“A technology looking for a problem” Can we apply search concepts to “rank” Semiconductor Intellectual Property?

It's all about attitude, stubbornness, and establishing new paradigms

While much of the appreciation for this blog topic is restricted to semiconductor component design, by the end of the story, I hope to bring this back into the context of generalized intellectual property distribution in cloud computing enterprise architectures.

Those of us who have been in R&D have either heard of or designed “technologies or solutions that are looking for a problem.” Those of us that have been entrepreneurs also know that “solutions looking for a problem don’t get funded.” (http://blog.startupprofessionals.com/2010/11/solutions-looking-for-problem-dont-get.html) However, I was only a couple of hours into my latest audio book, “In The Plex: How Google Thinks, Works, and Shapes Our Lives”, by Steven Levy, when I was continually reminded of just how many indirect network effects have been spawned out of Google’s obsession with the problem of “SEARCH”.

Solutions looking for problems!

What could certainly have been at first glance classified by most computer scientists as a “bounded problem”, Larry Page & Sergey Brin have managed to not only to profitably legitimize the problem of “search” for interesting web pages, but have managed to somehow indirectly integrate it into practically every facet of our lives! Okay, that last part is stretching it a bit, but sometimes it does seem like Google is everywhere.

Our past experiences in life always jade our thinking and perceptions, and my life as a chip designer certainly influences my “mind broadening” diatribes as well. The problem I’m challenging those reading this blog to think about is intertwined into my previous blog on Semiconductor Intellectual Property (SIP) in “the Cloud”, aka, “Snakes On A Plane!”

Present day semiconductor component architectures, Systems-on-Chip (SoCs), rely heavily upon previously designed and verified functional modules, often obtained from 3rd parties in exchange for licensing or royalty fees. When a single SIP design flaw could mean the demise of a chip company’s reputation or business, the fear that chip designers and architects have when integrating a 3rd party SIP module goes viral. The problem that the wary chip engineer has when assessing the worth of any SIP module is effectively a SEARCH problem!

That’s right, I said it, it’s a search problem! The engineer is searching for the answer to the question of whether that SIP block is worthy to be integrated on the chip, i.e. if there are bugs in the SIP, where are they and how bad can they be? What are the risks? The focus of this blog entry is, can we assign a “rank” to an SIP module in a similar or tangentially related manner to the ranking of Web pages, i.e. and SIPRank? To an experienced design engineer, such an attempt to design an automaton to quantify the value of a digital function may seem absurd, and I fully appreciate that healthy skepticism. And while initial attempts at defining SIPRanks will be crude, over time, just as the exponential expansion of Google’s web page database continued to refine, test, challenge, and improve Google’s search algorithms and subsequent results, an increasingly large data sampling of SIP will provide a similar proxy for defining and effective SIPRank algorithm.

More to come…

Self-serve frozen yogurt or Th’ Cloud…the chicken or the egg? Which came first or strange birds of a feather?

Yummy...help yourself to EXACTLY how much you desire!

Okay…based on the title of this blog, I’ll have to admit it, I may be spending way too much time thinking about cloud computing! But, my motivations are outweighing my logic, so here goes.

My wife, Judy, loves frozen yogurt. So much so that in her early entrepreneurial days she opened up a frozen yogurt store in west Boca Raton. Much to her chagrin, after moving to North Carolina, she found that frozen yogurt-mania was not quite so popular. Being few and far between, meant that finding a frozen yogurt spot prompted an immediate “pull over”. So you can imagine her delight in seeing the recent outbreak of self-serve frozen yogurt stores spring up around our home town of Cary, NC. For the past 9 months, I’ve become quite a “taste cup” connoisseur of the local frozen yogurt cuisine.

One day this week, after lunch, Judy and I stopped by her favorite self-serve, frozen yogurt oasis. As I spilled over (accidentally) my taste cup, I began thinking about what had changed in the frozen yogurt business from Judy’s days in Boca. We began talking about her previous service models, comparing it to the new model of one person at the cash register with a line of customers serving themselves! No more fixed size pricing, no separately priced toppings, no dedicated serving staff, and no crazy over-the-counter hand-offs! “It is absolutely the way to go!”, she told me. “Why didn’t I think of it?”

I then told her that this demand-based, self-serve model for frozen yogurt is exactly what is happening in world of cloud computing. My question to her was which business model came to this realization first, cloud computing or frozen yogurt? With more of a disgusted than quizzical expression, my wife said, “Don’t you think you’re taking this cloud thing a bit far?” “Not really.” I retorted. It didn’t take much analogy work to final convince her that these two business models are birds of a feather. She does get it. Did I mention that Judy was with Cisco’s Inside Sales team for a number of years, is an electrical engineer, and an MBA?

Kind of like my absolute favorite..."Chocolate Cake Batter"

By the way, for all of those ISVs out there that cringe at the thought of Software-as-a-Service (SaaS), the self-serve frozen yogurt business is healthier than ever! And did I forget to mention, they’re making more money selling it this way than they ever did before!

“Who do you trust?” Hubba, hubba, hubba…what can cloud do for you in trusted supply chains?

Trust in Supply Chain Management – Threats beyond the US Department of Defense

I know it has been quite awhile since the first Batman movie where Jack Nicholson starred as The Joker. However, I cannot help but think of Nicholson’s Joker when I think about Trusted Supply Chains when he said, “…And now, folks, it’s time for “Who do you trust!” Hubba, hubba, hubba! Money, money, money! Who do you trust? Me? I’m giving away free money. And where is the Batman? HE’S AT HOME WASHING HIS TIGHTS! “

My first take on the topic of supply chains is that it must be an abysmally dry topic, particularly in the context of the “white hot” world of cloud computing. At least that is what I believed until this week. With late notice last week, I had the distinct pleasure as an invited panelist at the inaugural Critical Technologies Conference that was held this week at NAVSEA in Crane, IN.  The panel was about the threat to national security from DIS-trusted supply chains infiltrating their way into DoD platforms of all types. The conference was held in a quaint and picturesque setting at NAVSEA’s Crane Division in southern Indiana at the base’s club house situated on Lake Greenwood. Trust me when I tell you that I wasn’t the only attendee that was happy to have had the conference shuttle from Bloomington!

While the conference was limited to about one hundred attendees, the presentations and information were more than simply intriguing to the selective gallery of onlookers. The content was sobering and in some ways startling. While the focus of the conference was on interests for the US Department of Defense (DoD), the epiphany that hit me square between the eyes is the very nasty impact that globalization is reeking on the supply chains of legitimate commercial interests. In this blog, I want to talk about Trusted Supply Chains and the positive impact that cloud computing architectures can have on what should be considered the lifeblood of a product, it’s supply chain.

I’m an electrical engineer by training, not an industrial engineer, so I haven’t given a great deal of thought into the subject of supply chains until my MBA days. That’s the funny thing about MBA training for engineers, it actually forces you get your head out of the calculus book and think about why you need calculus anyway. But back to the subject matter at hand. I’ve blogged ad nauseam about Christensen’s Value Chain Evolution (VCE) Theory. I’m afraid I have to do so again, because it is precisely VCE Theory that is responsible for the disaggregation in complex supply chains.

The interesting thing about VCE Theory in supply chain disaggregation is that it seems impervious to the granularity of the inflection point. It doesn’t seem to matter whether the inflection point in the supply chain is outsourcing diesel locomotive engines, steel factories, a few cleverly connected transistors on an integrated circuit, or a few lines of software code in a middleware module. The one thing that is discriminatory in VCE-affected supply chains is the “digital content ratio” exhibited by the supply chain. The more the supply chain is driven by information content that is inherently digital, the faster the absorption rate of VCE inflection points and the more subject the supply chain is to disaggregation.

Disaggregated supply chains can have very positive effects on extracting cost efficiencies in products. As with any pro, there is a con, and in this case the cost efficiency comes at the price of TRUST! Why do I think of the opening quote by The Joker? Because as a systems integrator when it comes to Supply Chain Risk Management (SCRM), who are you going to trust while saving money in assembling products? “…hubba, hubba, hubba! Money, money, money! Who do you trust?” These two issues, trust and money, go hand in hand in disaggregated supply chains.

“Hell isn’t merely paved with good intentions, it is walled and roofed with them” Aldous Huxley

Engineers, Supply Chains, Business Capital, Free Markets, and Good Intentions

I am no advocate for commercial isolationism, nor am I a proponent for a global free trade zone. However, we must be willing to take a candid look at the reality of industrial and commercial policies with enough open mindedness to step back when we see those policies start backfiring. With that said, I am also a dog lover, and dogs do the darnedest things, almost always with an intent to please their masters. The same great intentions can be aspired to the creators of disaggregated, VCE-shaped supply chains. However, just as our furry friend in the illustration shows, past habits that we learned that have previously pleased our masters, may now end up with unexpected and sometimes undesirable results!

The evolution of the disaggregated inflection points in a supply chain occur because there is no longer a differentiated advantage to maintaining that point in the supply chain vertically within the company. The value of outsourcing the service or part has become “good enough” and can be competitively sought after on the open market. The operative words “good enough” and “open market” impose a Supply Chain Management (SCM) responsibility on the consumption side of the supply chain, and the following questions must be considered:

  1. Is the outsource service truly “good enough”, i.e. will using the outsourced version of the component degrade the overall quality of the final product and ultimately the company’s reputation?
    • How will we maintain an ongoing quality control program in collaboration with the supplier?
  2. Does the supplier operate a sustainable business model?
    • Will they be in business as long as I need them to be?
    • Do we have acceptable alternative supply sources in our contingency plans?
  3. Is the supplier “trusted”?
    • Is the supplier honest, reputable?
    • What indemnification rights protect our company from transacting with this supplier?
    • Are the parts/service that I am receiving counterfeit?
    • Is the supplier operating under nefarious auspices?
  4. What about the distribution channels of the supplier?
    • What international tariffs or laws must be considered to integrate the supplier into our manufacturing processes?
    • How can we implement Just-In-Time manufacturing process efficiencies?

“Executive Decisions”…unexpected consequences from honest intentions…

Hard choices always start at the top

The electronics and software supply chains are characterized through high digital content ratios. These two supply chains are also very synergistic and have complex, interrelated dependencies. We are now observing practices in foreign markets that have degraded the integrity and trust of the electronics and software supply chains. The first and foremost practice is a market of counterfeit electronic parts. The second is digital content Intellectual Property (IP) theft that once compromised and disseminated, the control and recovery of that IP is effectively lost forever.

At the Critical Technologies Conference, the Supply Chain panel featured Tom Sharpe, CEO from SMT Corporation. SMT Corporation specializes in trusted electronics supply chain management. What I learned from Mr. Sharpe’s presentation is that knowing that counterfeit electronics exist and understanding the magnitude and prevalence of the problem are entirely two different things. A comment from Mr. Sharpe that strikes at the heart of the problem was this, “I guarantee you that if you have more than a few consumer electronics products in your home, there are counterfeit parts in one of those products!”

To most of us that statement does not translate into a serious threat, until one of the products that has been compromised with counterfeit electronics fails, malfunctions, or worse creates a hazard. In most cases, the product seems to work fine, but the unseen crime at work takes money out of the rightful pockets of the original manufacturers. Crime! Did I say crime! Yes, I did. When we examine the counterfeit electronics supply chain, what we find is that it is not all that hidden from view. In fact, we know a great deal about every step of the process. Most noteworthy is the cultural mindset that those engaged in the counterfeit electronics market do not associate any criminality in the activity, but in many respects see their market as a “green initiative” in recycling what is considered waste products.

The RnD cost that goes into designing, qualifying, testing, and supporting electronic components is staggering. Specification of the dozens of parameters for a specific component that are characterized by the component’s packaging labels are negated when counterfeiters re-mark the component with a higher performance designation. The situation becomes even more egregious when completely different components that have the same physical package are mislabeled. The fraudulent device is inserted into the product. The product test fails, gets ejected in manufacturing to a quality assurance line, and the counterfeit manufacturing cycle begins anew.

The situation becomes much more arduous when the malfeasance penetrates the silicon die in terms of digital content controlled intellectual property. This process of compromise in a trusted supply chain can be likened to an organ transplant and never knowing or finding the transplant recipient. In electronic component design & manufacturing, digital IP references the actual functional specification of a particular capability the component exhibits or delivers. That IP will undergo a series of content transformations that lead to a final manufacturing description. At each transformation stage the IP is in a human or machine readable digital format that if stolen or compromised can be used to complete the manufacturing process.

The problem becomes intractable once the IP is removed from its intended application or component and transferred into a completely different component architecture. The stolen IP simply becomes another functional element of a black box system that is practically impossible to detect, akin to someone disappearing into a large crowd of people. The IP, along with the component that is now contaminated with stolen IP, becomes part of the landscape of a black market supply chain. While not identical in process, in context, the problem of theft and compromise of software IP may be easier to execute, but just as hard to recover from after the theft has occurred.

Tony Bent, Business Operations Director for National Semiconductor’s trusted foundry operations represented on the same Supply Chain panel, talked about the additional supply chain controls that National is manufacturing into their components to make it easier to detect counterfeit components earlier in the supply chain cycle. Tony also mentioned the brazenness exhibited by counterfeiters. He discussed situations in which National engineers have received calls from overseas persons who ask why certain transistors are part of a particular circuit, clearly with an aim at replicating the silicon die for counterfeiting. The fact that the counterfeiting party has no reservation about contacting the original manufacturer borders on obscene!

Adding the “Trusted” cloud computing component into a disaggregated supply chain!

The issue of IT intellectual property rights, security, privacy, and protection is without dispute or question the single highest calling and priority for cloud computing service providers! There can be no effort minimized, no corners taken, no expense incurred in fulfilling this mission statement for a cloud computing service providers. Simply stated, without total IT intellectual property control and security, a cloud computing service provider does not have a service to sell.

Information control and management is a crucial component in SCM. While the information content associated with SCM is not in a strict sense technical or engineering intellectual property controlled through patents and copyrights, it is valuable to the company’s operations and must be considered a form of intellectual property and treated with appropriate security concerns. When a supply chain is vertically integrated within a single organization or company, control and management of SCM data is a simpler task. Disaggregate and distribute that SCM database across dozens of independent, international ongoing concerns, and SCM data management flies out the window. If the information flow across a supply chain could be likened to the glue that holds the flow of components across the supply chain, then SECURE, COLLABORATIVE information flow across that supply chain could be considered SUPER GLUE for the flow of components.

I suspect by now that you’ve probably surmised where I am going this with this…enter the disruptive world of collaborative cloud computing enterprise architectures. I personally love the application of a disruptive technology that solves a VCE-driven disruption.

True disruptions always look funny at first glance and often end up as mainstream solutions.

For most companies, the transition to a cloud architecture in itself is scary enough, much less a public cloud. Therefore, the initial focus of my comments here will be on “community cloud computing” architectures, i.e. a collaborative, demand-based, multi-tenant, utility computing model designed to serve the interests of a specific community of users. The concepts stated here are just as applicable to public clouds. The key concept to retain from the previous statement is that the multi-tenancy is the critical component in a community cloud service that binds collaboration with disaggregation.

Now let’s apply the vision a supply chain workflow implemented as a secure, collaborative, cloud computing enterprise architecture.

Identity Profiles – Trust component for Cloud-based Supply Chain Management

“Identity in the Age of Cloud Computing”, J.D. Lasica, Communications and Society Program

“Technology enables companies to build and tear apart alliances and partnerships on an as-needed basis. Product decisions are becoming less dependent upon a fixed list of suppliers than on the range of suppliers available. Relationships come together based on a particular product or project and then disband at the end.”

“The beginnings of this move toward specialization is already on display in certain global supply chains, where workers in disparate venues focus on one aspect of the manufacturing process. For instance, eighteen companies were involved in developing and manufacturing the first Apple iPod.”

“Improved global coordination allows companies that have found unique ways to deliver products in certain markets to go global with those advantages.”

More to come…