Welcome!

Java IoT Authors: Sematext Blog, Carmen Gonzalez, JP Morgenthal, Elizabeth White, Liz McMillan

Related Topics: Java IoT

Java IoT: Article

When Fixing Problems, Look Beyond

Merely Improving the Existing Solutions

One way in which technology is adopted is when an existing process is automated and made more efficient, cheaper, or reliable. Another is when a technique or innovation is applied to an existing process to drastically alter the way it occurs. The disadvantage of the latter is that it requires the idea being sold to someone who has to change to adopt it, and thereby carries a risk of failure. Applying a technology to merely streamline an existing process is a simpler to adopt as the implementation merely involves oiling an existing solution.

Given the keystone that communication occupies in our lives, you would think that it would be an exemplary case of technology implementation. Ironically though this isn't what has occurred; instead it is one of the most recalcitrant disciplines.

An example is the telephone. When it was first rolled out, it was used by secretaries to read memos sent by company executives. The secretaries would write down the message and read it to the recipient's secretary who'd deliver and collect a reply before phoning it back. It was a streamlining of the previous process, which had involved the message being carried to a telegraph agent who would encode it in Morse and send it as a telegram. We take it for granted now that a phone message is a way of conducting a two-way conversation, but for the first telephones it took a long while before the message's author and recipient would talk to each other directly and cut out the additional latency and inefficiency introduced by having couriers in-between.

While with smug hindsight we can mock the early adoption of the telephone, I fear that generations to come will do likewise with our current usage of e-mail. It originates from a scenario where mail would be used to send memos within and letters between organizations. Once computers were added to the equation, instead of hand writing memos and letters, people were using word processors and sending printed output. With networking, the obvious implementation was to shortcut the process and simply send the mail electronically to the recipient. What has occurred though is a world where e-mail has almost become the means and the end itself. A colleague came by my desk a few days ago to ask if I had received the e-mail he had sent me, and then went back to his cubicle to await my reply. Our corporate phone system e-mails you when someone leaves a phone message. In some situations I have received e-mails from people asking for a convenient time to telephone. Leaving aside the politics, flame, and other idiosyncrasies that come to the fore with e-mail, it is surely a poor implementation of technology as a means to solving the general problem of increasing communication effectiveness.

There are other examples of where the path of least resistance has been used, when a technology rollout has been influenced heavily by the legacy it replaces, rather than the promise it offers. Numeric keypads are a case in point, where telephones lay out 123 on the top row, and computers 123 on the bottom. The computer arrangement descends from calculators and adding machines, so why is the telephone different? It stems from an evolution that began with rotary phones with dials. The dial is turned clockwise to a fixed position and released, clicking on its return to generate pulses for each number; one for a 1, nine for a 9 and ten for a zero. The arrangement of the number was such that one was at the top, nine toward the bottom, and counter-clockwise next to it the zero. Nine and zero were infrequently used in phone numbers so they were the least easy to dial. When a numeric keypad for a phone was required, the engineers felt that, instead of just adopting the calculator key layout, keeping 1 at the top and 9 adjacent to 0 was easier for current phone dial users to migrate to. It was a decision based on following the path of least resistance to the adoption of technology, yet it has now created paradoxes such as the layout of soft keys on a telephony application being different from the physical layout of the keys on the computer's numeric keypad or the layout on a calculator application. It is a bizarre and seemingly insoluble legacy that stems from the initial solution being too closely aligned with the existing implementation rather than the new technology.

Apart from being interesting, these anecdotes provide lessons of failure where the common thread is that a technology is applied to an existing solution, rather than to the existing problem. When IT was first launched on corporations, buzzwords such as "business process re-engineering" were thrown about as jargon to embody the fact that computers would change the way the company worked, as well as merely improve its existing transactions. Instead, however, IT is now viewed as a cost center that has to purchase copies of operating systems and office applications, using whatever change remains to play with business innovation. It's akin to asking the sales department to pay a company's electric bills and catering costs before trying to generate new accounts, yet it passes off every day in boardrooms where IT managers have to fight daily for every dollar of their budget.

Whatever the future holds for IT, it has to come by looking at an existing scenario, and not merely attempting to tackle the old solution with a newer and faster technology, but peeling back the layers and working out what the original root problem was of the solution that's currently in place. The Internet has launched huge corporations that adopted technology as their means of doing point business rather than a bolt on, and the future is boundless as new problems are tackled with increasing bandwidth, mobility, and content type. I just hope that for each solution we aren't stuck with upside-down keyboards and implementations that hinder rather than aid communication, and that we all remember that the best solutions come from analyzing problems, not patching existing solutions.

More Stories By Joe Winchester

Joe Winchester, Editor-in-Chief of Java Developer's Journal, was formerly JDJ's longtime Desktop Technologies Editor and is a software developer working on development tools for IBM in Hursley, UK.

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
SYS-CON Belgium News Desk 02/09/06 09:50:13 AM EST

One way in which technology is adopted is when an existing process is automated and made more efficient, cheaper, or reliable. Another is when a technique or innovation is applied to an existing process to drastically alter the way it occurs. The disadvantage of the latter is that it requires the idea being sold to someone who has to change to adopt it, and thereby carries a risk of failure. Applying a technology to merely streamline an existing process is a simpler to adopt as the implementation merely involves oiling an existing solution.

@ThingsExpo Stories
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...