Megan Flinders
Module 5
Triple Convergence is the culmination of the flattened, global playing field which allowed many more individuals to pitch in on process improvement and efficiencies, the subsequent result of horizontal value creation instead of vertical means, and the previously untapped resources of individuals from China, India and the former Soviet Union. In the book, Friedman divides Triple Convergence up into three categories to fully define his mode of thinking.
The first convergence was the availability of resources (hardware, software, individual empowerment) that simply allowed more people to voice their opinions to improve processes. Friedman gives the example of Southwest and their online booking and check-in process which is meant to illustrate how customers are no longer dependent on people and systems for each step of the process. Once who has access to a PC which is connected to the web can now technically do a lot of work, in this case for the airline, in booking, checking-in and printing boarding passes (or now having the pass on their phone). This ultimately saves consumers time and reduces overhead. The end results, improved efficiencies and happier parties on both sides!
The second convergence can be summed up on one word, “horizontalization”. Simply put, many of the flatteners have been around for some time. But when you are introducing revolutionary ideas, it takes time to bring all aspects of the movement into play. The production piece is only a part. Often consumers also have to change habits and mindsets. As more and more people and business become involved, however, these new trends become the new norms.
The last, or third convergence, was basically the broadening of the playing field which allowed billions of more people to join in on the globalization of process change and improvement. The goal is to have the best and brightest making systems and products which everyone can use. With the proper tools for communication and collaboration in place, we continue to see massive improvements across all sectors.
Friedman fully admits that in the story of India and Indiana, it is hard to determine who the exploiter is really and who is being exploited. He mentions that it could be the Indian Engineers who are exploiting the people of Indiana by revamping their governmental unemployment system for cheap. Or it could be the Indian engineers themselves who are being exploited for being paid less for the specific contract. It could also be the Indian’s in general are being exploited by the big firms for which they are paid relatively well in terms of the standard of living in India
I believe that the latter is true. The companies that outsource for the sole purpose of lowering wages are the true exploiters. It is one thing to build factories in low cost areas or have people working remotely as part of the broader, global footprint with an aim to reduce overhead costs. It is another to hire and train those individuals, and then transplant them to the new location on a lower pay scale. Companies are focused on the bottom line, and will often pay their employees what they “need” to pay them to stay.
Intellectual property is the sum of resources, ideas, and know-how related to a product or process. The idea is very important for companies because they want to keep all of the financial benefits of innovation. Once these “top secret” ideas become common knowledge, products can easily be duplicated for cheap and the intellectual property is far less valuable. On the flip side, however, intellectual property is also the catalyst behind faster and more efficient innovation. Barriers of entry, of walls to information need to be set at a proper level to allow for global innovation, but also allow companies to gain profits and reap the rewards of their efforts.
Saturday, September 27, 2014
Saturday, September 20, 2014
Module 4
Megan Flinders
Module 4
Can You Hear Me Now?
For
this assignment I researched cybersecurity jobs and interviewed my husband who works
in the field (he is responsible for helping clients at his work who run into
issues with all sorts of fraud and identity theft related incidents). I also chose this specific topic due to the
several recent stories in the news about big companies with cybersecurity
incidents including Target and Home Depot.
What I found in reading several articles on the topic was a central
theme of people being defrauded.
Sometimes companies had system vulnerabilities or weaknesses that went
unnoticed for long periods of time, and many customer’s information was
unintentionally shared. Other times
individuals did not know the party with which they were communicating was in
fact the fraudster. In the end, Verizon’s
catchy theme of “Can you hear me now?” all of the sudden had a new meaning to
me. With whom are we really
communicating, and are these the parties with which we want to share our
confidential information?
In
my research I came across several types of cyber security jobs. The jobs ranged from Security Analysts and
Engineers who asses the vulnerabilities of software, hardware, and networks and
engage in forensic analysis to detect security incidents (which is what my
husband deals with), to those of Cryptanalysts and Cryptographers who analyze and
break malicious code to determine the intent of the program or build programs
which use complex algorithms to encrypt information. There are also Chief Information Officers who
are responsible for the entire Information Security operation all the way down to
very specialized analysts who work directly with specific systems or issues.
I also came across
all sorts of fraud that occurs due to the vast network of computers and
information. We have been reading and
discussing in “The World is Flat” all of the different ways globalization has
flattened information barriers and increased the connectivity of people. Most of the discussion revolves around the
positives of information sharing and popular technological enhancements such as
online libraries for music, photo libraries, and mass storage. However, with all of the positives come some
negatives. There are those people who
not only want to share productive forms of information and entertainment, but
those who wish to spread viruses, malware and other harmful, and mostly
unwanted products. This is where
cybersecurity comes to the forefront.
Most
companies have an IT department that focuses on the security of their company’s
network. My husband described in my
interview the fact that this goes above and beyond simply anti-virus software
and computer firewalls. He mentioned
that his work often goes through testing scenarios to detect certain
vulnerabilities in their systems and to also fortify the policies and
procedures to protect their employees and clients from acts of fraud. The difficult part, he said, not only keeping
up with the new trends and hacking attempts, but trying to be one step ahead. He mentioned that his work has dedicated
teams that focus on all areas of cybersecurity prevention and remediation.
Several
resources are available for everyday people to educate themselves on the
different forms of fraud and how to protect oneself from becoming a
victim. OnGuardeOnline.gov is a site my
husband directed me to that aims to educate about cybersecurity. It lists ways to avoid scams, protect your
kids online, and securing your computer to name a few. I think for most people my age and younger,
most of this stuff is pretty inherent.
My parent’s generation may not be quite as savvy though, so these
broad-based tips would help them greatly.
I did, however, find information and articles that were even helpful to
me in explaining how to properly secure a network and computer. After all, the last thing I want is to be
giving my credit card number or other personal information to a fraudster through
a phishing scheme or virus of some sort.
In
the end, cybersecurity is only going to continue to increase in importance as
more people and their devices become interconnected through our ever flattening
world. It is vital to stay up to date on
the latest prevention techniques and to be sure our information is secure with all
those whom we are communicating.
Saturday, September 13, 2014
Module 3
There are those words in the English
language which create immediate reactions; one of those is outsourcing. A somewhat related, yet I would argue less frequently
used term, is offshoring. Friedman
describes outsourcing as, “taking some specific, but limited, function that
your company was doing in-house – such as research, call centers, or accounts
receivable – and having another company perform that exact same function for
you and then reintegrating their work back into your overall operation. Offshoring, by contrast, is when a company
takes one of its factories that it is operating in Canton, Ohio, and moves the
whole factory offshore to Canton, China.
There it produces the same product in the very same way, only with
cheaper labor, lower taxes, subsidized energy, and lower health-care costs.” (Friedman, 2007,
pp. 137-138)
China joining the WTO took the world to a whole new level of offshoring just as
Y2K boosted India’s prospects of outsourcing and made the country a relevant
and dynamic player in the global workplace.
While reading the text, I gained a
greater appreciation of the concept of offshoring when Friedman described
China’s demographic of over 160 cities with a population over 1 million. This concept alone allows companies to
offshore factories and manufacturing as never before due to the sheer size of
its workforce. It is no wonder it seems
that a large majority of products are “made in China”.
A great illustration from the book
outlines the fact that companies must alter their vision and forget about competing
with China and treating them as the enemy.
Instead, you should give a good internal look at your business model to
determine which part of the business you would like to do in China, which part
you would like to sell to China, and which part you want to buy from China.
This just shows how flat the world has truly become since as China becomes a
more important player due to offshoring, other similar countries emerge as
potential offshoring destinations.
Another flattening topic introduced
is that of logistical efficiencies. A
supply chain is the mechanism used to allow products to flow downstream from a manufacturer/supplier
to customer. Wal-Mart has used their
supply chain to their advantage by driving a hard bargain with manufacturers,
but also by creating a super-efficient process and technological web with the
companies whose product they sale, and in turn with their own stores which are
spread across the nation. In effect, Wal-Mart does not create any
products. However, they are such a
dominant force in the retail world because of their expansive reach (in terms
of store locations, products offered, and low costs) and overall efficiencies
in technology (which allows them to quickly forecast and restock stores to
ensure customer demand is fulfilled). As
noted in the text, the goal of an efficient supply chain is to be the overall
lowest cost. Not always, however, can
you find a low cost leader that offers high quality products, delivery, and
customer service in every facet. So
while price is important, the overall efficiency and low cost leader is what
Wal-Mart has done to gain its competitive advantage.
One particular illustration in
Wal-Mart’s case is its visibility into each store’s particular needs. For example, if one particular store is
overstocked, Wal-Mart can quickly have excess product orders redirected to
stores that may be short on stock. This
ensures the company is not losing the product forecasting battle which often
results in sales on excess products.
Wal-Mart in turn allows its suppliers to view how their products are
selling through its central databases, all in an effort to have hyper-efficient,
just-in-time, inventories and supply chains.
Google is another company that has
revolutionized the playing field for businesses. Google has flattened the information barrier
by allowing anyone with an internet connection to search for and find the same
overall research information on any given topic. Google has affected business by allowing the
process of “informing.” Anyone can
create the know-how to run a business, outsource, and have an efficient supply
chain (through connectivity with globally established companies as Friedman
describes in UPS’ case) by simply “googling” the information. People want, and have, all the information
they can digest at their fingertips. No
longer are people spending time searching for the material. On the contrary, the information is readily
available and business owners large and small can focus on ideas and innovation
instead of utilizing resources on the information finding.
Saturday, September 6, 2014
Module 2
As we continue the
discussion of globalization and find examples of a flattening world, we are
introduced to the idea of workflow software. Once the playing field was leveled in terms of the accessibility
of the internet and connectivity of computers and systems (through physical
infrastructure such as fiber optic cables and standardized systems), workflow
software standardized the software applications enabling all systems to speak
to each other in an efficient manner.
The result was seamless workflows which allowed companies to not focus
on the pipes per se, but on the innovation of new products that would make
markets more efficient. The standard of
access became the same, but companies still had to produce and innovate to create
a compelling product and competitive advantage, all the while aiming to entice
customers to use their product over the competition.
An example of the
use of workflow software would be the use of the mobile wallet; or more
specifically, ISIS. The electronic payment
system in the standard bearer for retail companies, and credit/debit cards are
a primary source of transactions. The
mobile wallet has enhanced the speed and potential security of the payment
system by allowing consumers to retain their source of funds on the phone. The workflow software includes the tap
technology and card reader that is now in many restaurants and has even spilled
over the vending machines. Payments and
quick and efficient for both parties.
Friedman goes on to
explain that innovation and software can come to market from a variety of
sources, but some may be more effective than others, even when they challenge
the status quo. Open source, or community developed
software, is when communities of people collaborate and develop source code (software)
that is then uploaded to the web and often made free for downloadable use. This type of software is important because it
continues the idea of flattening the competitive landscape and cuts out the
middle man. It changes the landscape by allowing
more people to voice their opinions and share creative ideas and innovation
through collaboration and “peer review”.
Community developed
software is basically a more efficient way to streamline software on a broader
scale by bypassing the historical hierarchical processes and organizations. Ultimately the brainpower of a community of
thousands of geeks who simply want to create universally functional products is
better than a large company’s IT group trying to create a product to sell. We have seen a mass movement in the past
decade of IT companies and their engineers actually joining these groups as
they have seen the power of individuals who simply seek to create the best
products. The community forums are not
so much about being compensated, but about sharing their ideas and seeing them
take off. Ultimately whoever has the
best idea can submit source code which is reviewed by their peers for any bugs
before being implemented. Companies have
taken the free code and established proprietary and innovative products based
off what the community has built, but ultimately original credit is given to
the forum and the idea sharing process continues.
The last major
topic discussed is the concept of reaping the highest profits and efficiencies
while paying the lowest cost. The practice known as outsourcing is the
cost saving practice of delegating certain functions to lower cost
locations. Outsourcing is important
because it connects and flattens the world as never before. No longer is it required to be physically
present in one location to complete tasks.
For example, many back-office type functions that need not be present in
high cost locations can be shipped to lower cost centers, such as India. The key is to find a highly educated and
competent work force which can perform these functions without error for a
fraction of the cost. An additional benefit
is the time zone effect which allows most of this work to “follow the sun”,
meaning it can be completed oversees during the day when the main centers
(U.S.) are sleeping.
In summary,
workflow software, open source software, and outsourcing are additional proofs
of how the world has continued to be flattened. You no longer have to by an Ivy
League grad employed by a large corporation to have your ideas input in the programs
and products we use every day. On the
contrary, you can be a part-time “geek” who simply shares ideas to the global community
from your home computer. Indeed the
world has been flattened and minority voices are now at the forefront of
innovation.
Subscribe to:
Posts (Atom)