Securosis

Research

Friday Summary: October 14, 2011

It started with a corn chip. I was eating corn chips – a fresh bag – and they tasted like hell. I had a tomato and some strawberries, thinking eating healthy would be good, but my body said otherwise. They made me feel poorly. I was in the airport waiting for my flight to the Bay Area, thinking “What the hell are they putting in this stuff – it’s a freakin’ corn chip?” I anticipated that my trip would be emotionally exhausting, and I would be run down from all the work, but I ended up feeling better than I had in years. I mean, after a couple days, I was feeling really good. Part of it was being able to see good friends, and some of it was a few days without working. But it was more than that – after a week I realized that I had been eating really well and it was making me feel much better. The food we ate in Berkeley was largely locally grown fruits and vegetables, organic meats and grains. Every time I went to dinner at someone’s house it was food out of the garden. Well, the Scotch was not locally crafted, but everything else was. I mentioned this over dinner one night and I got an earful. My friends went into an entire story about how their farm animals can tell the difference between genetically engineered corn and the ‘real’ stuff, and tend to leave it uneaten. In fact it was the health of their pets – average lifespan of their dogs extended by 35%, and fewer incidents of cancer – that convinced my hosts to go on a natural food diet. They told me they had gone vegetarian, but later realized it was not a meat vs. no meat issue, but a crap food issue. They went through the process of finding raw foods and bought a place where they could have a year-round garden. They are eating meat again – but it took a long time to find food that was not totally bastardized. I have to say that chicken taste like chicken. That may sound stupid, but the slow degradation of eating grocery store or fast food chicken prevents you from realizing just how far off what’s being sold to you is. Taste and texture. The real stuff cooks differently as well, and it just tastes great! I guess I always knew home grown tasted better – but I was not aware how much. The pork was white meat and tasted great. The eggs tasted nothing like what I get in the supermarket. None of the bottled sauces, syrups, or seasonings – it was all homemade. I had known there is a huge difference in produce – especially tomatoes – as you can’t find a tomato that tastes like anything but water at mainstream grocery stores. But between the engineering on the tomato varieties so they remain firm for shipment, and the fact that they’re picked weeks before they are ripe and instead turned red with gas… no wonder the taste is absent. Good food makes eating more fun. This resulted in a very weird experience when I got back home – walking through the grocery store, I felt as if half the stuff on the shelves was poisonous. In fact I had trouble finding anything I wanted to eat – even if you read the label, you can’t determine what’s in these ‘products’, but it’s likely not food. And for those who know me, given my metabolism, getting enough food is usually a problem. Trying to eat healthy was compounding the issue. So I decided to do something about it, and jump in with both feet. In fact I am making up for lost time. I’ve started driving 25 miles down to the good grocery stores to get better food. I have decided to grow more food, and in the last few days discovered fruit trees that thrive in desert heat; I ordered a half dozen peach, apricot, aprium, apple, and almond trees. I purchased Valencia ‘summer’ oranges to fill the summer gap in citrus – I already have 9 trees that ripen at differnt times of the year. I have replaced most of the sugar in the house with unprocessed stuff, stocking up on honey and maple syrup. I am researching beehives – I have space way out back in mind. I have replaced all the flour in the house with different grades of whole wheat and buckwheat flour. I have designed a garden enclosure – in CAD – to keep the million-and-one different varieties or critters out of the garden I will be building shortly. I have found seeds for vegetables that thrive in the desert heat. I am looking for someone in Phoenix who sells non-steroid, non-hormone and low/no antibiotic beef. Heck, I am even considering a chicken coop. Even as I type this, it sounds radical to me. So much so that I am afraid Rich is going to come over here, place me in an arm-bar, and scream ‘Hippie!’ in my ear. But so far I am feeling better and meals taste a lot better, so what the hell. It’s more work, and in the short term will be much higher cost, but so far I think it’s worth it. On to the Summary: Webcasts, Podcasts, Outside Writing, and Conferences Rich quoted in SC Magazine. Favorite Securosis Posts Rich: David on Architectural Limbo. Remember, folks, Mr. Mortman builds and runs things in the cloud for a living… this isn’t just theory. Adrian Lane: The Securosis Nexus (and) Beta Test FAQ. Nexusey Goodness. Mike Rothman: New Series: Tokenization Guidance. No hidden agendas. No vendor sniping. Just a clear focus on what you need to do. A perfect example of how Securosis research is just different. Kudos to Adrian. Read the series. David Mortman: Good versus bad FAIL. Other Securosis Posts Tokenization Guidance: PCI Supplement Highlights. Incite 10/12/2011: Impact and Legacy. Isolated Computing.

Share:
Read Post
dinosaur-sidebar

Totally Transparent Research is the embodiment of how we work at Securosis. It’s our core operating philosophy, our research policy, and a specific process. We initially developed it to help maintain objectivity while producing licensed research, but its benefits extend to all aspects of our business.

Going beyond Open Source Research, and a far cry from the traditional syndicated research model, we think it’s the best way to produce independent, objective, quality research.

Here’s how it works:

  • Content is developed ‘live’ on the blog. Primary research is generally released in pieces, as a series of posts, so we can digest and integrate feedback, making the end results much stronger than traditional “ivory tower” research.
  • Comments are enabled for posts. All comments are kept except for spam, personal insults of a clearly inflammatory nature, and completely off-topic content that distracts from the discussion. We welcome comments critical of the work, even if somewhat insulting to the authors. Really.
  • Anyone can comment, and no registration is required. Vendors or consultants with a relevant product or offering must properly identify themselves. While their comments won’t be deleted, the writer/moderator will “call out”, identify, and possibly ridicule vendors who fail to do so.
  • Vendors considering licensing the content are welcome to provide feedback, but it must be posted in the comments - just like everyone else. There is no back channel influence on the research findings or posts.
    Analysts must reply to comments and defend the research position, or agree to modify the content.
  • At the end of the post series, the analyst compiles the posts into a paper, presentation, or other delivery vehicle. Public comments/input factors into the research, where appropriate.
  • If the research is distributed as a paper, significant commenters/contributors are acknowledged in the opening of the report. If they did not post their real names, handles used for comments are listed. Commenters do not retain any rights to the report, but their contributions will be recognized.
  • All primary research will be released under a Creative Commons license. The current license is Non-Commercial, Attribution. The analyst, at their discretion, may add a Derivative Works or Share Alike condition.
  • Securosis primary research does not discuss specific vendors or specific products/offerings, unless used to provide context, contrast or to make a point (which is very very rare).
    Although quotes from published primary research (and published primary research only) may be used in press releases, said quotes may never mention a specific vendor, even if the vendor is mentioned in the source report. Securosis must approve any quote to appear in any vendor marketing collateral.
  • Final primary research will be posted on the blog with open comments.
  • Research will be updated periodically to reflect market realities, based on the discretion of the primary analyst. Updated research will be dated and given a version number.
    For research that cannot be developed using this model, such as complex principles or models that are unsuited for a series of blog posts, the content will be chunked up and posted at or before release of the paper to solicit public feedback, and provide an open venue for comments and criticisms.
  • In rare cases Securosis may write papers outside of the primary research agenda, but only if the end result can be non-biased and valuable to the user community to supplement industry-wide efforts or advances. A “Radically Transparent Research” process will be followed in developing these papers, where absolutely all materials are public at all stages of development, including communications (email, call notes).
    Only the free primary research released on our site can be licensed. We will not accept licensing fees on research we charge users to access.
  • All licensed research will be clearly labeled with the licensees. No licensed research will be released without indicating the sources of licensing fees. Again, there will be no back channel influence. We’re open and transparent about our revenue sources.

In essence, we develop all of our research out in the open, and not only seek public comments, but keep those comments indefinitely as a record of the research creation process. If you believe we are biased or not doing our homework, you can call us out on it and it will be there in the record. Our philosophy involves cracking open the research process, and using our readers to eliminate bias and enhance the quality of the work.

On the back end, here’s how we handle this approach with licensees:

  • Licensees may propose paper topics. The topic may be accepted if it is consistent with the Securosis research agenda and goals, but only if it can be covered without bias and will be valuable to the end user community.
  • Analysts produce research according to their own research agendas, and may offer licensing under the same objectivity requirements.
  • The potential licensee will be provided an outline of our research positions and the potential research product so they can determine if it is likely to meet their objectives.
  • Once the licensee agrees, development of the primary research content begins, following the Totally Transparent Research process as outlined above. At this point, there is no money exchanged.
  • Upon completion of the paper, the licensee will receive a release candidate to determine whether the final result still meets their needs.
  • If the content does not meet their needs, the licensee is not required to pay, and the research will be released without licensing or with alternate licensees.
  • Licensees may host and reuse the content for the length of the license (typically one year). This includes placing the content behind a registration process, posting on white paper networks, or translation into other languages. The research will always be hosted at Securosis for free without registration.

Here is the language we currently place in our research project agreements:

Content will be created independently of LICENSEE with no obligations for payment. Once content is complete, LICENSEE will have a 3 day review period to determine if the content meets corporate objectives. If the content is unsuitable, LICENSEE will not be obligated for any payment and Securosis is free to distribute the whitepaper without branding or with alternate licensees, and will not complete any associated webcasts for the declining LICENSEE. Content licensing, webcasts and payment are contingent on the content being acceptable to LICENSEE. This maintains objectivity while limiting the risk to LICENSEE. Securosis maintains all rights to the content and to include Securosis branding in addition to any licensee branding.

Even this process itself is open to criticism. If you have questions or comments, you can email us or comment on the blog.