Address
304 North Cardinal St.
Dorchester Center, MA 02124
Work Hours
Monday to Friday: 7AM - 7PM
Weekend: 10AM - 5PM

Where you turn when you don't know where to turn.

This is a substantial report originally written and formatted for print. For your convenience, you may download a PDF file of the report here.
Nortel Networks began in 1895 as Northern Electric and Manufacturing Company, the manufacturing arm of Bell Canada, producing telephones and switchboards based on Western Electric designs. Over the next several decades, it evolved into Northern Electric, then Northern Telecom, expanding globally and becoming a major force in digital switching, fiber optics, and enterprise communications. By the late 1990s, Nortel had transformed into a multinational telecommunications and data‑networking giant headquartered in Ottawa, employing more than 94,000 people worldwide and accounting for over one‑third of the total valuation of the Toronto Stock Exchange at its peak. Its aggressive push into internet infrastructure positioned it as one of the world’s most influential telecom equipment manufacturers.
The company’s rapid expansion, however, was built on fragile assumptions. The telecom downturn beginning in 2000 triggered massive losses, including a $19.2 billion quarterly write‑down in 2001, one of the largest in corporate history. Nortel laid off tens of thousands of employees and struggled with accounting irregularities, operational overextension, and collapsing demand. In 2009, Nortel filed for bankruptcy protection in Canada and the United States, marking the largest bankruptcy in Canadian history. Over the following years, the company sold off its business units and intellectual property, and by 2017 its remaining assets were liquidated, closing the final chapter on a firm that had once defined the global telecommunications landscape.
In early 2000, Nortel initiated a global IT asset inventory project. At the time, the mandate appeared straightforward: establish an authoritative record of the company’s physical infrastructure. In practice, the organization had no reliable understanding of what it owned, where those assets were located, or who was responsible for them. The company’s internal systems disagreed with one another by margins large enough to affect financial reporting, operational continuity, and regulatory exposure, including a massive equipment leasing project involving tens of thousands of PCs that required flawless inventory management to avoid incurring significant service costs under contract.
The original project was as basic and routine a measure as one finds in asset management: an attempt to impose order on a landscape that had grown opaque through scale, acquisition, and institutional drift. In short: a full-scale IT inventory audit, to include nearly a quarter-million assets used by 90,000+ employees, worldwide from corporate headquarters to the most remote outposts of human civilization. If it had telephones, Nortel had an office intended to be able to reach the switching equipment – without regard for considerations even of government type or geopolitical power dynamics.
The project began with accumulated delays and conflicting directives from a decades-long bureaucratic history, and a growing sense that the underlying problem was larger than the scope of work implied. I walked into this situation as a hired IT subcontractor, part of a small team hired to physically conduct the audit. Six to eight week contract, zero suggestion of long-term anything. The job entailed walking from desktop to desktop, crawling on the floor under the desk to pull the computer out from against the wall, write down all the numbers, write down all the make and model information we could find including other tagged information, and move on to the next desktop. The whole project was to do this through 17 buildings in Research Triangle Park housing something on the order of twenty thousand employees and perhaps 28 thousand computers and peripherals, plus servers and ancillary equipment.
By the late 1990s, Nortel—like most large enterprises and government agencies—leased its entire fleet of desktop computers, primarily from Dell. These leases typically ran for three years and included explicit buyout penalties for any equipment not returned at end-of-term. While the original contract details are no longer publicly accessible, the standard structure of the era was a buyout cost of roughly one-third of the original purchase price.
In practical terms, this meant that failing to track a single Pentium I or early Pentium II system—machines originally costing between $1500 and $3,500, mostly—could trigger hundreds of dollars in avoidable charges per unit. Multiply that across tens of thousands of devices, and the financial exposure becomes obvious.
In Nortel’s case, part of their contract was per-asset accounting. This meant in order to satisfy the lease they couldn’t just return “a computer,” it had to match the serial number from the original contract.
This wasn’t a theoretical risk. The leasing agreements were active, the clock was ticking, and the only thing preventing Nortel from paying millions in penalties for obsolete hardware was an inventory audit held together by field improvisation and a barcode scanner. The project wasn’t just about cleaning up records—it was about ending the ongoing detonation of contractual time-bombs during what turned into a period of financial freefall.
And because the company’s internal systems couldn’t agree on what it owned, where those assets were located, or who was responsible for them, the risk wasn’t just financial—it was existential.
The barcode reconciliation effort, initiated from the ground up, became one of the few operational interventions that actually reduced exposure during the collapse. It didn’t save the company. But it may have shaved one of the largest corporate write-downs in history to $19.1B instead of $20.5B or worse.
In a time and place full of people trying to manage optics, this was one of the rare moments where someone quietly managed reality.
We would hand off our little stacks of audit forms to our handlers at the end of each shift, so the proposal went, and they would be given to someone, somewhere, to type into a computer.
By the end of the first week, I had noticed something that it seemed like everyone else had overlooked: Nearly all of the information we were recording with pens on paper was barcoded onto stickers or otherwise mounted somehow to the equipment. This included in nearly every case both a manufacturer serial number and a Nortel asset tag, and often other identifying information like the MAC address of the built-in network card.
On Thursday or Friday of that first week, I’d mentioned this observation to both my immediate supervisor and their manager in a five-minute meeting. The gist of this meeting was: listen, I think there’s a much faster and more effective way to do all of this, but it takes some work on the front end. In exchange for that work, you’re losing entire ranges and classes of errors, tightening your recordkeeping in ways you don’t even know you’re not right now, and doing it all with maybe four people in two weeks, plus or minus.
To be clear this wasn’t a shot in the dark. While I hadn’t done deep research on specific equipment, I knew that handheld device technology like Blackberry and Palm existed and that barcode technology existed of course. My IT credentials at the time were solid as a longtime hobbyist and professional developer and PC technician. This included prior work as a SQL Server administrator and developer, website designer, and some recent contract work on smaller inventory projects.
I was empowered with a knowledge base to justify the confidence to request a meeting with my management chain, which I did. In this meeting I presented them with specific observations and a broad but clear-eyed proposal to address a range of shortcomings not just with the project but ultimately with their entire IT asset management system and even their fundamental approaches to core related tasks.
For the sake of brevity we’ll leave the details of the next week or so to history, but within a week nearly the entire inventory crew had been sent home, and by the beginning of Week 3 I was being introduced to a whole new group of people and the entire scope of the project had changed. I was to be one of three key personnel driving the development and deployment of a barcode-informed, high-efficiency, fully normalized and properly validated inventory management system to handle roughly a quarter-million assets allocated to a workforce on the order of ninety thousand plus tens of thousands of contractors and subcontractors.
The first weeks revealed a system struggling under its own weight. Asset records were incomplete, duplicated, or missing entirely. Facilities listed as active had been decommissioned years earlier. Equipment marked as “in service” was found in storage cages, abandoned offices, or (in several cases) locations that no longer existed. The project’s central database functioned less as a source of truth and more as a repository of historical guesses.
Field teams operated with inconsistent guidance. Some regions relied on informal spreadsheets; others followed outdated procedures inherited from predecessor companies. The absence of a unified methodology meant that identical assets were classified differently depending on who documented them. The entire process of asset management was a sum total of decades of attempts to impose structure through a series of directives, each intended to standardize the process, but these often introduced new contradictions rather than resolving existing ones.
As the new processes created by the project were being implemented for the first time across the organization, I was included on an e-mail chain with several mid-to-high-level managers.
The conversation was a deep concern about mobile employees: sales, service techs, other folks who had laptops and were often out of the office for days or weeks at a time. Coordinating an in-person meeting with an inventory tech could be logistically problematic and take weeks.
I noted to the assemblage that you can scan photocopies of barcodes just by nature of how they work. Give your people a “drop dead” date about a week ahead of their actual audit, by which to have a photocopy of their laptop serial number pinned to the side of their cube or taped to their office door or what have you.
The auditor then comes by, takes the paper with them when they leave to prevent it from being used again next time, no meeting needed, problem solved.
The operational environment compounded the challenge. Nortel’s footprint spanned office buildings, manufacturing sites, data centers, and remote facilities, each with its own access controls, local practices, and undocumented exceptions. In several locations, the project team discovered entire rooms of equipment that had never been entered into any system. In others, assets listed as critical were nowhere to be found.
The project’s various communications attempts reflected the strain. Requests for clarification circulated through multiple layers of management and circular org charts before returning with answers that were incomplete, contradictory, or obsolete by the time they arrived. The baked-in institutional instinct was to generate additional processes (new forms, new checkpoints, new reporting structures), each intended to restore control but often increasing the complexity instead.
The solution developed by my team and I and implemented globally was, in the end, nearly the only thing not causing Nortel to hemorrhage money during a time when they filed one of the single largest charge-offs in global corporate history of nearly twenty billion 2001 dollars (about $35Bn today). The rest of this document will explore that system and its philosophy and implementation in more comprehensive format generally following the classic “Strategic Analysis” outline.
This analysis examines how a routine, paper‑based asset audit at Nortel’s Research Triangle Park campus revealed a latent capability the organization had overlooked: the entire environment was already barcoded, yet the audit process treated each asset as if it required manual rediscovery and transcription. Recognizing this disconnect transformed the assignment from a labor‑intensive sweep into a scalable data‑collection and normalization pipeline built on handheld barcode scanners, structured digital forms, and multi‑stage database reconciliation. By tracing how this unnoticed capability reshaped the project’s scope, efficiency, and data integrity, the analysis illustrates how large organizations often miss the solutions embedded within their own systems. The findings highlight the strategic value of perceptual acuity in operational environments and offer a framework for identifying similar opportunities hidden in plain sight.
Nortel’s Research Triangle Park campus—spanning seventeen buildings and tens of thousands of IT assets—initiated a traditional, paper‑based audit intended to reconcile physical equipment with corporate records. The planned approach relied on manual transcription, decentralized data collection, and post‑hoc reconciliation, reflecting industry norms of the era. Within this environment, a single observation reframed the entire effort: every asset was already barcoded, yet the audit process treated each one as if it required rediscovery from scratch.
Minimal capital investment beyond handheld scanners and form‑building software; primary needs include process redesign, data governance oversight, and integration support for enterprise systems.
Nortel’s Research Triangle Park (RTP) campus represented one of the largest concentrations of telecommunications infrastructure in the world at the time of this audit, initially scheduled to begin in April 2000. Spanning seventeen buildings and supporting tens of thousands of employees, the site housed the operational backbone of a company whose equipment carried the majority of global internet traffic. Within this environment, accurate IT asset intelligence was not merely an operational requirement; it was foundational to the continuity of global digital communication and commerce.
The organization initiated a comprehensive asset audit to reconcile physical equipment with corporate records. The planned methodology reflected industry norms of the era: deploy a team of temporary workers with paper forms, manually locate each asset, transcribe identifying information, and reconcile the results after the fact. This approach was labor‑intensive, error‑prone, and dependent on decentralized judgment at the point of collection. Despite the scale and strategic importance of the environment, the audit design assumed that each asset required rediscovery from scratch.
Prior asset audits at Nortel and across the telecommunications sector had relied on manual processes that produced inconsistent, incomplete, or outdated records. Data quality issues were often accepted as an unavoidable cost of scale. Despite the presence of barcoded asset tags across the environment, previous audits had not leveraged this capability for automated data capture. The organization had normalized a workflow that treated each audit as a fresh discovery exercise rather than a structured data‑collection process.
This historical pattern created the conditions for a perceptual blind spot: the tools for a more accurate, efficient, and scalable audit already existed within the environment, but their strategic potential had not been recognized or operationalized.
The original audit design assumed that each asset required manual rediscovery. Temporary workers would locate equipment, transcribe identifying information onto paper forms, and return the results for reconciliation through manual transcription into existing database systems. This approach reflected a common operational blind spot: treating a large‑scale environment as if it were unstructured, despite the presence of systems designed to impose structure.
The pivotal insight emerged from a single observation: every asset was already barcoded, both with the manufacturer’s serial number and a Nortel-issued asset tag. The environment contained a latent capability that had gone unnoticed because the audit process was inherited rather than examined. This perceptual shift reframed the assignment from a discovery exercise to a data‑collection and normalization problem.
Once the barcode infrastructure was recognized as the foundation, the audit’s core challenge changed. The problem was no longer “find and record assets,” but rather:
This reframing transformed the project from a labor‑intensive sweep into a systems‑level redesign.
The new approach replaced paper forms with:
This pipeline produced the first clean, reconciled asset dataset the organization had seen, revealing systemic data‑quality issues that had previously been invisible.
The analysis surfaced several structural patterns common in large enterprises:
These blind spots are not failures of competence; they are failures of perception. The barcode infrastructure was not hidden; it was simply not seen.
The intervention demonstrated that small perceptual shifts can produce outsized operational leverage. By recognizing and activating an overlooked capability, the audit achieved:
The approach also provided a template for broader systems review: identify embedded capabilities, question inherited workflows, and redesign processes around structural truths rather than historical habits. The redesigned workflow resulted in substantial direct cost savings and improved data integrity, which mitigated, corrected, and prevented downstream operational inefficiencies. The cumulative financial impact of these improvements far exceeded both the costs of the audit and of the development and implementation of an improved asset management system.
The most consequential discovery of the audit was not technological but perceptual: Nortel had already deployed a complete barcode infrastructure across its global asset base, yet the organization continued to operate as if every audit required manual rediscovery. This disconnect revealed a systemic blind spot—critical capabilities embedded within the environment were invisible because the inherited process defined what people believed was possible.
Organizations often fail not from lack of tools, but from lack of recognition. The barcode system was not a new investment; it was an overlooked asset whose activation immediately transformed the audit’s feasibility, accuracy, and cost structure.
The original paper‑based methodology was incapable of producing reliable data at Nortel’s scale. The process guaranteed transcription errors, inconsistent classification, and multi‑layer database drift. Even under ideal conditions, the workflow could not reconcile conflicting legacy systems or maintain data integrity across tens of thousands of assets.
Some processes cannot be optimized—they must be replaced. The audit’s failure was not operational but architectural: no amount of labor could compensate for a design that treated a structured environment as unstructured.
By replacing manual transcription with handheld scanners, structured digital forms, and multistage normalization, the project generated the first reconciled, high‑integrity asset dataset the organization had seen. This pipeline exposed systemic inaccuracies that had been invisible under the old process, including duplicated records, ghost facilities, and assets that existed only in databases.
Accuracy is not a function of effort but of method. The redesigned workflow created a repeatable, scalable model for asset intelligence that could be applied globally with minimal labor and dramatically reduced error rates.
The audit revealed that Nortel’s data inaccuracies were not merely operational inconveniences—they carried significant financial exposure. The company’s leasing agreements required per‑asset reconciliation, and missing or misclassified equipment triggered avoidable penalties. During a period of massive write‑downs and collapsing revenue, the barcode‑driven intervention became one of the few operational efforts that actively reduced financial risk.
Poor data governance compounds into material losses. The intervention demonstrated that improving asset intelligence is not a clerical exercise but a strategic safeguard against cascading financial and compliance failures.
The transformation of the audit did not require new technology, additional budget, or organizational restructuring. It required seeing the environment clearly. The recognition that the system was already barcoded reframed the entire project from a labor‑intensive sweep to a data‑normalization pipeline. This shift unlocked efficiencies that had been inaccessible under the inherited mental model.
Strategic breakthroughs often emerge from reframing, not reinvention. The barcode insight illustrates how overlooked capabilities can become leverage points that reshape entire operational domains.
Nortel’s audit failure was not the result of insufficient effort, inadequate staffing, or outdated tools. It was the result of a perceptual blind spot: the organization had already built the infrastructure required for accurate, scalable asset intelligence, but its inherited processes prevented anyone from seeing it. The barcode system was not a technological breakthrough—it was a structural truth hiding in plain sight. Recognizing and activating that truth transformed the audit from an impossible logistical burden into a high‑integrity data pipeline that reduced financial exposure during a period of organizational freefall.
The core insight is simple:
Operational breakthroughs emerge when organizations question the assumptions embedded in their own workflows.
The redesigned workflow succeeded because it aligned with how the environment was actually built, not how legacy processes imagined it. Future initiatives must begin with a clear assessment of existing capabilities before designing new procedures.
The barcode‑driven pipeline only delivered value because each stage—capture, normalization, reconciliation—was validated and controlled. Sustaining this model requires ongoing governance, not one‑time cleanup.
The audit exposed inconsistencies across Access, SQL Server, and Oracle layers. Maintaining accuracy requires continuous synchronization and a unified data model capable of reconciling legacy systems.
Percentage of assets with fully reconciled, validated records across all database layers.
Total time required to complete a full asset audit using the barcode‑driven workflow.
Frequency of mismatches, duplicates, or missing records identified during routine reconciliation.
The Nortel inventory project demonstrates a pattern that recurs across large, complex organizations: systems rarely fail because of a single catastrophic error. They fail because the structures designed to impose order slowly drift out of alignment with the environment they are meant to govern. Over time, processes become rituals, data becomes sediment, and institutional memory becomes a patchwork of inherited assumptions. The barcode infrastructure existed. The organization simply no longer saw it.
The intervention described in this analysis did not introduce new technology or radical organizational change. It restored coherence between the environment and the process meant to interpret it. By recognizing that the audit was not a discovery exercise but a data‑normalization problem, the project shifted from an impossible logistical burden to a scalable, high‑integrity pipeline. The resulting dataset was not merely more accurate: it was the first structurally sound representation of Nortel’s asset landscape in years.
This case illustrates a broader strategic truth: operational leverage emerges when organizations question the invisible assumptions embedded in their workflows. The barcode insight was not a stroke of luck; it was the product of perceptual acuity—the ability to see the system as it is, not as its processes insist it must be.
The lessons of this analysis extend beyond the specifics of IT asset management. They point toward a repeatable approach for diagnosing and correcting systemic drift:
These steps are not prescriptive actions but interpretive lenses: visualization methods that can help prevent organizations from drifting into the same perceptual traps that plagued Nortel.
The long‑arc lesson of this project is not about barcodes, scanners, or databases. It is about perception. Large organizations accumulate complexity faster than they accumulate clarity. Without deliberate mechanisms for re‑examining assumptions, even well‑designed systems become opaque, brittle, and self‑contradictory.
The barcode audit succeeded because it reconnected the organization to the structural reality of its own environment. That is the essence of strategic clarity: the ability to perceive what is already true, and to design processes that honor those truths rather than obscure them.
In this sense, the Nortel inventory project is more than a historical case study. It is a template for recognizing hidden leverage, correcting systemic drift, and restoring coherence to environments that have outgrown the processes meant to govern them. It shows that the most powerful strategic interventions are often the simplest ones: those that reveal what was always there, waiting to be seen.