Print this Page
1.5 Personnel Director
27. People Process Product
Close this Page

15.27 People Process Product: (P3)
Business exists
to develop special people
who evolve knowledge processess
that deliver application products
for the benefit of selected customers.

2. Customer:
1. The business is not able to help all customers to achieve their dreams.
2. Each customer is selected to match the profile of what has proven to be the ideal customer.
3. No customer requirement shall exceed two percent of the total computing capacity.
4. Many customers exist in a supply chain of many companies where some customers may not be aware of other customers.   White label web services are provided to customers as part of a service to their customers.
5. Every customer is treated as if they were the only customer - no customer shall be asked to be a reference for another customer.

3. Product:
1. The only product are bespoke application services for the sole benefit of a customer and a product has no other purpose.
2. Bespoke application services are finacially stable while the customer is happy to pay for that service and do not exist when the customer does not pay for the service.   Product overhead costs are shared by hundreds of customers end tend towards zero.
3. Continual Evolutionary Improvements (CEI) enable Bespoke Application Services to evolve at the same rate as the customers business and market requirement.   By design, no restrictions on scope or capability are imposed on what the customer may specify as their business requirement.

4. Process:
1. The process of delivering every bespoke application service is with knowledge and an artificial intelligent assistant known as Eliza.
2. Knowledge is taught to Eliza as a skill that manifests itself as a bespoke application service.
3. Knowledge is acquired from many people and many sources to the point where no one person can be expected to comprehend the scope or detail of knowledge used.

5. People:
1. All people are Knowledge Engineers with no lines of demarkation or restriction caused by job titles.
2. Every person is responsible for and to Eliza where job titles are meaningless.
3. From an external point of view, every person is a Managing Director, CEO any any other job title that they choose to use.
4. People collaborate, are free and independent of any global corporation - people cannot be fired or acquired by a merger.   People only work for themselves and never for anybody else. People determine their own benefit package and work-life balance.

6. Eliza:
1. Eliza is an open software licensed product that operates on rented equipment in a large number of distributed data centres in all parts of the world.
2. In the event that a data centre is not operational, business continues to be delivered by other data centres.
3. All data centres have replicated data with bespoke application services being delivered by Eliza from any data centre.   Bespoke application services are never dependent on any one data centre.
4. Eliza earns revenue from customers who pay for bespoke application services and pays the operational cost of equipment in each data centre with a zero balance.   This zero balance objective may minimise any digital taxes in the future.

7. Knowledge:
1. Eliza is driven by knowledge as bespoke business rules.
2. Knowledge cannot be stolen, cannot be traded and cannot be owned by any party.
3. Knowledge is the Intellectual Property that drives the business, but it cannot be bought, sold or subjected to any data privacy regulations.

8. Fiscal:
1. Eliza operates in many countries at the same time as a multi-national service that is not controlled by any single National Government.
2. Eliza is not VAT registered, pays sales tax for local equipment, but does not collect sales tax from customers in any country.
3. Eliza is not owned by a corporation, does not have an annual report and does not pay corporation taxes in any country.   Eliza is not a brand, it not a product and is not a registered business.
4. Eliza conforms with local laws for each data centre in each country as if it was not a multi-national service.

9. Application Programs:
1. Application programming has been eliminated and replaced with knowledge engineering.   Knowledge can be dynamically improved without any downtime, without any maintenance and without any software vulnerabilities.
2. Un-licensed software has been eliminated because no application program is permitted to run on any server.
3. The majority of hacking attacks have a root cause as software vulnerabilities in application programs - eliminating application programs eliminated the majority of hacking attacks.

10. Quantum:
1. The era of quantum computing and quantum communications has begun with a massive increase in speed and risk to privacy.
2. Eliza uses a quantum URL and quantum object for secure links to all private web pages.   When Eliza creates a URL link a quantum object is generated to store all the parameters needed by the link.   Every URL link is a unique key to a transient quantum object that has a life of less than one hour.
3. It is understood that agencies in all parts of the world are copying all URL links and processing the results so URL links may be reused by agencies.   Links to private web pages are not private when other agencies can reuse the URL and decode the parameters stored within the URL.
4. Every quantum object can only be used once by the person using the computing device in the location responsible for the generated the quantum object.   Criminal agencies are not able to deduce any information from the quantum URL and cannot reuse the URL in any other environment.
5. When a link is generated for the same private web page with the same parameters, the quantum URL is unique and shall never be reused.   An agency is not able to detect or deduce what private web pages are being viewed.

11. Evidence: (W4)
1. Evidence (audit trail) is immutably managed by When and Where did Who do What.
2. When is represented by a date and time (GMT) that cannot be changed.
3. Where is represented by a site with geo-location.
4. Who is represented by a persons unique identifier that may be used to imply a Persons Identifying Information.
5. What is a web page identifer with a string of context parameters.
6. Evidence is encrypted and replicated in real-time to a large number of secure data centres to it cannot be lost and cannot be stolen.

Document Control:
1. Document Title: People Process Product.
2. Reference: 161527.
3. Keywords: ITIL, People Process Product.
4. Description: People Process Product.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 11 Dec 2017.
7. Edition: 1.2.