Special thanks go to John Kineman who has acted as a reader for this blog, providing invaluable help in clarifying my thinking. I alone bear responsibility for the end result! The need to surrender sovereignty,…
Category: 3 Asymmetries
The different ways of managing the supply-demand relationship.
by Philip Boxer Why three kinds of symmetry-breaking? Because each symmetry is based on a different kind of basis for agreement: ‘how to do things’, ‘who to be’ and ‘what to want’. The need for…
by Philip Boxer Architectural evaluation usually focuses on the supplier’s domain from which a product or service is to be provided in response to some customer’s direct demand. The supplier approaches architecture from the starting…
by Philip Boxer PhD Why the interest in stratification? A colleague, Simon Western, referred me recently to Actor-Network Theory and the work of Bruno Latour in the context of a conversation about the behaviour of…
by Richard Veryard We can use the three asymmetries to appreciate different strategies for security and trust, such as deperimeterization. First we need some definitions: Boundary refers to a discontinuity in a physical system, Perimeter…
by Philip Boxer
By including the third asymmetry, stratification can no longer take the form of a universal hierarchy, but instead must be particular to the relationship to demand. It is this which presents the business with its double challenge.
by Philip Boxer
Different kinds of service are described, depending on the way in which a customer chooses to internalise or externalise its learning as it responds to its own value deficit.
by Richard Veryard In his Confused of Calcutta blog, JP Rangaswami (now CIO of BT’s Services Division) picks up a definition of Enterprise Architecture from Andrew McAfee: “IT that specifies business processes”. JP argues that…
by Philip Boxer
As we develop our understanding of the three asymmetries, it is helpful to associate them with three corresponding forms of economy that their management generates.
by Richard Veryard
This post provides a brief explanation of the three asymmetries, extracted from our Microsoft Architecture Journal article.