Tag: reputation

  • Strategic Sourcing?

    Strategic Sourcing?

    Is outsourcing software development strategic or simply a cost saving method?

    It Depends

    The most infamous words in software development.  Yes, it depends on the task at hand, but this cop out has long been a way to forego the development of a robust economic value and risk assessment.

    According to one vendor, “Engineering started becoming a commodity.”  But is this true if your product and organizational reputation are based on the long-earned perception that your organization provides the very best in safe and cost-effective solutions?

    What is your solution must work all the time, every time, e.g. medical equipment?  The list goes on, but readers get the point.

    Strategic Sourcing

    According to CIPS, the Chartered Institute of Procurement & Supply, “Strategic sourcing is about having a targeted approach to your procurement activity.  A sourcing strategy will help you to formalise the way you gather information, so you can find the best possible value that aligns with your organisation’s goals, long term.  Strategic sourcing is a long-term process and requires continuous re-evaluation of sourcing activities, analysis of the market and recognising your organisations goals.

    Strategic sourcing is important because it can help you save costs through the monitoring of the market and sourcing the right suppliers.  It also acts as a way to maintain long-term relationships with suppliers and they are selected on their compatibility with your organisation’s goals.”

    While strategic sourcing has its value, it cannot replace organization core competency.  These are two very different business requirements.

    Core Competency

    From One definition, “core competencies refer to the capabilities, knowledge, skills and resources that constitute its defining strengths.  Core competencies distinguish a company from other organizations and are, therefore, not easily replicated by those organizations, whether they’re existing competitors or new entrants into its market.”

    Not all engineering meets the test of core competency, but management must perform proper ‘due diligence’ before outsourcing technology and processes that either do or might meet this test.  In other words, effective Risk Profiling.

    Max 8 Headlines, Again

    The once storied aerospace firm, Boeing just can’t seem to catch a break.  A self-made purgatory: the gift that keeps on giving.  Offshoring engineering software development as a cost saving method appears to have backfired.

    Damningly, Multiple investigations – including a Justice Department criminal probe – are trying to unravel how and when critical decisions were made about the Max’s software.  During the crashes of Lion Air and Ethiopian Airlines planes that killed 346 people, investigators suspect, the MCAS system pushed the planes into uncontrollable dives because of bad data from a single sensor.

    That design violated basic principles of redundancy for generations of Boeing engineers, and the company apparently never tested to see how the software would respond, Lemme said.  “It was a stunning fail,” he said.  “A lot of people should have thought of this problem – not one person – and asked about it.”

    To this observer, it appears that this software met the test for core competency.  If this is the case, why would this be outsourced to save a few bucks?  It certainly appears to be outside the organization’s culture of redundancy that has served the organization well for decade.  A third-party vendor most likely would not share this cultural trait.

    How does your organization handle Bet Your Company procurement decisions?

    Pre order our new book

    Navigating the Data Minefields:

    Management’s Guide to Better Decision-Making

    We are living in an era of data and software exponential growth.  A substantive flood hitting us every day.  Geek heaven!  But what if information technology is not your cup of tea and you may even have your kids help with your smart devices?  This may not be a problem at home; however, what if you job depends on Big Data and Artificial Intelligence (AI)?

    Available April 2025

    For More Information

    Please note, RRI does not endorse or advocate the links to any third-party materials herein.  They are provided for education and entertainment only.

    See our Economic Value Proposition Matrix® (EVPM) for additional information and a free version to build your own EVPM.

    The author’s credentials in this field are available on his LinkedIn page.  Moreover, Dr. Shemwell is a coauthor of the recently published book, “Smart Manufacturing: Integrating Transformational Technologies for Competitiveness and Sustainability.”  His focus is on Operational Technologies.

    We are also pleased to announce our forthcoming book to be published by CRC Press in 2025, Navigating the Data Minefields: Management’s Guide to Better Decision-Making.  This is a book for the non-IT executive who is faced with making major technology decisions as firms acquire advanced technologies such as Artificial Intelligence (AI).

    “People fail to get along because they fear each other; they fear each other because they don’t know each other; they don’t know each other because they have not communicated with each other.” (Martin Luther King speech at Cornell College, 1962).  For more information on Cross Cultural Engagement, check out our Cross-Cultural Serious Game.  You can contact this author as well.

    For more details regarding climate change models, check out Bjorn Lomborg and his book, False Alarm: How Climate Change Panic Costs Us Trillions, Hurts the Poor, and Fails to Fix the Planet.

    Regarding the economics of Climate Change, check out our blog, Crippling Green.

    For those start-up firms addressing energy (including renewables) challenges, the author can put you in touch with Global Energy Mentors which provide no-cost mentoring services from energy experts.  If interested, check it out and give me a shout.

  • Clickbait Redux

    Clickbait Redux

    We are offered the world at the tip of our fingers, But!  There are many prices to pay.  Theft by scam simply by clicking on a great opportunity is getting more sophisticated all the time.

    Recently, this pundit was offered a once in a lifetime possibility if only I would listen to an MS Office (voicemail) sent to my email account.  Seemed OK, how harmful could it be?  Certainty, this world class software provider tool was safe?

    Well, as the saying goes, my mama didn’t raise no fool.  Not saying I won’t be duped at some point, but I like to think the odds are against it.  Tagged as junk, I will never know what the sender had to say.  Nor do I care, since likely it was phishing at best and possibly something worse.

    That said, businesses cannot run on the basis of individual prowess, especially when the scams often exceed hundreds a week or even a day.  Junk mail filters are much better than before but still not perfect and malefactors are always launching cyber organized criminal efforts to supersede defensive protections.

    Equally, if not more important, how many legitimate businesses lose sales or even have their reputations significantly compromise as a result of scams?  If a prospects clicks on your logo and is defrauded, her or she will most likely continue to blame the logo owner and not the criminals.

    Setting the Hook

    Fisherman know how to catch fish.  They know the right locations, time of day, cloudy or not and so forth and so on the land the ‘Big One.’

    On the other hand, digital hackers do not appear to have this ingrained focused instinct.  Perhaps, this skill is not necessary for them.

    Masquerading in plain sight, spammers try to tap into the greed in all of us.  Easy, quick and large these opportunities are attractive and many fall for them.

    As a mentor and advisor to organizations of all sizes, I consistently review product/service and even enterprise value propositions.  Frankly, many are found wanting.  Currently, the Lean Canvas construct and/or Elevator Pitch are models for succinctly posturing a position quickly.

    However, it takes a lot of effort to craft the short piece.  Only then does the firm have something of value for prospects and customers.

    While Fortune 500 et al will remain targets of cyber hacking, it is possible for others to make themselves less attractive to organized crime.  Firms should ask themselves, what is the goal for their web presence?

    In 2019, this blog addressed the “what’s in it for me question” as opposed to collecting ‘Likes.’  That edition contained a real world case study of wrong-headed thinking by a consulting firm collecting the wrong data.  As the client, we did not implement that recommendation.

    There is a fine line between building market ‘Buzz’ and simply collecting ‘Likes’.  However, the real focus should be on building repeat customers.  Recommendations from others, should still be part of the business model.

    Cyber is now an important part of every firm’s business model.  Part of the organization’s cybersecurity model has to be, “Why are individuals coming to the website?”  In other words, “What value are we providing them?”

    What is the Value of a ‘Like’ to your Organization and What is the ‘Risk’ of Obtaining One?

    For More Information

    Please note, RRI does not endorse or advocate the links to any third-party materials.  They are provided for education and entertainment only.

    For more information on Cross Cultural Engagement, check out our Cross Cultural Serious Game.  You can contact this author as well.