SWOT
This page describes the organizational forces that limit change.  It explains how to overcome them when necessary. 

Power& tradition holding back progress
This page uses an example to illustrate how:
  • A business can gain focus from targeting key customers,
  • Business planning activities performed by the whole organization can build awareness, empowerment and coherence. 
  • A program approach can ensure strategic alignment. 
Be responsive to market dynamics
This page uses the example of HP's printer organization freeing itself from its organizational constraints to sell a printer targeted at the IBM pc user. 
The constraints are described. 
The techniques to overcome them are implied. 
Overcome reactionaries
Primary Navigation

Adding structure through SWOT analysis

Summary
The page describes the SWOT process.  That includes:
Operational SWOT matrices and clusters from the Adaptive Web Framework (AWF) are included as examples. 
Introduction
The Strengths, Weaknesses, Opportunities and Threats classification (SWOT) is a simple technique that can provide structure to a development activity and ensure mission applicable aspects of the system are classified, managed and
The agents in complex adaptive systems (CAS) must model their environment to respond effectively to it.  Samuel modeling is described as an approach. 
learned
from and all others are ignored. 

By capturing, and classifying, the significant events affecting a business, as they occur, and then clustering them into associated sets, the structure of an
This page looks at schematic structures and their uses.  It discusses a number of examples:
  • Schematic ideas are recombined in creativity. 
  • Similarly designers take ideas and rules about materials and components and combine them. 
  • Schematic Recipes help to standardize operations. 
  • Modular components are combined into strategies for use in business plans and business models. 

As a working example it presents part of the contents and schematic details from the Adaptive Web Framework (AWF)'s operational plan. 

Finally it includes a section presenting our formal representation of schematic goals. 
Each goal has a series of associated complex adaptive system (CAS) strategy strings. 
These goals plus strings are detailed for various chess and business examples. 
action plan
can be defined.   As further key events are identified and added to the clusters, and some associations are backed up by theory and practice the SWOT becomes the foundation for strategy prioritization and selection. 
The SWOT classification
The classification separates events that are due to a business's internal weaknesses and strengths from external threats and opportunities.  Each event is classified and the items numbered. 
The SWOT clustering process
The process takes each weakness and assesses if it is part of a current cluster (the weakness makes sense added to other weaknesses in the cluster) or it is more usefully viewed as from a separate aspect of the business.  The threats and opportunities are added to the most appropriate of the clusters of weaknesses.  Finally the strengths can be added to multiple clusters.  Only the strengths are allowed to be repeatedly used.  The individual clusters so formed now represent the strategic goals of the operation's mission (such as the strategy studio mission).  The weaknesses, strengths, opportunities and threats in the cluster (for example AWF core cluster 4) can then be allocated to sub goals (such as operation plan goal 4.9) that when acted on will solve the weaknesses and take care of the threats by leveraging the opportunities and using the strengths. 
Integrating the SWOT clusters with planning and execution
The SWOT technique can fit naturally with the development of
To benefit from shifts in the environment agents must be flexible.  Being sensitive to environmental signals agents who adjust strategic priorities can constrain their competitors. 
flexible
action plans and a coordinating
This page uses an example to illustrate how:
  • A business can gain focus from targeting key customers,
  • Business planning activities performed by the whole organization can build awareness, empowerment and coherence. 
  • A program approach can ensure strategic alignment. 
program
.  It's one key aspect of adaptive
This page introduces some problems that make it hard for a business to execute effectively. 
It then presents a theory of execution. 
It describes what the theory says must be done to execute effectively. 
It reviews General Electric's use of adaptive planning to support effective execution. 
Then it details the execution requirements. 
execution
.  

The strengths, weaknesses, opportunities and threats can be
Agents use sensors to detect events in their environment.  This page reviews how these events become signals associated with beneficial responses in a complex adaptive system (CAS).  CAS signals emerge from the Darwinian information model.  Signals can indicate decision summaries and level of uncertainty. 
formally associated
with labeled
Plans emerge in complex adaptive systems (CAS) to provide the instructions that agents use to perform actions.  The component architecture and structure of the plans is reviewed. 
schemata
.  The schemata provide an association point to theory and practice that can be used to develop judgments about the
Walter Shewhart's iterative development process is found in many complex adaptive systems (CAS).  The mechanism is reviewed and its value in coping with random events is explained. 
significance of the SWOT item


With the Internet standardizing the infrastructure components, deployed by corporations, and the interfaces to them, the components are commoditizing.  The switching costs that stabilize the enterprise software industry are falling, and the commoditization is also making the customers increasingly similar.  

To offset this effect and build a sustainable competitive advantage, software providers and their enterprise customers must work together on 'strategic positioning' that differentiates the use of the Internet as a component of business strategy. 

The game of chess demonstrates how SWOT analysis can cluster situation specific strategy alternatives.  A SWOT of Vukovic's analysis of a moment of crisis that is highlighted and leveraged by Botvinnik. 

Job situation Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis


Strengths:
  1. The finance provided by HP's WFR package provides a buffer to allow relaxed evaluation of my options
  2. COBRA offered by California for 18 months.  Leaves us time to decide on new coverage strategy.
  3. Strategic analysis framework and process is aligned with modern developments in Complex Adaptive Systems
  4. Creative analogy framework based on schematic priorities. 
  5. Use strategy to maximize options
  6. Use of strategic frameworks of Burglemann, Hamel & Porter. 
  7. Use of chasm strategy of Moore
  8. Resume development can leverage Lee Hecht Harrison program management
  9. List out carrier accomplishments
  10. Link Marta to my network. 
  11. People who have left HP at the time of Radha's "night of the long knives" have developed broad networks and potentially hiring positions. 
  12. Empower teams by developing tools to facilitate Market Focus, Tipping Point Catalysis, Program based operations, SWOT based strategy development, Iterative development, Modular Design. 
Weaknesses:
  1. Being from the UK and an introvert NTJ limits the network that can be leveraged. 
  2. Being disconnected from a major social network could result in a lack of balance in my views and limited feedback on my social stances. 
  3. Limited knowledge of the health system.  Cobra does not seem value for money.
  4. Have no effective model of how to get a job having been employed at HP for 20 years and focused on doing the job well. 
  5. My writing style is technical which may impact the value of my web publications. 
  6. HP not viewed as a software company
  7. CAS software implications not well understood (CAS SWOTs)
Opportunities:
  1. HP Alumni system provides clear guidance about leaving HP and how to manage the tax implications etc. 
  2. US will provide payments for 6 months while not working. 
  3. Use time off to integrate a dog into the family. 
  4. Meditate to gain more empathy with the world. 
  5. Have time to learn Guitar - a desire since childhood. 
  6. Have time to exercise effectively. 
  7. Have time to develop some of the analysis of high tech markets and business strategies. 
  8. Use HP's offer of coaching by Lee Hecht Harrison to understand the redeployment process. 
  9. LHH network process is reasonable and provides driver for subverting introversion. 
  10. LHH network includes partner, and social system.  Leverage these.
  11. Understand who the hiring hubs are.  Build a CAS model. 
  12. Use surprise to stand out.  Very few people have a strategic CAS framework to discuss. 
  13. Write up analyses and publish them on the web. 
  14. Use the need to execute of ramp phase startups that have just obtained funding. 
  15. Provide friends with pro-bono strategic analysis
  16. Global network and Internet create business opportunities in middleware, messaging and security. 
  17. DNA and RNA chemistry provides leverage points for Biotech value creation
  18. Nano technology creates long term opportunities in building with Carbon. 
  19. Sensor developments create potential for CAS value add. 
  20. Take yourself less seriously
threats:
  1. HP's benefits say I have been working for fewer years than is true. 
  2. It is necessary to build activities to defend the self so that the WFR does not destroy your confidence. 
  3. We would like to stay in this area for schooling, but the employment picture is very poor in the Bay area. 
  4. Outplacement to low cost, educated countries makes some sense - providing absolute cost advantages to the participating companies. 
  5. The stock option catalyst that offset the risk and high workload of startups is being removed by congress
  6. Like most early markets the resume and career accomplishments are not likely to be trusted by target buyers.  They will prefer word of mouth, and independent demonstrations of worth. 
  7. Cold calling hiring companies from job listings has a very poor return in the 2004 economy. 
  8. Biotech risks (Epistatis, Translational unpredictability, Risk of death in failure, Cost of regulated market access, Ethics issues)
  9. Marketing process efficiency improvements appear of limited value add


Core Problem Clusters:
  • Problem 1: Need to stabilize finances and ensure self-supporting benefits (W3, O1, T1, T3, S1, S2,)
  • Problem 2: Build/Maintain confidence (O2, O4, O5T2, S1, )
  • Problem 3: Build and leverage Networks (W1, O3, O6, O9, O10, O11, O15, S10, S11, )
  • Problem 4: Define and develop tools to market yourself and expand future options (W4, W5, W6, W7, O8, O12, O13, O14, T6, S4, S6, S7, S8, S9, S12, )
  • Problem 5: Manage emotions (W2, 020,)
  • Problem 6: Improve long term vision and mission for career (O7, T9, )
  • Problem 7: Don't have linkages to some companies with jobs (T7, )
  • Problem 8: Majority unaware of value of strategic ideas, so I need to maximize power of strategic approach (O16, O17, O18, O19, T4, T5, T8, S5, )

CAS SWOTs
Complex adaptive systems (
This page introduces the complex adaptive system (CAS) theory frame.  The theory is positioned relative to the natural sciences.  It catalogs the laws and strategies which underpin the operation of systems that are based on the interaction of emergent agents. 
John Holland's framework for representing complexity is outlined.  Links to other key aspects of CAS theory discussed at the site are presented. 
CAS
) theory can be used as a strategic constraint.  The implications are analysed with the SWOT technique. 

Strengths:
  1. Agents are associations of schematic strings and structural workspace state. 
  2. Agents adapt to situation.  
  3. Development activities get in the details of CAS and infrastructure
  4. Metrics and tools provide a view of system operation
  5. This page describes the specialized codelets that provide life-cycle and checkpoint capabilities for Smiley applications. 
    The codelets implement a Shewhart cycle. 
    The structural schematic nature of the cycle is described. 
    Transcription factor codelets operate the phase change controls. 
    How inhibitory agents are integrated into the cycle is described. 
    An application agent with management and operational roles emerges. 
    The codelets and supporting functions are included. 
    Management codelets
    demonstrate
    Walter Shewhart's iterative development process is found in many complex adaptive systems (CAS).  The mechanism is reviewed and its value in coping with random events is explained. 
    Shewhart cycle
  6. Planning framework well developed
  7. To benefit from shifts in the environment agents must be flexible.  Being sensitive to environmental signals agents who adjust strategic priorities can constrain their competitors. 
    Flexibility

  8. Rather than oppose the direct thrust of some environmental flow agents can improve their effectiveness with indirect responses.  This page explains how agents are architected to do this and discusses some examples of how it can be done. 
    Indirection

  9. Metafile token phenomena associated keywords
  10. This page describes the Smiley infrastructure that supports the associative binding of schematic strings to codelets defined in the Meta file and Slipnet. 
    The infrastructure supporting the associations is introduced. 
    The role of Jeff Hawkins neocortical attributes is discussed. 
    Relevant Slipnet configurations are included. 
    The codelets and supporting functions are included. 
    Label association
    framework
  11. This page describes the Copycat Workspace. 
    The specialized use of the Workspace by the adaptive web framework's (AWF) Smiley is discussed. 
    How text and XML are imported into the Smiley Workspace is described. 
    Telomeric aging of schematic structures is introduced. 
    The internal data structure used to represent the state of each workspace object is included. 
    The Workspace infrastructure functions are included. 
    Work space
    based chemical environments,
    This web page reviews opportunities to find and capture new niches based on studying fitness landscapes using complex adaptive system (CAS) theory. 
    adjacent possible
    & molecular
    Plans emerge in complex adaptive systems (CAS) to provide the instructions that agents use to perform actions.  The component architecture and structure of the plans is reviewed. 
    schemata

  12. Testing of schematic operations
  13. This page describes the Smiley infrastructure and codelets that instantiate the epiphenomena defined in the Meta file and Slipnet. 
    Infrastructure sensors are introduced. 
    The role of phenomena in shaping the environment is discussed. 
    The focusing of forces by phenomena in Smiley is discussed. 
    The Meta file association of case keywords with phenomena is included. 
    The codelets and supporting functions are included. 
    Epiphenomenal
    forces instantiated as schemata associated codelets
  14. The agents in complex adaptive systems (CAS) must model their environment to respond effectively to it.  Samuel modeling is described as an approach. 
    Model
    based
    Plans are interpreted and implemented by agents.  This page discusses the properties of agents in a complex adaptive system (CAS). 
    It then presents examples of agents in different CAS.  The examples include a computer program where modeling and actions are performed by software agents.  These software agents are aggregates. 
    The participation of agents in flows is introduced and some implications of this are outlined. 
    agents
    and
    This page discusses the interdependence of perception and representation in a complex adaptive system (CAS).  Hofstadter and Mitchell's research with Copycat is reviewed. 
    perceptions
  15. This page discusses how Smiley provides signalling to its agent-based applications. 
    Alternative strategies for initiating the signalling are reviewed. 
    The codelets and supporting functions are included.
    Signalling
    and
    This page describes the adaptive web framework (AWF) Smiley agent progamming infrastructure's codelet based Copycat grouping operation. 
    The requirements needed for a group to complete are described. 
    The association of group completion with a Slipnet defined operon is described.  Either actions or signals result from the association. 
    How a generated signal is transported to the nucleus of the cell and matched with an operon is described. 
    A match with an operon can result in deployment of a schematic string to the original Workspace.  But eventually the deployed string will be destroyed. 
    Smiley infrastructure amplification of the group completion operation is introduced.  This includes facilities to inhibit crowding out of offspring. 
    A test file awfart04 is included. 
    The group codelet and supporting functions are included. 
    operon controlled
    This page discusses how Smiley provides deployment guarantees to its agent-based applications. 
    Smiley's transaction services are reviewed. 
    The complex interactions of codelets participating in a deployment cascade are discussed including: 
    • The implementation of schematic switches. 
    • The cooperative use of goal suppression.  
    • Evaluator codelets promotion of other siblings. 
    Challenges of initiation of a cascade are discussed. 
    Tools to associate transaction protection to an operon deployed codelet are described. 
    Special support for sub-program codelets is described.  Completion of transactional sub-programs presents special challenges. 
    Priority and synchronization support includes:
    • Delaying the operaton of the cascade sponsor. 
    • Delaying the notgcompleting cascade participant. 
    • Waiting for completion of parallel operations with the wait and relay service.  
    The need to sustain resource pools is reviewed. 
    The use of signals to coordinate siblings is described. 
    The structural binding operon for the wait and relay service is included. 
    The codelets and supporting functions are included.
    cascades
    of structural codelet aggregates
Weaknesses:
  1. Crowding out hard to detect and control.
  2. State representation builds up slowly.  
  3. Performance orders of magnitude too slow to be useful.
  4. Caches are hard to represent in secondary storage. 
  5. Parallel procedure operation is complex to program and debug.  
  6. No replication developed.  
  7. Descriptors are too direct and specific.  Cells use more structural associations.  The deployment of Workspace structure can then present tags for chance to leverage.  
  8. Richard Dawkin's explores how nature has created implementations of designs, without any need for planning or design, through the accumulation of small advantageous changes. 
    Constraining mutation
    adds complexity through additional indirection
  9. Mutational access to
    This web page reviews opportunities to find and capture new niches based on studying fitness landscapes using complex adaptive system (CAS) theory. 
    adjacent possible
    not proved
  10. No visual editor for filters or control streams
Opportunities:
  1. Adaptive sensor network for a car or house.  
  2. Teaching about CAS.
  3. Programming environment for CAS operation.
  4. Good alignment of strategy schemata and adaptive web framework (AWF) architecture.
  5. This page reviews Christensen's disruption of a complex adaptive system (CAS).  The mechanism is discussed with examples from biology and business. 
    Disruption

  6. Barriers are particular types of constraints on flows.  They can enforce separation of a network of agents allowing evolution to build diversity.  Examples of different types of barriers and their effects are described. 
    Barriers
    enabling the
    This page reviews the implications of selection, variation and heredity in a complex adaptive system (CAS).  The mechanism and its emergence are discussed. 
    evolution
    of
    This page looks at schematic structures and their uses.  It discusses a number of examples:
    • Schematic ideas are recombined in creativity. 
    • Similarly designers take ideas and rules about materials and components and combine them. 
    • Schematic Recipes help to standardize operations. 
    • Modular components are combined into strategies for use in business plans and business models. 

    As a working example it presents part of the contents and schematic details from the Adaptive Web Framework (AWF)'s operational plan. 

    Finally it includes a section presenting our formal representation of schematic goals. 
    Each goal has a series of associated complex adaptive system (CAS) strategy strings. 
    These goals plus strings are detailed for various chess and business examples. 
    new ideas & plans
  7. Test bench for
    Flows of different kinds are essential to the operation of complex adaptive systems (CAS). 
    Example flows are outlined.  Constraints on flows support the emergence of the systems.  Examples of constraints are discussed. 
    flows
    ,
    This page discusses the tagging of signals in a complex adaptive system (CAS).  Tagged signals can be used to control filtering of an event stream.  Examples of CAS filters are reviewed. 
    tag-filtered
    web frames and
    This page reviews the catalytic impact of infrastructure on the expression of phenotypic effects by an agent.  The infrastructure reduces the cost the agent must pay to perform the selected action.  The catalysis is enhanced by positive returns. 
    infrastructure
    amplifiers
  8. Plans are interpreted and implemented by agents.  This page discusses the properties of agents in a complex adaptive system (CAS). 
    It then presents examples of agents in different CAS.  The examples include a computer program where modeling and actions are performed by software agents.  These software agents are aggregates. 
    The participation of agents in flows is introduced and some implications of this are outlined. 
    Agent
    aggregates of schematic codelets
  9. Moving beyond Boltzmann statistics to
    This page reviews the strategy of setting up an arms race.  At its core this strategy depends on being able to alter, or take advantage of an alteration in, the genome or equivalent.  The situation is illustrated with examples from biology, high tech and politics. 
    evolved amplifiers
  10. Indirect schematic operations gain access to adjacent possible
  11. This page describes a schematic system about abstracted 'animal' and 'plant' cells competing in a small world. 
    The schematic cell was designed to focus in on the nature of mutation and the adjacent possible. 
    THE IMPLEMENTATION IS INCOMPLETE AND ONGOING. 
    The codelets and infrastructure are included. 
    Cell
    based
    This page describes a schematic system about abstracted neurons operating in a circuit. 
    The neuronal system was designed to focus in on the cellular nature of a schematically defined neuron. 
    The goals include:
    • Development of a system of cells, their differentiation and deployment into a neuron network. 
    • Abstract receptor operation must support interactions of a network of neurons and attached cells. 
    THE IMPLEMENTATION IS INCOMPLETE AND ONGOING. 
    The codelets and infrastructure are included. 
    neuronal networks
Threats:
  1. This page reviews the inhibiting effect of the value delivery system on the expression of new phenotypic effects within an agent. 
    Extended phenotypic alignment
    of
    Tools and the businesses that produce them have evolved dramatically.  W Brian Arthur shows how this occurred.
    tool based economy

  2. No programmers aware of this paradigm.
  3. Difficult to re-integrate into technology network since AWF incompatible with ubiquitous programming methods
  4. General software development leverages fully developed human agents to support PDCA loop creating products which evolve. 
  5. Mainstream of database applications
  6. Complex adaptive system alignment with
    This page discusses a complex adaptive system (CAS) implementation of a genetic algorithm (GA), Melanie Mitchell's robot-janitor built as a set of Copycat codelets integrated using agent-based programming.  The improvement in the operation of the robots over succeeding generations of applying the GA is graphed. 

    The CAS that generated, and operated the robot is reviewed, including the implementation details and codelet operational program flow, and the challenges and limitations of this implementation. 

    The schematic strings which make up the robot's genotype, as well as the signals which are sent to the nucleus of the robot's agents so that the agents can deploy the appropriate response strings (which activate codelets) are listed.  The Slipnet configuration required by the system to associate the schematic strings with programmatic forces (codelets) is also listed.  The codelets and supporting perl are also listed. 

    In the conclusion the limitations of the robot-janitor abstraction in studying emergence and creative evolution are discussed and alternative experimental frameworks are proposed.  One such, the schematic cell is the subject of a separate page in this web frame. 

    genetic algorithms



Alekhine Botvinnik Sicilian Defense Dragon Vukovic art of attack in Chess p284


Vukovic argues 'The moment of undertaking an obligation is also the moment of crisis, the moment for the thrust in the center, which in the Sicilian as a whole, and in this position particularly, is unstable.  Botvinnik perceived the correct moment and struck with 10 ... d5!'.
Strengths: for Black
Weaknesses:
Opportunities:
Threats:
  • Pawn storm (783wa2) +
  • Op castle strategy (783wa3)  - White attacks the castled King on its flank, isolated from its major pieces. 
  • Lines (783ba2) - if Black attempts a flank attack by opening the c file White has time to operationalize his flank attack and can mobilize through the open center faster than Black can down the Queen flank. 




















Market Centric Workshops
The Physics - Politics, Economics & Evolutionary Psychology
Politics, Economics & Evolutionary Psychology

Business Physics
Nature and nurture drive the business eco-system
Human nature
Emerging structure and dynamic forces of adaptation


integrating quality appropriate for each market
 
This page looks at schematic structures and their uses.  It discusses a number of examples:
  • Schematic ideas are recombined in creativity. 
  • Similarly designers take ideas and rules about materials and components and combine them. 
  • Schematic Recipes help to standardize operations. 
  • Modular components are combined into strategies for use in business plans and business models. 

As a working example it presents part of the contents and schematic details from the Adaptive Web Framework (AWF)'s operational plan. 

Finally it includes a section presenting our formal representation of schematic goals. 
Each goal has a series of associated complex adaptive system (CAS) strategy strings. 
These goals plus strings are detailed for various chess and business examples. 
Strategy
| Design |
This page uses an example to illustrate how:
  • A business can gain focus from targeting key customers,
  • Business planning activities performed by the whole organization can build awareness, empowerment and coherence. 
  • A program approach can ensure strategic alignment. 
Program Management
| Home

Profiles | Papers | Glossary | E-mail us