Archive

Archive for the ‘Case Studies’ Category

Google versus Bing – a competitive intelligence case study

February 2, 2011 7 comments

Search experts regularly emphasise that to get the best search results it is important to use more than one search engine. The main reason for this is that each search engine uses a different relevancy ranking leading to different search results pages. Using Google will give a results page with the sites that Google thinks are the most relevant for the search query, while using Bing is supposed to give a results page where the top hits are based on a different relevancy ranking. This alternative may give better results for some searches and so a comprehensive search needs to use multiple search engines.

You may have noticed that I highlighted the word supposed when mentioning Bing. This is because it appears that Bing is cheating, and is using some of Google’s results in their search lists. Plagiarising Google’s results may be Bing’s way of saying that Google is better. However it leaves a bad taste as it means that one of the main reasons for using Microsoft’s search engine can be questioned, i.e. that the results are different and that all are generated independently, using different relevancy rankings.

Bing is Microsoft’s third attempt at a market-leading, Google bashing, search engine – replacing Live.com which in turn had replaced MSN Search. Bing has been successful and is truly a good alternative to Google. It is the default search engine on Facebook (i.e. when doing a search on Facebook, you get Bing results) and is also used to supply results to other search utilities – most notably Yahoo! From a marketing perspective, however, it appears that the adage “differentiate or die” hasn’t been fully understood by Bing. Companies that fail to fully differentiate their product offerings from competitors are likely to fail.

The story that Bing was copying Google’s results dates back to Summer 2010, when Google noticed an odd similarity to a highly specialist search on the two search engines. This, in itself wouldn’t be a problem. You’d expect similar results for very targeted search terms – the main difference will be the sort order. However in this case, the same top results were being generated when spelling mistakes were used as the search term. Google started to look more closely – and found that this wasn’t just a one-off. However to prove that Bing was stealing Google’s results needed more than just observation. To test the hypothesis, Google set up 100 dummy and nonsense queries that led to web-sites that had no relationship at all to the query. They then gave their testers laptops with a new Windows install – running Microsoft’s Internet Explorer 8 and with the Bing Toolbar installed. The install process included the “Suggested Sites” feature of Internet Explorer and the toolbar’s default options.

Within a few weeks, Bing started returning the fake results for the same Google searches. For example, a search for hiybbprqag gave the seating plan for a Los Angeles theatre, while delhipublicschool40 chdjob returned a Ohio Credit Union as the top result. This proved that the source for the results was not Bing’s own search algorithm but that the result had been taken from Google.

What was happening was that the searches and search results on Google were being passed back to Microsoft – via some feature of Internet Explorer 8, Windows or the Bing Toolbar.

As Google states in their Blog article on the discovery (which is illustrated with screenshots of the findings):

At Google we strongly believe in innovation and are proud of our search quality. We’ve invested thousands of person-years into developing our search algorithms because we want our users to get the right answer every time they search, and that’s not easy. We look forward to competing with genuinely new search algorithms out there—algorithms built on core innovation, and not on recycled search results from a competitor. So to all the users out there looking for the most authentic, relevant search results, we encourage you to come directly to Google. And to those who have asked what we want out of all this, the answer is simple: we’d like for this practice to stop.

Interestingly, Bing doesn’t even try to deny the claim – perhaps because they realise that they were caught red-handed. Instead they have tried to justify using the data on customer computers as a way of improving search experiences – even when the searching was being done via a competitor.  In fact, Harry Shum, a Bing VP, believes that this is actually good practice, stating in Bing’s response to a blog post by Danny Sullivan that exposed the practice:

“We have been very clear. We use the customer data to help improve the search experience…. We all learn from our collective customers, and we all should.”

It is well known that companies collect data on customer usage of their own web-sites – that is one purpose of cookies generated when visiting a site. It is less well known that some companies also collect data on what users do on other sites (which is why Yauba boasts about its privacy credentials). I’m sure that the majority of users of the Bing toolbar and other Internet Explorer and Windows features that seem to pass back data to Microsoft would be less happy if they knew how much data was collected and where from. Microsoft has been collecting such data for several years, but ethically the practice is highly questionable, even though Microsoft users may have originally agreed to the company collecting data to “help improve the online experience“.

What the story also shows is how much care and pride Google take in their results – and how they have an effective competitive intelligence (and counter-intelligence) programme, actively comparing their results with competitors. Microsoft even recognised this by falsely accusing Google of spying via their sting operation that exposed Microsoft’s practices – with Shum commenting (my italics):

What we saw in today’s story was a spy-novelesque stunt to generate extreme outliers in tail query ranking. It was a creative tactic by a competitor, and we’ll take it as a back-handed compliment. But it doesn’t accurately portray how we use opt-in customer data as one of many inputs to help improve our user experience.

To me, this sounds like sour-grapes. How can copying a competitor’s results improve the user experience? If it doesn’t accurately portray how customer data IS used, maybe now would be the time for Microsoft to reassure customers regarding their data privacy. And rather than view the comment that Google’s exposure of Bing’s practices was a back-handed compliment, I’d see it as slap in the face with the front of the hand. However what else could Microsoft & Bing say, other than Mea Culpa.

Update – Wednesday 2 February 2011:

The war of words between Google and Bing continues. Bing has now denied copying Google’s results, and moreover accused Google of click-fraud:

Google engaged in a “honeypot” attack to trick Bing. In simple terms, Google’s “experiment” was rigged to manipulate Bing search results through a type of attack also known as “click fraud.” That’s right, the same type of attack employed by spammers on the web to trick consumers and produce bogus search results.  What does all this cloak and dagger click fraud prove? Nothing anyone in the industry doesn’t already know. As we have said before and again in this post, we use click stream optionally provided by consumers in an anonymous fashion as one of 1,000 signals to try and determine whether a site might make sense to be in our index.

Bing seems to have ignored the fact that Google’s experiment resulted from their observation that certain genuine searches seemed to be copied by Bing – including misspellings, and also some mistakes in their algorithm that resulted in odd results. The accusation of click fraud is bizarre as the searches Google used to test for click fraud were completely artificial. There is no way that a normal searcher would have made such searches, and so the fact that the results bore no resemblance to the actual search terms is completely different to the spam practice where a dummy site appears for certain searches.

Bing can accuse Google of cloak and dagger behaviour. However sometimes, counter-intelligence requires such behaviour to catch miscreants red-handed. It’s a practice carried out by law enforcement globally where a crime is suspected but where there is insufficient evidence to catch the culprit. As an Internet example, one technique used to catch paedophiles is for a police officer to pretend to be a vulnerable child on an Internet chat-room. Is this fraud – when the paedophile subsequently arranges to meet up – and is caught? In some senses it is. However saying such practices are wrong gives carte-blanche to criminals to continue their illegal practices. Bing appears to be putting themselves in the same camp – by saying that using “honeypot” attacks is wrong.

They also have not recognised the points I’ve stressed about the ethical use of data. There is a big difference between using anonymous data tracking user  behaviour on your own search engine and tracking that of a competitor. Using your competitor’s data to improve your own product, when the intelligence was gained by technology that effectively hacks into usage made by your competitor’s customers is espionage. The company guilty of spying is Bing – not Google. Google just used competitive intelligence to identify the problem, and a creative approach to counter-intelligence to prove it.

We were duped – EMI, Terra Firma and its argument against Citigroup

November 5, 2010 1 comment

We were duped – Terra Firma closes its argument against Citigroup(news item available to subscribers only) is the headline in the London Times (3 November 2010) reporting on Terra Firma‘s case against Citigroup relating to its 2007 purchase of the music group, EMI (which they lost).

I’ve been watching this news story, and EMI, for a number of years – as an example of a classical competitive intelligence failure. In fact, it’s not just one – but two failures. The first is the failure of the once great company, EMI, while the second is the failure to check sources and do appropriate due diligence, by Guy Hand’s firm, Terra Firma. As a case study in business failures, I believe it is a classic.

EMI’s history dates back to the early days of recorded music and it was once at the pinacle of its industry. Artists on EMI labels included The Beatles, Pink Floyd, Queen, Kylie Minogue, Coldplay, Lily Allen, KT Tunstall, Robbie Williams, and many many more. I grew up listening to albums such as David Bowie’s “Ziggy Stardust“, the Beatles “Sgt. Pepper’s Lonely Heart’s Club Band” and the unforgettable “Dark Side of the Moon” from Pink Floyd (the latter during free periods in my last year at school – that dates me 🙂 )

However EMI never adjusted to the idea of music downloading and the Internet. Rather than accept that there was a new technology that meant that the old model was dead, it tried to use court case after court case to kill the emerging hydra. Rather than fighting peer-to-peer online sharing of music it should have seen it as inevitable and that this reflected a new way for distributing music.

Music sharing was not new. People would regularly tape records and CDs – and although this was a problem for the recording companies, it was usually small scale and so could be overlooked. Even if one person didn’t purchase a record, their friend had. I believe that many records would be purchased just so you could hear a decent recording – rather than the bootleg taped version, so this copying served a purpose by publicising the music.

The Internet changed this – especially when services such as Napster emerged. The view of companies such as EMI was that such services had to be smashed – and that the old models had to be preserved. This did not mean that there were no new approaches that could have been adapted, and that they had no choice: there were. Last.fm, Pandora, Spotify, boxee and iTunes are all examples of services that take account of the web, online music streaming and similar to make money (albeit not all have yet broken into profit). Each of these offers a new model for distributing music – via low-cost downloads (iTunes), to subscription services (with a mix of free and paid versions) such as Spotify – backed up by advertising. Had EMI investigated such options the problems that led to its failure and eventual sale may have been avoided.

This is the first competitive intelligence failure and lesson.

Competitive Intelligence doesn’t just look at competitors. It also looks at the competitive environment and attempts to anticipate business change. It assesses the business change – and looks at the implications, allowing decision makers to develop strategies that cope effectively with the change. EMI certainly recognized the change represented by the Internet, but failed to understand its significance and so failed to adapt to what should have been obvious i.e. that the Internet was a radical change rather than an evolutionary development.

Such change occurs periodically – but always has a massive impact on businesses that fail to adapt their business model. Classic examples include the

  • development of commercial flight on shipping – why spend days sailing across the Atlantic from Europe to the USA when you can fly?
  • electric light – much safer and better than gas lights or candles
  • internal combustion engines and especially the mass production of cars, as initiated by the Ford motor company. The horse and cart, and all the equipment linked to horse and cart transport lost out.

The Internet was another such development. When such events (sometimes called Black Swan events) occur, only companies that recognise the threat and adapt quickly survive. EMI has failed in this – trying to stop the new models for music distribution, rather than embrace them and look for ways to make money from them.

Then we come to Guy Hands and Terra Firma’s acquisition of EMI. This is the second competitive intelligence failure – and in my view the more serious, as Terra Firma should have known better.

Private Equity firms such as Terra Firma’s make their money by buying and selling other businesses. Before purchasing a business, they need to do due diligence so that they can assess what they are buying.

Terra Firma’s court case revolved around a claim that they were mislead by Citigroup into believing that another company, Cerberus, was also bidding for EMI. They apparently were not told that Cerberus had dropped out on 19 May 2007, and so rushed through the due diligence process to ensure that they remained the prime bidder. Terra Firma claimed that David Wormsley, a Citigroup banker, had told them that Cerberus planned to place a rival bid of 262p a share and so Terra Firma offered 265p and walked away with what they thought was their prize.

Essentially there were three mistakes made here. The first was believing a single source without attempting to verify it through standard competitive intelligence approaches i.e. was Cerberus still bidding? Terra Firma relied on the word of a single individual whom they trusted, but who had a vested interest in upping the price that would have to be paid.

The second mistake was even worse. By rushing through their due diligence they didn’t investigate sufficiently the state of EMI and whether it was actually worth what they ended up paying. In fact it should not have made a difference whether or not Cerberus was bidding – if the company was not worth the price being asked then it would have been better to let a rival bidder grab it. Failure to do the due diligence meant that this assessment was not done effectively – it seems that Hands was blinded by his desire for EMI and wasn’t interested sufficiently in the process of ensuring that he got the value from his money.

The third mistake was hubris – instead of learning a well taught lesson, Hands attempted to blame Citigroup for being mislead, ignoring the old rule of Caveat Emptor . Had Terra Firma won, it would have meant that any advisor in any business sale would be at risk of being sued by purchasers who for whatever reason, failed to do adequate due diligence, and instead trusted totally the word of their advisors on what was or was not a good buy. Fortunately the court saw otherwise, and said good bye to Terra Firma’s claim.

In a way, the date of the judgement against Guy Hands is ironic – as 5th November is known as Guy Fawkes day in the United Kingdom.  Guy Fawkes attempted to blow up Parliament in 1605.  Instead of Trick-or-Treat on Halloween, British children used to make an effigy of Guy Fawkes to be burned on Guy Fawkes night, along with fireworks. Traditionally they would then use this effigy to collect money, with the chant “Penny for the Guy“.  This 5th November that slogan will have a new meaning for Terra Firma and Guy Hands.

Sharing ideas, creativity and intelligence

November 3, 2010 4 comments

I was recently pointed to a great YouTube video from Steven Johnson on where good ideas come from:

A key point that Johnson makes is that many creative ideas often take years to develop and depend on the input of other people. It is only through the sharing of partial ideas and hunches that fully fledged creativity can happen.

This is also important for competitive intelligence. Some managers view competitive intelligence as a “cloak & dagger” type process that needs to be enshrined in secrecy. They view it as of strategic importance and accordingly not for their corporation’s rank and file.

I believe that they are wrong! Competitive Intelligence IS strategically important but all employees need to be involved in the process. What often happens is that one employee will hear some information that by itself seems meaningless. It is only when combined with information from several others that a coherent picture emerges, turning disparate data pieces into important intelligence. Management needs to encourage such information sharing throughout the organisation – and only through such cooperation will the CI information gathering process be 100% effective. The role of the CI personnel then becomes that of coordination and facilitation – putting together the jigsaw of pieces gathered throughout the organisation and building a picture that management can safely use to make strategic decisions. Failure to do this can mean that several jigsaw pieces are liable to be missed or found too late – and so decision-making will suffer and the chances of making a wrong decision increase.

There is a story told by Sheila Wright of DeMontfort University. I’ve slightly adjusted it – partly to protect the innocent (and guilty) – apologies, Sheila.

Baked Beans TinApparently a number of years ago, there was a senior managers’ meeting at a food canning factory. Six months earlier, the factory had installed new machinery for wrapping the cans in plastic. Plastic wrap allowed them to reduce pallet sizes, and so ship products at a lower cost. Unfortunately the factory was having problems.  Too often the plastic was tearing – and not doing the job of keeping the cans immobile on the pallet. This meant that cans got damaged and costs got higher than anticipated.

As is common in senior management meetings, lunch and coffee is delivered during the meeting. A junior staff member was bringing in the coffee when he overheard his bosses talking about the plastic wrap problem.

Er hmm….. can I interrupt…. I know what the problem is and how to fix it….I thought that you already knew the answer to the problem….” he said, to the incredulous stares of his bosses. The junior staff member then explained that he played football every Sunday and was friends with an operations manager who worked for a rival company. Apparently this competitor had installed similar machinery and come across the same problem. A few Sundays before, the operations manager had come to the football game in an ebullient mood. “We’ve fixed it” he’d explained. “All it needed was to recalibrate the machinery to take into account our cans and the plastic wrap we were using. It took us months to work out, but we’ve done it“.

By not encouraging the sharing of information, the canning company had compounded their problems. Nobody knew that this staff member had friends in a rival company or that this competitor had also been having problems with their packaging – and had solved it. There was no process to communicate the information – that would have helped and saved time and money. Essentially, information flowed down but there were no processes to allow it to flow up or be networked within the organisation.

Effective competitive intelligence builds systems that encourages the flow of information throughout the company – up, down and sideways. Of course there does need to be a respect for secrecy – and some conclusions should be kept secret. Business, strategy, and product development plans and so on do need to be protected.  However this should not be at the cost of failing to encourage all staff to contribute to the overall intelligence process and provide any information they come across – whether obviously relevant, or seemingly irrelevant or unimportant. There needs to be a balance between secrecy and openness. Anything else is a flawed system – that deserves to be canned!

The camera never lies… or does it?

September 16, 2010 1 comment

When people look at a photograph, they see a snapshot of history. That is one reason that people used to say that the camera never lied. Of course, today, with Photoshop people are warier and look for signs that the photo has been edited. There have been a number of notorious recent incidents of photo editing that highlight this problem. Examples include

However there is another problem with photos – and also news stories, and gathered information in general. That is the context. Understanding the context is crucial for effective business decisions. Gathering information is not the difficult bit. It’s analysing the information to convert it into intelligence that is hard. Without the correct context, poor or even disastrous decisions may be made. These may impact both business and individuals.

An example of how this can happen was highlighted in a sermon given by Rabbi Ivan Lerner on the sabbath between the Jewish New Year (Rosh Hashana) and the Day of Atonement (Yom Kippur). Rabbi Lerner pointed out that the Hebrew word for truth (אמת Emet) is made up of the first, middle and last letters of the Hebrew alphabet. Truth about an event isn’t just information about what is happening at a point in time, but also includes the events that led up to that point, and the consequences of the actions taken based on the event. It includes the beginning, middle and end. Rabbi Lerner gave an example from the famous photograph taken by Eddie Adams on the 1st February 1968.

Eddie Adam's Pulitzer Prize photo. This photo led to Adam’s gaining the 1969 Pulitzer prize for spot news photography, as well as the World Press Photo award. The photo showed the moment of execution of a Viet Cong prisoner by General Nguyen Ngoc Loan. Close examination even showed the bullet exiting from the prisoner’s head.

The impact of the photo was immeasurable. Calls were made to charge General Loan with a war crime for the execution of an “innocent” civilian. The anti-war movement used the photo to justify their protests against a war that was seen as overly savage, cruel and gratuitous.

The impact on General Loan was significant. A few months later, Loan was severely wounded and taken to Australia for treatment. When people realised he was the same man from the photo, protests led to him being evacuated to the Walter Reed Army Medical Center in Washington. Even then protests continued – and Loan returned to Saigon, leaving the army due to his injuries. At the fall of Saigon his pleas for help from the Americans were ignored although in the end, he and his family managed to escape and he moved to the US – where he took on a new identity. He opened a pizzeria in Virginia but in 1991, he was discovered – and business disappeared, with graffiti scrawled on the restaurant walls.

The story so far shows the event and its aftermath – but not the context that led to the execution. General Loan was vilified as a war criminal, while Nguyễn Văn Lém was seen as the innocent victim. Loan had to hide his identity and lost his future as a result. In fact, the executed prisoner – Nguyễn Văn Lém – was not an innocent. He commanded a Viet Cong death squad that had targeted South Vietnamese police and their families. He was captured near a ditch containing over 30 bound and shot bodies of police and their relatives – men, women and children. Lém was personally responsible for the deaths of several. Adams has confirmed that this was the case. The Viet Cong had attacked during a truce arranged for the Tet Holiday. Some of their victims has been at home celebrating.

Subsequently Adams found out more about General Loan. Loan was seen as a hero to the South Vietnamese. He wasn’t just a soldier. He fought for the construction of hospitals, helping war orphans and for a way of life that was destroyed. Adams regretted taking the photo because of what happened afterwards. (Eddie Adams describing his notorious Vietnam photograph)

…Two people died in that photograph: the recipient of the bullet and GENERAL NGUYEN NGOC LOAN. The general killed the Viet Cong; I killed the general with my camera. Still photographs are the most powerful weapon in the world. People believe them, but photographs do lie, even without manipulation. They are only half-truths. What the photograph didn’t say was, ‘What would you do if you were the general at that time and place on that hot day, and you caught the so-called bad guy after he blew away one, two or three American soldiers?…’ (Eulogy: GENERAL NGUYEN NGOC LOAN, Time Magazine, Jul. 27, 1998)

Information needs a context. When gathering information it is important to know the source and why the information became available. It is important to understand the context and when interpreting it, there should be no hidden agenda. The Adams picture failed in that it didn’t give the context and instead only helped to support and confirm the biases of anti-war journalists, letting them further their own agenda. As such, it ruined Loan’s life.