Wednesday, January 21, 2015
The Fox is in the PMP Henhouse
Thursday, January 15, 2015
PMPs Are Inadequate to the Task
- Most opiate overdose deaths and growth in
them can be traced back to prescriptions: “4 in 5 of people today who
start using heroin began their opioid addiction on prescription opioids.”
Clamping down on the supply of heroin alone will not address the problem.
- U.S. clinicians “write more prescriptions
for opiate painkillers each year than there are adults in the United
States.”
- · The Fox is in the PMP Henhouse - When doctors and/or pharmacists are involved in the fraud the PMP is not a defense. This is a major failing of relying on PMPs. Although very few doctors participate in scams, if, as the Boston DEA’s SAC Ferguson says, “there are too many rogue doctors and pharmacists” then we are not being diligent enough if we ask rogue doctors and pharmacists to check on themselves
- · Prevention Effectiveness Requires Transactional Consistency - PMP data is subject to error in the interpretation by myriad independent physicians and pharmacists each applying their individual interpretations and doing it with different levels of diligence each time
- · Design Prescription Monitoring for Operability - PMPs oblige doctors and pharmacists to examine a data base, manually, with each patient, causing delay, frustration and cost in the office. It’s as if when buying clothes at a retailer the sales clerk stops the sale to check your credit score
- · Closing the In-state PMP Loop - With PMPs data are only collected for prescriptions filled, not prescriptions written. The PMP cannot detect potential diversion prior to dispensing. You can see doctor after doctor for at least a week before anyone notices
- · In Opiate Abuse Prevention, PMP Timelinessis Godliness - PMP data are collected monthly, or at best in some states weekly. This is not sufficient to capture diversion, which can be done intraday with patients getting prescriptions from multiple doctors and filling them at multiple pharmacies in very short periods of time
- · State-by-State Doctor Shopping Prevention Silos - Because they vary, technically, by state, and because laws governing their data and use are written without sharing across state lines in mind, PMPs do not operate across state lines. Multiple prescriptions can be written in one state and a very short time later, often minutes, filled in a nearby state with no-one the wiser.
Tuesday, May 27, 2014
Leadership Attributes That People Like
I am unclear what formally passes for "going viral" on LinkedIn but this one question, as of the end of May, has generated over 5,000 comments. I decided to investigate, using the comments in the stream, "what ARE the attributes that people think make up a leader?"
If there is a way to download all the comments I don't know it, so I copied and pasted a sample into an Excel sheet. Then, using a series of simple transformation and filtering tricks I removed all of the noise and distraction that comes with a simple "copy and paste" and whittled the file down to only those responses that elicited a "like" inside the discussion. In a truly circumstantial outcome, in this manner I came down to 100 comment types in the sample I chose. To recap, I have a 100 item subset of 5,000 comments within a group of people who are users of LinkedIn and are members of the Harvard Business Review (HBR) group within LinkedIn.
To make my small analysis more approachable I've filtered further. A number of people respond to Ian's request for "the single most important quality" with multiple qualities, e.g. Trust and Humility, or with paragraphs. In these cases I typed the comment with the first type used, not both. Also, in my cut and paste sample the most dominant comments that were liked were those that explained that the answer is situational, unknowable,.. a mystery, There were 1047 likes across my sample comment types. 318 of these are in the comment type I labeled "Situational Mix." I created this chart with those comment types that are not "Situational Mix":
Almost all of the attributes that got more than 10 "likes" are about the leader's character, not the skill set. Trust, Integrity and Humility lead the list. Then the ability to communicate is cited, ending in this list of most-often-liked with the redundant Leadership.
The pattern extends in the types I've summarized as 6-10 likes and 1-5 likes. Words like "passion,", "reliability", "compassion" and "virtue" are listed. "Analysis," "negotiation," "synthesis," and similar skills are not cited.
Because its the HBR group the respondents, whether CEOs or not, most likely have at least some leadership responsibility, even if in a small group. With fair reason we can expect these people to be leaders or directly interact with them. Yet, in reading, the responses strike me as aspirational. They read more as what people think leaders should do, what people wish their leadership does do, than as analytical of the actual behavior of leaders.
My method doesn't approach science so I'll end with observations. First, a simple question on LinkedIn can generate enormous activity. In this case the question is about the attributes of "leadership." Leadership seems to be something people are passionate about. At the same time, leadership is something that people do not appear to be consistent about. Except for the high concentration of people who say "its a mix of things" that describe leadership, there is little consistency in the responses. People care about leadership. They know it when they see it. But they don't have a simple, shared expression of what it is.
Wednesday, May 12, 2010
A Cloud, by any other name, is how you tweet
There are arguments about what’s in The Cloud or, said another way, what constitutes Cloud Computing. Some purists vociferously deny that there is such a thing as a Private Cloud. Others say the only reasonable way for large corporations to migrate to cloud computing is through the use of both external, or public clouds, and internal or private cloud services.
No matter what cloud computing sellers say there are practical limitations to moving existing business technology to cloud platforms. Most often when this is discussed the issues of establishing the target platform, testing and configuring, establishing management practices covering change management, service quality, security and access and the like are central to the discussion.
The so-called mythical man-month and the related issue of how to use scarce IT funds is also central. Cloud computing proponents rightly will tell you that cloud operating costs are somewhat lower than comparable in-house costs. Cloud providers are operating at scale and usually pricing on the margin. It’s a big cost advantage… if you don’t examine the switch-over costs.
The switch-over costs are not limited to the dollars or Euros involved in migrating applications to Das Kloud, whether public or private. The act of migration is distractive. It means the halt to the development of any new function, today, while legacy applications are migrated to a lower-cost platform tomorrow. That’s a bad thing.
Smaller companies with smaller applications portfolios may feel this pinch less than medium and large firms do. But for most, the time and opportunity costs of migrating the out-of-sight, out-of-mind legacy is too high for the benefits. It is often best to move those applications as they age to the point of replacement or major re-engineering.
New systems or major bolted on enhancements are a different matter. Provided there is a reasonably current interface available these new functions can be designed, developed and deployed in a cloud environment and linked through the web to the legacy.
New uses of IT, like social media technologies in Marketing 2.0 applications, tend to be cloud-provisioned. Instead of coordinating and helping, old-schoolers often try to block corporate access to Facebook, Twitter, YouTube and the other places where the customers are learning about and discussing your products.
Companies must be involved in those conversations. This drives marketing people to external clouds and creates gratuitous governance issues for IT. IT needs to get on board. “Resistance is futile.” Whether that cloud is Private, Public, or a hybrid, for most of us a cloud, by any other name, is how you Tweet.
Wednesday, April 21, 2010
4 Ways for Cloud Computing to Gain Legitimacy
It says something about cloud computing when the NY Times, not often an information technology bellwether, not known for surfing on the bleeding edge of technology, publishes on its business pages an article on how mainstream companies are slowly but surely examining and adopting cloud computing. That the NY Times Business Section has noticed cloud computing is a clear indication that The Cloud has risen, in the mind of general management, beyond awareness and interest to the level of general business management discussion and decisions.
Action, one way or another, can’t be too far ahead. What will established companies be looking for? What must cloud computing providers do?
To date start-ups or smaller companies have been buying cloud services either to run all their applications or, just as often, to run some of the services like e-mail or, as in the case with Netflix, the web-presence portion of IT. Greenfields IT is relatively easy. But these companies haven’t got the scale and complexity of IT infrastructure that a Fortune 500 sized company has.
There is a wide array of cloud service providers. Expected names like IBM and Google are in the mix but Amazon, on first blush a surprise, is an industry leader. There are less gigantic players like Rackspace and Terremark. There are “public” cloud providers where the services are only available outside a company’s network. To the purists this is the only cloud that is a cloud. IBM and Acadia, a joint effort by EMC, Intel and Cisco, are offering so-called “private” cloud services where the web-based, on-demand capabilities are privately held or within a privately managed and controlled bubble.
Working on Step 2
Cloud computing providers are now reaching out to major corporations in an effort to provide core computing services to them via the cloud. Their relative success will depend on their ability to discuss, offer and deliver their cloud services less as a “transformational new paradigm in information technology” and more as a solid, tested, and trusted component of effective and efficient business operations.
To the extent that cloud computing significantly penetrates mainstream computing in large businesses providers will have to convince prospects that they understand the needs and motivations of mainstream business. Said in the framework of Everett Rogers’ Diffusion of Innovations, businesses that are innovators that are excited by the next new thing are already using the cloud. So are “early adopters,” companies that through need or culture like to be on the leading edge. For cloud computing to find a major market it must “cross the chasm,” in Geoffrey Moore’s “Crossing the Chasm” terminology, and appeal to the “early majority” of main stream businesses. They buy on different signals and in different ways.
The Early Majority are pragmatists. They care about the company they are buying from, the quality of the product they are buying, the infrastructure of supporting products and system interfaces, and the reliability of the service they are going to get. Pragamatists tend to be 'vertically' oriented, meaning that they communicate more with others like themselves within their own industry than do technology. A standard question: “Where else have you done this for someone just like me?”
There are four fundamental characteristics of visionaries that alienate pragmatists. When planning and executing a marketing strategy, when engaging prospects in sales efforts, cloud computing services should avoid all four. They include:
1. Lack of respect for colleagues' experiences.
2. Taking greater interest in technology than in their industry.
3. Failing to recognize the importance of existing product infrastructure.
4. Overall disruptiveness.
I have worked in multiple very innovative software companies and came to dread the meetings where the founder/chief architect/head visionary is on a sales call and forgets to listen to the prospects. Instead, they frequently listen for a bit and lapse into how all encompassing the vision is and how smart we were to provide it to solve your problems, whatever they are. Implicitly we were also saying how behind the times the prospects were if they didn’t get on board. We would get smiles and encouraging signals of further consideration. The near universal back-channel reaction was that the prospects were plenty smart and plenty experienced too. They have a number of issues and we didn’t take the time to grasp and deal with them. We should come back when we’re prepared. Similarly, cloud providers who are in a race to establish market share may very well win that race through patience and listening.
A difficulty about providing technology is that evaluation discussions frequently become about the technology. It is important to know and measure scalability, be able to show how and if you use the Rete Alogrithm or not (for 50 bonus points, without using the web, what is THAT about?), and have a discussion of file size compression for rich media content. This class of issue has its place, and, since sales to the mainstream involve consensus across the prospects functions, they will be covered. But, these issues describe how value is delivered, not what the value is. In the end the winning providers in mainstream competitions will understand and communicate about in-this-industry net value. By net value I mean the value net of vendor-risk (can they support us, are they strong enough to stay with us, if something goes off the rails can they recover?).
Mainstream corporate IT has a ton of legacy, as well it should. The legacy systems and underlying infrastructures represent the collective, and sometimes forgotten, knowledge and wisdom of thousands of people over many decades. Legacy applications are rarely pretty, in IT terms. Within an enterprise they yield multiple systems architectures, multiple sets of underlying operating and data management software, multiple hardware platforms and configurations. Successful mainstream cloud efforts will work with these realities, align with them, adjust and change them where possible over time. Watch out for the cloud provider that attempts the large-scale, 100% conversion in an accelerated timeframe. It will look good for the business case, certainly look good on their income statement, and almost certainly fail under the pressure and complications.
Vendors of cloud services are in a difficult place. They need to introduce a new way of delivering, consuming and paying for computing to the mainstream market that buys consistency and reliability and distrusts change. The apparent economic advantage of cloud computing, it is generally priced on the margin, is the carrot. The winners will be able to communicate and deliver what the buyers view as risk-adjusted superior value. My personal expectation is that they will but only to the extent they put on their customers’ shoes and walk around in them.
Wednesday, April 14, 2010
On Social Media IT Pros Often are the Luddites
A discussion was started on CIO Zone yesterday that makes my hair hurt.
Titled “CIO’s Are Getting Tougher on Social Media” the main article reported data from a Robert Half survey of IT management regarding the use of
The author expresses surprise, “after all, we can all remember a time when allowing staffers to use the Internet seemed like a crazy idea from security and productivity standpoints.” I found the inward-looking, functional resistance nature of many of the comments more surprising. Here’s the first one:
... But if it were solely up to me to dictate policy, I would block Facebook/Twitter but encourage use of LinkedIn and professional social networking sites such as CIOZone.
To me, Facebook is nearly exclusively used for personal use and people who are addicted to Facebook tend to squander huge chunks of their time on it. I very much doubt many people at most companies have a compelling business reason to use it on a regular basis. Maybe give access to an HR person for potential background checking-type things, but that's it.
You can’t make some stuff up. The above comment reads as though the writer has never interacted with anyone in sales, marketing or customer service and support. I’m fairly certain that the writer has had such interactions but the position taken denies it. He clearly doesn’t work at Best Buy and has never heard of Blue Shirt Nation. He can’t work inside Booz Allen with Walton Smith. He doesn’t work at Thomas Nelson Publications.
No business can responsibly be interacting with and engaging with its markets, especially customers, prospects and influencers, without
Thus, all parts of the organization that interacts with customers, prospects and influencers must use it, any and all of it that the community they deal with uses. This means just about everyone in your organization needs access to Twitter, LinkedIn, Facebook, wikis, etc., etc.... except, maybe, the Luddites in IT.
Read the comment again. The writer is saying that the external social sites that he uses are fine but those that others use aren’t justified. It’s another way to say “I don’t know what other people do.”
Other comments are more sensible. An example, “you can't bury your head in the sand… you can't simply expect this thing called social media to go away. 40% of all professionals now use their profiles to email colleagues - soon email as we know it will be a thing of the past. For the professional side of social networking, reaching out to peers for industry discussions, problem solving and keeping abreast of business news, this site and others make complete sense. Forrester tells us time and time again that learning from peers in forum discussions and via video content is where it's at.”
Ed Zachary!
But the Luddites are there. “I believe that the security of the company must come before convenience” is a common sentiment. The problem is that this is not the choice. It’s security risk versus market participation risk. “Convenience” is not at issue.
Another view, “I still have a hard time justifying the use of Twitter, Facebook, MySpace, etc. in a corporate setting unless someone is doing sanctified marketing or other corporate promotion.” “Sanctified?....” Frankly, this comment reads as though the writer feels inconvenienced by all that “marketing stuff.” He should read the company’s income statement.
Working on Step 2
A viewpoint to get behind is “there is also no doubt that the world has shifted in such a way that personal and business boundaries are blurring, with work spilling into personal time and vice versa… The ubiquitous presence of personal mobile devices capable of posting to social networks places the issue outside of an employer's ability to restrict access.”
This view is consistent with that of Microsoft’s CIO, Tony Scott. Recently interviewed by CIO Zone Scott said that its actually social media “in life” and that they were going to entirely invert their previous position on the consumerization of IT and orient their infrastructure to support the technology their employees bring to the firm rather than force their employees to fit into an IT-generated cookie cutter.
I don’t suggest for a second that security concerns are immaterial. The normal rules of engaging in inappropriate content should be enforced as should professional standards of protection against sites and services that create security and access exposures. That said I agree with Sam Curry of EMC’s RSA group (they do security). Sam will tell you that business is ultimately about Risk v. Reward, that Fear, Uncertainty and Doubt (FUD) are no way to run a business, and that the task is to “ensure the right people have access to the right information over a trusted infrastructure.” “Trusted” is different from “entirely restrictive” and essentially not useful nor helpful.
It is clear, at least to me, that all parts of the organization that interact with customers, prospects and influencers must use Enterprise 2.0 technologies, must use “social media.” It is also clear that what is the best or appropriate tool to use for what business purpose is under rapid change. Your company doesn’t get to choose which ones the community-of-interests you deal with use. That is defined outside your enterprise and you must adapt to that definition, unless, maybe, you’re a technology Luddite inside IT.
This means just about everyone in your organization needs access to Twitter, LinkedIn, Facebook, YouTube, wikis, etc. You already have management authority to keep people working instead of fooling around, whether the technology is there or not, use it. Expect people to get their work done and provide them the tools to do so. Increasingly these are
Wednesday, April 7, 2010
Clouds, Stages, and IT Spending
-->
From up and down and still somehow
It's cloud's illusions I recall
I really don't know clouds at all
--> -->
- Systems built this year must be run and supported over time
- Left unchecked, the compounding effect of increased operations and support costs inexorably crowd out further new systems spending
- Because businesses cannot tolerate static systems, because system change and new challenges emerge, constant efficiencies are needed in operations and support costs to make budgetary room for new systems development

![]() |
Nolan's 4 Stages of EDP (IT) Growth |
-->
-->