Responsibilities of a Product Owner

It is increasingly apparent that technology has become a large driver of business strategy. By providing new channels and mechanisms to interact with its customers, clients, partners and suppliers, technology is a key part of an organization’s sustainable competitive advantage. So its imperative for a product owner to not just understand the business landscape but also understand how he or she can use technology components as key artifacts in differentiating their offering.

Functional Responsibilities:

There have been a number of blogs which have focused on requirements that are intuitable, usable, simple and efficient. So I will not cover this aspect here.

Non Functional Responsibilities:

Security:

I cannot say enough on making sure your product is safe and secure for your users and their data and this focus is not only to comply with regulations like HIPAA but to stay out of the front page of the Wall Street Journal. Given the high profile breaches we have seen, it is imperative that your product has a plan for the following:

  • Encrypted data stores
  • Multi factor user authentication
  • Allow only encrypted access to your app or website
  • Std DMZ based protection for your applications
  • Regular security patch management program, software upgrades and periodic vulnerability assessment including pen tests and adhering to the OWASP Top Ten list.

Business Environment and Model Resiliency:

As a product owner you should keep an eye on the business environment and your competition, so that your business or application is not upended by a competitor introducing a game changing innovation or the market changing to be unfavorable to your product.

When I was working for a mail order pharmacy, we were able to use our functional components to rearrange the value chain and disrupt the pharmacy fulfillment market. Mail order pharmacy is a volume business and we used benefit plan design, formulary design and volume discounts to drive our profitability. The model did not involve engagement with a patient unless doing a coverage review or a generic substitution. We had implemented digitization of the prescription (i.e. separating the cognitive and the fulfillment parts of the process) to be able to route this to the most efficient pharmacist and/or robotic pharmacy to fill. Our competition – retail pharmacies on the other hand were local and a pharmacist at these retail pharmacy would have a one on one relationship with the patient. When we introduced the TRC (Therapeutic Resource Center) model, we were able to use our routing components to our advantage. We created these centers that were focussed on a specific disease condition (oncology, cardio-vascular, diabetic, neuro-psych, specialty etc.) and were able to route our chronic and complex patients’ calls and fills to these centers. The engagement that we got with these patients was a lot better than retail pharmacies, and we were able to drive mail order penetration using our plan designs by proving to our clients that we were able to bend the healthcare cost curves.

So when you are designing your product, keep your design flexible, so you can adapt if the environment or your competitor’s strategy changes.

Configurability:

Ask for your product to be configurable rather than needing code releases every time there needs to be a change. An example is the regulatory framework we designed for our on-boarding platform. Since my investment bank operates in multiple jurisdictions and there are frequent changes in regulations for any single jurisdiction; it was very beneficial for us to use a regulatory program framework with the rules extracted out of the application; These rules are user modifiable with the right approval workflow. This has given us a huge advantage in being nimble with regulatory changes and not have to wait for IT release cycles and change windows.

Modularize and Encourage Plug And Play Components:

When you modularize your system – like lego blocks representing various functions, you have the ability to introduce a champion-challenger competition between these blocks. This allows for increasing product innovation through constant improvements because of competition between the modules.

There are new capabilities being added every day in ML (machine learning) and AI (artificial intelligence). You want to have a flexible architecture so that you can plug these modules in anytime to improve the learning and adaptability of your apps.

Data Processing Variety:

Always design your application to be able to handle a multitude of data streams with different types of variety, velocity and volume characteristics. What I mean by this is your functional modules should be able to handle both structured (db, partner systems etc.) and unstructured data (say social media feeds/blogs). Given the growth in IoT devices, make sure you are able to source data from these devices and crunch them realtime to have a much more agile and realtime responses for your users.

Portability:

Be cloud ready – i.e. a portable application that is able to shift its compute and storage resources at any time. This is key for scaling up or from a business continuity planning perspective. Say you lose that data center that hosts your application. Are you able to port your application seamlessly to the disaster recovery compute / storage resources?

Platform Agnostic:

Technology obsolescence is a huge risk. Design your systems using std patterns, interfaces and open source components.  If one component goes out of its useful life or technical support,  it can be replaced by an equivalent functional component that isn’t obsolescent -this is not a question of “if” but “when”.

Scalability:

Your product needs to be able to scale up if there is a sudden rush of customer interest. It is useful to have a capacity on demand model, where you can dial up or down based upon market conditions. A number of cloud hosting providers have an elastic compute model offering that you can leverage.  For e,g, this blog site is hosted on an elastic offering with the ability to scale up or down depending upon demand.

 

SDLC Responsibilities:

Honest Broker for all Stakeholders:

A product owner is usually responsible for prioritizing the requirements from various business units and stakeholders into a single product. He or she must be an honest broker managing the interests and prioritization across these stakeholders in a fair, transparent and honest manner.

Promote Agile Development Practices:

Adopting an agile development methodology allows for iterative delivery where the development team has the benefit of frequent and constructive feedback and able to adapt to a dynamic market with rapidly changing demands.

Define Success and Measure Achievement:

Be able to define the metrics measuring application functionality, scalability and delivery before commencement of the scrum sprint. Should also be able to measure, communicate and put plans in place to address missing any of these goals.

IT Industry Evolution

Some History

As humans went from hunter gatherers to agriculture, they settled down in small villages and hamlets. Once agriculture took care of food production, people could focus on specializing their skills – like being a shoe maker or a barber or an iron smith. They then bartered their services for food and products that they themselves did not produce. Next came the advent of money which brought about efficiency in transactions over bartering. After that came the industrial revolution with a large scale focus on mechanization. This was the era where machines powered actions that a human or a group of humans could not do and helped improve the efficiency of a single worker working in a job shop. This human history is very well documented in the Sapiens by Yuval Noah Harari.

The next level of efficiency was achieved by moving from “a job shop” production unit to an assembly line. Henry Ford is credited with introducing this innovation which brought about standardization and higher output. As production moved to assembly lines, there was the need to measure and standardize each action station to improve quality and throughput.

As industry specialized and process engineering became a science, data collection to fine tune processes whether to increase production or to reduce the cash cycle for a firm became important. Hence we saw industries investing in computing technology & resources. Now the trend is to not just eke out efficiencies, but to collect data from the environment or market to influence strategies on how to take advantage of these changes in preferences of consumers and to some extent even shape or mold user preferences.

How has the IT Industry Evolved?

Trends in Computing

Mainframe and Monolithic Architectures:

The first computers were large scale machines with very limited computing power. These mainly were invented as an academic project which later found application in data crunching within industry. Initially only the largest industries could afford it, and run it. I am sure you would remember the punch card drives and the huge cooling towers around the mainframes!

Evolution of Distributed Systems & Client Server architecture:

Since the 80’s we have seen an explosion in the speed at which information can be collected, processed and disseminated. Some advances came from the mainstreaming of IT into every business or organization. Initially the target was automation – simple enterprise systems that were automated for e.g. The production, planning, accounting, sales etc. There were a number of different flavors of distributed platforms that had specific appeals to different sets of users – the windows platform that was very popular in business user computing segment, the mac platform that appealed to an individual user with needs for creative art applications and the unix/linux platforms which appealed to the geeks. Eventually as we saw these platforms compete we saw the linux/java stack start to dominate the back end processing at most business enterprises, while the front end remained windows based and Apple made a big dent into the personal computing segment.

These led to centralized databases which facilitated the collection and analysis of historical data to make processes more efficient. A number of database structures evolved from network to hierarchical, then relational and object databases evolved as a result.

Web Infrastructure and Interconnection of computers

In the 90’s we had the development of the world wide web, with computers forming a connected web, with standardized communication protocols like TCP/IP, HTTP, SMTP etc.  This was a huge improvement to the unconnected islands that businesses and users had maintained prior to this. This really improved the velocity of information travel – from copying data to floppy drives and moving from computer to computer, to directly transmitting information from one computer to another when every node became addressable and ready to understand communication over standard protocols.

Development of Cloud Infrastructure:

In the 2000’s the trend moved to virtualization and the ability to run multiple processing slices on any physical machine. Computing became fungible and transferable. The idea was if every one was running their own physical servers which were not highly utilized, it would be better to have highly fungible compute and storage slices that could move around virtually to the least busy node, thereby improving efficiency multi folds for our computing and storage hardware.

IoT (Internet of Things)

We have also seen the shrinking of compute hardware to such an extent that this hardware can be embedded in any device or appliance. So a washing machine or a refrigerator may have enough and more computing power as a specialized computer from a few years back, implies each of these devices are capable of producing process data that can be collected and analyzed to measure efficiency or even proactively predict failures or predict trends.

Decentralized Value Exchange:

A parallel development has been the  paradigm shift in creating the ability to transfer value instead of just information. This came about from a seminal paper by Satoshi Nakamoto and the origins of block chain (more on this in another post).

Some call it a fundamental shift in philosophy where we do not need to depend on a central store of value (or authority) to establish the truth. It tackles the double spend problem in a unique and novel way without relying on this central agent. This has spawned applications in various sphere’s like digital currency, money transfer, smart contracts etc. that will definitely change the way we do business.

Big Data Computing

Today the amount of data has become so overwhelming that we find traditional centralized database architectures unable to keep up. This has resulted in a number of new architectures like Hadoop with its own map reduce algorithms and its family of peripheral components/applications like HDFS (Hadoop Distributed File System), Hive (interpreter that turns sql into MR code), PIG (scripting language which gets turned into MR jobs), Impala (sql queries for data in an HDFS cluster), Sqoop (convert data from traditional relational DB into an HDFS cluster), Flume (injesting data generated from source or external systems to put on the HDFS cluster), HBase (realtime DB built on top of HDFS), Hue (graphical front end to the cluster), Oozie (workflow tool), Mahout (machine learning library) etc.

Given this explosion of data that is being produced, collected, processed and acted upon which is beyond human capabilities, we have had to resort to delegating this to machines to collect, process and make sense of these trends – hence the renewed focus on machine learning and artificial intelligence.

Data Analytics and Usage of various Modeling Tools

Given the volume, velocity and variety of data we deal with, its humanly not possible for humans or organizations to analyze this steady stream of data and make sense of it. Hence we have started to construct models to analyze and make sense of this. There are a number of tools available that visualize and provide insights into this data and they inherently use a best fit model that is able to fit to existing data as well as provides predictive value to extrapolations of the causative variables.

This has become so ubiquitous in our lives that everything from credit scores to teacher ratings to how an employee is rated at work all depend on models. One of the critical insights in all this is that our inherent biases get encoded into these models. Hence we need to be careful to not trust these models without establishing their fairness. The best defense that we can employ is transparency and negative feedback control loops that help correct these models for accuracy. Cathy O’Neil has analyzed this very phenomenon in her book Weapons of Math Destruction – a delightful read!

Artificial Intelligence and Machine Learning:

Artificial intelligence is intelligence exhibited by machines. AI attempts to solve the following categories of problems using various methods (statistics, computational intelligence, machine learning or traditional symbolic AI) to achieve goals like social intelligence, creativity and general intelligence.

 

  • Reasoning
  • Knowledge Representation
  • Planning
  • Learning
  • Natural Language Processing
  • Perception
  • Robotics

There have been a number of efforts into machine autonomous behavior for e.g. autonomous driving cars, that use a variety of sensors like cameras and radars to collect information about the road and other vehicles and make real time decisions about control of the car.

 

Machine Learning problems can be broadly divided into supervised learning (where we have a body of data that a computer can use to learn and mimic), unsupervised learning (where the computer tries to make sense of patterns in a sea of random data whether through classification or clustering) and reinforcement learning (when a program interacts with a dynamic environment to perform towards a certain goal without an explicit teacher). A general categorization of machine learning tasks are as follows – classification, regression, clustering, density estimation and dimensionality reduction.

Is the ultimate design the creation of a self aware machine that can compete with humans for survival? Will this be a symbiotic relationship or a competition for survival? Are we simply a tool in the evolutionary process playing our part in creating a smarter, better and more resilient new being?

Fake News and Information Velocity

Trends in Information Dissemination: Speed of Information Transmission is increasing at a very rapid pace and veracity (the source, the “Truthiness” of the information (thank you Stephen Colbert!), or if it has been tampered with en-route) has not .

Initially information travelled as fast as humans could travel – A courier would take a document or a piece of information and use a fast horse or chariot to convey it from one location to another. Then humans invented other modes of transmission of signals – carrier pigeons, smoke signals, sound/light transmissions within line of sight and then we moved on to using an electric current (telegraph, telephone) and eventually using light or or radio or microwave, VHF, UHF transmissions. We also learnt how to use satellites for communication when the curvature of the earth’s surface got in the way of line of sight transmission. Mostly this was point to point with respected agents in the middle establishing the veracity of the information – like newspapers, radio stations, tv stations etc.

Meanwhile in the early part of this century, we had the advent of a number of social networks like Facebook, LinkedIn, Twitter, SnapChat, YouTube, MySpace  etc. These networks connected individuals into social networks and facilitated an extreme agility in information transmission. Think  how easy it is to share an update or a personal opinion on these networks. It has developed to such an extent that it is possible to rapidly disseminate false news with real consequences.

Now it has become possible for anyone to act as an agent and share any content however authentic or inauthentic with his network. In a highly interconnected social network, this results in sacrificing veracity.

Take for example this specific site – focusnews.us, that very often shows up on my Facebook feed.

This site usually runs incendiary stories with provocative headlines like the following (I have only attached news items that showed up on my Facebook feed today because someone in my network liked it, or shared it or commented on it). Here’s a commentary of someone’s personal opinion disguised as news and sensational clickbait:

 

And having a few catalysts in any social network – implies a news story can be disseminated very easily without the usual veracity requirements as a traditional news organization.

The effect of rapid information dissemination and network amplification that helps false news propagate and have a much more profound effect on public perception.

I looked at their website to understand if they had any journalistic credentials. I found none – no names for the management team, the editor or any journalistic team.  The Contact Us section provided an anonymous email address (world@focusnews.us) that did nothing to reassure me of their credentials. So I am assuming this is a clickbait operation, with a goal to generate ad revenues by posting sensational stories on social networks and getting people to click on them. But I haven’t seen any ads on their site – so what should I assume? Is this a disinformation operation that is being fed to a gullible american electorate who loves their conspiracy theories!

When I looked up the internet registration record for this site, it appears to be registered in Macedonia and regularly publishing unverified US news.

RAW WHOIS DATA

Domain Name:                                 FOCUSNEWS.US

Domain ID:                                   D55884931-US

Sponsoring Registrar:                        GODADDY.COM, INC.

Sponsoring Registrar IANA ID:                146

Registrar URL (registration services):       whois.godaddy.com

Domain Status:                               clientDeleteProhibited

Domain Status:                               clientRenewProhibited

Domain Status:                               clientTransferProhibited

Domain Status:                               clientUpdateProhibited

Variant:                                     FOCUSNEWS.US

Registrant ID:                               CR255879236

Registrant Name:                             ivan stankovic

Registrant Address1:                         JNA 18

Registrant City:                             kumanovo

Registrant State/Province:                   macedonia

Registrant Postal Code:                      1300

Registrant Country:                          MACEDONIA, THE FORMER YUGOSLAV REPUBLIC OF

Registrant Country Code:                     MK

Registrant Phone Number:                     xxxxxxxxxxxxxxxxxxxx

Registrant Email:                             @gmail.com

Registrant Application Purpose:              P3

Registrant Nexus Category:                   C11

Administrative Contact ID:                   CR255879238

Administrative Contact Name:                 ivan stankovic

Administrative Contact Address1:             JNA 18

Administrative Contact City:                 kumanovo

Administrative Contact State/Province:       macedonia

Administrative Contact Postal Code:          1300

Administrative Contact Country:              MACEDONIA, THE FORMER YUGOSLAV REPUBLIC OF

Administrative Contact Country Code:         MK

Administrative Contact Phone Number:         xxxxxxxxxxxxxxxxxx

Administrative Contact Email:                 @gmail.com

Administrative Application Purpose:          P3

Administrative Nexus Category:               C11

Billing Contact ID:                          CR255879239

Billing Contact Name:                        ivan stankovic

Billing Contact Address1:                    JNA 18

Billing Contact City:                        kumanovo

Billing Contact State/Province:              macedonia

Billing Contact Postal Code:                 1300

Billing Contact Country:                     MACEDONIA, THE FORMER YUGOSLAV REPUBLIC OF

Billing Contact Country Code:                MK

Billing Contact Phone Number:                xxxxxxxxxxxxxx

Billing Contact Email:                        @gmail.com

Billing Application Purpose:                 P3

Billing Nexus Category:                      C11

Technical Contact ID:                        CR255879237

Technical Contact Name:                      ivan stankovic

Technical Contact Address1:                  JNA 18

Technical Contact City:                      kumanovo

Technical Contact State/Province:            macedonia

Technical Contact Postal Code:               1300

Technical Contact Country:                   MACEDONIA, THE FORMER YUGOSLAV REPUBLIC OF

Technical Contact Country Code:              MK

Technical Contact Phone Number:              xxxxxxxxxxxxxxxx

Technical Contact Email:                      @gmail.com

Technical Application Purpose:               P3

Technical Nexus Category:                    C11

Name Server:                                 NS1.FOCUSNEWS.US

Name Server:                                 NS2.FOCUSNEWS.US

Created by Registrar:                        GODADDY.COM, INC.

Last Updated by Registrar:                   GODADDY.COM, INC.

Domain Registration Date:                    Fri Oct 21 22:24:17 GMT 2016

Domain Expiration Date:                      Fri Oct 20 23:59:59 GMT 2017

Domain Last Updated Date:                    Mon Oct 31 15:37:59 GMT 2016

DNSSEC:                                      false

 

 

If people are gullible enough to fall for this clickbait and generate traffic for this website, there is nothing wrong with this – this lets them push advertising based on site traffic and a couple of kids making money off this,it is a perfect example of capitalism.

And who knows if they are also being paid by any foreign government to carry out a disinformation campaign – oh wait – thats not true – right – we just heard from Putin that they would never do so…so obviously this line of reasoning is wrong…

And if my fellow Americans are gullible enough to fall for these clickbaits and provide these entrepreneurs with a steady revenue stream – so be it. But let’s not call it news anymore….

 

Do also check out this report on how fake news works (from media matters.org) –

 

Reading List

This is a book list I have created for my kids – I highly recommend these…Sid has finished these and Shaurya is progressing. Will keep adding more as I come across ones I recommend.

  1. Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future – Ashley Vance
  2. Sapiens: A Brief History of Humankind – Yuval Noah Harari
  3. Homo Deus : A Brief History of Tomorrow – Yuval Noah Harari
  4. The Gene : An Intimate History – Siddhartha Mukherjee
  5. The Emperor of All Maladies: A Biography of Cancer – Siddhartha Mukherjee
  6. The Body Builders : Inside the Science of the Engineered Human – Adam Piore
  7. The Wright Brothers – David McCullough
  8. The Road to Character – David Brooks
  9. Hit Makers – Derek Thompson
  10. Brave New World – Aldous Huxley
  11. President Barack Obama – David Blum
  12. The Art of War – Sun Tzu
  13. The Hitchhikers Guide to the Galaxy – Douglas Adams
  14. A Path Appears – Nicholas D Kristof and Sheryl Wudunn
  15. Steve Jobs – Walter Isaacson
  16. Lord of the Rings Series – J R R Tolkien
  17. Harry Potter Series – J K Rowling
  18. David and Goliath – Malcolm Gladwell
  19. The Audacity of Hope – Barack H Obama
  20. Dreams from my Father – Barack H Obama
  21. The Power of Habit – Charles Duhigg
  22. Weapons of Math Destruction – Cathy O’Neil
  23.  1984 – George Orwell
  24. Animal Farm – George Orwell
  25. Fahrenheit 451 – Ray Bradbury
  26. Between the World and Me – Ta-Nehisi Coates
  27. Underground Railroad – Colson Whitehead
  28. God : A Human History – Reza Aslan

And these are some that I recommend from my professional life –

  1. The Startup of You – Reid Hoffman/ Ben Casnocha
  2. Principles : Life and Work – Ray Dalio
  3. Smarter Faster Better : The Transformative Power of Real Productivity – Charles Duhigg
  4. Influence Without Authority : Allan R. Cohen & David L. Bradford
  5. The Situational Leader – Dr. Paul Hersey
  6. Leadership and the One Minute Manager – Ken Blanchard, Patricia Zigarmi & Drea Zigarmi
  7. The Black Swan – Nassim Nicholas Taleb
  8. Anti Fragile – Nassim Nicholas Taleb
  9. Skin in the Game – Nassim Nicholas Taleb
  10. The Back of the Napkin – Dan Roam
  11. Signal and the Noise – Nate Silver
  12. Flash Boys – Michael Lewis
  13. Dark Pools – Scott Patterson
  14. The Goal – Eli Goldratt