Chapter 6
Information Supply Chains and Ecosystems

A couple of decades ago, especially in the early days of data warehousing and as intimations of “information as an asset” were starting to take hold, information professionals started putting forward the notion of conceiving and architecting the production, flow, enhancement, and availability of information (even just within an organization) as a type of supply chain, an “information supply chain” (ISC). The supply chain is an excellent metaphor to visualize, define, refine, and assess the processes and resources for the information lifecycle—particularly for unidirectional analytics environments. Even though the term “supply chain” sounds like it focuses on the supplier, supply chains actually are designed with the customer in mind. Therefore, the concept can help information management professionals keep top-of-mind the kinds of business outcomes highlighted in the early chapters for deployed information assets.

A supply chain is a system of activities and resources involved in moving a product or service from the point where it is manufactured to where it is consumed.1

Typically, a supply chain begins with the harvesting, collection, or generation of some kind of raw material. Although I personally shy away from the pedantic discussion of differentiating data from information, in a supply chain context it may be somewhat relevant to discern raw material from product. But as we’ll see, adding value to data to turn it into information is rarely a single step or obvious transformation. In our supply chain metaphor, data are raw, original transactions, text files, emails, images, or the like. They often have utility only in the context of the process that created or captured them.

Applying the SCOR Model to the Information Supply Chain

While it sounds straightforward enough, even the most simple supply chains involve a host of moving and tightly coordinated moving parts. The Supply Chain Operations Reference (SCOR) model lays out these processes as:

  • Plan— Processes that balance aggregate demand and supply to develop a course of action which best meets sourcing, production, and delivery requirements.
  • Source— Processes that procure goods and services to meet planned or actual demand.
  • Make—Processes that transform product to a finished state to meet planned or actual demand.
  • Deliver—Processes that provide finished goods and services to meet planned or actual demand, typically including order management, transportation management, and distribution management.
  • Return—Processes associated with returning or receiving returned products for any reason. These processes extend into post-delivery customer support.
  • Enable— Processes for establishing and operating the supply chain procedures, resources, and facilities, including relationships with all stakeholders and other involved parties.

Borrowing from supply chain best practices, information supply chain (ISC) planning should ensure: that the process/flow is integrated from front to back; the ability to simulate what-if scenarios for information production, delivery, and usage; flexibility for demand volatility; and that all individuals and organizations involved understand their downstream and upstream impact. It also involves planning for costs, fulfillment cycle times, return on assets and working capital, demand planning and management, “pull-based” inventory replenishment, inventory recording practices, and dozens of other procedures and considerations, some of which have relevance in in an ISC context.

Sourcing deals with how materials (data) are acquired, how to manage inventory (database, metadata, master data) and supplier network (data source owners), supplier agreements (terms of service with data owners), how to handle payments and revenues (chargeback and payback), and how materials (data) are transmitted and received (accessed and/or streamed, including security controls), and verified (quality controls, data profiling).

Making includes the activities for turning materials (data) into finished goods (information, reports, application inputs). This step may include production activities (cleansing, integration, enrichment), packaging (aggregation, predefined analytics, or reports), staging (data staging areas), and releasing (database loads or updates).

Delivering is the order management (user data/report requests or their actual queries against the data), warehousing (data warehouse, data mart, logical data warehouse architecture), and transportation (query management, API, or web service calls). It also includes product lifecycles (archival, roll-ups, deletion) and import/export requirements (cloud, remote data centers).

Returning refers to the processing of defective product (information, reports), which in an information context may not be so relevant since data is rarely returned. But this process could also include information user support activities.

A few years ago the Supply-Chain Council announced an update to the SCOR model, adding Enable as a sixth process. This process represents the management of business rules (data integration logic, data governance, and security policies and processes), regulatory compliance (data governance) and data management (metadata, master data). Other Enablement processes translate directly into ISC performance management, resource management, facilities management, contract management, supply chain network management, and risk management.

Information Supply Chain Scenarios

The SCOR model also provides a few levels of detail for scoping, configuring, and process/performance attributes. These details enable the handling of specific supply chain scenarios such as “make-to-stock” versus “make-to-order” supply chain configurations for general and custom goods and services, respectively. Differentiating these two configurations for the supply of information can be helpful in designing for:

  1. Generalized information uses such as a data warehouse or data lake, or
  2. Specified information purposes such as an architected data mart or report, input to a new application, or partner data feed request.

Typically, make-to-stock scenarios are executed not based on supposition, but upon a forecast. In an information context, this could refer to the vision for information described in the previous chapter. Make-to-order scenarios usually require some additional tasks for specing, producing, testing, staging, and releasing in collaboration with an actual customer. The information productization steps enumerated in chapter 4 are representative of a make-to-order scenario.

As supply chains grow more sophisticated, they appear and behave more as networks—complex flows of goods and services among suppliers, distributors, payment processors, and customers. Accordingly, organizations should characterize, architect and document their information life-cycles in this way as well.

Metrics for the Information Supply Chain

The SCOR model includes some 200 key indicators of supply chain operations performance. Although we’ll cover information measurement in part III, these metrics can be useful in understanding and crafting an information supply chain. The high-level metrics framework includes the following attributes, definition, and sample metrics, along with performance measures transposed into sample information supply chain metrics:

Performance Attribute Classic Supply Chain Performance Attribute Definition2 Sample Information Supply Chain Performance Metrics

Reliability The ability to perform tasks as expected. Reliability focuses on the predictability of the outcome of a process. Typical metrics for the reliability attribute include: on-time, the right quantity, the right quality. • Query/update performance
• Data quality (accuracy, completeness, timeliness, integrity, etc.)
Responsiveness The speed at which tasks are performed. The speed at which a supply chain provides products to the customer. Examples include cycle-time metrics. • Information accessibility
• User request turnaround time
• User satisfaction survey
Agility The ability to respond to external influences, and the ability to respond to marketplace changes to gain or maintain competitive advantage. SCOR agility metrics include flexibility and adaptability. • Utility of information for a range of purposes
• Linked data, metadata, and master data measures
• Ease of integrating new types of data or changing dimensions
Costs The cost of operating the supply chain processes. This includes labor costs, material costs, management, and transportation costs. A typical cost metric is cost of goods sold. • Data acquisition cost
• Data management costs
• Data delivery costs (Each include labor and technology related costs)
Asset Management Efficiency (Assets) The ability to efficiently utilize assets. Asset management strategies in a supply chain include inventory reduction and in-sourcing versus outsourcing. Metrics include: inventory days of supply and capacity utilization. • Information timeliness
• Amount of available history
• Actual usage (e.g., percent of data touched by users/apps)

A New Supply Chain Model for Information Assets

Certainly the classic product/service supply chain model is useful at a high level, especially to express information management needs to those more familiar with the physical supply chain concept. However, the detailed processes become increasingly unrelated to the specific processes relevant to the management and flow of information. Moreover, I find the product and service-oriented supply chain concept a bit too focused on process and less so on value creation. If infonomics is a concept for treating information as an economic asset, a model or framework for describing its flow perhaps should center more on how each step increases its economic potential.

To that end, let’s consider a range of different kinds of recognized assets, or the stuff organizations manage:

  • Material assets (e.g., raw goods, consumer goods, plant, equipment),
  • Financial assets (e.g., cash, savings, various investment vehicles, pre-paid expenses),
  • Intellectual property (e.g., patents, trademarks, copyrights),
  • Human capital (employees, contractors, partners, departments), and
  • Information “assets” (e.g., transactions, lists, reference data, content, metadata, etc.).

We will examine the specific processes and standards for each of these in the next chapter.

Financial and material assets are somewhat obvious. It gets a little murkier when discussing people as assets. Today, most organizations consider employees as “human capital.” However, this concept only came about fairly recently. In 1964, University of Chicago economist and Nobel Prize winner Gary Becker published the book Human Capital. Upon the popularity of Becker’s ideas, the term “human capital” became widely used in business, and human resources (HR) executives emerged. Becker and other prominent economists including Milton Friedman then established the economic concept of human capital. So, with employees now considered organizational assets, why aren’t they (we, that is) on the balance sheet? Does your employer actually own you? No. Thankfully, due to anti-slavery laws in civilized countries, we are “at will” employees, even if under contract. Since ownership and control are key asset determinants, you and I show up as an expense on the income statement, not as an asset on the balance sheet.

And we’ve already discussed how information—in most cases—is not a recognized asset according to accounting standards.

For nearly any kind of asset (or proto-asset, as in the case of human capital and information), we execute a similar set of activities on them, or do certain things to them. We collect or otherwise obtain assets. For manufacturers in particular, we produce them and inventory them in the counting, or accounting, sense. Once we have assets, we might also do things to enhance their potential economic benefit, such as enriching them in some way (i.e., employee training), moving them about, or integrating them. And for precautionary reasons, we typically protect them in some way and keep continuous track of them. Organizations do these things to assets to ensure the assets don’t lose value and are able to generate future value.

These lifecycle primitives classify the activities we do to assets, and represent the supply side of the supply chain:

Collect Prepare Combine Enrich
Produce Inventory Locate Secure
Organize Distribute Govern Monitor

Many of these look familiar juxtaposed against the SCOR framework, but note that they are applicable to any and all classes of asset (or proto-asset). Also note that no sequence of steps is implied. They can be combined and sequenced in any way necessary or applicable. These activities focus on value augmentation alone. They are ways to increase the potential or probable economic value of the asset, but not to realize its value.

Now let’s consider the ways these various assets generate realized economic value. True to the definition of an asset, value realization happens only once we do something with them. These primitives classify the activities we do with assets, and represent the demand side of the supply chain:

Sell Lend or License Share
Spend Trade Apply

(You may have noticed I just used the terms supply and demand. Yes, this is foreshadowing that we’re getting to the thrilling topic of information economics a bit later.)

In the case of financial assets, we typically spend them on other assets (including other kinds of financial assets like securities), or lend them to financial institutions to generate interest income. Actually in doing so, we are giving banks a license to use our money. Material assets are typically sold as finished goods or applied as raw materials to create finished goods. Human assets are applied to business processes. Yes, sometimes we employees feel quite spent, too!

Intellectual property is most often applied to business processes, as well. But because it’s an actual owned asset, it can also be sold or licensed directly, as in the case of a business selling or licensing a patent to another business.

Interestingly, even as an unrecognized asset class, information is at least as flexible on the demand side as any other kind of asset. We can perform any and all of these activities with it. And with a strong information culture, we should be performing all of these activities with it. In the first few chapters you probably started thinking about how much information your organization has that—if packaged and marketed properly—could become a salable (licensable) commodity itself. You may be doing this already, but the opportunities to do so are likely much greater than most people in your organization realize.

This book is not about defining a detailed, 976-page (i.e., SCOR) reference model for an information supply chain. Instead I’ll leave you with a useful illustration based on these supply-side and demand-side primitives, with a few others added specific to information assets. Hopefully, the most enthusiastic of you will look to adopt, adapt, and build on this concept.

Figure 6.1 Information Supply Chain Activities

Figure 6.1 Information Supply Chain Activities

Figure 6.1 simply shows how information value potential leading to its realization is enhanced along a continuum. Instead of five or six process groupings, it consists of three which I believe represent the main stages of an ISC:

  • Acquisition— how you obtain raw data or other information.
  • Administration— how the data is enhanced, or what the machinery the “information factory” might include.
  • Application— how information is received and used in generating value.

Moreover, as one organization’s ISC intersects with another’s, as in the case of an information supply network, the arrow may loop back on itself. For example: sold, lent, or analyzed information may become the raw data purchased or captured, licensed, or observed by another organization. And so on. This is the nature of our most non-depleting, non-rivalrous, regenerative asset.

Preparing for the Real Information Ecosystem

Speaking of loops, particularly feedback loops, another way to characterize information’s relative place in the world is as an ecosystem. A supply chain may seem too linear, and even a supply network too static and procedural for today’s (and especially tomorrow’s) more dynamic business environment. Indeed, supply chains/networks change and increasingly run pseudo-autonomously on business logic, embedded analytics, and always-on communication among stakeholders. But do they really evolve? Do they really sense and respond and adapt to both immediate and gradual shifts in their larger environment the way biological ecosystems do? Only if someone coded them that way. Someday soon we will witness an entire supply chain driven by a neural network.

Perhaps we should be conceiving and planning for that day. Already, certain players in certain supply chains manage and store much of the information flow. Think: Walmart. Or Coca-Cola. As Don Keough, the former president of Coke once said, “Whoever has information fastest and uses it wins.”3 It’s probably something Sun Tzu once said, too.4

In Japan, keiretsus are the renowned corporate ecosystems formed around trust, sharing, collaboration, and coordination. Today, with companies like Walmart and Coca-Cola and Amazon, we’re starting to see the formation of information keiretsus. These ecosystems enable trusted partners to readily share and use one another’s information. Gartner’s Group VP of Data and Analytics, Regina Casonato, has referred to this kind of arrangement as “information without borders.” Whatever we want to call it, the behavior of information within and among these entities resembles something flowing or even thriving within an ecosystem.

This flow of information becomes even more important as businesses turn to ecosystems to fuel their digital growth. The Gartner 2017 CIO Agenda5 survey of 2,598 global CIOs found that top performers create or participate in ecosystems and expect to double their ecosystems in two years. As Andy Rowsell-Jones, vice president and research director at Gartner, said, “Many organizations will need to shift their enterprises from a linear, value chain business trading with well-known partners and adding value in steps, to being part of a faster and more dynamic networked digital ecosystem.”

So what we can learn and apply about ecosystems to the discipline of information management? What is an ecosystem exactly?

Ecosystem

[ek-oh-sis-tuh m, ee-koh-]

noun, Ecology.

  1. a system, or a group of interconnected elements, formed by the interaction of a community of organisms with their environment.
  2. any system or network of interconnecting and interacting parts, as in a business.6

Sticking for now with the classical, biological definition, an ecosystem describes a community of organisms along with the inanimate parts of their environment such as air, water, sun, and soil. Ecosystems are defined by how these components are linked via nutrient cycles and energy flows, and how these components interact with one another.

Just as the web can be thought of as globe-spanning information ecosystem, the planet itself is considered by some scientists as a massive ecosystem (or even as a living organism itself!).7 But most ecologists and biologists prefer to consider ecosystems as more localized.

Which Role Does Information Play in an Information Ecosystem?

We can characterize information within an information ecosystem as a resource, or perhaps as an organism itself. Bear with me.

Consider information as an energy source or resource. Peter Sondergaard, senior vice president of research at Gartner, has referred to Big Data as the oil of the 21st century.8 Microstrategy’s founder Michael Saylor throughout the 2000s repeated his catchphrase, “information like water.” These analogies make sense. Information fuels business processes and businesses themselves. It is also a lubricant for commerce. It is fairly abundant (depending on one’s climate and topology), can be collected and processed and stored. And it can even be bought and sold as a commodity. Not to mention, like oil and water, when information leaks, you’ve got a mess on your hands! But both of these analogies place dubious limitations upon information, disregarding its unique economic and behavioral characteristics.

Perhaps a more compelling, non-obvious, and provocative way to think about information within an ecosystem context is as an organism itself. One could argue that information germinates or is born,9 survives and thrives, replicates, combines and evolves, is affected by climate and topography, and sometimes even decomposes and is recycled. Of course, information does few of these activities on its own. Information doesn’t have DNA within it programmed to tell it how to behave, given certain stimuli. Not yet. Information today is programmed from the outside.

But why not flip the information-process model upside-down (or rather, inside-out) to define and prepare for tomorrow’s information ecosystem? For decades we’ve had “stored procedures” embedded within database management systems (DBMS). And more recently we’re seeing emerging technologies like those from Pneuron specialize in “moving the processing to the data” rather than the opposite classic approach to information processing. Another fascinating early example of this flip is the inside-out approach from SertintyOne, which embeds security logic within the dataset itself.

Chuck Devries, vice president of enterprise architecture and technology strategy at Vizient, articulated an increasingly common sentiment among thought-leading information executives: “I’m a big believer that you move processing, not data.”

On a true ecosystem scale, the New York Stock Exchange and the retail market intelligence company IRI are examples of organizations offering analytic environments for customers to process data in-situ rather than extracting and downloading it. Ash Patel, the CIO of IRI, is also keen on the ecosystem concept. He calls the way they manage data as “liquid” in that “We aggregate nothing. We work on the raw, leaf level of data, and it takes the shape of the container we put it in. Clients come to the fountain to drink, rather than carrying buckets of data around.”

Further supporting the metaphor of information as an organism, let’s not forget that viruses can infect data, not just systems.

Indeed, most of us in the industry have been using the term “information ecosystem” somewhat casually. This is par for the course throughout much of the IT profession. We use many related terms like “value” and “asset,” and even “lifecycle” and “management,” without much of a common understanding throughout our organizations or industry. Examining the range of classic, biological ecosystem concepts can yield ways to adapt them for explaining the world of information a bit better.

Adapting Classic Ecosystem Entities Concepts

Classic biological ecosystems involve certain actors or entities, have a range of features and processes, are influenced by various events, and are often managed by humans. An information ecosystem can be classified and described similarly. However, Gartner IT service management expert, Roger Williams, cautions: “The world is littered with the hubris of those that thought they could control the complex. Anyone operating in an information ecosystem must always keep in mind that they cannot direct outcomes, they can only influence them.”10

Ecosystem Entities

In a biological ecosystem, the main actors are organisms, organic matter, nutrients, and energy. If the biological ecosystem is named for biology, the study of organisms, then it follows that our information ecosystem model would center on information. (Remember, we could adopt the metaphor of information as energy, but then this would suggest applications or business entities are the central actors. “Application ecosystems” or business ecosystems are legitimate models no less, but they are not information ecosystems.)

Other items within the biological ecosystem include organic matter, nutrients and energy, and resources including air, water, and soil. In the information ecosystem, we’re concerned with (perhaps) the bits and bytes that comprise information “matter,” or the individual units of information that makes up a dataset. And in the information ecosystem we’re concerned with resources such as processing, storage and bandwidth, and of course energy just the same. What provides nutrition for information? Let’s say transactions or other kinds of events do. We’ll get to how these “nutrients” support growth in a moment.

Ecosystem Features

Like their counterpart, information ecosystems involve networks of interactions among information “organisms” and with their environment. It may not be natural to think of information as interacting, but that’s just what happens during lookups, searches, integration, query updates, and reporting. These each involve an interaction among disparate datasets such as a sales transaction and a customer or product master data file. It may be more comfortable to call these “intersections” instead since, as I mentioned previously, in these early days of the Information Age information is not yet an autonomous actor.

Both ecosystems also have climates and topographies which determine organisms’ access to resources. Information ecosystem topographies are characterized by data and system architectures, and climate relates to periodic or cyclical changes in the availability of resources dictated by business climate changes.

Biodiversity is a feature which translates into the variety of information. Ecosystems with high degrees of biodiversity or “infodiversity” are capable of generating a greater amount of goods and services upon which businesses and consumers depend. But these ecosystems may be more complex and fragile. Changes in climate or other influences outlined ahead can adversely affect or unbalance them.

Ecosystem Processes

The types of processes within the biological ecosystem include energy flows, nutrient cycling, and the movement of matter. These sub-processes enable the main functions of decomposition, reproduction, and growth.

The decomposition of organisms is an interesting parallel to the various methods for altering information. Decomposition happens by leaching, fragmentation, and chemical alteration in order to make organic matter more easily absorbed. Similarly, altering information can occur via filtering it, cleansing it, or applying algorithms to it—thereby rendering it more consumable.

The reproduction of information, of course, involves making copies or extracts of it. The movement of organisms is akin to the movement of information. And the growth (volume) of information is due to nutrients (e.g., transactions) and the availability of energy and resources.

Ecosystem Influences

Various occurrences or disturbances influence an ecosystem. In the biological world, disturbances may include falling trees or rocks, wildfires, insect invasions, volcanic eruptions, or tsunamis. Using a concept known as “threat modeling” we can imagine and should prepare for similar kinds of disturbances to our information ecosystems such as security breaches, natural disasters, new competitors, or business collapses. Disturbances often lead to succession—the term ecologists use to describe a directional change in the structure of an ecosystem due to changes in resource availability. It is the same with information ecosystems. We often see how disturbances bring about or impel structural changes in the way we manage and leverage information.

Even climate change affects both ecosystems. In an information ecosystem, however, the climate is a macroeconomic function. Therefore, it would seem that just as with biological ecosystems, man-made (anthropogenic) global effects upon the business climate may alter or stress information ecosystems.

Ecosystem Management

Many biological ecosystems are managed to ensure the ongoing optimal production of organisms for ultimate consumption (e.g., eating, viewing, playing, commuting, etc.). Correspondingly, information ecosystems are managed to ensure the ongoing optimal production of information consumed by businesses and individuals.

In our biosphere, ecosystem managers alter topologies (tilling, grading), introduce or reduce resources (clear cutting, burning, watering), supplement resources (irrigation, fertilizing), artificially repair organism imbalances (herd thinning, fish stocking), and even help prevent the extinction of species (genetic material banking) in severely distressed ecosystems.

In our infosphere, ecosystem managers also perform similar tasks such as reconfiguring hardware and networks; cleansing information; augmenting computing, storage, and bandwidth resources; repairing information imbalances via archiving or enriching data; and even backing up information to help prevent its loss.

Indeed, effective ecosystem planning and management of either kind requires an effective vision, strategy, measurements, governance, and personnel, along with an understanding of the organisms’ lifecycles and a set of tools. Sound familiar? Maybe we should look to our forestry and agriculture agencies, water ministries, and national park departments for guidance on how to manage our information ecosystems more effectively. At the very least we should consider borrowing from their model. I look forward to the emergence of information ecologists!

Information ecosystem managers such as CDOs would be well advised to study biological ecosystems to ensure that their organizations’ information ecosystems are healthy and sustainable. We have only been managing our biological ecosystems for several millennia. What could those of us in the decades-old information world possibly learn from them? A lot.

One last note on ecosystems: if you think the whole concept of drawing parallels between biological and information ecosystems is a bit whacked, consider that the leading theoretical ecologist, Robert Ulanowicz, has employed modern information theory concepts to describe the complex structure of biological ecosystems themselves.11

Lessons from Sustainability

When an ecosystem is healthy, scientists say it is in balance or sustainable. Since we want our information ecosystems to be sustainable and thrive, let’s take a look at how we might incorporate the principles of sustainability or conservation. What was originally known as the “three Rs” of Reduce, Reuse, and Recycle recently have been expanded into “five Rs” which also include Refuse and Repurpose.

Most businesses are compiling information assets so furiously because: 1) they’re easily captured or obtained, 2) they’re increasingly inexpensive to store, and 3) they have nearly unlimited monetization potential. This makes sense, but as gigabytes become terabytes, and terabytes become petabytes, and petabytes become exabytes, the sustainability of an information ecosystem or architecture or infrastructure can be threatened. Even considering the diminishing marginal cost of storing information, conserving its use and production—and thereby the use of information-related resources—can improve the performance, costs, and risks incurred by your information ecosystem.

Refuse

If you’re not going to use it, refuse it.

Refusing an asset is the surest way to prevent any expenses or risks associated with it. Why capture, collect, or generate information you have no intention to leverage? Doing so incurs not only excess storage costs, but also unnecessary costs up and down the information lifecycle such as planning, design, architecture, data integration, backup/recovery, governance, and security. Moreover, bulking up a database with extraneous data can impact operational, analytic, and business performance. Sometimes refusing an asset involves rethinking and reinventing our consumption habits or processes altogether.

Particularly for any kind of private data or information which—if hacked or leaked—could damage your organization, be circumspect about choosing to collect it in the first place.

No doubt, refusing information can be a difficult decision, especially in this age of untold opportunities for monetization and decreasing storage expense. But in many cases, information you don’t collect today will be licensable from a partner or data broker when you need it.

Reduce

If you can’t refuse it, try to reduce it.

Reducing the use of an asset is about minimizing—rather than eliminating—the expenses associated with it. Information architects and data modelers have struggled with this conundrum daily since the introduction of the relational database: how to balance performance versus storage. If you have never had a debate about how much to normalize or denormalize a data model, then you’re not an information professional!

Similarly, customer relationship management (CRM), enterprise resource planning (ERP), and other application architects wrangle with decisions over whether to include or exclude certain fields from the application’s data model. How many different kinds of addresses do we need for a business customer? Or, Must we capture the cashier’s ID in addition to the point-of-sale terminal number for each sale? Or other related storage questions such as, At which level of granularity or detail should electronic media be saved? Too often business users involved in design will say, “Just capture it all, then we’ll decide if or how we’re going to use it.” Information professionals need to have the ability, authority, and economic models to push back.

However, reducing which information you collect is just one side of the question. The other side is to consider how much information you use. While reducing the amount of data used won’t affect the storage and other supply-side expenses, it will affect those on the demand side like processing costs and business performance. Increasingly, information technologies incorporate features like query optimization, but much design work is still manual—e.g., which fields to present to a user and when, or which operational fields to include in a data warehouse or data lake, or how much of a large item of content to retrieve and buffer.

In short, information management professionals should be attuned to reducing the information generated or collected, and reducing the information moved and presented.

Reuse

Especially if you cannot reduce it, reuse it.

Reusing an asset is simply to use it again for the same purpose, whatever that purpose is. Fortunately, such is the nature of information. It is non-depletable. No matter how much you use it, it doesn’t get used up. As argued in chapter 1, this is one of the characteristics that makes information highly monetizable. You can’t sell or eat the same sandwich or pizza more than once, but you can license and consume the same customer contact data over and over.

True, one can drive the same car again and again, but it depreciates and deteriorates over time. Datasets representing an ongoing business or events don’t generally deteriorate, as they are refreshed continuously or periodically. Individual records may lose relevance, accuracy, or timeliness, but not their existence or completeness. As a whole, datasets deteriorate when a business closes (e.g., the customer records of the recently shuttered Radio Shack and Sports Authority stores), unless someone purchases those records and continues refreshing them. Or—to some extent—when a new process replaces an older one.

Therefore, reuse may not be a primary consideration in information ecosystem design, as reusability is a key characteristic of information. However, if you find certain information isn’t being reused, such as in the case of “dark data,” it may be time to reduce it.

Repurpose

Repurpose on purpose.

Repurposing an asset involves sharing it and enabling it to be used for different reasons. An Uber or Lyft driver’s automobile is a prime example: it is used for both taxiing and personal reasons. Repurposing any asset, including an information asset, can lower or spread its net cost of ownership among multiple entities, and it can generate additional benefits that offset its initial expense or ongoing depreciation.

Just as information’s non-depletability enables its extreme reuse, information’s non-rivalry characteristic enables its extreme repurposing. More than just being able to share an asset or resource, non-rivalry, as I mentioned in chapter 1, is the ability of multiple processes or parties to use the same instance of an asset simultaneously.

In addition to reference data such as metadata and master data, most repurposing of information tends to be in the form of repurposing operational data for analytics. Or in the case of content it may involve simultaneously sharing on the web, an intranet, broadcast media, or signage. Clever information and enterprise architects recently have been honing their skills at identifying opportunities for repurposing information. Yet, I find most organizations have only scratched the surface, lacking the creativity, the will, or just the awareness that certain information even exists in other parts of the organization, or elsewhere. Issues of “data ownership” we’ll discuss in

chapter 9 also tend to interfere with information repurposing.

Recycle

No use for it? Recycle it.

Recycling involves breaking down an asset to create a new one. Or in our previous ecosystem terminology: decomposing it to provide the building blocks for a new organism.

With transactional or other structured information (portions of a data-set), fields may be parsed and recombined to create new datasets. If the original dataset remains in use, then this is more like reuse than recycling. In any case, architects should look for opportunities to do so rather than discarding the information altogether. Often recycling will involve sharing “decomposed” information with others (even outside the organization) so that they may benefit from creating new information assets from it.

It occurs to me that presently I’m recycling bits and pieces of existing research content from my colleagues and myself, other information sources, and some new ideas to create a new valuable asset: a book.

Remove

Can’t reduce, reuse, repurpose, or recycle it? Remove it.

In addition to the “five Rs” of classic sustainability and conservation, there’s a sixth “R” specific to non-physical assets such as information: removal. The removal or dumping of physical assets is a last resort, and not much in the realm of sustainability. But with non-physical or intangible assets, removing unneeded ones is easy and doesn’t harm your or anyone else’s information ecosystem. But it can help with lessening personnel, storage, processing costs, and risks. Purging a customer database of old records with dead email addresses (or dead customers!) is one simple example of this.

However, when the actual deletion of information may not be allowable due to regulatory compliance reasons, consider moving the data into an offline archive.

Technically, the simple deletion of information may not always be so simple. Within an information ecosystem, many different kinds of information are linked through other information. Therefore, simply deleting some unused information can cause data integrity problems.

Information as a Second Language

All of these metaphors for information we’ve devised over the years are not meant to be clever. Rather they’re to help information management professionals, IT professionals, business people, and executives communicate about information more effectively using familiar, non-threatening terminology and frameworks. They can make information seem less ephemeral and abstract, and more tangible, helping us convince our business colleagues, executives, and ourselves that information really is an asset to be treated as such.

To consolidate all of these challenges and potential solutions related to “speaking data” within an organization and among business partners, Gartner analyst Valerie Logan recently has introduced the concept of “information as a second language” (ISL). No surprise, ISL parallels the kind of challenges and training afforded to non-native speakers in the U.S. under the moniker “English as a Second Language” (ESL). Logan’s ISL idea is a fantastic one and still being developed.

Although rectifying our sloppy or geeky information vernacular can help with communicating throughout the organization, to manage information as an actual asset, we still have a lot to learn from other disciplines. In the next chapter we’ll investigate other well-honed, well-articulated, and reasonably well-understood forms of asset management to see what we might borrow from these disciplines to improve and extend information asset management (IAM) capabilities.

Notes

1 “What is a supply chain,” Canadian Supply Chain Sector Council, http://www.supplychaincanada.org/assets/u/HandoutWhatisaSupplyChain.pdf, accessed 14 May 2017

2 “Supply Chain Operations Reference Model, Revision 11.0,” Supply Chain Council, 2012, http://docs.huihoo.com/scm/supply-chain-operations-reference-model-r11.0.pdf.

3 Attributed quote, est. 1988.

4 In fact, he did. In the book The Art of War Sun Tzu is quoted as saying: “The general who wins the battle makes many calculations in his temple before the battle is fought. The general who loses makes but few calculations beforehand.”

5 Andy Roswell-Jones, Jan-martin Lowendahl, Chris Howard, and Tomas Nielsen, “The 2017 CIO Agenda: Seize the Digital Ecosystem Opportunity,” Gartner, 14 October, 2016, www.gartner.com/document/3478517.

6 “Ecosystem”, dictionary.com, accessed 14 May 2017

7 The Gaia hypothesis is the idea that the Earth is a single living entity. James Hutton (1726–1797), the father of geology, once described the Earth as a kind of superorganism. Later, in 1979 James Lovelock defined Gaia as “a complex entity involving the Earth’s biosphere, atmosphere, oceans, and soil; the totality constituting a feedback or cybernetic system which seeks an optimal physical and chemical environment for life on this planet.” (ref: “The Earth Is a Sentient Living Organism,” The Mind Unleashed Website, 15 May 2014, http://themindunleashed.com/2014/05/earth-sentient-living-organism.html).

8 Peter Sondergaard, “Big Data Fades to the Algorithm Economy,” Forbes, 14 August 2015, www.forbes.com/sites/gartnergroup/2015/08/14/big-data-fades-to-the-algorithm-economy/.

9 With apologies to quantum physicists and information theorists who have proven that information in the purest form can never be created.

10 Roger Williams, email to author, 03 January 2017.

11 Robert E. Ulanowicz, A Third Window: Natural Life Beyond Newton and Darwin (Templeton Foundation Press, 2009).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.16.184