Search
Subscribe

Bookmark and Share

About this Blog

As enterprise supply chains and consumer demand chains have beome globalized, they continue to inefficiently share information “one-up/one-down”. Profound "bullwhip effects" in the chains cause managers to scramble with inventory shortages and consumers attempting to understand product recalls, especially food safety recalls. Add to this the increasing usage of personal mobile devices by managers and consumers seeking real-time information about products, materials and ingredient sources. The popularity of mobile devices with consumers is inexorably tugging at enterprise IT departments to shifting to apps and services. But both consumer and enterprise data is a proprietary asset that must be selectively shared to be efficiently shared.

About Steve Holcombe

Unless otherwise noted, all content on this company blog site is authored by Steve Holcombe as President & CEO of Pardalis, Inc. More profile information: View Steve Holcombe's profile on LinkedIn

Follow @WholeChainCom™ at each of its online locations:

Entries in VRM (9)

Wednesday
Jul112012

The Tipping Point Has Arrived: Market Incentives for Selective Sharing in Web Communications

By Steve Holcombe (@steve_holcombe) and Clive Boulton (@iC)

A Glimmer of Market Validation for Selective Sharing

In late 2005 Pardalis deployed a multi-tenant, enterprise-class SaaS to a Texas livestock market. The web-connected service provided for the selective sharing of data assets in the U.S. beef livestock supply chain.  Promising revenues were generated from a backdrop of industry incentives being provided for sourced livestock. The industry incentives themselves were driven by the specter of mandatory livestock identification promised by the USDA in the wake of the 2003 "mad cow" case.

At the livestock market thousands of calves were processed over several sessions. Small livestock producers brought their calves into the auction for weekly sales where they were RFID tagged. An affordable fee per calf was charged to the producers which included the cost of a RFID tag. The tags identifiers were automatically captured, a seller code was entered, and affidavit information was also entered as to the country of origin (USA) of each calf. Buyers paid premium prices for the tagged calves over and above untagged calves. The buyers made money over and above the affordable fee per calf.  After each sale, and at the speed of commerce, all seller, buyer and sales information was uploaded into an information tenancy in the SaaS that was controlled by the livestock market. For the first time ever in the industry, the livestock auction selectively authorized access to this information to the buyers via their own individual tenancies in the SaaS.

That any calves were processed at all was not possible without directly addressing the fear of information sharing that was held by both the calf sellers and the livestock market. The calf sellers liked that their respective identities were selectively withheld from the calf buyers. And they liked that a commercial entity they trusted – the livestock market – could stand as a kind of trustee between them and governmental regulators in case an auctioned calf later turned out to be the next ‘mad cow’. In turn the livestock market liked the selectiveness in information sharing because it did not have to share its confidential client list in an “all or nothing” manner to potential competitors on down the supply chain. At that moment in time, the immediate future of selective sharing with the SaaS looked very bright. The selective sharing design deployed by Pardalis in its SaaS fixed data elements at a single location with authorizations controlled by the tenants. Unfortunately, the model could not be continued and scaled at that time to other livestock markets. In 2006 the USDA bowed to political realities and terminated its efforts to introduce national mandatory livestock identification.

And so, too, went the regulatory-driven industry incentives. But … hold that thought.

Talking in Circles: Selective Sharing in Google+

Google+ is now 1 year old. In conjunction with Google, researchers Sanjay Kairam, Michael J. Brzozowski, David Huffaker, and Ed H. Chi have published Talking in Circles: Selective Sharing in Google+, the first empirical study of behavior in a network designed to facilitate selective sharing:

"Online social networks have become indispensable tools for information sharing, but existing ‘all-or-nothing’ models for sharing have made it difficult for users to target information to specific parts of their networks. In this paper, we study Google+, which enables users to selectively share content with specific ‘Circles’ of people. Through a combination of log analysis with surveys and interviews, we investigate how active users organize and select audiences for shared content. We find that these users frequently engaged in selective sharing, creating circles to manage content across particular life facets, ties of varying strength, and interest-based groups. Motivations to share spanned personal and informational reasons, and users frequently weighed ‘limiting’ factors (e.g. privacy, relevance, and social norms) against the desire to reach a large audience. Our work identifies implications for the design of selective sharing mechanisms in social networks."

While selective sharing may be characterized as being available on other networks (e.g. ‘Lists’ on Facebook), Google is sending signals that making the design of selective sharing controls central to the sharing model offers a great opportunity to help users manage their self-presentations to multiple audiences in the multi-tenancies we call online social networks. Or, put more simply, selective sharing multiplies opportunities for online engagement.

For the purposes of this blog post, we adopt Google’s definition of "selective sharing" to mean providing information producers with controls for overcoming both over-sharing and fear of sharing. Furthermore, we agree with Google that that the design of tools for such selective sharing controls must allow users to balance sender and receiver needs, and to adapt these controls to different types of content. So defined, we believe that almost seven years since the Texas livestock market project, a tipping point has been reached that militates in favor of selective sharing from within supply chains and on to consumers. Now, there have been a lot of things happen over the last seven years that bring us to this point (e.g., the rise of social media, CRM in the Cloud, the explosion of mobile technologies, etc.). But the tipping point we are referencing "follows the money", as they say. We believe that the tipping point toward selective sharing is to be found in the incentives provided by affiliate networks like Google Affiliate Networks.

Google Affiliate Networks

Google Affiliate networks provide a means for affiliates to monetize websites. Here’s a recent video presentation by Google, Automating the Use of Google Affiliate Links to Monetize Your Web Site:


Presented by Ali Pasha & Shaun Cox | Published 2 July 2012 | 47m 11s

The Google Affiliate Network provides incentives for affiliates to monetize their websites based upon actual sales conversions instead of indirectly based upon the number of ad clicks. These are web sites (e.g., http://www.savings.com/) where ads are the raison d'etre of the web site. High value consumers are increasingly scouring promotional, comparison, and customer loyalty sites like savings.com for deals and generally more information about products. Compare that with websites where ads are peripheral to other content (e.g., http://www.nytimes.com/) and where ad clicks are measured using Web 2.0 identity and privacy sharing models.

In our opinion the incentives of affiliate networks have huge potential for matching up with an unmet need in the Cloud for all participants - large and small - of enterprise supply chains to selectively monetize their data assets. For example, data assets pertaining to product traceability, source, sustainability, identity, authenticity, process verification and even compliance with human rights laws, among others, are there to be monetized.

Want to avoid buying blood diamonds? Go to a website that promotes human rights and click on a diamond product link that has been approved by that site. Want to purchase only “Made in USA” products? There’s not a chamber of commerce in the U.S. that won’t want to provide a link to their members’ websites who are also affiliates of an incentive network. Etc.

Unfortunately, these data assets are commonly not shared because of the complete lack of tools for selective sharing, and the fear of sharing (or understandable apathy) engendered under “all or nothing” sharing models. As published back in 1993 by the MIT Sloan School in Why Not One Big Database? Ownership Principles for Database Design: "When it is impossible to provide an explicit contract that rewards those who create and maintain data, ‘ownership’ will be the best way to provide incentives." Data ownership matters. And selective sharing – appropriately designed for enterprises – will match data ownership up with available incentives.

Remember that thought we asked you to hold?

In our opinion the Google Affiliate Network is already providing incentives that are a sustainable, market-driven substitute for what turned out to be unsustainable, USDA-driven incentives. We presume that Google is well aware of potential synergies between Google+ and the Google Affiliate Network. We also presume that Google is well aware that "[w]hile business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself (as well as the integration with the abundance of other information sources) is still a major challenge."

We know this is a "big idea" but in our opinion the dynamic blending of Google+ and the Google Affiliate Network could over time bring within reach a holy grail in web communications – the cracking of the data silos of enterprise class supply chains for increased sharing with consumers of what to-date has been "off limits" proprietary product information.

A glimpse of the future may be found for example in the adoption of Google+ by Cadbury UK, but the design for selective sharing of Google+ is currently far from what it needs to attract broad enterprise usage. Sharing in Circles brings to mind Eve Maler’s blog post, Venn and the Art of Data Sharing.  That’s really cool for personal sharing (or empowering consumers as is the intent of VRM) but for enterprises Google+ will need to evolve its selective sharing functionalities. Sure, data silos of commercial supply chains are holding personal identities close to their chest (e.g., CRM customer lists) but they’re also walling off product identities with every bit as much zeal, if not more. That creates a different dynamic that, again, typical Web 2.0 "all or nothing" sharing (designed, by the way, around personal identities) does not address.

It should be specially noted, however, that Eve Maler and the User-Managed Access (UMA) group at the Kantara Initiative are providing selective sharing web protocols that place "the emphasis on user visibility into and control over access by others".  And Eve in her capacity at Forrester has more recently provided a wonderful update of her earlier blog post, this one entitled A New Venn of Access Control for the API Economy.

But in our opinion before Google+, UMA or any other companies or groups working on selective sharing can have any reasonable chance of addressing "data ownership" in enterprises and their supply chains, they will need to take a careful look at incorporating fixed data elements at a single location with authorizations. It is in regard to this point that we seek to augment the current status of selective sharing. More about that line of thinking (and activities within the WikiData Project) in our earlier “tipping point” blog post, The Tipping Has Arrived: Trust and Provenance in Web Communications.

What do you think? Share your conclusions and opinions by joining us at @WholeChainCom on LinkedIn at http://tinyurl.com/WholeChainCom.

Friday
Apr202012

Pardalis announces issuance of Canadian patent

April 20, 2012 — Pardalis, Inc. announced today the issuance of the following patent by the Canadian Intellectual Property Office:

  • Informational Object Authoring and Distribution System, Patent No. CA 2457936 issued February 28, 2012.

The issuance of this patent represents another milestone in the continued, global expansion of Pardalis' same-named parent patent, U.S. Patent No. 6,671,696, and its continuation patents and applications.

The Pardalis 696 Patent was issued by the United States in 2003 and is also entitled Informational object authoring and distribution system. Pardalis' 696 patent is the parent patent for the Common Point Authoring™ system.

The critical means and functions of the Common Point Authoring™ system are directed to a system in which a creator can create data which is then fixed (immutable) and users can access that immutable data but cannot change it. They provide for user-centric authoring and registration of radically identified, immutable objects for further granular publication, by the choice of each author, among networked systems. The benefits of CPA include minimal, precise disclosures of personal and product identity data to networks fragmented by information silos and concerns over 'data ownership'.

“Australia, Canada, China, Hong Kong, India, Mexico, New Zealand and, of course, the United States are the countries that have so far issued one or more patents to Pardalis,” said Steve Holcombe, Pardalis’ CEO. “We also have high expectations for similar actions on our applications pending in Brazil, Europe and Japan.”

About Pardalis, Inc.

Pardalis' Common Point Authoring™ system provides an object-oriented solution for introducing trust and provenance in web communications. For more information, see Pardalis' Global IP.

Friday
Aug052011

A New Way of Looking at Information Sharing in Supply & Demand Chains

The Internet is achieved via layered protocols. Transmitted data, flowing through these layers are enriched with metadata necessary for the correct interpretation of the data presented to users of the Web. Tim Berners-Lee, inventor of the Web says, “The Web was originally conceived as a tool for researchers who trusted one another implicitly …. We have been living with the consequences ever since ….” “[We need] to provide Web users with better ways of determining whether material on a site can be trusted ….”

Our lives have nonetheless become better as a result of Web service providers like Google and Facebook. Consumers are now conditioned to believe that they can – or should be able to - search and find information about anything, anytime. But the service providers dictate their quality of service in a one-way conversation that exploits the advantages of the Web as it exists. What may be considered trustworthy content is limited to that which is dictated by the service providers. The result is that consumers cannot find real-time, trustworthy information about much of anything.

Despite all the work in academic research there is still no industry solution that fully supports the sharing of proprietary supply chain product information between “data silos”. Industry remains in the throes of one-up/one down information sharing when what is needed is real-time “whole chain” interoperability. The Web needs to provide two-way, real-time interoperability in the content provided by information producers. Immutable objects have heretofore been traditionally used to provide more efficient data communications between networked machines, but not between information producers. Now researchers are innovatively coming up with new ways of using immutable objects in interoperable, two-way communications between information content providers.

A New Way of Looking at Information Sharing in Supply & Demand chains

Pardalis’ protocols for immutable informational objects make possible a value chain of two-way, interoperable sharing that makes information more available, trustworthy, and traceable. This, in turn, incentivizes increases in the quality and availability of new information leading to new business models.

Tuesday
Mar012011

Real-time, supply chain test marketing of new product lines 

Assume that a retailer, a class of beef product pre-retailers (i.e., wholesalers, processors and vertically integrated operators), and a class of consumers are all multi-tenant members of a centralized personal data store for sharing supply chain information.

I gave an example of a multi-tenant Food Recall Data Bank in an earlier blog entitled Consortium seeks to holistically address food recalls. At the time I wrote this earlier blog I vacillated between calling it what I did, or calling it a VRM Data Bank. I refrained from calling it the latter because while the technology application is potentially very good for consumers (i.e., food recalls tied to point of sale purchases) it still felt too much like it was rooted in the world of CRM. For more about the VRM versus CRM debate see The Bullwhip Effect.

Below is a technology application whereby supply chain tenants may register their CPA informational objects with permissions and other instructions for how those objects may be minimally accessed, used and further shared by and to other supply chain participants. What one then has is what may more appropriately be called a VRM Data Tenancy System (VRM DTS).

So what can one do with this architecture? How can it get started in the marketplace of solutions? A reasonable beginning point is with real-time, supply chain test marketing of new food product lines. And by supply chain test marketing, I mean something clearly more than just consumer test marketing. What I am describing below is multi-directional, feedback loop for:

  1. test marketing a new consumer product line for the purpose of driving retail sales, and
  2. concurrently generating procurement and wholesale interest and support from pre-retailers.

Assume that a retailer has been receiving word of mouth consumer interest in a particular beef product class (e.g., "ethically raised" beef products). Assume that pre-retailers have heretofore not been all that interested in raising, processing or purchasing "ethically raised" meat products for wholesale.

An initial "test market" object is authored and registered by the retailer for polling consumer interest via asynchronous authoring by individual consumers of their store outlet preferences, likely beef product quantity purchases of the new product line per week, etc. This object is revealed to a consumer class via their tenancies in the VRM DTS. The object is concurrently revealed to a class of pre-retailers via their tenancies, too. Each consumer is anonymous to the other consumers, and anonymous to the pre-retailers. Each pre-retailer is anonymous to the other pre-retailers, and anonymous to the consumers. But each consumer, as is each pre-retailer, is nonetheless privy to the consumers' real-time poll and the pre-retailers' real-time poll. The retailer watches all, being privy to the actual identities of both consumers and pre-retailers, while at the same time the retailer’s customer and pre-retailer client lists remain anonymous.

With this kind of real-time sharing of information, one can begin to imagine a competitive atmosphere arising among the pre-retailers. Furthermore, there is no reason the retailer's object could be further authored by the retailer to solicit real-time offers from the pre-retailers to procure X quantities of the beef products for delivery to identified outlets of the retailer by dates certain, in the same specific beef product class, etc. And there's no reason the "test market" object could not be further used to finalize a procurement contract with one or more pre-retailers ...

... which at the moment of execution shares real-time, anonymized information over to consumers as to dates of delivery of X quantity of beef products at identified retail outlets.

The "test market" object could be further designed for the consumer class to asynchronously provide real-time feed-back to the retailer regarding their experiences with the purchased product, and to perhaps do so even back to the pre-retailers based upon GLNs and GTINs. Depending on the retailer's initial design of the "test market" object, this consumer feedback to pre-retailers may be anonymous or may specifically identify a branded product. And, because food safety regulators are seeking "whole chain" traceability solutions, the government can be well apprised with minimal but real-time disclosures.

The dynamic business model for employing a VRM DTS includes greater supply chain transparency (increased, ironically, with consumer and pre-retailer anonymity), food discount incentives, real-time visualizations, new data available for data mining, and new product outlets for pre-retailers who have not previously provided products to the retailer. Perhaps most significantly there is the identification by the retailer of best of breed pre-retailers and loyal, committed consumers via an “auction house” atmosphere ...

 

... created from the sharing of real-time, sometimes anonymous information, between and among the pre-retailers and consumers.

Saturday
Jan222011

The Bullwhip Effect (Part III)

Return to Part II.

The writing is on the wall. The writing is on the Facebook Wall, like it was on the Berlin Wall. Only this time the writing is in real-time. The is in the real-time that it takes to save a life or protect an innocent company from bankruptcy by suspicion. From bankruptcy by the Bullwhip Effect.

Ironically, it won't be the really bad guys who are caught in real-time. You know, the ones who commit out and out fraud. Instead, It will be the companies who really are trying to play by the rules. Who are doing their best to keep the trust of their suppliers and their customers. But even those good companies who are caught up in a recall will benefit from the elimination or reduction of deaths, sicknesses and legal liabilities that would otherwise occur under the good 'ol one-up/one-down paradigm. Instead of hundreds or thousands of people becoming sick from a pepper salmonella contamination over a period of months, flattening out the Bullwhip Effect will mean that significantly fewer people will be sickened before the government regulators react with real-time information at their finger-tips. 

As an attorney who has had a fair amount of jury trial experience, I find myself wondering what a jury of Facebook users would think about questions like these in determining a food company's liability?

  • Could the company have responded in real-time to the food safety incident?
  • Did the company take full advantage of real-time technologies for providing food security for its customers?
  • Was the company a good corporate citizen or did it recklessly ignore real-time technologies to the detriment of its consumers’ health? 

Actually, it's not inconceivable that a jury comprised entirely of users of social media (Facebook, Twitter, etc.) would be seated even today. I wonder how much ag and food companies have thought about that? It may even now be almost impossible for their attorneys to avoid juries who in their daily lives are reading the real-time writing on the Facebook Wall. But the companies who early adopt and bring forth VRM and whole chain traceability will be the companies who will benefit even if they end up in court. At least they will be able to look the jury in the eye and say, "We acted as good corporate citizens with the best available real-time technology. We saved lives that might otherwise have been lost. We played by the rules and we didn't try to bend them."

But the fraud-committing bad guys, they'll surely run the greater risk of being bankrupted into oblivion.

Juries rest at the foundation of democracy here in the U.S. They give voice to the voiceless. They send messages (i.e., verdicts and liability judgments) out to our society that are often heard as clearly as if the President had signed significant Congressional legislation. They're not real-time messages but sometimes they kind of feel like it because they often seem to come out of nowhere.

 A few years ago I prosecuted a prisoner for escaping from a penitentiary. He wasn't a bad guy in a violent sense. In fact, he wasn't violent at all. He was a middle-aged, property thief who was a kind of 'nice guy' among bad guys. The prison warden even designated him as a trustee so that he could work on the farm outside of the walls of the Big House. At least until he tried to escape at all of about 15 mph (24 kph) on a farm tractor. It didn't take long to catch him.

The prosecution of escape cases rarely go to trial because, well, what's the point? I offered the prisoner's attorney the minimum sentence of 2 additional years to do just so we wouldn't have to pick a jury but he said that his client wanted a trial. What? Huh? Why? "He wants a trial and I don't know why," the attorney said with a shrug. He was as perplexed as I was. Both of us knew that the prisoner risked receiving the maximum of 7 additional years in prison for making the judge and members of the jury go through an unnecessary procedure. That is, for wasting everybody's times.

So one afternoon the prisoner was transported over from the Big House to the courthouse. We picked a jury. I rested my case. The prisoner took the witness stand. He swore to tell the truth. His attorney asked him to tell his story. The prisoner said, "I escaped".

There is a tenet among trial lawyers that you should never ask a question that you don't know the answer to. I didn't have to ask the prisoner a question at all. He was going to be convicted. He knew he was going to be convicted. The jury's decision was made for them. There was no need for deliberation. The jury members were relieved that they would all be home well before dinner. But I had to ask him because I genuinely wanted know, "Why have we gone through this process of picking a jury and conducting a trial when you admit straight up to escaping?"

"I've been in and out of prison my whole life," the prisoner said. "The 5 or 6 times that I've been put back in prison was because whomever my attorney was at the time told me to plead guilty. I always did what I was told. This time, I wanted to do it my way. I wanted my day in court. I wanted to be heard. I escaped ... but now I have had my day in court. That's all I wanted."

The jury was touched. There was even a knowing smile or two in the jury box. They quickly came back with a verdict - the 2 year minimum that I had offered to begin with. The prisoner went back home to his cell in the Big House that night with a smile on his face. He had had his day in court. A jury of his peers had actually listened to him. And heard him.

 I was touched, too. It was one of those teachable moments that we find ourselves surprisingly carrying with us, and from time to time reflecting upon. People want to be heard. People don't want to be managed into "doing the right thing" and muzzled in the process. Even in a losing effort. The need to be heard is a powerful human need. That's the bull's-eye that VRM is aiming to hit. It's the right target.

I began this three part series of journal entries referencing comments that Frank Yiannas made at the second annual meeting of the Arkansas Association of Food Protection. He said something else that I hadn't mentioned. He said that when he first took on the food safety position at Walmart that their marketing department wanted to broadcast the message that food safety was now a priority at Walmart. Yiannas said that - to the surprise of the marketing folks - he nipped that at the bud. His reason? Food safety is not a priority because ... priorities change. Food safety is a commitment ... and commitments don't change.

If we can just get VRM and whole chain traceability connected with Yiannas' corporate philosophy of food safety committment, there will be a whole lot more customers feeling like they are able to do it their way with companies who are truly acting as good corporate citizens in a real-time world. Lives will be saved. Customer loyalty will be increased. Liability risks for companies and industries will be eliminated or reduced. Lots of money will be made.* And maybe, just maybe, the global trust bust - identified as being real by the largest retailer in the world - will begin to fade away.

 

This is the third and final part of a three part journal entry. Feel a need to comment? Please do so at Data Ownership in the Cloud on LinkedIn.

________________________________

* And kept from the hands of the dreaded trial lawyers! :-) Like Bill Marler says, "Put me out of business - please!"