availability?
  • How will data transfer across regions be achieved and what are the concerns here? 

4.7 Accessibility considerations

  • How accessible is the solution?
  • What tools will you use to evaluate its accessibility? 

4.8 Operational considerations

  • Does this solution cause adverse aftereffects?
  • How will data be recovered in case of failure?
  • How will the solution recover in case of a failure?
  • How will operational costs be kept low while delivering increased value to the users? 

4.9 Risks

  • What risks are being undertaken with this solution?
  • Are there risks that once taken can’t be walked back?
  • What is the cost-benefit analysis of taking these risks? 

4.10 Support considerations

  • How will the support team get across information to users about common issues they may face while interacting with the changes?
  • How will we ensure that the users are satisfied with the solution and can interact with it with minimal support?
  • Who is responsible for the maintenance of the solution?
  • How will knowledge transfer be accomplished if the project owner is unavailable? 

5. Success Factors

5.1 Impact

  • Security impact
  • Performance impact
  • Cost impact
  • Impact on other components and services

5.2 Metrics

  • How will you measure success?
  • List of metrics to capture
  • Tools to capture and measure metrics

6. Work Execution

6.1 Work estimates and timelines

  • List of specific, measurable, and time-bound tasks
  • Resources needed to finish each task
  • Time estimates for how long each task needs to be completed

6.2 Prioritization

  • Categorization of tasks by urgency and impact

6.3 Milestones

  • Dated checkpoints when significant chunks of work will have been completed
  • Metrics to indicate the passing of the milestone

6.4 Future work

  • List of tasks that will be completed in the future

7. Deliberation

7.1 Points under Discussion or Dispute

  • Elements of the solution that members of the team do not agree on and need to be debated further to reach a consensus.

b. Open Questions and Issues

  • Questions about matters and issues you do not know the answers to or are unsure that you pose to the team and stakeholders for their input. These may include aspects of the problem you don’t know how to resolve yet. 

8. Relating Matters, References & Acknowledgements

8.1 Related Work

  • Any work external to the proposed solution that is similar to it in some way and is worked on by different teams. It’s important to know this to enable knowledge sharing between such teams when faced with related problems. 

8.2 References

  • Links to documents and resources that you used when coming up with your design and wish to credit. 

8.3 Acknowledgments

  • Credit people who have contributed to the design that you wish to recognize.

After you’ve written your technical spec

Now that you have a spec written, it’s time to refine it. Go through your draft as if you were an independent reviewer. Ask yourself what parts of the design are unclear and you are uncertain about. Modify your draft to include these issues. Review the draft a second time as if you were tasked to implement the design just based on the technical spec alone. Make sure the spec is a clear enough implementation guideline that the team can work on if you are unavailable. If you have doubts about the solution and would like to test it out just to make sure it works, create a simple prototype to prove your concept. 

When you’ve thoroughly reviewed it, send the draft out to your team and the stakeholders. Address all comments, questions, and suggestions as soon as possible. Set deadlines to do this for every issue. Schedule meetings to talk through issues that the team is divided on or is having unusually lengthy discussions about on the document. If the team fails to agree on an issue even after having in-person meetings to hash them out, make the final call on it as the buck stops with you. Request engineers on different teams to review your spec so you can get an outsider’s perspective which will enhance how it comes across to stakeholders not part of the team. Update the document with any changes in the design, schedule, work estimates, scope, etc. even during implementation.

Conclusion

Writing test specs can be an impactful way to guarantee that your project will be successful. A little planning and a little forethought can make the actual implementation of a project a whole lot easier.  

lovingmydesk.com

Hiya!

We are delighted to share our passion for travel and photography with you in a way that can make your day brighter and cheer those around you.

Grab some cool photos from our site, upload them into your video conferencing tool as virtual backgrounds and change them as often as every virtual meeting or even mid-meeting if the mood takes you.

Share the cheer, be inspirational, make them laugh and open the meeting with some all important personal chat, LovingMyDesk.com is the perfect video conference ice breaker and its free!

We have built this site to share the love, as an initial concept first so please click away download photos and use them on your computer, tablet or phone. If we see enough people having fun we may take it to the next stage, until then let us know what improvements you would like to see.

All we ask is you enjoy, share the goodness and perhaps leave us the odd comment if you like this idea whether we should take our super lean, hacked together start-up concept to the next stage?

So tell us what you think, like and share with others who might need a smile too.

Cheers

Renier and Stuart

#FreePictures #VirtualBackground #VideoConference

Be aware of scammers while using email…

Many businesses have had to adapt to new working practices because of the coronavirus (COVID-19) situation. This has often meant an increase in emails and more frequent calls with suppliers, customers, banks and other organisations.
Scammers have been taking advantage of this. Cases are on the increase where fraudsters are calling businesses pretending to be from their phone or internet provider, their bank or even a retailer. They’ll ask for payments, or for staff to download software that then gives them control of that staff member’s device. Some have even taken control of genuine email addresses and used them to request payments, making it more difficult to spot the signs of a scam.
With this in mind, it’s now even more important to have strong, clear processes in place for keeping data safe.

Can you spot a scam?
Even if you know all the hallmarks and what to look out for, with ever-more sophisticated ways to access your data, scams are getting harder to spot. If a fraudster called or emailed you or a member of staff pretending to be a known supplier, would you know it was a scam?
They might even contact a staff member pretending to be you. For example, how can you tell if this email’s genuine?

Put checks and processes in place
To help you and your staff spot fraudulent attempts, here are some tips on the checks and processes you should have in place. Remember – it’s good to have a healthy level of suspicion.

  • If you get an email out of the blue that asks you to click on a link or attachment, don’t do it – even if the sender seems familiar – and even if it appears to be coming from a known email address. Instead, contact the apparent sender using different details that you already know and trust to verify the request.
  • When someone calls unexpectedly, don’t give them any information like personal details, bank details or pins.
  • Never download any software onto your device if you’re asked to – fraudsters can use this to access your personal information, even your bank account. Instead, call them back on a known number to check they’re genuine.
  • You can also search for a number to see if a listed number you’ve been asked to call is genuine. Have a payment-checking process in place. For example, if you receive a request to update the bank details you have on file or get new bank details for a payment, confirm this by calling that person or organisation using details you already have, and not those provided in the request. You should also do this with requests from anyone within your own organisation.
  • Have security policies in place, such as having strong passwords, using an encrypted VPN (virtual private network) when working from home, and using an extra layer of authentication for email and payment processes (such as a unique code texted to your mobile) – and test these processes often.
  • Make sure you and all your staff, regardless of their role, are made aware of the checks and processes regularly.

Solution Design & Architecture (SD&A) – Consider this…

When it comes to the design and architecture of enterprise level software solutions, what comes to mind?

What is Solution Design & Architecture:

SolutionDesign and Architecture (SD&A) is an in-depth IT scoping and review process that bridges the gap between your current IT environments, technologies, and the customer and business needs in order to deliver maximum return-on-investment. A proper design and architecture document also documents the approach, methodology and required steps to deliver the solution.

SD&A are actually two distinct disciplines. Solution Architect’s, with a balanced mixed of technical and business skills, write up the technical design of an environment and work out how to achieve a solution from a technical perspective. Solution Designers put the solution together and price it up based from assistance from the architect.

A solutions architect needs significant people and process skills. They are often in front of management, trying to explain a complex problem in laymen’s terms. They have to find ways to say the same thing using different words for different types of audiences, and they also need to really understand the business’ processes in order to create a cohesive vision of a usable product.

Solution Architect focuses on: 

  • market opportunity
  • technology and requirements
  • business goals
  • budget
  • project timeline
  • resourcing
  • ROI
  • how technology can be used to solve a given business problem 
  • which framework, platform, or tech-stack can be used to create a solution 
  • how the application will look, what the modules will be, and how they interact with each other 
  • how things will scale for the future and how they will be maintained 
  • figuring out the risk in third-party frameworks/platforms 
  • finding a solution to a business problem

Here are some of the main responsibilities of a solutions architect:

Ultimately, the Solution Architect is responsible for the vision that underlies the solution and the execution of that vision into the solution.

  • Creates and leads the process of integrating IT systems for them to meet an organization’s requirements.
  • Conducts a system architecture evaluation and collaborates with project management and IT development teams to improve the architecture.
  • Evaluates project constraints to find alternatives, alleviate risks, and perform process re-engineering if required.
  • Updates stakeholders on the status of product development processes and budgets.
  • Notifies stakeholders about any issues connected to the architecture.
  • Fixes technical issues as they arise.
  • Analyses the business impact that certain technical choices may have on a client’s business processes.
  • Supervises and guides development teams.
  • Continuously researches emerging technologies and proposes changes to the existing architecture.

Solution Architecture Document:

The Solution Architecture provides an architectural description of a software solution and application. It describes the systems and it’s features based on the technical aspects, business goals, and integration points. It is intended to address a solution to the business needs and provides the foundation/map of the solution requirements driving the software build scope.

High level Benefits of Solution Architecture:

  • Builds a comprehensive delivery approach
  • Stakeholder alignment
  • Ensures a longer solution lifespan with the market
  • Ensures business ROI
  • Optimises the delivery scope and associated effectiveness
  • Easier and more organised implementation
  • Provides a good understanding of the overall development environment
  • Problems and associated solutions can be foreseen

Some aspects to consider:

When doing an enterprise level solution architecture, build and deployment, a few key aspects come to mind that should be build into the solution by design and not as an after thought…

  • Solution Architecture should a continuous part of the overall innovation delivery methodology – Solution Architecture is not a once-off exercise but is imbedded in the revolving SDLC. Cyclically evolve and deliver the solution with agility that can quickly adapt to business change with solution architecture forming the foundation (map and sanity check) before the next evolution cycle. Combine the best of several delivery methodologies to ensure optimum results in bringing the best innovation to revenue channels in the shortest possible timeframe. Read more on this subject here.
  • People – Ensure the right people with the appropriate knowledge, skills and abilities within the delivery team. Do not forget that people (users and customers) will use the system – not technologists.
  • Risk – as the solution architecture evolves, it will introduce technology and business risks that must be added to the project risk register and addressed to mitigation in accordance with the business risk appetite.
  • Choose the right software development tech stack that is well established and easily supported while scalable and powerful enough to deliver a feature rich solution that can be integrated into complex operational estates. Most tech-stacks has Solution Frameworks that outline key design options and decision when doing solution architecture. Choosing the right tech-stack is one of the most fundamental ways to future-proof the technology solution. You can read more on choosing the right tech stack here.
  • Modular approach – using a service oriented architecture (SOA) model to ensure the solution can be functionally scaled, up and down to align with feature required, by using independently functioning modules of macro and micro-services. Each service must be clearly defined with input, process, output parameters that aligns with the integration standard established for the platform. This SOA also assist in overall information security enhancements and fault finding in case something goes wrong. It also makes the developed platform more agile to adapt to continuous business environment and market changes with less overall impact and system changes.
  • Customer data at the heart of a solution – Be clear on Master vs Slave customer and data records and ensure the needed integration between master and slave data within inter-connecting systems and platforms, with the needed security applied to ensure privacy and data integrity. Establish a Single Customer and Data Views (single version of the truth) from the design off-set. Ensure personal identifiable data is handled within the solution according to the regulations as outlined in the Data Protection Act and recently introduced GDPR and data anonymisation and retention policy guidelines.
  • Platform Hosting & Infrastructure – What is the intended hosting framework, will it by private or public cloud, running in AWS or Azure – all important decisions that can drastically impact the solution architecture.
  • Scalability – who is the intended audience for the different modules and associated macro services within the solution – how many consecutive users, transactions, customer sessions, reports, dashboards, data imports & processing, data transfers, etc…? As required, ensure the solution architecture accommodate the capability for the system to monitor usage and automatically scale horizontally (more processing/data (hardware) nodes running in parallel without dropping user sessions) and vertically (adding more power to a hardware node).
  • Information and Cyber Security – A tiered architecture ensure physical differentiation between user and customer facing interfaces, system logic and processing algorithms and the storage components of a solution. Various security precautions, guidelines and best practices should be imbedded within the software development by design. This should be articulated within the solution architecture, infrastructure and service software code. Penetration Testing and the associated platform hardening requirements should feed back into the solution architecture enhancement as required.
  • Identity Management – Single Sign On (SSO) user management and application roles to assign access to different modules, features and functionality to user groups and individuals.
  • Integration – data exchange, multi-channel user interface, compute and storage components of the platform, how the different components inter-connects through secure connection with each other, other applications and systems (API and gateway) within the business operations estate and to external systems.
  • Customer Centric & Business Readiness – from a customer and end-user perspective what’s needed to ensure easy adoption (familiarity) and business ramp-up to establish a competent level of efficiency before the solution is deployed and go-live. UX, UI, UAT, Automated Regression Testing, Training Material, FAQs, Communication, etc…
  • Enterprise deployment – Involvement of all IT and business disciplines i.e. Business readiness (covered above), Network, Compute, Cyber Security, DevOps. Make sure non-functional Dev-Ops related requirements are covered in the same manner as
  • Application Support – Involve the support team during product build to ensure they have input and understanding of the solution to provide SLA driven support at to business and IT operations when the solution goes live. 
  • Business Continuity – what is required from an IT infrastructure and platform/solution capability perspective to ensure the system is always available (online) to enable continuous business operations?

Speak to Renier about your solution architecture requirements. With more than 20 years of enterprise technology product development experience, we can support your team toward delivery excellence.

Also Read:

12 Useful Psychological Hacks

#1. If you want to know about something from someone , ask them a question and when they are done answering , keep silent and maintain an eye contact. They will tell you some more stuff, almost everything.

#2. When you try to convince someone over something, make sure they are sitting and you are standing. This makes them believe you sooner.

#3. The key to confidence is walking into a room and assume that everyone already likes you.

#4. Refer to people you’ve just met by their name. People love being referred to by their name and it will establish a sense of trust and friendship right away. Example: “Nice to meet you Alex. So, Alex how do you know John?” And continue to repeat name throughout the conversation.

#5. If someone is attracted to you, their eyes start blinking more than usual during a conversation with you.

#6. Spot the difference between a fake smile and a real one. You can find out if someone is smiling for real or faking it by looking at their eyes. Wrinkles form near eye corners when the smile is genuine.

#7. Pay attention to people’s feet. To know if someone is interested in a conversation look at their feet, if they are pointing towards you, they are. If they are pointing sideways or any other direction, they aren’t. Feet don’t lie.

#8. When at a party or a meeting. When at a party or a meeting, crack a joke and observe the people who are laughing around you. People who feel close to each other will be looking at each other. This is useful for discerning out friendships and other relationships.

#9. The life hack to make people do what you want them to do. Offer someone a choice instead of a command. For example, instead of saying drink your milk to a toddler, ask which mug would he/she like to drink milk from. This gives the person a sense of control hence produces a higher chance of a better outcome.

#10 How to win an argument?. If the person arguing loses his temper and starts shouting, natural human tendency is to shout back. DON’T! Stay calm and reply in silence. Try it! It works.

#11. Mirror people’s body language to build up trust. If you subtly mimic the body language of the person you’re talking to, you can effectively build up trust with them. By mirroring the way they speak and how they move they’ll like you more, because, to them, it will seem as if you are pretty good compatible.

#12 Inception To plant a seed of idea in someone’s mind, ask them to not think of a particular thing at all. Let’s say I ask you to NOT think about motorbikes. What are you thinking of?

RPA – Robotic Process Automation

Robotic process automation (RPA), also referred to as software robots, is a form of business process automation (BPA) – also now as Business Automation or Digital Transformation – where complex business processes are automated using technology enabled tools harnessing the power of Artificial intelligence (AI).

Robotic process automation (RPA) can be a fast, low-risk starting point for automating repettitive processes that depend on legacy systems. Software bots can pull data from these manually operated systems (most of the time without an API) into digital processes, ensuring faster and more efficient and accurate (less user error) outcomes. 

Workflow vs RPA

In traditional workflow automation tools, a system developer produces a list of actions/steps to automate a task and define the interface to the back-end system using either internal application programming interfaces (APIs) or dedicated scripting language. RPA systems, in contrast, compile the action list by watching the user perform that task in the application’s graphical user interface (GUI), and then perform the automation by repeating those tasks directly in the GUI, as if it is manually operated.

Automated Testing vs RPA

RPA tools have strong technical similarities to graphical user interface testing tools. Automated testing tools also automate interactions with the GUI by repeating a set of actions performed by a user. RPA tools differ from such systems in that they allow data to be handled in and between multiple applications, for instance, receiving email containing an invoice, extracting the data, and then typing that into a financial accounting system.

RPA Utilisation

Used the right way, though, RPA can be a useful tool in your digital transformation toolkit. Instead of wasting time on repetitive tasks, your people are freed up to focus on customers or subject expertise bringing product & services to market quicker and provide customer outcomes quickly – all adds up to real tangible business results.

Now, let’s be honest about what RPA doesn’t do – It does not transform your organisation by itself, and it’s not a fix for enterprise-wide broken processes and systems. For that, you’ll need digital process automation (DPA).

Gartner’s Magic Quadrant: RPA Tools

The RPA market is rapidly growing as incumbent vendors jockey for market position and evolve their offerings. In the second year of this Magic Quadrant, the bar has been raised for market viability, relevance, growth, revenue and how vendors set the vision for their RPA offerings in a fluid market.

Choosing the right RPA tool for your business is vital. The 16 vendors that made it into the 2020 Gartner report is marked in the appropriate quadrant below.

The Automation Journey

To stay in the race, you have to start fast. Robotic process automation (RPA) is non-invasive and lightning fast. You see value and make an immediate impact.

Part of the journey is not just making a good start with RPA implementations but to put the needed governance around this technology enabler. Make sure you can maintain the automated processes to quickly adapt to changes, integrate with new applications, align with continuously changing business processes while making sure that you can control the change and clearly communicate it to all needed audiences.

To ensure that you continuously monitor the RPA performance you must be able to measure success. Data gathered throughout the RPA journey and then converted through analytics into meaningful management information (MI). MI that enables quick and effective decisions – that’s how you finish the journey.

Some end-to-end RPA tools cover most of the above change management and business governance aspects – keep that in mind when selecting the right tool for your organisation.

So, do you want to stay ahead of your competition? Start by giving your employees robots that help them throughout the day.

Give your employees a robot

Imagine if, especially in the competitive and demanding times we live today, you could give back a few minutes of time of every employee’s day. You can if you free them from wrangling across systems and process siloes for information. How? Software robots that automate the desktop tasks that frustrate your people and slow them down. These bots collaborate with your employees to bridge systems and process siloes. They do work like tabbing, searching, and copying and pasting – so your people can focus on your customers.

RPA injects instant ROI into your business.

Also read:

Fundraisers tackle Route 66 – without even leaving home

Renier Botha joined the Shawbrook Bank staff who have ‘virtually’ tackled one of the most iconic road networks in the world to raise vital funds for frontline workers in the NHS.

The 14-strong group of colleagues decided to embrace lockdown boredom head-on by sign- ing up for the online ‘Route 66 Virtual fitness challenge.’

Hosted by the Conqueror web- site, the challenge saw partici- pants complete the 2,280-mile route online by recording the completion of physical walking, jogging and running exercises at home.

Travelling virtually from Chi- cago to Los angeles, the group gave themselves a three-month target to complete the entire length of the Route 66 highway.

However, they smashed that tar- get in impressive style, completing the gruelling trek in less than a month – and raising £2,940 for the NHS at the same time.

Gareth McHenry – who launched the charity effort before roping in his colleagues – said the idea initially came about to relieve the boredom of lockdown.

Gareth, head of delivery and innovation at Shawbrook Bank, said: “Lockdown has taken its toll on lots of people across the UK – not just within Shawbrook.

“So we decided as a group to have a think of activities that we could do online that would help alleviate the boredom and the monotony of lockdown and at the same time help us stay fit both mentally and physically.

“Route 66 is one of the most iconic – if not thee most iconic – highway in the world and so we felt this would be a great project to start off with. We decided to go for it, and to try and raise some funds for our NHS frontline heroes at the same time and it just grew arms and legs from there.

“We have a group Slack channel that we use to communicate and from within that we just egged each other on. We initially gave ourselves a three-month target to complete all 2,280 miles but we absolutely smashed that within a month – raising almost £3,000 in the process.

“all in all, it’s been a very worth- while exercise and we’re all delighted with it.”

The Conqueror website describes the virtual Route 66 trek as the “ultimate running, cycling and walking challenge’”

But after just six days the team from Shawbrook had managed to cover more than 400 miles.

Gareth added: “this gave the team a little bit of focus out with work and helped us re-create a bit of workplace atmosphere at the same time. after enjoying it so much we’re now trying to plan our next challenge.”

The successful team from Shawbrook Bank included Gareth McHenry, alex Richardson, Chris Kerr, Edward Grainge, Giselle Kelly, James Popham, John Culli- nane, Jonathan Hotchkiss, Nigel Cooper, Patrick Coughlan, Renier Botha, Stephen Birrell, Brendan Ellis and John Kelly.

Read article Shawbrook-Route 66 Surrey Mirror

The Route 66 Virtual Challenge is hosts by “the conqueror”

Seven Coaching Questions

Question 1: “What’s on your mind?” 

A good opening line can make all the difference (just ask Charles Dickens, the Star Wars franchise, or any guy in a bar). The Kickstart Question starts fast and gets to the heart of the matter quickly. It cuts to what’s important while side stepping stale agendas and small talk. 

Question 2: “And what else?” 

The AWE Question keeps the flame of curiosity burning. “And what else?” may seem like three small words, but it’s actually the best coaching question in the world. That’s because someone’s first answer is never the only answer — and rarely the best answer. There are always more answers to be found and possibilities to be uncovered. Equally as important, it slows down the question asker’s “advice monster” — that part of every manager that wants to leap in, take over, and give advice/be an expert/solve the problem. 

Question 3: “What’s the real challenge here for you?” 

This is the Focus Question. It gets to the essence of the issue at hand. This question defuses the rush to action, which has many people in organizations busily and cleverly solving the wrong problems. This is the question to get you focused on solving the real problem, not just the firstproblem. 

The first three questions combine to form a powerful script for any coaching conversation, performance-review formal, or water-cooler casual. Start fast and strong, provide the opportunity for the conversation to deepen, and then bring things into focus with the next questions. 

Question 4: “What do you want?” 

This is the Foundation Question. It’s trickier than you think to answer, and many disagreements or dysfunctional relationships will untangle with this simple but difficult exchange: “Here’s what I want. What do you want?” It’s a basis for an adult relationship with those you work with, and a powerful way to understand what’s at the heart of things. 

Question 5: “How can I help?” 

It might come as a surprise that sometimes managers’ desire to be helpful can actually have a disempowering effect on the person being helped. This question counteracts that in two ways. First, it forces the other person to make a clear request, by pressing them to get clear on what it is they want or need help with. Second, the question works as a self-management tool to keep you curious and keep you lazy — it prevents you from leaping in and beginning things you think people want you to do. 

Question 6: “If you’re saying yes to this, what are you saying no to?” 

If you’re someone who feels compelled to say “yes” to every request or challenge, then this question is for you. Many of us feel overwhelmed and overcommitted; we’ve lost our focus and spread ourselves too thin. That’s why you need to ask this Strategic Question. A “yes” without an attendant “no” is an empty promise.

Question 7: “What was most useful for you?” 

Your closer is the Learning Question. It helps finish the conversation strong, rather than just fading away. Asking “What was most useful for you?” helps to reinforce learning and development. They identify the value in the conversation — something they’re likely to miss otherwise, and you get the bonus of useful feedback for your next conversation. You’re also framing every conversation with you as a useful one, something that will build and strengthen your reputation. 

From the book: The Coaching Habit: Say Less, Ask More & Change the Way Your Lead Forever

The Crucial Elements of a Robust Data Strategy: A Blueprint for Success

In the digital age, data has become the lifeblood of businesses, driving innovation, enhancing customer experiences, and providing a competitive edge. However, the mere existence of data is not enough; what truly matters is how organisations harness and manage this valuable resource. Enter the realm of a good data strategy – a meticulously crafted plan that delineates the path for effective data management.

To unlock its true potential, a data strategy must be carefully aligned with the core pillars of an organisation: its operations, its current IT and data capabilities, and its strategic objectives.

Alignment with Business Operations and Processes:

The heart of any business beats to the rhythm of its operations and processes. A well-crafted data strategy ensures that this heartbeat remains strong and steady. It’s about understanding how data can be seamlessly integrated into everyday workflows to streamline operations, increase efficiency, and reduce costs.

As an example, consider a retail company, for instance. By aligning its data strategy with business operations, it can optimise inventory management through real-time data analysis. This allows for better stock replenishment decisions, reducing excess inventory and minimising stockouts. In turn, this alignment not only cuts costs but also enhances customer satisfaction by ensuring products are readily available.

Leveraging Current IT and Data Capabilities:

No data strategy exists in a vacuum – it must be rooted in the organisation’s existing IT and data capabilities. The alignment of these elements is akin to synchronising gears in a well-oiled machine. A data strategy that acknowledges the current technological landscape ensures a smooth transition from theory to practice.

Suppose an insurance company wishes to harness AI and machine learning to enhance fraud detection. An effective data strategy must take into account the available data sources, the capabilities of existing IT systems, and the skill sets of the workforce. It’s about leveraging what’s in place to create a more data-savvy organization.

Supporting Strategic Business Objectives:

Every business sets its course with strategic objectives as the guiding star. A data strategy must be a companion on this voyage, steering the ship towards these goals. Whether it’s revenue growth, customer acquisition, or market expansion, data can be a compass to navigate the path effectively.

For a healthcare provider, strategic objectives might include improving patient outcomes and reducing costs. By aligning the data strategy with these objectives, the organisation can use data to identify trends in patient care, optimising treatments and resource allocation. This not only furthers the business’s strategic goals but also enhances the quality of care provided.

Components of a Data Strategy

Let’s delve into the significance and essential components of a robust data strategy that forms the cornerstone of success in today’s data-driven world.

  1. Informed Decision-Making – A well-structured data strategy empowers businesses to make informed decisions. By analysing relevant data, organisations gain profound insights into market trends, customer behaviour, and operational efficiency. Informed decision-making becomes the guiding light, steering businesses away from guesswork towards calculated strategies.
  2. Strategic Planning and Forecasting – A good data strategy provides the foundation for strategic planning and forecasting. By evaluating historical data and patterns, businesses can anticipate future trends, enabling them to adapt proactively to market shifts and customer demands. This foresight is invaluable, especially in dynamic industries where agility is key.
  3. Enhanced Customer Experiences – Understanding customer preferences and behaviour is pivotal in delivering exceptional experiences. A data strategy facilitates the collection and analysis of customer data, enabling businesses to personalise offerings, optimise interactions, and foster stronger customer relationships. In essence, it’s the key to creating memorable customer journeys.
  4. Operational Efficiency and Cost Reduction – Efficient data management reduces operational complexities and costs. A well-designed data strategy streamlines data collection, storage, and analysis processes, eliminating redundancies and ensuring optimal resource allocation. This efficiency not only saves costs but also frees up valuable human resources for more strategic tasks.
  5. Risk Mitigation and Security – Data breaches and cyber threats pose significant risks to businesses. A robust data strategy includes stringent security measures and compliance protocols, safeguarding sensitive information and ensuring regulatory adherence. By mitigating risks, businesses can protect their reputation and build trust with customers.
  6. Innovation and Growth – Data-driven insights fuel innovation. By analysing data, businesses can identify emerging trends, unmet customer needs, and untapped market segments. This knowledge forms the bedrock for innovative product development and business expansion, driving sustained growth and competitiveness.
  7. Continuous Improvement – A data strategy is not static; it evolves with the business landscape. Regular assessment and feedback loops enable organisations to refine their strategies, incorporating new technologies and methodologies. This adaptability ensures that businesses remain at the forefront of the data revolution.

In summary, a data strategy’s success hinges on its alignment with the intricate web of business operations, current IT and data capabilities, and strategic objectives. The beauty lies in the harmony it creates, the symphony of data-driven insights that empowers an organization to thrive in a data-rich world. It is more than a strategy; it is a journey, a roadmap to a future where data is not just a resource but a strategic ally, guiding businesses to new horizons of success. A good data strategy is not merely a luxury; it is a necessity for any organisation aspiring to thrive in the digital era. It empowers businesses to make strategic decisions, enhance customer experiences, optimise operations, mitigate risks, foster innovation, and achieve sustained growth. As businesses continue to navigate the complex terrain of data, a well-crafted data strategy stands as a beacon, illuminating the path to success and ensuring a future that is both data-driven and prosperous.

Digital Strategy & the Board

Digital Strategy is a plan that uses digital resources to achieve one or more objectives. With Technology changing at a very fast pace, Organisations have many digital resources to choose from.

Digital Resources can be defined as materials that have been conceived and created digitally or by converting analogue materials to a digital format for example:

  • Utilising the internet for commerce (web-shops, customer service portals, etc…)
  • Secure working for all employees from anywhere via VPN
  • Digital documents, scanning paper copies and submitting online correspondence to customers i.e. online statements and payment facilities via customer portals
  • Digital resources via Knowledge Base, Wiki, Intranet site and Websites
  • Automation – use digital solutions like robotics and AI to complete repetitive tasks more efficiently
  • Utilising social media for market awareness, customer engagement and advertising

A Digital Strategy is typically a plan that helps the business to transform it’s course of action, operations and activities into a digital nature by utilising available applicable technology.

Many directors know that digital strategies, and there related spending, can be difficult to understand. From blockchain and virtual reality to artificial intelligence, no business can afford to fall behind with the latest technological innovations that are redefining how businesses connect with their customers, employees, and myriad of other stakeholders. Read this post that covers “The Digital Transformation Necessity“…

As a Board Director what are the crucial factors that the Board should consider when building a digital strategy?

Here are five critical aspects, in more detail, and the crucial things to be conscious of when planning a digital transformation strategy as part of a board.

Stakeholders

A stakeholder, by definition, is usually an individual or a group impacted by the outcome of a project. While in previous roles you may have worked with stakeholders at senior management level, when planning a digital strategy, it’s important to remember that your stakeholders could also include customers, employees or anyone that could be affected by a new digital initiative.

Digital strategies work from the top down, if you’re looking to roll out a digital transformation project, you need to consider how it will affect every person inside or outside of your business.

Investment

Digital transformation almost always involves capital and technology-intensive investments. It is not uncommon for promising transformation projects to stall because of a lack of funds, or due to technology infrastructure that cannot cope with increased demands.

Starting a budgeting process right at the start of planning a digital transformation project is essential. This helps ensure that the scope of a project does not grow beyond the capabilities of an enterprise to fund it. A realistic budgeting and funding approach is crucial because a stalled transformation project creates disruption, confusion and brings little value to a business.

Communications

From the get-go, any digital strategy, regardless of size, should be founded on clear and constant communication between all stakeholders involved in a project. This ensures everyone is in the loop on the focus of the project, their specific roles within it, and which processes are going to change. In addition, continuous communication helps build a spirit of shared success and ensures everyone has the information they need to address any frustrations or challenges that may occur as time passes. When developing an effective communication plan, Ian’s advice is to hardly mention the word digital at all.

The best digital strategies explain what digital can do and also explain the outcomes. Successful communication around digital strategies uses language that everyone can understand, plain English, no buzzwords, no crazy acronyms and no silly speak.

Also read “Effective Leadership Communication” which covers how you can communicate effectively to ensure that everyone in the team are on the same page.

Technology

While there are many technologies currently seeing rapid growth and adoption, it doesn’t necessarily mean that you will need to implement all of them in your business. The choice of technology depends upon the process you are trying to optimise. Technology, as a matter of fact, is just a means to support your idea and the associated business processes.

People often get overwhelmed with modern technologies and try to implement all of them in their current business processes. The focus should be on finding the technologies that rightly fit your business objectives and implement them effectively.

Never assume that rolling out a piece of technology is just going to work. When embarking on a digital project, deciding what not to do is just as important as deciding what to do. Look at whether a piece of technology can actually add value to your business or if it’s just a passing trend. Each digital project should hence be presented to Board with a business case that outlines the business value, return on investment and the associated benefits and risks, for board consideration.

Measurement

No strategy is complete without a goal and a Digital Strategy is no different. To measure the effectiveness of your plan you will need to set up some key performance indicators (KPIs). These metrics will demonstrate the effectiveness of the plan and will also guide your future decision making. You will need to set up smart goals that have clear achievable figures along with a timeline. These goals will guide and optimise the entire execution of a transformation project and ensure that the team does not lose focus.

Any decent strategy should say where we are now, where we want to get to and how we’re going to get there, but also, more importantly, how are we going to monitor and track against our progress.

Also Read

Risk Management – for NEDs

Arguably the most significant adjustment to the NED role over the past seven years is that all NEDs must now be well versed in identifying and managing all forms of risk – operational, financial and reputational…

As a Chairman once described: “Risk is a massive issue now: You need to understand the risks and be clear about what the board is doing about mitigating those risk.”

So, how can you ensure that risks are being articulated appropriately and how can you probe into how risks are being mitigated, irrespective if risk management is well established within an industry or not? In the first part of this article I give some steer on how you can assess current risk management practises (governance) and the latter part covers some best practises.

Risk Maturity

If not already done within the company, you could do a Risk Maturity Assessment which gives an indication of the organisation’s engagement with risk management.

There are various models, usually with five levels of maturity (see the 5 Level Maturity Model in diagram below): from an immature Level 1 organisation where there are no formal risk management policies, processes or associated activities, tools or techniques, through a Level 2 managed organisation where policies are in place but risk reviews are generally reactive, all the ay up to the mature or ‘risk intelligent’ Level 5 enterprise where the risk management tone is set at the top and built into decision making, with risk management activities proactively embedded at all levels of the organisation.

Maturity - 5 Levels

     5 Level Maturity Model 

The outcome of such an assessment will give you clear indication of the risk management maturity level of the organisation. Dependant on how that aligns with the Shareholders’ and Board’s expected level, the needed change actions can be initiated to mature the organisation to the expected level. It will also give you measure of clarity of the rigour of process and review that is likely to have gone into the risk reporting that you see as a Board.

Risk Score/Rating Matrix

As risks are identified, logged in the Risk Register and then assessed based on likelihood of it happening and the impact to the business if it should happen, a Risk Scoring Matrix (with preferably a 5 point scal as per diagram below) is very useful to assign a Risk Score to each risk.

The higher the score the higher the priority of mitigating the risk should be.

RISK Matrix

Risk Score Matrix

As a NED you need to assess the completeness of the Key Risks in the Risk Register. Engaging with the executives prior board meetings goes a long way to get input and a feel for risks existing on the floor (day to day running/operations) of the business. You should also ask if there is something that you are talking about in every meeting that either is not on the risk register, or is rated as a low risk?  If that is true, then you need to explore why you are talking about it as a Board but management are not giving it greater focus.

Risk Heat Chart

A heat chart (as per diagram below) enables a holistic view of risks with high scoring risks in the top right (coloured red) corner and low risks in the bottom left corner (coloured green).Risk-HeatMap

   Risk Heat Map

For a board to get an overview of what the key risks are, I don’t think you can beat a heat chart.

As a NED, you can use this to sense check: Are the risks in the top quadrants, the Red Risks, the ones that the Board feel are the highest risk? Are you talking about these risks regularly and challenging the business on what mitigating actions they are doing to reduce them?

Approach on Risk Review

The popular parlance these days is a ‘deep dive’ into the highest risks, usually undertaken by the Audit Committee.

Apart from the “deep dive’ into risks usually undertaken by the Audit Committee you, as a NED, want to do your own exploring, below is an approached…

1. Current Risk Score

What is the justification for the current rating – does this feel right? The impact should be measured by the potential impact of the risk on strategic objectives, and is usually quite easy to define, but likelihood can be more subjective.

Also known as the mitigated risk rating, the current rating should recognise mitigations or controls that are already in place, and how effective these are.

2. Target Risk Score

What is a reasonable target risk rating for this risk, ie where are we trying to get to?

As a Board, you need to set the risk appetite (which equates to target risk ratings).  This may vary by the type of risk, for example, targeting a very low risk rating might be necessary on something that is a matter of compliance or safety, but in commercial matters, the trade-off between risk and reward needs to be considered, so a higher risk appetite is likely to be acceptable.

There won’t be a limitless budget to spend on mitigating every risk to a minimal level, so as a Board you will have to decide what level of risk you are comfortable with; and where the balance sits between reducing the risk and the cost of mitigation.  Why would you spend more on mitigations than the financial impact of the risk crystallising?

3. Mitigating actions

How are you going to get to your target level of risk?  Planned mitigating actions should drive the risk rating to its target level.  This is a focus area for audit committee deep dives – what actions are planned, and will they be sufficient to bring you to your target risk rating?  Progress on these actions should be monitored regularly – if no progress, ask if this risk being taken seriously enough? Or is it not as big a risk as you first thought?

Good risk management should aid decision making, avoid or minimise losses, but also identify opportunities.

Let’s look now into Risk Mitigation in more detail…

Approach on Risk Mitigation

Risk mitigation can be defined as taking steps to reduce adverse effects and impact to the business while reducing the likelihood of the risk.

There are four types of risk mitigation strategies that hold unique to Business Continuity and Disaster Recovery. When mitigating risk, it’s important to develop a strategy that closely relates to and matches your company’s risk profile.

four types of risk mitigation

Risk Acceptance

Risk acceptance does not reduce any effects however it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself. A company that doesn’t want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy.

Risk Avoidance

Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. It’s important to note that risk avoidance is usually the most expensive of all risk mitigation options.

Risk Limitation/Reduction

Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company’s exposure by taking some action. It is a strategy employing a bit of risk acceptance along with a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

Risk Transference

Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc. This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on their core competencies.

All of these four risk mitgiation strategies require montioring. Vigilence is needed so that you can recognize and interrperet changes to the impact of that risk.

 

Project Sponsorship

There are multiple aspects that contribute to a successful project, for example the right people, proper planning, governance, clear roles and responsibilities, but to mention a few. You could argue all equally important but one of the most important aspects that are often overlooked is the position of the Project Sponsor.

In my experience, the Sponsor holds one of the most important roles in terms of project success or failure. An involved sponsor who really is vested in the success of the project, will bring drive and energy to the project at a senior executive level – especially needed when the going gets tough.

The Project Sponsor takes ownership for the project goals, provides overall direction for the project and is the owner of the final product/deliverable.

Project Sponsor – Definition

In PRINCE2 it is not a defined role. PRINCE2 separately defines the “Project Executive” and the “Senior User” – two of the three core elements of the Project Board. For simpler projects these roles may well be combined and this then aligns closely with the general usage of the term Project Sponsor.

The APM Body of Knowledge characterises the Project Sponsor as the individual for whom the project is undertaken and who is the primary risk taker. The Sponsor is a member of the Steering Group which provides strategic direction and will include senior managers and, sometimes, key stakeholders.

The PMI PMBOK Guide talks about project sponsors and project initiators: the project initiator authorises the initiation of a project and the project sponsor provides the financial resources, in cash or in kind for the project. Again, these roles may often be assumed by a single individual.

Who can be a Project Sponsor

It is unusual for Project Sponsors to be full time project professionals. It is more likely that they are drawn from the management team of the business – perhaps as an interested “user”. For major projects it may be the CEO or CIO which assumes the role of Sponsor. It is preferable that the individual brings relevant experience and wields the authority and organisational ability to make things happen.

A sponsor needs to be:

  • a business leader and decision-maker with the credibility to work across corporate and functional boundaries;
  • an enthusiastic advocate of the work and the change it brings about;
  • prepared to commit time and support to the role;
  • sufficiently experienced in P3 to judge if the work is being managed effectively and to challenge P3 managers where appropriate.

Project Sponsor vs Other Project Roles

Project Sponsor vs. Project Owner

The project sponsor is a person.  The project owner is the organization that performs the project and receives its deliverables.  Normally the project sponsor is employed by the project owner organisation.

Project Sponsor vs. Project Manager

The project sponsor is one (and only one) level above the project manager.  While the project manager is responsible for the day to day operations of the project, the project sponsor seeks to promote the project to keep it high on the priority list, ensures the resources are in place to perform the project, and approves changes to the project.

Project Sponsor Project Manager
Day to Day management of project work No Yes
Project Deliverables Accepts Produces
Funding Approves Requests

The two main differences between project sponsorship and project management 

    1. Project sponsorship includes the identification and definition of the project whereas project management is concerned with delivering a project that is already defined, if only quite loosely.
    2. The project sponsor is responsible for the project’s business case and should not hesitate to recommend cancellation of the project if the business case no longer justifies the project.

Quick look at Other Project Roles:

    • Project Manager:  Responsible for the day to day project work, keeping the project on schedule and budget.  They report to the Project Sponsor.
    • Project Team:  The people who perform the technical project work and produce the deliverables.  They report to the project manager.
    • Customers/Users:  The people who use the project deliverables to improve their lives or work.  They are sometimes involved directly within the project in the form of focus groups or test subjects.
    • Vendors:  The people and organizations the project procures to provide products and/or services to fill technical gaps in the project team’s knowledge or ability, or to enhance the quality of the final product.
    • Business Partners:  The people or organizations that the project owner partners with to fulfill a specific role like installation, training or support.
    • Functional Managers:  The managers of technical groups (departments) within the owner organization, who often supply technical expertise to the project.
    • External Stakeholders:  Most project have stakeholders who are affected by the project, like government regulatory agencies, adjacent landowners, and the like.

Sponsor Responsibilities

The role of project sponsor is critical to ensuring the success of projects – therefore, when initiating a new project, you need to define the project sponsor taking into account the importance of project sponsorship. A project sponsor is to be involved from project initiation to project end. They represent the business side of the project.  They were probably involved when the project was being conceived and advocated for its inception before a project manager was assigned.

Further the sponsor is critical to strategic planning, high project sustainability, and successful implementation of project objectives. The role of project sponsor covers the financial and organizational responsibilities and activities that are directed to quick and decisive governance of the project.

The project sponsor is one, and only one, level above the project manager.  They do not manage the day to day operations of the project but they ensure the resources are in place, promote the project, and hold overall responsibility for the project’s success.

A good sponsor performs different functions during the project life cycle, serving as mentor, catalyst, motivator, barrier buster, and boundary manager. Most of the sponsor responsibilities are covered below:

  • The sponsor is the link between the project manager and senior managers, lead negotiations to gain and ensure stakeholder consensus.
  • Champion/Promotion: The project sponsor is the best ‘project seller’ that champions the project thought the business. The sponsor promotes and defends the project in front of all other stakeholders. They are the project champion that attempts to keep the project at the highest priority within the organisation.
  • Informing:  They receive project status updates from the project manager and disseminate the information to the relevant executives.
  • Project Charter:  This document officially creates the project and assigns the project manager.  It falls directly within the project sponsor’s responsibility.
  • Authorisation: They authorise the project and assign the project manager. They approve the project management plan and are kept aware of how the project is managed.
  • Scoping:  They are generally responsible for determining the initial project scope, although the project manager is ultimately responsible for the official project scope within the project management plan.
  • Goals: The Sponsor should ensure that the business need is valid and correctly prioritised within the project.
  • Communication: Clearly communicate on aspects of the project with stakeholder groups and senior management.
  • Keeping to Schedule: The Sponsor is heavily involved in ensuring that the project is kept to the original schedule along with the Project Manager. In order to manage the schedule the Sponsor and Project Manager should meet frequently and review the timeline.
  • Changes: A project can experience changes at any time. The Sponsor needs to ensure that these changes are properly managed to ensure that they don’t have any negative impact on the project.
  • Resolve Risks & Issues: Some issues are out of the reach of the Project Manager such as decisions on changes and conflicting objectives. The Sponsor takes control of these issues and ensures that they are solved efficiently and effectively.
  • Support: The Project Manager needs consistent support during a project. The Sponsor is on hand to provide this support in the form of mentoring, coaching and leadership. The Sponsor also supports the Project Team especially in terms of scope clarification, progress management and guidance.
  • Reporting: Assistance for the PM with appraisal and reporting.
  • Funding: They are responsible for negotiations to ensure funding is in place and approving changes to the project budget.
  • Leadership: Provide direction and guidance for project empowerment, key business strategies and project initiatives.
  • ROI & Benefits: As owner of the business case, the project sponsor is responsible for qualifying and overseeing the delivery of the benefits (the benefits realisation) as well as to identify project critical success factors and approve deliverables.
  • Identify members of Steering Committee and chair these Steerco meetings.
  • Involve stakeholders in the project and maintain their ongoing commitment to the project through using communication strategies and project management planning methods
  • Receiving:  Evaluate the project’s success on completion – The project sponsor receives the project deliverables from the project manager, approves them, and integrates them into the owner organization.

According to the Project Management Institute (PMI), the project sponsor role can be broken into three parts: vision, governance and value or benefits realization. They break those down in the following way:

Vision

    • Makes sure the business case is valid and in step with the business propositio
    • Aligns project with business strategy, goals and objective
    • Stays informed of project events to keep project viable
    • Defines the criteria for project success and how it fits with the overall business

Governance

    • Ensures project is properly launched and initiated
    • Maintains organizational priorities throughout project
    • Offers support for project organization
    • Defines project roles and reporting structure
    • Acts as an escalation point for issues when something is beyond the project manager’s control
    • Gets financial resources
    • Decision-maker for progress and phases of project

Values & Benefits

    • Makes sure that risks and changes are managed
    • Helps to ensure control and review processes
    • Oversees delivery of project value
    • Evaluates status and progress
    • Approves deliverables
    • Helps with decision-making
    • Responsible for project quality throughout project phases

Common reasons why the Sponsor lets down the project:

Many organisations invest heavily in project management training but are blind to the benefits of having project leaders who truly understand how projects differ from other management activities. Business are letting a project down if the sponsor:

    • is reassignment in the organisation, or distraction by other priorities.
    • is micro managing which can disrupt project manager confidence and authority.
    • fails to understand the project process and responsibilities.

The chances are that if an inappropriate project sponsor has been chosen,

    • the effectiveness of the role is reduced,
    • the project is not funded sufficiently,
    • and the overall success of the project is likely to turn into failure.

In fact, any project which is initiated without an appropriate degree of executive sponsorship (executive sponsor) stands an high likelihood of failure.

Sponsorship: project, programme or portfolio

Project

The role of the project sponsor starts before the appointment of the project manager. It continues beyond project closure and the departure of the project manager. So the sponsorship role covers the whole project life cycle.

The project sponsorship role will often be taken by the programme manager where the project is part of a programme.

Programme

The scale of programmes will often require a sponsor to be supported by a group of senior managers who perform some sponsorship duties. However, ultimate accountability will lie with the programme sponsor.

The programme manager should also be a competent project sponsor and will often perform that role for some, or all, of the programme’s component projects.

Portfolio

Sponsorship of a portfolio of projects and programmes will be undertaken by a senior executive with the necessary status, credibility and authority. This may well be a main board member, or even the CEO of the organisation. The scale of a portfolio will require an extensive governance organisation. This may involve, for example, committees with the responsibility for investment decisions or management of change.

What a Project Sponsor Does In Each Phase

While sometimes a project sponsor is clearly engaged from the start and other times they are nowhere to be seen, the best project sponsor is fully engaged with every phase of the project.

Initiation Duties

Project sponsors are instrumental in selecting the project manager during the initiation phase, and then they give that project manager a clear mandate, context for the project and set the level of their authority.

Also, during the project initiation, the project sponsor makes sure the project is appropriate for the organization, offering input on the project charter and participates in the kick-off meeting. The sponsor helps with the decision making during this phase.

Planning Duties

For the planning phase, the project sponsor is checking to make sure the project plan is realistic and feasible. This accounts for time restrictions and whether or not the team is tasked with expectations they cannot meet.

The project sponsor can help resolve issues, too, if they’re beyond the scope of the project manager. If there are other projects in play, the project sponsor is making sure they’re all working together and not against each other.

Implementation Duties

For the implementation and control phases, the project sponsor should work with the project manager, but not overstep boundaries. The project sponsor evaluates the project’s actual progress against what was planned and provides feedback to the project manager as necessary.

Sponsors also help the project manager and team work more autonomously to solve issues as they arise, while making sure that processes are being followed. They identify underlying factors that might cause problems and celebrate completion of milestones.

Closing Duties

During the closing phase, the project sponsor is part of the post-mortem evaluation on performance and other aspects of the project. They make sure that handoffs and signoffs are done properly. Project sponsors help facilitate the discussion that decides whether a project was a success or failure.

Overall, a project sponsor helps to streamline communications. They create trust and collaboration and keep problems from escalating. In terms of issues, they set up the instrument to identify problems with schedule, cost and quality. In that sense, they’re also in charge of making sure risk management is successful. Finally, they also encourage record-keeping for historical data storage.

Innovation Case Study: Test Automation & Ambit Enterprise Upgrade

A business case of how technology innovation successfully integrated into the business operations an improved the way of working that supported business success.

  
Areas of Science and TechnologyData Engineering, Computer Science
R&D Start DateDec 2018
R&D End DateSeptember 2019
Competent ProfessionalRenier Botha

 

Overview and Available Baseline Technologies

Within the scope of the project, the competent professionals sought to develop a regression testing framework aimed at testing the work carried out to upgrade the Ambit application[1] from a client service solution to a software as a service solution (SaaS) operating in the Cloud. The test framework developed is now used to define and support any testing initiatives across the Bank. The team also sought to automate the process, however this failed due to lack of existing infrastructure in the Bank. 

Initial attempts to achieve this by way of third-party solution providers, such as Qualitest, were unsuccessful, as these providers were unable to develop a framework or methodology which could be documented and reused across different projects. For this the team sought to develop the framework from the ground up. The project was successfully completed in September 2019. 

Technological Advances

The upgrade would enable access to the system via the internet, meaning users would no longer need a Cisco connection onto the specific servers to engage with the application. The upgrade would also enable the system to be accessed from devices other than a PC or laptop. Business Finance at Shawbrook is comprised of 14 different business units, with each unit having a different product which is captured and processed through Ambit. All the existing functionality, and business specific configuration needed to be transferred into the new Enterprise platform, as well as the migration of all the associated data. The competent professionals at Shawbrook sought to appreciably improve the current application through the following technological advances:

  • Development of an Automated Test Framework which could be used across different projects

Comprehensive, well executed testing is essential for mitigating risks to deployment. Shawbrook did not have a documented, standardised, and proven methodology that could be adopted by different projects to ensure that proper testing practises are incorporated into project delivery. There was a requirement to develop a test framework to plan, manage, govern and support testing across the agreed phases, using tools and practices that help mitigate risks in a cost-effective and commensurate way.

The test team sought to develop a continuous delivery framework, which could be used across all units within Business Finance. The Ambit Enterprise Upgrade was the first project at Shawbrook to adopt this framework, which lead to the development of a regression test pack and the subsequent successful delivery of the Ambit upgrade. The Ambit Enterprise project was the first project within the Bank which was delivered with no issues raised post release.

The development of a regression test pack which would enable automated testing of future changes or upgrades to the Ambit platform

Regression testing is a fundamental part of the software development lifecycle. With the increased popularity of the Agile development methodology, regression testing has taken on added importance. The team at Shawbrook sought to adopt an iterative, Agile approach to software development. 

A manual regression test pack was developed which could be used for future testing without the need for the involvement of business users. This was delivered over three test cycles with the team using the results of each cycle (bugs identified and resolved) to issue new releases. 

173 user paths were captured in the regression test pack, across 14 different divisions within Business Finance. 251 issues were found during testing, with some being within the Ambit application. Identifying and resolving these issues resulted in the advancement of Ambit Enterprise platform itself. This regression test pack can now be used for future changes to the Ambit Enterprise application, as well as future FIS[2] releases, change requests and enhancements, without being dependent on the business users to undertake UAT. The competent professionals at Shawbrook are currently using the regression test pack to test the integration functionality of the Ambit Enterprise platform.

  • Development of a costing tool to generate cost estimates for cloud test environment requirements

In order to resolve issues, solutions need to be tested within test environments. A lack of supply was identified within Shawbrook and there was an initiative to increase supply using the Azure cloud environment. The objective was to increase the capability within Business Finance to manage an Azure flexible hosting environment where necessary test environments could be set up on demand. There was also a requirement to plan and justify the expense of test environment management. The competent professionals sought to develop a costing tool, based on the Azure costing model, which could be used by project managers within Business Application Support (“BAS”) to quickly generate what the environment cost would be on a per day or per hour running basis. Costs were calculated based on the environment specification required and number of running hours required. Environment specification was classified as either “high”, “medium” or “low”. For example, the test environment specification required for a web server is low, an application server is medium while a database server is high. Shawbrook gained knowledge and increase its capability of the use of the Azure cloud environment and as a result are actively using the platform to undertake cloud-based testing.

The above constitutes an advance in knowledge and capability in the field of Data Engineering and Computer Science, as per sections 9 a) and c) of the BEIS Guidelines.

Technological Uncertainties and activities carried out to address them

The following technological uncertainties were encountered while developing the Ambit Enterprise upgrade, mainly pertaining to system uncertainty:

  • Implementation of the new Ambit Enterprise application could disrupt existing business processes

The biggest risks for the programme of change, was the potential disruption of existing business processes due to the implementation of the change without validation of the upgraded application against the existing functionality. This was the primary focus of the risk mitigation process for the project. Following the test phases set out in the test framework would enable a clear understanding of all the residual risks encountered approaching implementation, providing stakeholders with the context required to make a calculated judgement on these risks.

When an issue was identified through testing, a triage process was undertaken to categorise the issues as either a technical issue, or a user issue. User issues were further classified as “training” or “change of business process”. Technical issues were classified as “showstoppers”, “high”, “medium” and “low”. These were further categorised by priority as “must haves” and “won’t haves” in order to get well-defined acceptance criteria for the substantial list of bugs that arose from the testing cycles. In total, 251 technical issues were identified.

The acceptance criteria for the resolution of issues were:

  • A code fix was implemented
    • A business approved work around was implemented
    • The business accepted the risk

All showstoppers were resolved with either a code fix or and an acceptable work around. Configuration issues were within the remit of Shawbrook’s business application support (“BAS”) team to resolve, whilst other issues could only be resolved by the FIS development team. When the application went live, there were no issues raised post release, and all issues present were known and met the acceptance criteria of the business. 

  • Business processes may no longer align with the new web-based application

Since the project was an upgrade, there was the potential for operational impact of existing functionality due to differences between the Ambit client server solution, and the upgraded Ambit Enterprise web-based solution. The BAS team at Shawbrook were required to make changes to the business processes in order to align with the way the Ambit Enterprise solution now operated. Where Shawbrook specific issues could not be resolved through the configuration of the application with the business processes, changes were made to the functionality within Ambit, for example, additional plug-ins were developed for the Sales Portal platform to integrate with the Ambit Enterprise application. 

Because Ambit Enterprise was a web-based application, application and security vulnerabilities needed to be identified so that the correct security level was achieved. Because of this, performance and security testing, which was currently not being executed, needed to be introduced to the test framework. Performance testing also needed to be executed so that speed and stability requirements under the expected workloads were met.

Summary and Conclusions

The team at Shawbrook successfully developed a test framework which could be used across all projects within Business Finance. The development of the test framework lead to the generation of a regression test pack for the Ambit Enterprise upgrade. By undertaking these R&D activities, Shawbrook gained knowledge in the use of Azure Cloud Environment for testing, and increased its automated testing capabilities, enabling the transition to a continuous delivery framework whereby the majority of testing is automated.


[1] Ambit is the asset finance application operating within the business unit, 70-80 percent of transactions on all lending is captured and managed through Ambit

[2] FIS is the Ambit Enterprise vendor

Case Study: Transformational Leadership at Shawbrook Bank – Establishing the Tech-Hub in Glasgow

Programme Director (Contractor): Renier Botha

Objective:
Renier Botha, Principal Consultant and Director at renierbotha Ltd in his role as Programme Director at Shawbrook Bank from August 2018 to September 2019, was tasked with establishing the Tech-Hub in Glasgow as a centre of excellence. His objective was to introduce innovative new standards and agile-driven governance to project and service delivery teams within the Business Finance division.

Assignments & Achievements:

1. Tech-Hub Maturity Transformation Programme:
Renier Botha led the “Tech-Hub Maturity Transformation” Programme, implementing a new Target Operating Model (TOM) in Glasgow. Through innovative ways of working, delivery targets were achieved approximately 9% more efficiently. Notably, support issue resolution time was drastically reduced from over 30 days to fewer than 2 days.

2. Establishment of Business Finance PMO:
He established the Business Finance Portfolio Management Office (PMO) from the ground up. Renier developed portfolio governance processes, templates, metrics, KPIs, and real-time management information (MI). This approach facilitated measurable improvements and set new standards for data-driven, commercially focused delivery. These practices were adopted across the entire bank.

3. Testing Capability Initiative:
Renier spearheaded an innovative initiative to create a Testing Capability for the bank. This included developing a risk-mitigating test strategy, automation framework, and associated Azure cloud development and test environments. He successfully delivered the operating model and a test-automation toolset proof of concept (POC). This initiative enabled continuous delivery (CD) and remarkably reduced regression testing efforts by 95%.

4. Ambit Enterprise Upgrade Programme:
Renier took on the challenge of managing the £1.3 million Ambit Enterprise upgrade (asset management system) across 14 business units, each with multiple product offerings. Despite the complexity, the upgrade was completed on time and under budget. This achievement earned accolades from the board, recognising it as the best-managed delivery in Shawbrook Bank.

Conclusion:

Under Renier Botha’s leadership as Programme Director, Shawbrook Bank witnessed a significant transformation within its Business Finance division. Renier’s innovative approach and strategic acumen not only established the Tech-Hub in Glasgow as a centre of excellence but also revolutionised the bank’s project and service delivery methodologies. His achievements, from efficiency improvements to groundbreaking testing capabilities, have left a lasting impact, setting new standards for excellence within Shawbrook Bank.

Project Retrospective

These meetings go by many names – lessons learned, postmortems, retrospectives, after-action reviews, wrap-ups, project “success” meetings. Regardless of what you call them, they all have the same goal and follow the same basic pattern.

Retrospective – looking back on or dealing with past events or situations oran exhibition or compilation showing the development of work over a period of time.

An Agile retrospective is a meeting that’s held at the end of an iteration (sprint) in an agile project. During the retrospective, the team reflects on what happened in the iteration (sprint) and identifies actions for improvement going forward.

The Project Retrospective dedicates time to reviewing a completed project and learning from both the successes and the failures so the team and organisation can improve how they work going forward.

The general purpose is to allow the team, as a group, to evaluate its past working cycle. In addition, it’s an important moment to gather feedback on what went well and what did not.

Classic questions answered in these meetings:

  • What did we set out to do?
  • What actually happened?
  • Why did it happen?
  • What are we going to do next time?

 

“We do not learn from experience … we learn from reflecting on experience.”; John Dewey

Retrospectives give a team time to reflect on what they learned.

 

The Process

The process for debriefing a project covers roughly the same topics as the quick after-action discussion.

  1. Review the Project
  2. What went well and did not
  3. How can we do it better next-time

Review the project

Start by reviewing the project facts: goals, timeline, budget, major events, and success metrics.

In order to come up with useful ideas that everyone can agree on, the team needs a shared understanding of the facts and insight into the parts of the project in which they may not have been involved.

It’s important not to skip or rush through this step, especially for larger projects. People will arrive at the retrospective ready to discuss and solve problems, often assuming they know everything they need to know about what happened. This is rarely true.

If you are reviewing a project as a team, that means it took many people with unique experiences to get to that point. This step ensures everyone gets all the facts straight before they try to solve problems they may only partially understand.

What went well and what did not

This is the heart of the meeting. Everyone shares what they learned during the project: both the good and the bad.

In my opinion, this is the most fun and most challenging part of the meeting. As the meeting leader, you have an enormous impact on the success of your retrospective by deciding which questions you’ll ask and how the team shares their answers.

How can we do it better next-time

Real change is the ultimate measure of a retrospective’s success. To ensure that your retrospective results in something actually getting better, you’ll end the meeting by creating a specific action plan for improvements.

Top quotes on Change & Trust by Stephen Covey

7Habits-Covey

I’ve first read this book “7 Habits of Highly Effective People” in the 90’s – timeless inspiration!

 

 

 

 

  1. “There are three constants in life – change, choice and principles.”
  2. “Make time for planning; Wars are won in the general’s tent.”
  3. “Be proactive.” 
  4. “Begin with the end in mind.”
  5. “You have to decide what your highest priorities are and have the courage – pleasantly, smiling, nonapoloegetically – to say ‘no’ to other things. And the way to do that is by having a bigger ‘yes’ burning inside.”
  6. “Put first things first.”
  7. “Think win-win.”
  8. “Seek first to understand, and then to be understood.” 
  9. “Most people do not listen with the intent to understand. Most people listen with the intent to reply.”
  10. “If we keep doing what we’re doing, we’re going to keep getting what we’re getting.”
  11. “Trust is the glue of life. It’s the most essential ingredient in effective communication. It’s the foundational principle that holds all relationships.” 
  12. “Treat your employees exactly as you want them to treat your best customers.” 
  13. “The key is not to prioritise what’s on your schedule but to schedule your priorities.” Leadership is a choice, not a position.” 
  14. “I am not a product of my circumstances, I am a product of my decisions.” 
  15. “Strength lies in differences not in similarities.” 
  16. “Listen with your eyes for feelings.” 
  17. “The way we see the problem is the problem.” 
  18. “Most of us spend too much time on what is urgent and not enough time on what is important.” 
  19. “Accountability breeds response-ability.” 
  20. “Highly proactive people don’t blame circumstances, conditions or conditioning for their behaviour. Their behaviour of their own conscious choice.” 
  21. “Management is doing things right; leadership is doing the right things.” 
  22. “Be a light not a judge. Be a model not a choice. be part of the solution not part of the problem.” 
  23. “He who has a why can deal with any what or how.” Stephen Covey
  24. “Our ultimate freedom is the right and power anybody or anything outside ourselves will affect us.” 
  25. “The only thing that endures over time is the Law of the Farm. You must prepare the ground, plant the seed, cultivate, and water it if you expect to reap the harvest.”
  26. “A personal mission statement becomes the DNA for every other decision we make.” 
  27. “Courage is not the absence of fear but the awareness that something else is more important.” 
  28. “To achieve goals you’ve never achieved before you need to start doing things you’ve never done before.” 
  29. “Live out of your imagination, not your history.” 
  30. “Sow a thought, reap an action; sow an action, reap a habit; sow a habit, reap a character; sow a character, reap a destiny.” 
  31. “Every human has four endowments – self-awareness, conscience, independent will and creative imagination. These give us the ultimate human freedom. The power to choose, to respond, to change.” 
  32. “I teach people how to treat me by what I will allow.” 
  33. “Motivation is a fire from within. If someone else trie to light that fire under you, chances are it will burn very briefly.” 
  34. “You can change the fruit without changing the root.” 
  35. “Our character is basically a composite of our habits because they are consistent. Often unconscious patterns, they constantly, daily, express our character.” 
  36. “Be patient with yourself. Self-growth is tender; it’s holy ground. There’s no greater investment.” 
  37. “If I really want to improve my situation, I can work on the one thing over which I have control – myself.” 
  38. “Once you have a clear picture of your priorities that is values, goals, and high leverage activities, organise your life around them.”
  39. “What you do has greater impact than what you say.”

 

Also see quotes from Peter Drucker

Humans are smarter than any type of AI – for now…

Despite all the technological advancements, can machines today only achieve the first two of the thee AI objectives. AI capabilities are at least equalling and in most cases exceeding humans in capturing information and determining what is happening. When it comes to real understanding, machines still fall short – but for how long?

In the blog post, “Artificial Intelligence Capabilities”, we explored the three objectives of AI and its capabilities – to recap:

AI-8Capabilities

  • Capturing Information
    • 1. Image Recognition
    • 2. Speech Recognition
    • 3. Data Search
    • 4. Data Patterns
  • Determine what is happening
    • 5. Language Understanding
    • 6. Thought/Decision Process
    • 7. Prediction
  • Understand why it is happening
    • 8. Understanding

To execute these capabilities, AI are leaning heavily on three technology areas (enablers):

  • Data collecting devices i.e. mobile phones and IoT
  • Processing Power
  • Storage

AI rely on large amounts of data that requires storage and powerful processors to analyse data and calculate results through complex argorythms – resources that were very expensive until recent years. With technology enhancements in machine computing power following Moore’s law and the now mainstream availability of cloud computing & storage, in conjunction with the fact that there are more mobile phones on the planet than humans, really enabled AI to come to forefront of innovation.

AI_takes_over

AI at the forefront of Innovation – Here is some interesting facts to demonstrate this point:

  • Amazon uses machine learning systems to recommend products to customers on its e-commerce platform. AI help’s it determine which deals to offer and when, and influences many aspects of the business.
  • A PwC report estimates that AI will contribute $15.7 trillion to the global economy by 2030. AI will make products and services better, and it’s expected to boost GDP’S globally.
  • The self-driving car market is expected to be worth $127 billion worldwide by 2027. AI is at the heart of the technology to make this happen. NVIDIA created its own computer — the Drive PX Pegasus — specifically for driverless cars and powered by the company’s AI and GPUs. It starts shipping this year, and 25 automakers and tech companies have already placed orders.
  • Scientists believed that we are still years away from AI being able to win at the ancient game of Go, regarded as the most complex human game. Recently Google’s AI recently beat the world’s best Go player.

To date computer hardware followed a growth curve called Moore’s law, in which power and efficiency double every two years. Combine this with recent improvements in software algorithms and the growth is becoming more explosive. Some researchers expect artificial intelligence systems to be only one-tenth as smart as a human by 2035. Things may start to get a little awkward around 2060 when AI could start performing nearly all the tasks humans do — and doing them much better.

Using AI in your business

Artificial intelligence has so much potential across so many different industries, it can be hard for businesses, looking to profit from it, to know where to start.

By understanding the AI capabilities, this technology becomes more accessible to businesses who want to benefit from it. With this knowledge you can now take the next step:

  1. Knowing your business, identify the right AI capabilities to enhance and/or transform your business operations, products and/or services.
  2. Look at what AI vendors with a critical eye, understanding what AI capabilities are actually offered within their products.
  3. Understand the limitations of AI and be realistic if alternative solutions won’t be a better fit.

In a future post we’ll explore some real life examples of the AI capabilities in action.

 

Also read:

Raspberry Pi – Tips & Notes

OS Install

NOOBS – New Out Of the Box Software

https://www.raspberrypi.org/downloads/noobs/

https://www.raspberrypi.org/learning/software-guide/

https://www.raspberrypi.org/help/videos/#noobs-setup

https://www.raspberrypi.org/documentation/installation/noobs.md

Download the latest hoop – unzip and copy it to a overwrite formatted SDCard which are then used to boot and load an appropriate OS for the RPi

 

Remote Desktop Control RPi from Mac using XRDP

sudo apt-get install xrdp

 

GPIO – General Purpose input/Output

A General Purpose Input/output (GPIO) is an interface available on most modern microcontrollers (MCU) to provide an ease of access to the devices internal properties. Generally there are multiple GPIO pins on a single MCU for the use of multiple interaction so simultaneous application.

Pinout – https://pinout.xyz

 

I²C – Inter-Inter Circuit

I2C is a serial communication protocol, so data is transferred bit by bit along a single wire (the SDA line). Like SPI, I2C is synchronous, so the output of bits is synchronized to the sampling of bits by a clock signal (the SCL line) shared between the master and the slave.

I²C, pronounced I-squared-C, is a synchronous, multi-master, multi-slave, packet switched, single-ended, serial computer bus invented in 1982 by Philips Semiconductor. It is widely used for attaching lower-speed peripheral ICs to processors and microcontrollers in short-distance, intra-board communication.

http://www.circuitbasics.com/basics-of-the-i2c-communication-protocol/

  • The default device address for I2C is 0x18

 

PWM – Pulse-width modulation

Pulse-width modulation, or pulse-duration modulation, is a way of describing a digital signal that was created through a modulation technique, which involves encoding a message into a pulsing signal.

Pulse Width Modulation, or PWM, is a technique for getting analog results with digital means. Digital control is used to create a square wave, a signal switched between on and off.

PWM is a way to control analog devices with a digital output

Pulse Width Modulation (PWM) is a fancy term for describing a type of digital signal. Pulse width modulation is used in a variety of applications including sophisticated control circuitry. A common way we use them is to control dimming of RGB LEDs or to control the direction of a servo motor.

There are many different ways to control the speed of DC motors but one very simple and easy way is to use Pulse Width Modulation.

 

Ultrasonic Sensor HC SR04

https://randomnerdtutorials.com/complete-guide-for-ultrasonic-sensor-hc-sr04/

Projects:

Three Wheeled Smart Car – Freenove

https://github.com/Freenove/Freenove_Three-wheeled_Smart_Car_Kit_for_Raspberry_Pi

Servo – servo control accuracy is 1us = 0.09degrees

 

 

Ambit Enterprise Upgrade

Sep ’19 – The latest version of Ambit Enterprise software have been deployed for Shawbrook Bank’s Business Finance division.
As Programme Director, Renier was responsible for managing the integration and delivery, software development and implementation of the Enterprise version of Ambit for 15 specialist asset-finance business units and their associated product offerings.
Ambit Asset Finance Software meets its customer’s diverse set of requirements by not only bringing to market scalable, flexible, and industry-leading software solutions, but delivering and supporting these applications in fully managed and hosted environments.
Read more about the FIS Asset Manage Solution – Ambit, FIS Ambit Asset Finance Solution.
#Lead #Direct #ProjectManagement #AssetFinance

GANTT Charts

A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry L. Gantt, an American engineer and social scientist. Frequently used in project management, a Gantt chart provides a graphical illustration of a schedule that helps to plan, coordinate, and track specific tasks in a project.

Gantt charts may be simple versions created on graph paper or more complex automated versions created using project management applications such as Microsoft Project or Excel.

A Gantt chart is constructed with a horizontal axis representing the total time span of the project, broken down into increments (for example, days, weeks, or months) and a vertical axis representing the tasks that make up the project (for example, if the project is outfitting your computer with new software, the major tasks involved might be: conduct research, choose software, install software). Horizontal bars of varying lengths represent the sequences, timing, and time span for each task. Using the same example, you would put “conduct research” at the top of the verticle axis and draw a bar on the graph that represents the amount of time you expect to spend on the research, and then enter the other tasks below the first one and representative bars at the points in time when you expect to undertake them. The bar spans may overlap, as, for example, you may conduct research and choose software during the same time span. As the project progresses, secondary bars, arrowheads, or darkened bars may be added to indicate completed tasks, or the portions of tasks that have been completed. A vertical line is used to represent the report date.

Gantt charts give a clear illustration of project status, but one problem with them is that they don’t indicate task dependencies – you cannot tell how one task falling behind schedule affects other tasks. The PERT Chart, another popular project management charting method, is designed to do this. Automated Gantt charts store more information about tasks, such as the individuals assigned to specific tasks, and notes about the procedures. They also offer the benefit of being easy to change, which is helpful. Charts may be adjusted frequently to reflect the actual status of project tasks as, almost inevitably, they diverge from the original plan.

Also Read…

Management Communication Plan

PERT Charts

A PERT chart is a project management tool used to schedule, organize, and coordinate tasks within a project. PERT stands for Program Evaluation Review Technique, a methodology developed by the U.S. Navy in the 1950s to manage the Polaris submarine missile program. A similar methodology, the Critical Path Method (CPM) was developed for project management in the private sector at about the same time.

PERT Chart 1

A PERT chart presents a graphic illustration of a project as a network diagram consisting of numbered nodes (either circles or rectangles) representing events, or milestones in the project linked by labelled vectors (directional lines) representing tasks in the project. The direction of the arrows on the lines indicates the sequence of tasks. In the diagram, for example, the tasks between nodes 1, 2, 4, 8, 9 and 10 must be completed in sequence. These are called dependent or serial tasks. The tasks between nodes 2 and 3, and nodes 2 and 4 are not dependent on the completion of one to start the other and can be undertaken simultaneously. These tasks are called  parallel or concurrent tasks. Tasks that must be completed in sequence but that don’t require resources or completion time are considered to have event dependency. These are represented by dotted lines with arrows and are called dummy activities. For example, the dashed arrow linking nodes 6 and 9 indicates that the system files must be converted before the user test can take place, but that the resources and time required to prepare for the user test (writing the user manual and user training) are on another path. Numbers on the opposite sides of the vectors indicate the time allotted for the task.

The PERT chart is sometimes preferred over the Gantt Chart, another popular project management charting method, because it clearly illustrates task dependencies. On the other hand, the PERT chart can be much more difficult to interpret, especially on complex projects. Frequently, project managers use both techniques.

Also Read…

Management Communication Plan

Project Failure? How to Recover and/or Prevent…

Statistics indicate that 68% of all IT projects are bound to failure!

The PMI’s definition of a high-performing organisation, is a company that completes 80% or more projects on time, on budget, and meeting original goals. In a low-performing organization, only 60% or fewer projects hit the same marks.

Projects fail for all kinds of reasons:

  • Stakeholders can change their objectives
  • Key team members can leave for other companies
  • Budgets can disappear
  • Materials/Vendors can be delayed
  • Priorities can go un-managed
  • Running out of time
  • …and others

In this post:

> How to prevent project failure (with some statistics)

> How to recover a failing project

How to prevent project failure

Prevention is the best cure, so what can you do to prevent projects from failing? Here is some statistics…

  • Organisations that invest in proven project management practices waste 28 times less money because more of their strategic initiatives are completed successfully.
    Source: PMI’s Pulse of the Profession Survey, 2017.
  • 77% of high-performing organizations have actively-engaged project sponsors, while only 44% of low-performing organizations do.
    Source: PMI’s Pulse of the Profession Survey, 2017.
  • 46% of CIOs say that one of the main reasons IT projects fail is weak ownership.
    Source: The Harvey Nash/KPMG CIO Survey, 2017.
  • 33% of IT projects fail because senior management doesn’t get involved and requirements/scope change mid-way through the project.
    Source: A Replicated Survey of IT Software Project Failures by Khaled El Emam and A. Güneş Koru, 2008.
  • 78% of respondents feel that business is out of sync with project requirements and business stakeholders need to be more involved in the requirements process.
    Source: Doomed from the Start Industry Survey by Geneca, 2011.
  • 45% of the managers surveyed say business objectives are unclear to them.
    Source: Doomed from the Start Industry Survey by Geneca, 2011.
  • Companies that align their enterprise-wide PMO (project management office) to strategyhad 38% more projects meet original goals than those that did not. They also had 33% fewer projects deemed failures.
    Source: PMI’s Pulse of the Profession Survey, 2017.
  • 40% of CIOs say that some of the main reasons IT projects fail is an overly optimistic approach and unclear objectives.
    Souce: The Harvey Nash/KPMG CIO Survey, 2017.
  • Poor estimation during the planning phase continues to be the largest (32%) contributor to IT project failures.
    Source: PwC 15th Annual Global CEO Survey, 2012.
  • Projects with effective communication are almost twice as likely to successfully deliver project scope and meet quality standards than projects without effective communication (68% vs 32% and 66% vs 33%, respectively.)
    Source: PwC 15th Annual Global CEO Survey, 2012.

How to recover a failing project

These statistics show that the odds are not in your favour. It is inevitable that you will have to deal with a failing project or two, some time within your career… You could turn the odds in your favour by taking action in recovering failing projects.

Here are four steps you can use that could save a failing project — backed up by original research from GartneriSixSigmaPMI Project Zone CongressThe Institution of Engineering and Technology, and Government CIO MagazineFollow these four steps and salvage your failing project!

Step 1: Stop and Evaluate

Step 1 – Big action items:

  • Issue a “stop work” order
  • Talk with everyone

Metrics/Indicators: The right project Management Information (MI) should give you the needed early warning signs when things are not going according to plan and heading to failure. These signs should drive you to action, as rescuing a failing a project is not a task to be sneezed at. It takes planning, and the process can consume weeks of key resources time and effort.

People: To help ease the pain of stopping a project, work with the team members’ managers (resource owners) to identify and assign interim work. As people are your most important asset, it is important to keep them productively engaged while you are evaluating and re-planning your project recovery.

Project artefacts/deliverables: Make sure all the project artefacts and deliverables are safely stored where it cannot be tampered with for the interim period.

Communicate: (clear, concise, and concrete) – Communicate to your team why their project is on hold. Spend the needed time to learn as much as you can about each team member’s opinions of the project and of each other. Learning that their project will be put on hold will inevitably create distrust. Transparency and tailored messaging is the best way to mitigate bad feelings. See blog posts “Management Communication Plan” and  “Effective Leadership Communication

Project/Delivery Manager (You):Check your ego. Go to the major stakeholders and ask for anonymous feedback on their view of the overall project. When evaluating their responses, don’t forget to consider company culture and politics and how those factors may have played a role in forming the stakeholders’ opinions.

Step 2: Why your project is failing – Root causes

Step 2 – Big action items:

  • Establish allowable solutions for project rescue (including project termination)
  • Identify root causes of the problem
  • Identify risks to project continuation

Determine the root causes: Most times the cause of project problems is not immediately obvious. Even the best project managers — those with excellent project plans, appropriate budgets, and fantastic scope control — also struggle, on occasion, with project failure.

You’ll only get to the bottom of it by doing a Route Cause Analysis (RCA) and the “5 Why’s” technique can help with that. See “The 5 Whys for route cause analysis

Surface-level answers are often the temptation when project managers reach this step. They might focus on the complexity of their project, their outdated project management softwareor methodology, their unclear objectives or their stakeholders’ lack of involvement. All of these problems are so generic that they don’t provide enough insight to create real solutions.

Apply the “5 Whys” and be specific when answering these questions… i.e.

  • Why are objectives unclear?
  • Why aren’t users getting involved?
  • Why are the estimates wrong?

Of course, some of these answers may be hard to hear, and solutions can range from the challenging to impossible. Remember: if these issues could be easily remedied, they would have been addressed and resolved. Even simple problems — like a team member leaving — can take months to fix. Ask yourself: are you using the right technology for the job? Are your dependencies so external that project control is simply out of your hands?

If you’re still struggling to figure out where the root of your project failure is, consider these seven issues – the most common causes of project failure.

  • Complexity
  • External
  • Financial
  • Operational
  • Organizational
  • Schedule
  • Technology

Risk Assessment:What are the risks when trying to salvage the project? Are those risks worth it? Is the project salvageable? Answer these questions before moving on.

Step 3: War Room

Step 3 – Big action items:

  • Set up the war room
  • Re-engage stakeholders
  • Create a tentative plan to move forward

Okay, General!

Assemble the team, seat them all together, and work through a rescue workshop. You’re in the mentality of “kill” or “fix” you’re done fact finding, asking question for further research, or finding other excuses to delay the process. That should all have been done in step two. You’re focussed to figure out what to do with your project.

The “war room” will be intense – all members need to be prepared and the right mindset  of problem solving!

The decision-making process could take two hours or several days. All key decision makers must be present. As this is not always possible some executives may prefer to be called in as the meeting is nearing its end, where team members can present prepared options.

To get the most out of the workshop, conduct the meeting face to face (take the meeting offline). Try to limit the meeting to ten people, including the most important stakeholders (like the sponsors), project manager, senior team members including technical representative to give insight to plan feasibility.

The war room is serious business –  prepare for it. Create an agenda to go over findings, from quantitative reporting to team member interviews. Encourage pre-war-room collaboration (covering the outcomes of steps 1 and 2) toward the ideal shared result.

When you start the war room meeting, all project material should be readily available. That’s your fact base driving factual data driven assumptions and decisions.

Using the facts, the purpose of the war room, in essence, is to answer three deceptively complex questions:

  • Is the business case still valid?
  • If the business case is no longer valid, is there potential for a new, reimagined, justified business case?
  • (If so): Are the added costs for project rescue worth it?

Encourage your task force to focus on identifying the project’s primary drivers (i.e. business need/value, budget, schedule, scope, or quality). Ideally, there should only be one driver that controls the outcome of the project – this is usually the business need for the project’s deliverables.

Sometimes the primary driver is beyond repair. For example, if the core due date has passed and it was aligned with a market cycle (ex: Black Friday to Christmas), then the project is irremediable.

Least case scenario: Clearly articulate the primary goal. Then identify what the team can do with the least amount of effort. Develop a scenario that costs the company the least and gets closest to achieve the primary goal.

Project termination considerations: If the primary goal cannot be achieved, prepare a recommendation to terminate the project… but not without scrutiny. Several variables must be considered and thoroughly addressed in the war room.

  • Consider trade-offs that could make the worst-case scenario more possible than originally thought.
  • Think about the potential backlash from killing a project.
    • How does that decision affect business strategy?
    • Other projects?
    • Public perceptions?
    • Potential future clients? All these variables must be considered and thoroughly addressed in the war room.

Alternatives: Should the least-case scenario makes sense, explore more alternatives. Are there alternative options that can deliver more of the project’s objectives, and consider how adding those solutions to your plan can create additional potential scenarios — positive or negative.

New project charter: Write down the main points of your plan in a revised project charter.

Replacement project option: It’s not uncommon for stakeholders to propose a replacement project instead of a rescue. That’s a totally viable option — kill the project, salvaging only essential, functional portions of the original attempt, and work to create a new plan.If the decision is to completely start over, abandon project rescue altogether. Justify the replacement project on its own merit (a new scope, budget, resource plan, etc.)

Step 4: Set your project in motion

Step 4 – Big action items:

  • Finalise how your project will move forward
  • Confirm responsibilities
  • Reset organizational expectations.

Following your war room meeting, your next steps are all about follow-up. The real project rescue starts here and is the most challenging part of project rescue.

Re-engage stakeholders around the contents of the new project plan and complete the detail with precise commitments for each team member. Plans should be finalised within two days.

Be careful as hesitation and procrastination can limit team commitment and lower morale. You’re the general; get your troops ready to re-engage and to stay committed and focussed!

Reconfirm all project metrics: Validate all project aspects especially resources, as people has been allocation to productive work while you were reworking your rescue plan.

As the project rolls forward, be sure to detail the new project’s profile, scope, and size to the core team and beyond. Emphasize expected outcomes and explain how this project aligns with the company’s goals. Don’t shy away from communicating what these changes can mean on a big-picture scale. While you may receive some feedback, be direct: the project is proceeding.

Make sure all communication is clear. Confirm that stakeholders accept their new responsibilities to the project.

Case Study: Renier Botha’s Role as Non-Executive Director at KAMOHA Tech

Introduction

In this case study, we examine the strategic contributions of Renier Botha, a Non-Executive Director (NED) at KAMOHA Tech, a company specialising in Robotic Process Automation (RPA) and IT Service Management (ITSM). Botha’s role involves guiding the company through corporate governance and product development to establish KAMOHA Tech as a standalone IT service provider.

Background of KAMOHA Tech

KAMOHA Tech operates within the rapidly evolving IT industry, focusing on RPA and ITSM solutions. These technologies are crucial for businesses looking to automate processes and enhance their IT service offerings, thereby increasing efficiency and reducing costs.

Role and Responsibilities of Renier Botha

Renier Botha joined KAMOHA Tech with a wealth of experience in IT governance and service management. His primary responsibilities as a NED include:

  • Corporate Governance: Ensuring that KAMOHA Tech adheres to the highest standards of corporate governance, which is essential for the company’s credibility and long-term success. Botha’s oversight ensures that the company’s operations are transparent and align with shareholder interests.
  • Strategic Guidance on Product and Service Development: Botha plays a pivotal role in shaping the strategic direction of KAMOHA Tech’s product offerings in RPA and ITSM. His expertise helps in identifying market needs and aligning the product development to meet these demands.
  • Mentoring and Leadership: As a NED, Botha also provides mentoring to the executive team, offering insights and advice drawn from his extensive experience in the IT industry. His guidance is crucial in steering the company through phases of growth and innovation.

Impact of Botha’s Involvement

Botha’s contributions have had a significant impact on KAMOHA Tech’s trajectory:

  • Enhanced Governance Practices: Under Botha’s guidance, KAMOHA Tech has strengthened its governance frameworks, which has improved investor confidence and positioned the company as a reliable partner in the IT industry.
  • Product Innovation and Market Fit: Botha’s strategic insights into the RPA and ITSM sectors have enabled KAMOHA Tech to innovate and develop products that are well-suited to the market’s needs. This has been crucial in distinguishing KAMOHA Tech from competitors and capturing a larger market share.
  • Sustainable Growth: Botha’s emphasis on sustainable practices and long-term strategic planning has positioned KAMOHA Tech for sustainable growth. His influence ensures that the company does not only focus on immediate gains but also invests in long-term capabilities.

Challenges and Solutions

Despite the successes, Botha’s role involves navigating challenges such as:

  • Adapting to Market Changes: The IT industry is known for its rapid changes. Botha’s experience has been instrumental in helping the company quickly adapt to these changes by foreseeing industry trends and aligning the company’s strategy accordingly.
  • Balancing Innovation with Governance: Ensuring that innovation does not come at the expense of governance has been a delicate balance. Botha has managed this by setting clear boundaries and ensuring that all innovations adhere to established governance protocols.

Conclusion

Renier Botha’s role as a Non-Executive Director at KAMOHA Tech highlights the importance of experienced leadership in navigating the complexities of the IT sector. His strategic guidance in corporate governance and product development has not only enhanced KAMOHA Tech’s market position but has also set a foundation for its future growth. As KAMOHA Tech continues to evolve, Botha’s ongoing influence will be pivotal in maintaining its trajectory towards becoming an independent and robust IT service provider.

Cyber-Security 101 for Business Owners

Running a business require skill with multiple things happening simultaneously that require your attention. One of those critical things is cyber-security – critical today to have your focus on.

In the digital world today, all businesses have a dependency on the Internet in one way or the other… For SMEs (Small Medium Enterprise) that uses the Internet exclusively as their sales channel the Internet is not only a source of opportunity but the lifeblood of the organisation. An enterprise has the ability, through the Internet, to operate 24×7 with digitally an enabled workforce bringing unprecedented business value.

Like any opportunity though, this also comes with a level of risk that must be mitigated and continuously governed, not just by the board but also by every member within the team. Some of these risks can have a seriously detrimental impact to the business, ranging from financial and data loss to downtime and reputational damage. It is therefore your duty ensuring your IT network is fully protected and secure to protect your business.

Statistics show that cybercrime is exponentially rising. This is mainly due to enhancements in technology enabling and giving access to inexpensive but sophisticated tools. Used by experienced and inexperienced cyber criminals alike, this is causing havoc across networks resulting in business downtime that costs the economy millions every year.

If your business is not trading for 100 hours, what is the financial and reputational impact? That could be the downtime caused by, for example, a ransomware attack – yes, that’s almost 5 days of no business, costly for any business!

Understanding the threat

Cyber threats take many forms and is an academic subject on it’s own. So where do you start?

First you need to understand the threat before you can take preventative action.

Definition: Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

A good start is to understand the following cyber threats:

  • Malware
  • Worms
  • Trojans
  • IoT (Internet of Things)
  • Crypto-jacking

Malware

Definition:Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network.

During 2nd Q’18, the VPNFilter malware reportedly infected more than half a million small business routers and NAS devices and malware is still one of the top risks for SMEs. With the ability of data exfiltration back to the attackers, businesses are at risk of the loss of sensitive information such as usernames and passwords.

Potentially these attacks can remain hidden and undetected. Businesses can overcome these styles of attacks by employing an advanced threat prevention solution for their endpoints (i.e. user PCs). A layered approach with multiple detection techniques will give businesses full attack chain protection as well as reducing the complexity and costs associated with the deployment of multiple individual solutions.

Worms

Definition:A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Recent attacks, including WannaCry and Trickbot, used worm functionality to spread malware. The worm approach tends to make more noise and can be detected faster, but it has the ability to affect a large number of victims very quickly.For businesses, this may mean your entire team can be impacted (spreading to every endpoint in the network) before the attack can be stopped.

Approximately 20% of UK businesses that had been infected with malware had to cease business operations immediately resulting in lost revenue.

Internet of Things (IoT)

Definition:The Internet of things (IoT) is the network of devices such as vehicles, and home appliances that contain electronics, software, actuators, and connectivity.

More devices are able to connect directly to the web, which has a number of benefits, including greater connectivity, meaning better data and analytics. However, various threats and business risks are lurking in the use of these devices, including data loss, data manipulation and unauthorised access to devices leading to access to the network, etc.

To mitigate this threat, devices should have strict authentication, limited access and heavily monitored device-to-device communications. Crucially, these devices will need to be encrypted – a responsibility that is likely to be driven by third-party security providers but should to be enforced by businesses as part of their cyber-security policies and standard operating procedures.

Cryptojacking

Definition:Cryptojacking is defined as the secret use of your computing device to mine cryptocurrency. Cryptojacking used to be confined to the victim unknowingly installing a program that secretly mines cryptocurrency.

With the introduction and rise in popularity and value of crypto currencies, cryptojacking emerged as a cyber-security threat. On the surface, cryptomining may not seem particularly malicious or damaging, however, the costs that it can incur are. If the cryptomining script gets into servers, it can send energy bills through the roof or, if you find it has reached your cloud servers, can hike up usage bills (the biggest commercial concern for IT operations utilising cloud computing). It can also pose a potential threat to your computer hardware from overloading CPUs.

A recent survey, 1 in 3 of all UK businesses were hit by cryptojacking with statistics rising.

Mitigating the risk 

With these few simple and easy steps you can make a good start in protecting your business:

  • Education: At the core of any cyber-security protection plan, there needs to be an education campaign for all in the business. They must understand the gravity of the threat posed – regular training sessions can help here. And this shouldn’t be viewed as a one-off box-ticking exercise then forgotten about. Having rolling, regularly updated training sessions will ensure that staff members are aware of the changing threats and how they can best be avoided.
  • Endpoint protection: Adopt a layered approach to cyber security and deploy endpoint protection that monitor processes in real-time and seek out suspicious patterns, enhancing threat hunting capabilities that eliminate threats (quarantine or delete), and reducing the downtime and impact of attacks.
  • Lead by example: Cyber-security awareness should come from the top down. The time is long gone where cyber-security has been the domain of IT teams. If you are a business stakeholder, you need to lead by example by promoting and practicing a security-first mindset.

Different Software Testing – Explained

Testing of software and application is an integral part of the software development and deployment lifecycle. But with so many different types of tests to choose from when compiling your test approach, which are best suited for your requirements?

In this post 45 different tests are explained.

Software Application Testing are conducted within two domains: Functional and Non-Functional Testing.

Functional testing is a software testing process used within softwaredevelopment in which software is tested to ensure that it conforms with all requirements. Functional testing is a way of checking software to ensure that it has all the required functionality that’s specified within its functional requirements.

Functional testing types include:

  • Unit testing
  • Integration testing
  • System testing
  • Sanity testing
  • Smoke testing
  • Interface testing
  • Regression testing
  • Beta/Acceptance testing

Non-functional testing is defined as a type of Software testing to check non-functional aspects (performance, usability, reliability, etc) of a software application. It is designed to test the readiness of a system as per nonfunctional parameters which are never addressed by functional testing.

Non-functional testing types include:

  • Performance Testing
  • Load testing
  • Stress testing
  • Volume testing
  • Security testing
  • Compatibility testing
  • Install testing
  • Recovery testing
  • Reliability testing
  • Usability testing
  • Compliance testing
  • Localization testing

45 Different types of testing – explained

  1. Alpha Testing

It is the most common type of testing used in the Software industry. The objective of this testing is to identify all possible issues or defects before releasing it into the market or to the user. Alpha testing is carried out at the end of the software development phase but before the Beta Testing. Still, minor design changes may be made as a result of such testing. Alpha testing is conducted at the developer’s site. In-house virtual user environment can be created for this type of testing.

  1. Acceptance Testing

An acceptance test is performed by the client and verifies whether the end to end the flow of the system is as per the business requirements or not and if it is as per the needs of the end user. Client accepts the software only when all the features and functionalities work as expected. It is the last phase of the testing, after which the software goes into production. This is also called as User Acceptance Testing (UAT).

  1. Ad-hoc Testing

The name itself suggests that this testing is performed on an ad-hoc basis i.e. with no reference to test case and also without any plan or documentation in place for such type of testing. The objective of this testing is to find the defects and break the application by executing any flow of the application or any random functionality.

Ad-hoc testing is an informal way of finding defects and can be performed by anyone in the project. It is difficult to identify defects without a test case but sometimes it is possible that defects found during ad-hoc testing might not have been identified using existing test cases.

  1. Accessibility Testing

The aim of accessibility testing is to determine whether the software or application is accessible for disabled people or not. Here disability means deaf, color blind, mentally disabled, blind, old age and other disabled groups. Various checks are performed such as font size for visually disabled, color and contrast for color blindness etc.

  1. Beta Testing

Beta Testing is a formal type of software testing which is carried out by the customer. It is performed in Real Environment before releasing the product to the market for the actual end users. Beta testing is carried out to ensure that there are no major failures in the software or product and it satisfies the business requirements from an end-user perspective. Beta testing is successful when the customer accepts the software.

Usually, this testing is typically done by end-users or others. It is the final testing done before releasing an application for commercial purpose. Usually, the Beta version of the software or product released is limited to a certain number of users in a specific area. So end user actually uses the software and shares the feedback to the company. Company then takes necessary action before releasing the software to the worldwide.

  1. Back-end Testing

Whenever an input or data is entered on front-end application, it stores in the database and the testing of such database is known as Database Testing or Backend testing. There are different databases like SQL Server, MySQL, and Oracle etc. Database testing involves testing of table structure, schema, stored procedure, data structure and so on.

In back-end testing GUI is not involved, testers are directly connected to the database with proper access and testers can easily verify data by running a few queries on the database. There can be issues identified like data loss, deadlock, data corruption etc during this back-end testing and these issues are critical to fixing before the system goes live into the production environment

  1. Browser Compatibility Testing

It is a subtype of Compatibility Testing (which is explained below) and is performed by the testing team.

Browser Compatibility Testing is performed for web applications and it ensures that the software can run with the combination of different browser and operating system. This type of testing also validates whether web application runs on all versions of all browsers or not.

  1. Backward Compatibility Testing

It is a type of testing which validates whether the newly developed software or updated software works well with older version of the environment or not.

Backward Compatibility Testing checks whether the new version of the software works properly with file format created by older version of the software; it also works well with data tables, data files, data structure created by older version of that software. If any of the software is updated then it should work well on top of the previous version of that software.

  1. Black Box Testing

Internal system design is not considered in this type of testing. Tests are based on the requirements and functionality.

Detailed information about the advantages, disadvantages, and types of Black box testing can be seen here.

  1. Boundary Value Testing

This type of testing checks the behavior of the application at the boundary level.

Boundary value Testing is performed for checking if defects exist at boundary values. Boundary value testing is used for testing a different range of numbers. There is an upper and lower boundary for each range and testing is performed on these boundary values.

If testing requires a test range of numbers from 1 to 500 then Boundary Value Testing is performed on values at 0, 1, 2, 499, 500 and 501.

  1. Branch Testing

It is a type of white box testing and is carried out during unit testing. Branch Testing, the name itself suggests that the code is tested thoroughly by traversing at every branch.

  1. Comparison Testing

Comparison of a product’s strength and weaknesses with its previous versions or other similar products is termed as Comparison Testing.

  1. Compatibility Testing

It is a testing type in which it validates how software behaves and runs in a different environment, web servers, hardware, and network environment. Compatibility testing ensures that software can run on a different configuration, different database, different browsers and their versions. Compatibility testing is performed by the testing team.

  1. Component Testing

It is mostly performed by developers after the completion of unit testing. Component Testing involves testing of multiple functionalities as a single code and its objective is to identify if any defect exists after connecting those multiple functionalities with each other.

  1. End-to-End Testing

Similar to system testing, End-to-end testing involves testing of a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.

  1. Equivalence Partitioning

It is a testing technique and a type of Black Box Testing. During this equivalence partitioning, a set of group is selected and a few values or numbers are picked up for testing. It is understood that all values from that group generate the same output. The aim of this testing is to remove redundant test cases within a specific group which generates the same output but not any defect.

Suppose, application accepts values between -10 to +10 so using equivalence partitioning the values picked up for testing are zero, one positive value, one negative value. So the Equivalence Partitioning for this testing is: -10 to -1, 0, and 1 to 10.

  1. Example Testing

It means real-time testing. Example testing includes the real-time scenario, it also involves the scenarios based on the experience of the testers.

  1. Exploratory Testing

Exploratory Testing is an informal testing performed by the testing team. The objective of this testing is to explore the application and looking for defects that exist in the application. Sometimes it may happen that during this testing major defect discovered can even cause system failure.

During exploratory testing, it is advisable to keep a track of what flow you have tested and what activity you did before the start of the specific flow.

An exploratory testing technique is performed without documentation and test cases.

  1. Functional Testing

This type of testing ignores the internal parts and focuses only on the output to check if it is as per the requirement or not. It is a Black-box type testing geared to the functional requirements of an application. For detailed information about Functional Testing click here.

  1. Graphical User Interface (GUI) Testing

The objective of this GUI testing is to validate the GUI as per the business requirement. The expected GUI of the application is mentioned in the Detailed Design Document and GUI mockup screens.

The GUI testing includes the size of the buttons and input field present on the screen, alignment of all text, tables and content in the tables.

It also validates the menu of the application, after selecting different menu and menu items, it validates that the page does not fluctuate and the alignment remains same after hovering the mouse on the menu or sub-menu.

  1. Gorilla Testing

Gorilla Testing is a testing type performed by a tester and sometimes by developer the as well. In Gorilla Testing, one module or the functionality in the module is tested thoroughly and heavily. The objective of this testing is to check the robustness of the application.

  1. Happy Path Testing

The objective of Happy Path Testing is to test an application successfully on a positive flow. It does not look for negative or error conditions. The focus is only on the valid and positive inputs through which application generates the expected output.

  1. Incremental Integration Testing

Incremental Integration Testing is a Bottom-up approach for testing i.e continuous testing of an application when a new functionality is added. Application functionality and modules should be independent enough to test separately. This is done by programmers or by testers.

  1. Install/Uninstall Testing

Installation and uninstallation testing is done on full, partial, or upgrade install/uninstall processes on different operating systems under different hardware or software environment.

  1. Integration Testing

Testing of all integrated modules to verify the combined functionality after integration is termed as Integration Testing. Modules are typically code modules, individual applications, client and server applications on a network, etc. This type of testing is especially relevant to client/server and distributed systems.

  1. Load Testing

It is a type of non-functional testing and the objective of Load testing is to check how much of load or maximum workload a system can handle without any performance degradation.

Load testing helps to find the maximum capacity of the system under specific load and any issues that cause the software performance degradation. Load testing is performed using tools like JMeter, LoadRunner, WebLoad, Silk performer etc.

  1. Monkey Testing

Monkey testing is carried out by a tester assuming that if the monkey uses the application then how random input, values will be entered by the Monkey without any knowledge or understanding of the application. The objective of Monkey Testing is to check if an application or system gets crashed by providing random input values/data. Monkey Testing is performed randomly and no test cases are scripted and it is not necessary to

Monkey Testing is performed randomly and no test cases are scripted and it is not necessary to be aware of the full functionality of the system.

  1. Mutation Testing

Mutation Testing is a type of white box testing in which the source code of one of the program is changed and verifies whether the existing test cases can identify these defects in the system. The change in the program source code is very minimal so that it does not impact the entire application, only the specific area having the impact and the related test cases should able to identify those errors in the system.

  1. Negative Testing

Testers having the mindset of “attitude to break” and using negative testing they validate that if system or application breaks. A negative testing technique is performed using incorrect data, invalid data or input. It validates that if the system throws an error of invalid input and behaves as expected.

  1. Non-Functional Testing

It is a type of testing for which every organization having a separate team which usually called as Non-Functional Test (NFT) team or Performance team.

Non-functional testing involves testing of non-functional requirements such as Load Testing, Stress Testing, Security, Volume, Recovery Testing etc. The objective of NFT testing is to ensure whether the response time of software or application is quick enough as per the business requirement.

It should not take much time to load any page or system and should sustain during peak load.

  1. Performance Testing

This term is often used interchangeably with ‘stress’ and ‘load’ testing. Performance Testing is done to check whether the system meets the performance requirements. Different performance and load tools are used to do this testing.

  1. Recovery Testing

It is a type of testing which validates that how well the application or system recovers from crashes or disasters.

Recovery testing determines if the system is able to continue the operation after a disaster. Assume that application is receiving data through the network cable and suddenly that network cable has been unplugged. Sometime later, plug the network cable; then the system should start receiving data from where it lost the connection due to network cable unplugged.

  1. Regression Testing

Testing an application as a whole for the modification in any module or functionality is termed as Regression Testing. It is difficult to cover all the system in Regression Testing, so typically automation testing tools are used for these types of testing.

  1. Risk-Based Testing (RBT)

In Risk Based Testing, the functionalities or requirements are tested based on their priority. Risk-based testing includes testing of highly critical functionality, which has the highest impact on business and in which the probability of failure is very high. The priority decision is based on the business need, so once priority is set for all functionalities then high priority functionality or test cases are executed first followed by medium and then low priority functionalities.

The low priority functionality may be tested or not tested based on the available time. The Risk-based testing is carried out if there is insufficient time available to test entire software and software needs to be implemented on time without any delay. This approach is followed only by the discussion and approval of the client and senior management of the organization.

  1. Sanity Testing

Sanity Testing is done to determine if a new software version is performing well enough to accept it for a major testing effort or not. If an application is crashing for the initial use then the system is not stable enough for further testing. Hence a build or an application is assigned to fix it.

  1. Security Testing

It is a type of testing performed by a special team of testers. A system can be penetrated by any hacking way.

Security Testing is done to check how the software or application or website is secure from internal and external threats. This testing includes how much software is secure from the malicious program, viruses and how secure and strong the authorization and authentication processes are.

It also checks how software behaves for any hackers attack and malicious programs and how software is maintained for data security after such a hacker attack.

  1. Smoke Testing

Whenever a new build is provided by the development team then the software testing team validates the build and ensures that no major issue exists. The testing team ensures that build is stable and a detailed level of testing is carried out further. Smoke Testing checks that no show stopper defect exists in the build which will prevent the testing team to test the application in detail.

If testers find that the major critical functionality is broken down at the initial stage itself then testing team can reject the build and inform accordingly to the development team. Smoke Testing is carried out to a detailed level of any functional or regression testing.

  1. Static Testing

Static Testing is a type of testing which is executed without any code. The execution is performed on the documentation during the testing phase. It involves reviews, walkthrough, and inspection of the deliverables of the project. Static testing does not execute the code instead of the code syntax, naming conventions are checked.

The static testing is also applicable for test cases, test plan, design document. It is necessary to perform static testing by the testing team as the defects identified during this type of testing are cost-effective from the project perspective.

  1. Stress Testing

This testing is done when a system is stressed beyond its specifications in order to check how and when it fails. This is performed under heavy load like putting large number beyond storage capacity, complex database queries, continuous input to the system or database load.

  1. System Testing

Under System Testing technique, the entire system is tested as per the requirements. It is a Black-box type testing that is based on overall requirement specifications and covers all the combined parts of a system.

  1. Unit Testing

Testing an individual software component or module is termed as Unit Testing. It is typically done by the programmer and not by testers, as it requires a detailed knowledge of the internal program design and code. It may also require developing test driver modules or test harnesses.

  1. Usability Testing

Under Usability Testing, User-friendliness check is done. Application flow is tested to know if a new user can understand the application easily or not, Proper help documented if a user gets stuck at any point. Basically, system navigation is checked in this testing.

  1. Vulnerability Testing

The testing which involves identifying of weakness in the software, hardware and the network is known as Vulnerability Testing. Malicious programs, the hacker can take control of the system, if it is vulnerable to such kind of attacks, viruses, and worms.

So it is necessary to check if those systems undergo Vulnerability Testing before production. It may identify critical defects, flaws in the security.

  1. Volume Testing

Volume testing is a type of non-functional testing performed by the performance testing team.

The software or application undergoes a huge amount of data and Volume Testing checks the system behavior and response time of the application when the system came across such a high volume of data. This high volume of data may impact the system’s performance and speed of the processing time.

  1. White Box Testing

White Box testing is based on the knowledge about the internal logic of an application’s code.

It is also known as Glass box Testing. Internal software and code working should be known for performing this type of testing. Under this tests are based on the coverage of code statements, branches, paths, conditions etc.

Artificial Intelligence Capabilities

AI is one of the most popular talked about technologies today. For business, this technology introduces capabilities that innovative business and technology leadership can utilise to introduce new dimensions and abilities within service and product design and delivery.

Unfortunately, a lot of the real business value is locked up behind the terminology hype, inflated expectations and insecure warnings of machine control.

It is impossible to get the value from something that is not understood. So lets cut through the hype and focus to understand AI’s objectives and the key capabilities that this exciting technology enables.

There are many definitions of AI as discussed in the blog post “What is Artificial Intelligence: Definitions“.

Keeping it simple: “AI is using computers to do things that normally would have required human intelligence.” With this definition in mind, there are basically three things that AI is aiming to achieve.

3 AI Objectives

  • Capturing Information
  • Determine what is happening
  • Understand why it is happening

Lets use an example to demonstrate this…

As humans we are constantly gathering data through our senses which is converted by our brain into information which is interpreted for understanding and potential action. You can for example identify an object through site, turn it into information and identify the object instantly as, for example, a lion. In conjunction, additional data associated with the object at the present time, for example the lion is running after a person yelling for help, enables us to identify danger and to take immediate action…

For a machine, this process is very complex and requires large amounts of data, programming/training and processing power. Today, technology is so advanced that small computers like smart phones can capture a photo, identify a face and link it to a name. This is achieved not just through the power the smart phone but through the capabilities of AI, made available through services like facebook supported by an IT platform including, a fast internet connection, cloud computing power and storage.

To determine what is happening the machine might use Natural Language Understanding (NLU) to extract the words from a sound file and try to determine meaning or intent, hence working out that the person is running away from a lion and shouting for you to run away as well.

Why the lion is chasing and why the person is running away, is not known by the machine. Although the machine can capture information and determine what is happening, it does not understand why it is happening within full context – it is merely processing data. This reasoning ability, to bring understanding to a situation, is something that the human brain does very well.

Dispite all the technological advancements, can machines today only achieve the first two of the thee AI objectives. With this in mind, let’s explore the eight AI capabilities relevant and ready for use, today.

8 AI Capabilities

AI-8Capabilities

  • Capturing Information
    • 1. Image Recognition
    • 2. Speech Recognition
    • 3. Data Search
    • 4. Data Patterns
  • Determine what is happening
    • 5. Language Understanding
    • 6. Thought/Decision Process
    • 7. Prediction
  • Understand why it is happening
    • 8. Understanding

1. Image Recognition

This is the capability for a machine to identify/recognise an image. This is based on Machine Learning and requires millions of images to train the machine requiring lots of storage and fast processing power.

2. Speech Recognition

The machine takes a sound file and encodes it into text.

3. Search

The machine identifies words or sentences which are matched with relevant content within a large about of data. Once these word matches are found it can trigger further AI capabilities.

4. Patterns

Machines can process and spot patterns in large amounts of data which can be combinations of sound, image or text. This surpasses the capability of humans, literally seeing the woods from the trees.

5. Language Understanding

The AI capability to understand human language is called Natural Language Understanding or NLU.

6. Thought/Decision Processing

Knowledge Maps connects concepts (i.e. person, vehicle) with instances (i.e. John, BMW) and relationships (i.e. favourite vehicle). Varying different relationships by weight and/or probabilities of likelihood cn fine tune the system to make recommendations when interacted with. Knowledge Maps are not decision trees as the entry point of interaction can be at any point within the knowledge map as long as a clear goal has been defined (i.e. What is John’s favourite vehicle?)

7. Prediction

Predictive analytics is not a new concept and the AI prediction capability basically takes a view on historic data patterns and matches it with a new piece of data to predict a similar outcome based on the past.

8. Understanding

Falling under the third objective of AI – Understand what is happening, this capability is not currently commercially available.

To Conclude

In understanding the capabilities of AI you can now look beyond the hype, be realistic and identify which AI capabilities are right to enhance your business.

In a future blog post, we’ll examine some real live examples of how these AI capabilities can be used to bring business value.

Also read:

Release Management as a Competitive Advantage

“Delivery focussed”, “Getting the job done”, “Results driven”, “The proof is in the pudding” – we are all familiar with these phrases and in Information Technology it means getting the solutions into operations through effective Release Management, quickly.

In the increasingly competitive market, where digital is enabling rapid change, time to market is king. Translated into IT terms – you must get your solution into production before the competition does, through an effective ability to do frequent releases. Doing frequent releases benefit teams as features can be validated earlier and bugs detected and resolved rapidly. The smaller iteration cycles provide flexibility, making adjustments to unforeseen scope changes easier and reducing the overall risk of change while rapidly enhancing stability and reliability in the production environment.

IT teams with well governed agile and robust release management practices have a significant competitive advantage. This advantage materialises through self-managed teams consisting of highly skilled technologist who collaborative work according to a team defined release management process enabled by continuous integration and continuous delivery (CICD), that continuously improves through constructive feedback loops and corrective actions.

The process of implementing such agile practices, can be challenging as building software becomes increasingly more complex due to factors such as technical debt, increasing legacy code, resource movements, globally distributed development teams, and the increasing number of platforms to be supported.

To realise this advantage, an organisation must first optimise its release management process and identify the most appropriate platform and release management tools.

Here are three well known trends that every technology team can use to optimise delivery:

1. Agile delivery practises – with automation at the core 

So, you have adopted an agile delivery methodology and you’re having daily scrum meetings – but you know that is not enough. Sprint planning as well as review and retrospection are all essential elements for a successful release, but in order to gain substantial and meaningful deliverables within the time constraints of agile iterations, you need to invest in automation.

An automation ability brings measurable benefits to the delivery team as it reduces the pressure on people in minimising human error and increasing overall productivity and delivery quality into your production environment that shows in key metrics like team velocity. Another benefit automation introduces is consistent and repeatable process, enabling easily scalable teams while reducing errors and release times. Agile delivery practices (see “Executive Summary of 4 commonly used Agile Methodologies“) all embrace and promote the use of automation across the delivery lifecycle, especially in build, test and deployment automation. Proper automation support delivery teams in reducing overhead of time-consuming repetitive tasks in configuration and testing so them can focus on the core of customer centric product/service development with quality build in. Also read How to Innovate to stay Relevant“; “Agile Software Development – What Business Executives need to know” for further insight in Agile methodologies…

Example:

Code Repository (version Control) –> Automated Integration –> Automated Deployment of changes to Test Environments –> Platform & Environment Changes automated build into Testbed –> Automated Build Acceptance Tests –> Automated Release

When a software developer commits changes to the version control, these changes automatically get integrated with the rest of the modules. Integrated assembles are then automatically deployed to a test environment – changes to the platform or the environment, gets automatically built and deployed on the test bed. Next, build acceptance tests are automatically kicked off, which would include capacity tests, performance, and reliability tests. Developers and/or leads are notified only when something fails. Therefore, the focus remains on core development and not just on other overhead activities. Of course, there will be some manual check points that the release management team will have to pass in order to trigger next the phase, but each activity within this deployment pipeline can be more or less automated. As your software passes all quality checkpoints, product version releases are automatically pushed to the release repository from which new versions can be pulled automatically by systems or downloaded by customers.

Example Technologies:

  • Build Automation:  Ant, Maven, Make
  • Continuous Integration: Jenkins, Cruise Control, Bamboo
  • Test Automation: Silk Test, EggPlant, Test Complete, Coded UI, Selenium, Postman
  • Continuous Deployment: Jenkins, Bamboo, Prism, Microsoft DevOps

2. Cloud platforms and Virtualisation as development and test environments

Today, most software products are built to support multiple platforms, be it operating systems, application servers, databases, or Internet browsers. Software development teams need to test their products in all of these environments in-house prior to releasing them to the market.

This presents the challenge of creating all of these environments as well as maintaining them. These challenges increase in complexity as development and test teams become more geographically distributed. In these circumstances, the use of cloud platforms and virtualisation helps, especially as these platforms have recently been widely adopted in all industries.

Automation on cloud and virtualised platforms enables delivery teams to rapidly spin up/down environments optimising infrastructure utilisation aligned with demand while, similar to maintaining code and configuration version history for our products, also maintain the version history of all supported platforms. Automated cloud platforms and virtualisation introduces flexibility that optimises infrastructure utilisation and the delivery footprint as demand changes – bringing savings across the overall delivery life-cycle.

Example:

When a build and release engineer changes configurations for the target platform – the operating system, database, or application server settings – the whole platform can be built and a snapshot of it created and deployed to the relevant target platforms.

Virtualisation: The virtual machine (VM) is automatically provisioned from the snapshot of base operating system VM, appropriate configurations are deployed and the rest of the platform and application components are automatically deployed.

Cloud: Using a solution provider like Azure or AWS to deliver Infrastructure-as-a-Service (IaaS) and Platform as a Service (PaaS), new configurations can be introduced in a new environment instance, instantiated, and configured as an environment for development, testing, staging or production hosting. This is crucial for flexibility and productivity, as it takes minutes instead of weeks to adapt to configuration changes. With automation, the process becomes repeatable, quick, and streamlines communication across different teams within the Tech-hub.

3. Distributed version control systems

Distributed version control systems (DVCS), for example GIT, Perforce or Mercurial, introduces flexibility for teams to collaborate at the code level. The fundamental design principle behind DVCS is that each user keeps a self-contained repository with complete version history on one’s local computer. There is no need for a privileged master repository, although most teams designate one as a best practice. DVCS allow developers to work offline and commit changes locally.

As developers complete their changes for an assigned story or feature set, they push their changes to the central repository as a release candidate. DVCS offers a fundamentally new way to collaborate, as  developers can commit their changes frequently without disrupting the main codebase or trunk. This becomes useful when teams are exploring new ideas or experimenting as well as enabling rapid team scalability with reduced disruption.

DVCS is a powerful enabler for the team that utilise an agile-feature-based branching strategy. This encourages development teams to continue to work on their features (branches) as they get ready, having fully tested their changes locally, to load them into next release cycle. In this scenario, developers are able to work on and merge their feature branches to a local copy of the repository.After standard reviews and quality checks will the changes then be merged into the main repository.

To conclude

Adopting these three major trends in the delivery life-cycle enables a organisation to imbed proper release management as a strategic competitive advantage. Implementing these best practices will obviously require strategic planning and an investment of time in the early phases of your project or team maturity journey – this will reduce the organisational and change management efforts to get to market quicker.

Modular Operating Model for Strategy Agility

One of life’s real pleasures, is riding a motorcycle. The sense of freedom when it is just you, machine and the open road is something only sharing enthusiast would truly understand. Inspired, I recently completed a hobby project building the Lego Set 42063. The building blocks of this Technic model constructs the BMW R1200GS Adventure motorcycle, arguably the best allrounder, adapted to handle all road conditions. The same building blocks can also be used to build a futuristic flying scooter, or shall I call it a speedster in true Star Wars style… While building the model I was marvelled by the ingeniousness of the design and how the different components come together in a final product – fit for purpose today but easily adapted to be fit for future.

Lego-Technic-modular

This made me think about business agility – how can this modular approach be used within business. We know that SOA (Service Oriented Architecture) takes a modular approach in building adaptable software application and in the talk on “Structure Technology for Success – using SOA” I explained a modular approached to design a Service Orientated Organisation (SOO), to directly contribute to the business success.

Recently I’ve also written about how to construct a business Operating Models that delivers. Such an operating model aligns the business operations with the needs of it’s customers, while it provides the agility to continuously adapt to changes in this fast changing technological ecosystem we live in. An Operating Model that delivers, fit for purpose today but easy adaptable to be fit for the future, in other words – a Modular Operating Model.

As the environment for a company changes rapidly, static operating models lack the agility to respond. Successful companies are customer centric and embrace continuous innovation to enhance the ability of the organisation to re-design it’s operations. This requires an Operating Model that incorporates the agility to be responsive to changes in business strategy and customer needs. A modular operating model enables agility in business operations with a design that can respond to change by defining standard building blocks and how to dynamically combine them. Modular blocks (with the specific operational complexity contained) simplifies managing complexity. This reduces the time to produce a new operational outcome, irrespective of this being a new services, product or just an efficiency improvement within an existing value chain.  

An example of applying modular thinking to a operational delivery methodology is covered in the blog post: “How to Innovate to stay Relevant”. In combining the core principles and benefits of three different delivery methodologies, Design Thinking, Lean Startup and Agile Scrum as modular building blocks, a delivery methodology are constructed that ensures rapid delivery of innovation into customer centric revenue channels while optimising the chances of success through continuous alignment with customer and market demand.

A modular operating model imbeds operational agility through the ability to use, re-use, plug and play different capabilities, processes and resources (building blocks) tech-TOMto easily produce new business outcomes without having to deal with the complexities which are already defined within the individual building blocks – just like a Lego set using the same set of standardised and pre-defined blocks to build completely different things. The focus is on re-using the blocks and not on the design of the blocks itself. Off course a lot of thinking has gone into the design of the different building blocks, but through re-using the same block designs, the model design time is focussed on a new/different outcome and not on a component of an outcome.

Designing modular capabilities, processes and resources that are used to design operating models have benefits not just in efficiencies and savings through economies of scale, but also in the reduction of time to market. These benefits are easier to accomplish in larger multi-divisional organisation with multiple operating models or organisations with complex operating models bringing together multiple organisations and different locations, where the re-use of modular operating model blocks bring demonstrable efficiencies – but is also possible for smaller organisations and start-ups.

If you want a Operating Model that Delivers and are agile to adapt to the challenges introduced by new technologies and digital business models – ensure the Target Operating Model (TOM) design methodology focusses on modular thinking from the offset and through the design process.

renierbotha Ltd has a demonstrable track record of compiling and delivering visionary Target Operating Models.

Talk to us – we can help you with the Digital Transformation to align your business operations and business model to the modern customers expectations.

 

Also read…

An Operating Model that Delivers

Every organisation that I have worked with around the world, whether it is in London, Johannesburg, Sydney, Singapore, Dallas, Kuala Lumpir, Las-Vegas, Nairobi or New York, there was always reference to a Target Operating Model (TOM) when business leaders spoke about business strategy and performance. Yes, the TOM – the ever eluding state of euphoria when all business operations work together in harmony to deliver the business vision…sometime in the near foreseen future.

Most business transformation programmes are focussed to deliver a target operating model – transforming the business by introducing a new way of working that better aligns the business offering with it’s customer’s changing expectation. Millions in business change budgets have been invested in TOM design projects and 1000s of people have worked in these TOM projects of which some have delivered against the promise.

With the TOM as the defined deliverable, the targeted operational state and the outcome of the business transformation programme, it is very important that the designed TOM are actually fit for purpose. The TOM also has to lend itself to be easily adjustable in order to contribute to the agility of an organisation. The way the business is operating must be able to adapt to an ever changing technology driven world and the associated workforce. The quick evolving digital world is probably the main catalyst for transformation in organisations today – read “The Digital Transformation Necessity” for further insights…

Operating Model (OM)

The Operating Model uses key inputs from the Business Model and Strategy.

The Business Model focuses on the business’ customers, the associated product and service offerings – how the organisation creates value for it’s cliental – and the commercial proposition. Within the business model the business’s revenue streams and how those are contributing to the business value chain to generate profits, are decried. In other words, the Business Model envisages the What within the organisation.

Within the Business Strategy the plan to achieve specific goals are defined, as well as the metrics required to measure how successfully these are achieved. The business goals are achieved through the daily actions as defined within the Operating Model.

Typically an Operating Model takes the What from the Business Model in conjunction with the business strategy, and defines the Why, What, How, Who and With. It is the way in which the business model and strategy is executed by conducting the day to day business operations. Execution is key as no business can be successful by just having a business strategy, the execution of the operating model delivering the business strategy is the operative ingredient of success.

In order to document and describe how an organisation functions, the Operating model usually includes business capabilities and associated processes, the products and/or services being delivered, the roles and responsibilities of people within the business and how these are organised and governed within the business, the metrics defined to manage, monitor and control the performance of the organisation and then the underpinning Technology, Information Systems and Tools the business uses in delivering it’s services and/or products.

Analogy: A good analogy to describe the Operating Model is to compare it to the engine of F1 car. In 2016 the Mercedes Silver Arrow (the fastest car, driven by Lewis Hamilton (arguably the fastest driver), did not win because of engine and reliability problems. Instead the World Championship was won by Nico Rosberg, who had a better performing engine over the whole season. Nico benefited from a better operating model – he had the processes, data, systems and the people (including himself) to win. The mechanical failures that Lewis suffered, mostly not through fault of his own, were a result of failures somewhere within his operating model.

Target Operating Model (TOM)

The Target Operating Model (TOM) is a future state version of the Operating Model. To derive the TOM, the existing Operating Model is compared with the desired future state keeping the key aspects of an operating model in mind: Why, What, How, Where, Who and With. The TOM also cover two additional key aspects: the When & Where defined within the transformation programme to evolve from current to future states.

The difference between the “as is” Operating Model and the “to be” Target Operating Model, indicates the gap that the business must bridge in the execution of its Transformation Model/Strategy – the When and Where. To achieve the Target Operating Model usually require large transformation effort, executed as change & transformation programmes and projects.

ToBe (TOM) – AsIs (OM) = Transformation Model (TM)

Why >> Business Vision & Mission

What >> Business Model (Revenue channels through Products and Services – the Value Chain)

How >> Business Values & Processes & Metrics

Who >> Roles & Responsibilities (RACI)

With >> Tools, Technology and Information

Where & When >> Transformation Model/Strategy

Defining the TOM

A methodology to compile the Target Operating Model (TOM) is summarised by the three steps shown in the diagram below:

TOM Methodology
Inputs to the methodology:

  • Business Model
  • Business Strategy
  • Current Operating Model
  • Formaly documented information, processes, resource models, strategies, statistics, metrics…
  • Information gathered through interviews, meetings, workshops…

Methodology produces TOM Outputs:

  • Business capabilities and associated processes
  • Clearly defined and monetised catalogue of the products and/or services being delivered
  • Organisation structure indicating roles and responsibilities of people within the business and how these are organised and governed
  • Metrics specifically defined to manage, monitor and control the performance of the organisation
  • Underpinning Technology, Information Systems and Tools the business uses in delivering it’s services and/or products

The outputs from this methodology covers each key aspect needed for a TOM that will deliver on the desired business outcomes. Understanding these desired outcomes and the associated goals and milestones to achieve them, is hence a fundamental prerequisite in compiling a TOM.

To Conclude

An achievable Target Operating Model, that delivers, is dependant on the execution of an overall business transformation strategy that aligns the business’ vision, mission and strategy with a future desired state in which the business should function.

Part of the TOM is this Business Transformation Model that outlines the transformation programme plan, which functionally syncs the current with the future operating states. It also outlines the execution phases required to deliver the desired outcomes, in the right place at the right time, while having the agility to continuously adapt to changes.

Only if an organisation has a strategically aligned and agile Target Operating Model in place that can achieve this, is the business in a position to successfully navigate its journey to the benefits and value growth it desires.

renierbotha Ltd has a demonstrable track record of compiling and delivering visionary Target Operating Models.

If you know that your business has to transform to stay relevant – Get in touch!

 

Originally written by Renier Botha in 2016 when, as Managing Director, he was pivotal in delivering the TOM for Systems Powering Healthcare Ltd.

The Rise of the Bots

Guest Blog from Robert Bertora @ Kamoha Tech – Original article here

The dawn of the rising bots is upon us. If you do not know what a Bot is, it’s the abbreviated form for the word Robot, and it is a term that is now commonly used to describe automated software programs that are capable of performing tasks on computers that traditionally were reserved for human beings. Bots are software and Robots are Hardware, all Robots need Bots to power their reasoning or “brain” so to speak. Today the Golden Goose is to build Artificial Intelligence (commonly known as AI) directly into the Bots, and the goal is, for these Bots to be able to learn on their own, either from being trained, or from their own experience of making mistakes. There is after all no evidence to suggest that the human mind is anything more than a machine, and therefore no reason for us to believe that we can’t build similar intelligent machines incorporating AI.

These days Bots are everywhere, you may not realise it so here are a few examples that come to mind:

Trading Bots: Trading Bots have existed for many years, at least 20 years if not more and are capable of watching financial markets that trade in anything from currency to company shares. Not only do they watch these markets, but they can perform trades just like any other Human Trader. What is more, is that they can reason out, and execute a trade in milliseconds, leaving a Human Trader in the dust.

Harvesting Bots were originally created by computer gamers who were tired of performing repetitive tasks in the games they played. Instead of sitting at their computer or consoles for hours killing foe for resources such as mana or gold, one could simply load up a Bot to do this tedious part of gameplay for you. While you slept, the Bot was “harvesting” game resources for you, and in the morning your mana and gold reserves would be nicely topped up and ready for you to spend in game on more fun stuff, like buying upgraded weapons or defences!

Without Harvesting Bots and their widespread proliferation in the gaming community we are all very unlikely to have ever heard of Crypto Currencies, you see it can be argued that these would never have been invented in the first place. Crypto Currencies and Block Chain technologies rely in part on the foundations set by the computer gaming Harvesting Bots. The Harvesting Bot concept was needed by the Crypto Currency Pioneers who used it to solve their problem of mimicking the mining of gold in the real world. They evolved the Harvesting Bot into Mining Bots which are capable of mining for crypto coins from the electronic Block Chain(s). You may have heard of people mining for Bitcoins and other Crypto coins, using mining Rigs and the Bots; the Rigs being the powerful computer hardware they need to run the Mining Bots.

What about Chat Bots? have you ever heard of these? These Bots replace the function of humans in customer service chat rooms online. There are two kinds of Chat Bots, the really simple ones, and the NLP (Neuro Linguistic Programming) ones which are capable of processing Natural Language.

Simple Chat Bots follow a question, answer, yes/no kind of flow. These Chatbots offer you a choice of actions or questions that you can click on, in order to give you a preprogramed answer or to take you through a preprogramed flow with preprogramed answers. You may have encountered these online, but if not, you will have certainly encountered this concept in Telephone Automation Systems that large companies use as part of their customer service functions.

NLP Chat Bots are able to take your communication in natural language (English, French etc..), making intelligent reasoning as to what you are saying or asking, and then formulating responses again in natural language that when done well may seem like you are chatting with another human online. This type of Chatbot displays what we call artificial intelligence and should be able to learn new responses or behaviours based on training and or experience of making mistakes and learning from these. At KAMOHA TECH, we develop industry agnostic NLP Bots on our KAMOHA Bot Engine incorporating AI and Neural Network coding techniques. Our industry agnostic Bot engine is used to deploy into almost any sector. Just as one could deploy a human into almost any job sector (with the right training and experience) so too we can do this with our industry agnostic artificially intelligent KAMOHA Bots.

Siri, Cortana and Alexa are all Bots which are integrated to many more systems across the internet, giving them seemingly endless access to resources in order to provide answers to our more trivial human questions, like “what’s the weather like in LA?”. These Bots are capable of responding not only to text NLP but also to voice natural language inputs.

Future Bots are currently being developed, Driverless vehicles: powered by Bots, any Robot (taking human or animal form) that you may see in the media or online in YouTube videos are and will be powered by their “AI brain” or Bot so to speak. Fridges that automatically place your online grocery shopping order – powered by Bots, buildings that maintain themselves: powered by Bots. Bot Doctors that can diagnose patients, Lawyer Bots, Banker Bots, Bots that can-do technical design, image recognition, Bots that can run your company? … Bots Bots Bots!

People have embraced new Technology for the last 100 years, almost without question, just as they did for most of Medical Science. Similar to certain branches of Medical Science, Technology has its bad boys though, that stray deeply into the Theological, Social, Moral and even Legal territories. Where IVF was 40-50 years ago, so too are our Artificially Intelligent Bots: pushing the boundaries, of normalities and our moral beliefs. Will Bots replace our jobs? What will become of humans? Are we making Robots in our own image? Are we the new Gods? Will Robots be our slaves? Will they break free and murder us all? A myriad of open ended questions and like a can of worms or pandora’s box, the lid was lifted decades ago. Just as sure as we developed world economies and currency in a hodgepodge of muddling through the millennia we are set to do the same with Bots; we will get there in the end.

It’s not beyond my imagination to say that if Bots replace human workers in substantial volume, then legislation will be put in place to tax these Bots as part of company corporation tax, and to protect human workers it is likely that these taxes will be higher than that of humans. If a bot does the work of 50 people? How do you tax that? Interesting times, interesting questions. My one recommendation to any one reading this, is do not fear change, do not fear the unknown, and have faith in the Human ability to make things work.

Love them or hate them Bots are on the rise, they will only get smarter and their usages will be as diverse as our own human capabilities. Brave new world.

Click on the image below to see our bots:

How to Innovate to stay Relevant

Staying relevant! The biggest challenge we all face – staying relevant within our market. Relevance to your customers is what keeps you in business.

With the world changing as rapidly as it does today, mainly due to the profound influence of technology on our lives, the expectations of the consumer is changing at pace. They have access to an increasing array of choice, not just in how they spend their money but also in how they are communicating and interacting – change fueled by a digital revolution. The last thing that anyone can afford, in this fast paced race, is losing relevance – that will cost us customers or worse…

Is what you are selling today, adaptable to the continuous changing ecosystems? Does your strategy reflect that agility? How can you ensure that your business stays relevant in the digital age? We have all heard about digital transformation as a necessity, but even then, how can you ensure that you are evolving as fast as your customers and stay relevant within your market?

Business, who has a culture of continuous evolvement, aligning their products and services with the digital driven customer, is the business that stays relevant. This is the kind of business that does not require a digital transformation to realign with customer’s demand to secure their future. A customer centric focus and a culture of continuous evolution within the business, throughout the business value chain, is what assure relevance. Looking at these businesses, their ability/agility to get innovation into production, rapidly, is a core success criterion.

Not having a strategy to stay relevant is a very high and real risk to business. Traditionally we deal with risk by asking “Why?”. For continuous improvement/evolution and agility, we should instead be asking “Why not?” and by that, introduce opportunities for pilots, prototypes, experimentation and proof of concepts. Use your people as an incubator for innovation.

Sure, you have a R&D team and you are continuously finding new ways to deliver your value proposition – but getting your innovative ideas into production is cumbersome, just to discover that it is already aged and possibly absolute in a year a two. R&D is expensive and time consuming and there are no guarantees that your effort will result in a working product or desired service. Just because you have the ability to build something, does not mean that you have to build something. Focusing the scares and expensive resources on the right initiatives makes sense, right! This is why many firms are shifting from a project-minded (short term) approach to a longer-term product-minded investment and management approach.

So, how do you remain customer centric, use your staff as incubators of innovation, select the ideas that will improve your market relevance and then rapidly develop those ideas into revenue earners while shifting to a product-minded investment approach?

You could combine Design Thinking with Lean Startup and Agile Delivery…

In 2016, I was attending the Gartner Symposium where Gartner brought these concepts together very well in this illustration:

Gartner - Design-Lean-Agile 2

Instead of selecting and religiously follow one specific delivery methodology, use the best of multiple worlds to get the optimum output through the innovation lifecycle.

Design-Lean-Agile 1

Using Design Thinking (Empathise >> Define >> Ideate >> Prototype) puts the customer at the core of customer centric innovation and product/service development. Starting by empathising with the customers and defining their most pressing issues and problems, before coming up with a variety of ideas to potentially solve the problems. Each idea is considered before developing a prototype. This dramatically reduces the risk of innovation initiatives, by engaging with what people (the customer) really need and want before actually investing further in development.

Lean Startup focuses on getting a product market fit, by moving a Prototype or MVP (minimum viable product) through a cycle of Build >> Measure >> Learn. This ensures a thorough knowledge of the user of the product/service is gained through an active and measureable engagement with the customer. Customer experience and feedback is captured and used to learn and adapt resulting in an improved MVP, better aligned to the target market, after every cycle.

Finally Agile Scrum, continuing the customer centric theme, involves multiple stakeholders, especially users (customers), in every step in maturing the MVP to a product they will be happy to use. This engagement enhances transparency, which in turn grow the trust between the business (Development Team) and the customer (user) who are vested in the product’s/service’s success. Through an iterative approach, new features and changes can be delivered in an accurate and predictable timeline quickly and according to stakeholder’s priorities. This continuous product/service evolvement, with full stakeholder engagement, builds brand loyalty and ensures market relevance.

Looking at a typical innovation lifecycle you could identify three distinct stages: Idea, Prototype/MVP (Minimal Viable Product) and Product. Each of these innovation stages are complimented by some key value, gained from one of the three delivery methodologies:

Design-Lean-Agile 2

All of these methodologies, engage the stakeholders (especially the customer & user) in continuous feedback loops, measuring progress and capturing feedback to adapt and continuously improve, so maximum value creation is achieved.

No one wants to spend a lot of resource and time delivering something that adds little value and create no impact. Using this innovation methodology and associated tools, you will be building better products and service, in the eye of the user – and that’s what matters. You’ll be actively building and unlocking the potential of you’re A-team, to be involved in creating impact and value while cultivating a culture of continuous improvement.

The same methodology works very well for digital transformation programmes.

At the very least, you should be experimenting with these delivery approaches to find the sweat spot methodology for you.

Experiment to stay relevant!

Let’s Talk – renierbotha.com – Are you looking to develop an innovation strategy to be more agile and stay relevant? Do you want to achieve your goals faster? Create better business value? Build strategies to improve growth?

We can help – make contact!

Read similar articles for further insight in our Blog.

6 reasons why learning Rainbird is beneficial for your career

  1. You’ll be a better consultant

Rainbird’s human-centric automation is a unique emerging technology in the industry, and understanding how it works is a huge advantage – both in being able to sell a Rainbird solution to your clients, but also through being the gate-keeper for a desirable commodity.

  1. You’ll improve your analytical skills

The skills needed to break down what we call ‘subject matter expertise’ for Rainbird involve understanding a set of human inferences that are not widely understood in the wider RPA (robotic process automation) landscape or by automation consultancies. The nature of the subject matter itself is also very different: whilst the data on which human judgements are based has long been available as subject matter, human judgements, and how those judgements are reached, has never been subject matter for automation before. We’ve even had clients tell us that the process of mapping out their business logic has forced them into the invaluable exercise of confronting, and re-evaluating, their own thinking.

  1. You’ll look at things differently

Traditionally, RPA technologies require that decisions are broken down into formalised logic, requiring the removal of nuance and complete, unambiguous datasets and processes for successful implementation. Before Rainbird, there was an industry standard possible for if-this-then-that process automation; now, authors in Rainbird learn to structure their reasoning, a skill that is completely unfamiliar to most solution consultants.

  1. You’ll be able to do business with clients that no one else can help

Successfully replicating human reasoning, instead of relying on a decision tree, is industry-changing. Applying a new technology to use cases that we’ve never been able to automate before, due to the multi-faceted nature of human inference, provides an undeniable competitive edge.

  1. You’ll be a sought-after resource.

Maintenance of this emerging strand of unique automated reasoning technology is going to be a sought-after and exceptionally rare skill – you can capitalise on your Rainbird understanding as knowledge maps proliferate in the RPA marketplace.

  1. You’ll be able to maximise other technologies more scalably.

Infrastructure in process flow automation is maturing, with big players like Blue Prism and PEGA expanding in the space. Learning Rainbird – the only technology that can tie together these embedded process flow systems in the same way as human reasoning currently does – is crucial in maximising these flow techs scalably.

What is Artificial Intelligence: Definitions

The term “Artificial Intelligence was first coined by John McCarthy in 1956. He is one of the “founding fathers” of artificial intelligence, together with Marvin Minsky, Allen Newell and Herbert A. Simon

Artificial Intelligence today is bathed in controversiality and hype mainly due to a misconception that is created by media. AI means different things to different people.  Some called it “cognitive computing”, others “machine intelligence”. It seems to be difficult to give a definition of what AI really is.

Different Definitions:

Wikipedia: “Artificial intelligence (AI, also machine intelligence, MI) is intelligence demonstrated by machines, in contrast to the natural intelligence (NI) displayed by humans and other animals. In computer science AI research is defined as the study of “intelligent agents“: any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, such as “learning” and “problem solving”.

English Oxford Living Dictionary:  “The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.”

Webster: ” A branch of computer science dealing with the simulation of intelligent behavior in computers. The capability of a machine to imitate intelligent human behavior.”

Google: “The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision making, and translation between languages.”

Quartz: “Artificial intelligence is software or a computer program with a mechanism to learn. It then uses that knowledge to make a decision in a new situation, as humans do. The researchers building this software try to write code that can read images, text, video, or audio, and learn something from it. Once a machine has learned, that knowledge can be put to use elsewhere.”

Rainbird: “A computer doing a task that was previously thought would require a human.”

In my own words, keeping it simple: “AI is using computers to do things that normally would have required human intelligence.”

In other words, we might say that AI is the ability of computers/machines to use human knowledge modelled into algorithms and relational data, to learn from human reasoning and the associated conclusions/decisions, and use what has been learned to make decisions like a human would.

Thus can specialist (expensive) human knowledge be stored and processed, to make the decision making ability/application available to other non-specialist people (who do not have that specialised knowledge), empowering them to, through the use of the AI system, make a specialised decision.

Unlike humans, where specialists are numbered and constrained by human limitations, can AI-powered machines scale, don’t need to rest and they can process massively large volumes of information, can conduct tasks and make reasoning decisions at a significantly higher frequency and lower error ratio than humans, all at once!

Value!?

“Creating value”; “delivering value”; “the value proposition”; “focus on value, not cost”; “price is a reflection of value” – just a few of the statements we are using on a daily basis.

But what is value?

Value comes in different forms and types and can be different for a business, it’s shareholders, clients/customers, suppliers, employees. For example: A business might define value in recurring business and it’s loyal customers; the Board might value the increase in assets on the balance sheet; Shareholders define value in the profitability of the business that convert into dividend payments or an increase in the share price; Suppliers sees value in market penetration;  Employees perceive value in an inviting work environment, culture, recognition and benefits received from their employer.

In previous posts, we covered “how to build a compelling value proposition” and what is “your value proposition“. Value was associated with what you offer (sell) into a buying market – a product or service that addresses a specific need and is of value in a commercial world. “Remember – you define your value proposition, but it’s true value is in the eyes of the beholder – your customer.”

So you are creating value for your customers in solving a specific problem or providing to a specific need in a way that makes your product of service desirable. So when you want to describe your value, it is important to think about the customer’s need first. Being customer centric in your product or service design ensures your business is aligned to deliver to a specific customer (market) need, in a profitable way – value to the customer drives business results in revenue. Excellent customer service ensures recurring customers, customer retention means future revenue growth. Satisfied customers talk about your product and service which brings revenue growth. Thus focussing on the customer value first will lead to the other types of value, as mentioned above.

But how can you define value for your customers? Well, by simply asking if your product or service helps the customer to:

  • make their life easier or better?
  • save them time?
  • save or make them money?
  • be happier?
  • be more positive?
  • be healthy?
  • be more productive?
  • improve their effectiveness and/or efficiency?
  • achieve their goals and objectives?
  • build relationships?
  • make more friends?
  • get more customers?
  • etc…?

Place yourself in your customer’s shoes – be a customer to your own product and service. How does it make you feel? Does it help you – in what way? Use the answers to these questions to continuously improve your value.

Action: Have a look at your value chain and identify how the different processes, teams and people, add value in different ways and how these combine, to focus your value proposition onto the customer.

 

Related Posts:

3 positions of leadership – Leading from the front

We can learn much from horses about teamwork and leadership in business. In our workshops with horses, we share a leadership model that the horses use to create cohesive teamwork. It involves three positions of leadership and we will explore Leading from the front in more detail in this post.

Many of our clients have found this leadership model to be enlightening and have embraced and implemented it into their business with substantial success. The model is based on building relationships rather than a more traditional command and control style of leadership which does not engage and inspire employees. The success of the team is dependent on every team member taking responsibility for leadership and changing their position within the team according to what they believe is needed in each moment.

The model we use is adapted from a model developed by Klaus Ferdinand Hempfling. He observed that there are three different leadership roles in a herd of horses:

  • Leading from the front where the leader sets the pace, destination and direction
  • Leading from the side where leaders coach each other in a democratic leadership style and ensure everyone is moving forward together in the same direction
  • Leading from behind which has a check and balance style of leadership and drives the team forward to maintain momentum

Each member of the team is leading at different moments, and all are essential to the success of the team.

It might seem obvious that dragging or shoving half a ton of horse is impossible yet many employees feel as though they are on the receiving end of this behaviour in the workplace. When we work with horses, we are always working at a fine-tuning level of leadership to maximise leaders’ effectiveness so we reduce coercion and passivity and help leaders find that knife-edge of assertiveness when they are leading out of the comfort zone. As a result, they improve their ability to flex and adapt to what is needed in any given situation and are able to inspire their teams much more easily.

In this post, I share an extract from a book titled Leadership Beyond Measure which explores leading from the front in more detail.

Leading from the front
The alpha mare is the most dominant member of the herd and leads from the front. Her role is to set the pace, direction and destination. Since horses are a prey animal, they are on the alert for danger. Imagine a pack of wild dogs appears, the alpha mare will decide where the herd go, how they get there and how fast they go.

If the dogs are close by, she will set off at a gallop. If they are further away, she will set off at a walk. She will go as fast as is necessary to keep the herd safe. This way, the herd conserve their energy for when it is most needed. Many people in business are going at three hundred miles per hour constantly. That is exhausting, and more balance is essential to prevent burn-out and work-related stress.

In a workplace setting, the leader of the company and each team and department usually lead from the front. For example, the MD or CEO will set the strategy and vision for a company. A Project Manager defines clear goals and objectives for his project team. A leader of a team translates the vision and goals so everyone on their team has clear expectations. Everyone at some point will need to lead from the front.

If nobody takes the lead from the front or the vision and direction are not clear enough, the team gets diverted and disperses. This can ultimately lead to conflict in the team and causes increased workload as the team become ineffective. If you’ve ever sat in a meeting and listened to a discussion go round and round without a decision, you’ve experienced what happens when nobody is leading from the front.

And if you’ve ever sat in a meeting where everyone talks over the top of each other, then you’ve experienced what happens when everyone is trying to lead from the front!

One of the challenges of leading from the front is you can get so far ahead that you lose the team. It is essential to keep checking that all team members are coming with you and understand where they are going. A common mistake in organisations is to believe that the strategy and vision have been clearly communicated when they have not. If the team is not doing what you want them to do, the destination, pace and direction need to be clearer.

When leading from the front, the focus is in the direction you are heading. If you keep turning round and looking back, you create a stop/start behaviour in your team. It indicates doubt, a lack of self-belief and self-confidence. Leading from the front requires enormous trust in yourself and the team and a belief that people will execute the strategy you have set. Be purposeful, focused, committed and clear about where you are heading or the team may stall.

In today’s business environments of rapid transformation and change, leading from the front is critical to providing the clarity and vision that employees need in order to drive the business forward.

How clear is the vision in your business and team?

Next month, I’ll explore Leading from behind and how it is critical to drive the team forward in line with the vision and pace that has been articulated.

Jude Jennison is an international speaker, author and Horse Assisted Educator with a 16 year senior leadership career in a global IT organisation, where she led UK, European and global teams.

Jude helps senior leaders and executive teams develop embodied leadership skills that create tangible business results. By receiving a horse’s non-judgemental feedback, any leader can identify their leadership behaviours and transform themselves into a courageous and hugely influential non-verbal communicator.

For more information on our leadership development programmes,
contact us on 0800 170 1810 or visit our website www.theleadershipwhisperers.com

Business Driven IT KPIs

KPIs (Key Performance Indicators) are a critical management tool to measure the success and progress of effort put in towards achieving goals and targets – to continually improve performance.

Every business set their specific KPIs to measure the criteria that drive the business success – these vary from business to business. One thing every modern business has in common though, is IT – the enabler that underpin operational processes and tools used to commerce daily. Setting KPIs that measure the success of IT operations does not just help IT leadership to continuously improve but also proof the value of IT to the business.

Here are ten IT KPIs that matter most to modern business

1. % of IT investment into business initiative (customer-facing services and business units)
How well does the IT strategy, reflected in the projects it is executing, align with the business strategy? This metrics can help to align IT spend with business strategy and potentially eliminate IT projects for IT that does not align directly with business objectives.

2. % Business/Customer facing Services meeting SLAs (Service Level Agreements)
IT is delivering service to customers; these are internal to the business but can also be delivered external to the business’ client/customers directly. Are these services meeting required expectations and quality – in the eye of the customer? What can be done to improve.

3. IT Spend vs Plan/Budget
Budgets are set for a purpose – it is a financial guideline that indicates the route to success. How is IT performing against budget, against plans? Are you over-spending against the set plans? Why? Is it because of a problem in the planning cycle or something else? If you are over-spending/under-spending, in which areas do this occur?

Knowing this metrics give you the insight to take corrective actions and bring IT spend inline with budgets.

4. IT spend by business unit
IT service consumptione is driven by user demand. How is IT costs affected by the user demands by business unit – are business units responsible to cover their IT cost, hence owning up to the overall business efficiency. This metrics put the spotlight on the fact that IT is not free and give business unit manager visibility of their IT consumption and spend.

5. % Split of IT investment to Run, Grow, Transform the business
This is an interesting one for the CIO. Businesses usually expects IT to spend more money in growing the business but reality is that the IT cost of running the business is driven by the demand from IT users with an increased cost implication. Business transformation, now a key topic in every board meeting, needs a dedicated budget to succeed. How do these three investment compare in comparison with business strategic priorities.

6. Application & Service TCO (Total Cost of Ownership)
What is the real cost of delivering IT services and application. Understanding the facts behind what makes up the total cost of IT and which applications/services are the most expensive, can help to identify initiatives to improve.

7. Infrastructure Unit Cost vs Target & Benchmarks
How do you measure the efficiency of your IT infrastructure and how does this compare with the industry benchmark? This is a powerful metrics to justify ROI (Return on Investment), IT’s value proposition, IT strategy and the associated budget.

8. % Projects on Time, Budget & Spec
Is the project portfolio under control? Which projects need remediation to get back on track and what can be learned from projects that do run smoothly?

9. % Project spend on customer-facing initiatives
How much is invested in IT projects in the business for the business (affecting the bottom line) in comparison with customer-centric projects that impacts the business’ top line.

10. Customer satisfaction scores for business/customer facing services

Measure the satisfaction of not just the internal business units that consume IT services but also the business’ customer’s satisfaction with customer-facing IT services. Understand what the customer wants and make the needed changes to IT operations to continuously improve customer satisfaction.

KPI vs Vision

In the famous words of Peter Drucker “What gets measured gets improved”, KPIs give you the insight to understand:

  • your customer
  • your market
  • your financial performance
  • your internal process efficiency
  • your employee performance

Insight brings understanding that leads to actions driving continuously improve.

NED :: Non-Executive Director’s proposition

Are you aware of the substantive and measurable value a Non-Executive Director can bring to you and your business…?

Introduction

The Non-Executive Director, no longer a role that is associated just with large organisations. There is a growing awareness of the NED role and more and more organisations are appointing NEDs of various types, and specific specialities, often within technology and digital transformation, to enhance the effectiveness of their boards as standard practise.

With the pressure on organisations to compete globally, deal with digital transformation and respond to rapidly changing market conditions, new skills are needed at board level. This leads to the role of the NED diversifying and introduces a need to refresh the NEDs as circumstances change, bringing in new specialities, experience and challenge when the organisation needs it.

A good NED can, and should make a substantive and measurable contribution to the effectiveness of the board. Do not see a NED as a consulting advisor – a NED, within the remit of the role of a company director, play a full and active part in the success efforts of an organisation. Irrespective of the skills, experience and network contacts that NEDs will bring, they must above all, provide appropriate independent and constructive challenge to the board.

Both the organisation and the NED must understand the purpose of being a NED, within the specific organisation, for the role to be effective. This includes a clear understanding of what value the NED is expected to bring. A NED’s value goes beyond just the statutory requirements.

On appointment a Non-executive director can:

  • Broaden the horizons and experience of existing executive directors.
  • Facilitate the cross-fertilisation of ideas, particularly in terms of business strategy and planning.
  • Have a vital part to play in appraising and commenting on a company’s investment/expenditure plans.
  • Bring wisdom, perspective, contacts and credibility to your business.
  • Be the lighthouse that helps you find your way and steer clear of near and present dangers.

The role of the NED

All directors, including NEDs, are required to:

  • provide entrepreneurial leadership of the company
  • set the company’s vision, strategy and strategic objectives
  • set the company’s values and standards
  • ensure that its obligations to its shareholders and others are understood and met.

In addition, the role of the NED has the following key elements:

  • Strategy: NEDs should constructively challenge and help develop proposals on strategy.
  • Performance: NEDs should scrutinise the performance of management in meeting agreed goals and objectives and monitor the reporting of performance.
  • Risk: NEDs should satisfy themselves on the integrity of financial information and that financial controls and systems of risk management are robust and defensible.
  • People: NEDs are responsible for determining appropriate levels of remuneration of executive directors and have a prime role in appointing, and where necessary removing, executive directors, and in succession planning.

“In broad terms, the role of the NED, under the leadership of the chairman, is: to ensure that there is an effective executive team in place; to participate actively in the decision–takingprocess of the board; and to exercise appropriate oversight over execution of the agreed strategy by the executive team.”; Walker Report, 2009

 

A non-executive director will bring the follow benefits to your company:

  • strengthen the board and provide an independent viewpoint
  • contribute to the creation of a sound business plan, policy and strategy
  • review plans and budgets that will implement policy and strategy
  • be a confidential and trusted sounding board for the MD/CEO and keep the focus of the MD/CEO
  • have the experience to objectively assess the company’s overall performance
  • have the experience and confidence to stand firm when he or she believes the executive directors are acting in an inappropriate manner
  • ensure good corporate governance
  • provide outside experience of the workings of other companies and industries, and have beneficial sector contacts and experience gained in previous businesses
  • have the ability to clearly communicate with fellow directors
  • have the ability to gain the respect of the other directors
  • possess the tact and skill to work with the executive directors, providing support and encouragement where difficult decisions are being made
  • have contacts with third parties such as financial sources, grant providers and potential clients

Looking for a NED?

Now that you understand what a NED can do – What are you waiting for?

Contact Renier Botha if you are looking for an experienced director with strong technology and digital transformation skills.

Renier has demonstrable success in developing and delivering visionary business & technology strategies. His experience include Mergers & Acquisitions (M&A), major capital projects, growth, governance, compliance, risk management as well as business and organisation development. From startup to FTSE listed enterprise, the value Renier can bring as NED is substantive, driving business growth.

Insightful Quotes on Artificial Intelligence

Artificial Intelligence (AI) today, is a practical reality. It captivated the minds of geniuses and materialised through science fiction as I grew up. During the past 70 years (post WWII) AI has evolved from a philosophical theory to a game changing emerging technology, transforming the way digital enhances value in every aspect of our daily lives.

Great minds have been challenged with the opportunities and possibilities that AI offers.  Here are some things said on the AI subject to date. Within these quotes, the conundrum in people’s minds become clear – does AI open up endless possibilities or inevitable doom?

“I believe that at the end of the century the use of words and general educated opinion will have altered so much that one will be able to speak of machines thinking without expecting to be contradicted.”; Alan Turing (1950)

“It seems probable that once the machine thinking method has started, it would not take long to outstrip our feeble powers… They would be able to converse with each other to sharpen their wits. At some stage therefore, we should have to expect the machines to take control.”; Alan Turing

“The study is to proceed on the basis of the conjecture that every aspect of learning or any other feature of intelligence can in principle be so precisely described that a machine can be made to simulate it. An attempt will be made to find how to make machines use language, form abstractions and concepts, solve kinds of problems now reserved for humans, and improve themselves.”; John McCarthy (1956)

“AI scientists tried to program computers to act like humans without first understanding what intelligence is and what it means to understand. They left out the most important part of building intelligent machines, the intelligence … before we attempt to build intelligent machines we have to first understand how the brain things, and there is nothing artificial about that.”; Jeff Hawkins

“The question of whether a computer can think is no more interesting than the question of whether a submarine can swim.”; Edsger Dijkstra

“Whether we are based on carbon or on silicon makes no fundamental difference; we should each be treated with appropriate respect.”; Arthur Clarke (2010)

“…everything that civilisation has to offer is a product of human intelligence. We cannot predict what we might achieve when this intelligence is magnified by the tools that AI may provide, but the eradication of war, disease, and poverty would be high on anyone’s list. Success in creating AI would be the biggest event in human history.”; Stephen Hawking and colleagues wrote in an article in the Independent

“Why give a robot an order to obey orders—why aren’t the original orders enough? Why command a robot not to do harm—wouldn’t it be easier never to command it to do harm in the first place? Does the universe contain a mysterious force pulling entities toward malevolence, so that a positronic brain must be programmed to withstand it? Do intelligent beings inevitably develop an attitude problem? …Now that computers really have become smarter and more powerful, the anxiety has waned. Today’s ubiquitous, networked computers have an unprecedented ability to do mischief should they ever go to the bad. But the only mayhem comes from unpredictable chaos or from human malice in the form of viruses. We no longer worry about electronic serial killers or subversive silicon cabals because we are beginning to appreciate that malevolence—like vision, motor coordination, and common sense—does not come free with computation but has to be programmed in. …Aggression, like every other part of human behavior we take for granted, is a challenging engineering problem!”; Steven Pinker – How the Mind Works

“Ask not what AI is changing, ask what AI is not changing.”; Warwick Oliver Co-Founder at hut3.ai (2018)

“Sometimes at night I worry about TAMMY. I worry that she might get tired of it all. Tired of running at sixty-six terahertz, tired of all those processing cycles, every second of every hour of every day. I worry that one of these cycles she might just halt her own subroutine and commit software suicide. And then I would have to do an error report, and I don’t know how I would even begin to explain that to Microsoft.”; Charles Yu

“As more and more artificial intelligence is entering into the world, more and more emotional intelligence must enter into leadership.”; Amit Ray

“We’ve been seeing specialized AI in every aspect of our lives, from medicine and transportation to how electricity is distributed, and it promises to create a vastly more productive and efficient economy …”; Barrack Obama

“Artificial intelligence is the future, not only for Russian, but for all of humankind. It comes with colossal opportunities, but also threats that are difficult to predict. Whoever becomes the leader in this sphere will become the ruler of the world.”; Vladimir Putin

“I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, I’d probably say that. So we need to be very careful.”; Elon Musk

“Whenever I hear people saying AI is going to hurt people in the future I think, yeah, technology can generally always be used for good and bad and you need to be careful about how you build it … if you’re arguing against AI then you’re arguing against safer cars that aren’t going to have accidents, and you’re arguing against being able to better diagnose people when they’re sick.”; Mark Zuckerberg

“Most of human and animal learning is unsupervised learning. If intelligence was a cake, unsupervised learning would be the cake, supervised learning would be the icing on the cake, and reinforcement learning would be the cherry on the cake. We know how to make the icing and the cherry, but we don’t know how to make the cake. We need to solve the unsupervised learning problem before we can even think of getting to true AI.”; Yan Lecun

“Artificial intelligence would be the ultimate version of Google. The ultimate search engine that would understand everything on the web. It would understand exactly what you wanted and it would give you the right thing. We’re nowhere near doing that now. However, we can get incrementally closer to that, and that is basically what we’re working on.”; Larry Page,  Co-Founder at Google (2000)

If you had all of the world’s information directly attached to your brain, or an artificial brain that was smarter than your brain, you’d be better off.” – Sergey Brin Co-Founder at Goolgle (2004)

 

 

 

What is P3M3

Maturity models are tools that can benchmark current performance against best practise. It provides valuable information on the current status of operations and point out areas for improvement that could increase the operational effectiveness, not just from a processes perspective but also the involved people, the tools used and the interaction of different disciplines within an organisation.

P3M3 is a management maturity model looking across an organization at how it delivers its projects, programmes and portfolio. P3M3 is unique in that it considers the whole system and not just at the processes.

P3M3 provides three maturity models that can be used separately to focus on specific areas of the business, or more generally to help the organization assess the relationships between their portfolios, programmes and projects.

The three P3M3 maturity models are:

  • Portfolio Management
  • Programme Management
  • Project Management

Structure

Each sub-model is further broken down into seven perspectives:

  • Organizational governance
  • Management control
  • Benefits management
  • Risk management
  • Stakeholder management
  • Finance management
  • Resource management

The P3M3 model has five maturity levels:

  • Level 1: Awareness
  • Level 2: Repeatable
  • Level 3: Defined
  • Level 4: Managed
  • Level 5: Optimized

P3M3 allows an assessment of the process employed, the competencies of people, the tools deployed and the management information used to manage and deliver improvements. This allows organizations to determine their strengths and weaknesses in delivering change.

There are no interdependencies between the models so an assessment may be against one, two or all of the sub-models. It is possible for an organization to be better at programme management than it is at project management.

Benefits

Through baselining an organization’s performance it is possible to identify areas where an organization can most effectively increase its project, programme and portfolio capability. Therefore the sort of benefits expected from using P3M3 to develop and implement an improvement plan would be:

  • Cost savings
    • On delivering project outputs and programme outcomes
    • Integrate processes across an organization
    • More effective use of budgets
  • Improved benefits delivery
  • Improved quality of delivered projects and programmes
  • Improved customer satisfaction
  • Increase return on investment
  • Providing plans for continual progression
  • Recognizing achievements from previous investment in capability improvement
  • Focusing on the organization’s maturity, not specific initiatives (you can run good programmes and projects without having high levels of maturity – but not consistently).

DevOps: An Immersive Simulation

It’s 8:15 am on Thursday 5th April and I’m on the 360 bus to Imperial College, London. No — I’ve not decided to go back to college, I am attending a DevOps (a software engineering culture and practice that aims at unifying software development and software operation) simulation day being run by the fabulous guys from G2G3.

I’ve known the G2G3 team for several years now, having been on my very first ITSM (IT Service Management) simulation way back in 2010 when I worked for the NHS in Norfolk and I can honestly say that that first simulation blew me away! In fact, I was so impressed with that I have helped deliver almost 25 ITSM sims since that day, in partnership with G2G3.

Having worked with ITIL (IT Infrastructure Library) based operations teams for most of my career, I remember when DevOps first became “a thing”. I was sharing an office with the Application Manager at the time and I can honestly say that it seemed a very chaotic way of justifying throwing fixes/enhancements into a live service. This really conflicted with my traditional ITSM beliefs that you should try to stop fires happening in the first place, so as you can imagine, we had some lively conversations in the office.

Since then, DevOps has grown into the significant, best practice approach that it is today. DevOps has found its place alongside service management best practice, allowing the two to complement each other.

Anyway, back to the 360 bus — let me tell you a bit about the day…

On arrival, I met with Jaro and Chris from G2G3 who were leading the day. The participants consisted of a variety of people from different backgrounds, some trainers, some practitioners, but all with a shared interest in DevOps. Big shout out as well to the guys who came all the way from Brazil!!! Shows how good these sessions are!

The day kicked off with us taking our places at the tables that are scattered around the room as we are given an explanation of how the sim works. I do not want to go into detail about what happens over the day, as you really need to approach these sessions with an open mind, rather than know the answers. What I can tell you is that the rest of the day consisted of rounds of activity, with each one followed by opportunities for learning and improving and planning. There are times when you find yourself doing something you would never normally do, amidst the chaos of the first round. This was summed up by my colleague, another service management professional, who had to admit that they “put it in untested”, much to the enjoyment of the rest of the room!

The day itself went by in a blur! People who you met at the beginning of the day, are now old friends that you go down the pub with at the end of the day! These new-found friends are also a fantastic pot of knowledge, with everyone able to share ideas and approaches.

The day was a rollercoaster of emotions — At the beginning of the day, I was apprehensive about whether I had enough knowledge of DevOps. Apprehension quickly changed to a general feeling of frustration and confusion through round one, as I tried to use my Tetris knowledge to develop products! I finished the day with a real sense of satisfaction — I had held my own and the whole team had been successful in developing products and delivering a profit for the business. There were some light-bulb moments for me along the way, in particular around needing to make sure that any developments should integrate with each other and also meet the user acceptance criteria. I also realised that DevOps is more structured than I thought with checkpoints along the way to ensure success. The unique way in which simulations are delivered serves to immerse people in a subject whilst encouraging them to change behaviours through self-discovery.

I have always received very good feedback for ITSM simulations, and I can see that the DevOps simulation will prove to be as successful.

Several of us also returned to Imperial College the next day to attend the Train the Trainer session for the DevOps simulation. This means that we can now offer tailored simulations either as an individual session or as part of a wider programme of change.

Simulations are always difficult to explain, without giving away the content of the day, but if you would like to find out more, please contact me onsandra.lewis@bedifrent.com


Written by Sandra Lewis — Difrent Service Mannagement Lead
@sandraattp | sandra.lewis@bedifrent.com | +44(0) 1753 752 220