SlideShare a Scribd company logo
1 of 39
Download to read offline
Externalisation – The Next Principle for Information Sharing?
Can We Apply Web Principles to Corporate IT?


The Open Group Enterprise Architecture Practitioners Conference
Paris, France ~ 23-25 April, 2007

      Nigel Green, Capgemini UK
The IT Butterfly Effect…




        .




                           2
Blah, blah,
What I'll be talking about today…


  Define what I mean by externalisation
  How we might think about business information when we put 'externalisation'
  front of mind
  Provide an example of an externalised approach to Information Sharing with
  UK government
  Provide a high level point-of-view on what I see as the critical externalising IT
  enablers and trends
  Illustrate why I think this topic is business relevant and immediate
  Leave you with some ideas, emerging patterns and a number of unanswered
  questions!

                     What I won't be talking about...
        Zzzz.

                          ...RDF/OWL, WS and Ontology (well not much anyway!)
                          ...Or Open Group Standards (you're the experts)


                                                                                      3
What’s different Today?
 There is the fundamental difference between the way the Web works and traditional
 enterprise IT systems:

      •The Web starts with the premise that any resource can be used by anyone for any
      purpose

      •Traditional Enterprise IT systems starts with a constrained, internal, perspective -
      usually in support of specific processes.


 Externalisation is about bringing these two worlds together to meet business needs
 for ubiquitous information sharing.

 Externalisation is about the deliberate application Web patterns and approaches to
 Enterprise IT to address business information sharing needs more effectively.

 Externalisation is not focused on replacing traditional IT systems per se, rather it is
 focused on implementing coarse-grained, loosely-coupled and broadly sharable
 information within and between business domains.

  The Opportunity: many of the standards and tools are available to make Externalisation a viable and
  business relevant approach.

  The Risk: Businesses are seeing their employees are already ‘Externalising’ using ‘Shadow IT’.

                                                                                                    4
What do I mean by ‘Externalisation’ in the context of corporate IT?




                               Externalisation:
   Breaking apart the concepts of applications and databases to expose the
  business-meaningful parts of an Information System and, at the same time,
          making tacit, human, knowledge and behaviour explicit.
 Integrating externally owned information sources and services of value to the
                         Business Information System
Consuming and publishing meaningful events within and outside the enterprise




                                                                                 5
A picture of Externalisation
                                                           The access to information and
                 4                                     1
                         Information
  2                                                        communities on the Web by
                           Services
                                                           organisations and the people
                                                           within them
                                                           Collaboration with people and
                                                       2
             1
                                                           visibility of events (process
                                                           state changes) outside the
                                                           enterprise
                                                           Ubiquitous Event visibility
                                                       3
                                                           within the enterprise
                     5

                                                           The use of external information
                                                       4
                                                           and data processing services
                     3
                                                           by people and corporate IT
Web     Enterprise                     Enterprise IT
                                       Applications
                                                           The opening-up of data from
                                                       5
                                                           within corporate applications –
                                                           for sharing within the
                                                           enterprise and, selectively,
                                                           beyond

                 4       Processing
                          Services



                                                                                         6
Brains, Buckets, Boxes and Buildings


  Information relevant to the business is held in various 'containers'
  within the business



                  The heads of employees


                  data buckets


                  filing systems
                                                    Business information
                                                   systems are inherently
                                                 'internalised’ within these
                  and offices                            containers..



                                                                               7
Information Containers
Highly Internalised                                       Highly Externalised


                       Container:
                                       Container:         Container:
                      Applications
 Container:                          The Organisation   Web Communities
                      & Databases
Human Brains




                                                          The Web




                                                                           8
The Nature of Each Container Affects Its Content
Highly Internalised                                                   Highly Externalised


                       Container:
                                         Container:                  Container:
                      Applications
 Container:                            The Organisation            Web Communities
                      & Databases
Human Brains




                                                                     The Web




                      Technology
  Creativity                                                        Web Standards &
                                          Corporate
                      Translation
 Perception                                                        Ubiquitous Access
                                       Values, Privacy,
                      Structure &
 & Selective                                                         Self-regulating
                                           Policy &
                        Binding
    recall                                                            Communities
                                         Regulation


        Each type of container has an affect on the information held within it..

                                                                                       9
Information is only understood within the context of its container
Highly Internalised                                                Highly Externalised


                        Container:
                                         Container:              Container:
                       Applications
 Container:                            The Organisation        Web Communities
                       & Databases
Human Brains




                                                                  The Web



                                                              Useful Information
                                          Only 10% of
                                                              and services might
                                       business process
 Shadow IT is         Applications &                            be out there….
                                         Information is
    used to           Databases are    automated by IT –
                                                               Is my business
 support gaps          built to meet   limited Corporate
                                                               visible to these
in corporate IT       vertical needs        visibility
                                                                communities?


                  Outcome: Information Exhaust & Corporate Blindness

                                                                                    10
Externalisation: An Approach Re-shapes the Business Systems Container
Highly Internalised                                                Highly Externalised


                       Container:
                                               Container:         Container:
                      Applications
 Container:                                  The Organisation   Web Communities
                      & Databases
Human Brains




                                                                  The Web




                                 Container:
                       Externalised Business Systems

      Dissolves the barriers between internal containers by adopting external
  information standards and technologies focused on the information rather than
                                     function
                                                                                    11
A new Architectural Style for expressing desired Business Outcomes?

 An Architectural Style that focuses on:

  • The analysis of the behaviour of people and organisations and their interaction with information
      systems
  •   Real world events, content and policies
  •   Values of people and organisations and their trust relationships
  •   Freeing-up analysis activities from engineering rigour (which should come as a second step) – thereby
      helping decision makers
  •   User adoption approaches from the outset thereby materially increasing implementation success
  •   Business outcomes and communication to business stakeholders to aid decision making
      processes – contrast with engineering tools (business process and IT)


 A style that is complementary to necessary and proven methods for process and IT design,
 for example:
        − Enterprise Architecture frameworks and methods (e.g. TOGAF, IAF, Zachman)
        − Process Design frameworks (e.g. IDEF, SCOR etc)
        − IT Solution Design frameworks and methods (e.g. RUP, Package specific design methods)


 We believe this style is based on 5 simple, abstracted, analysis dimensions:
                         Values, Policies, Events, Content and Trust

                                                                                                         12
Focusing on VPEC-T: Externalisation Within the 4 Walls


                                                           Externalising the key
                                                              aspects of the
                                                         Information System e.g.:
                                                            Business Events
                                                           Content & Dialogues
                                                           Policies & Contracts
                                                           Values, Outcomes &
                                                                  Goals
 Values          Values               Values
 Policies        Policies             Policies           Trust Models & Profiles
 Content         Content              Content
 Events          Events               Events
  Trust           Trust                Trust




  Focusing on these aspects as discrete, re-usable, information components
                                     xxxx
creates the foundation for externalised information sharing across the business

                                                                              13
Focusing on VPEC-T: Externalisation With the World




                                                                   The Web




                   Values
 Values                                 Values                       Values
                   Policies
 Policies                               Policies                     Policies
                   Content
 Content                                Content                      Content
                   Events
 Events                                 Events                       Events
                    Trust
  Trust                                  Trust                        Trust




            And increases the ease of interaction with the outside world


                                                                                14
VPEC-T: The 5 key focus areas for Externalised Information Sharing

   Dimension                                   Applying emphasis and techniques to:

                 Focus on understanding the values and desired outcomes of both the individual and the business, and the values of
  Values         individuals and businesses you interact with. Values can be thought of as constraining beliefs (e.g. ethics) and
                 goals (e.g. desired outcomes)

                 Focus on the broad range of mandates and agreements such as internal policies, law, external contracts across the
 Policies        business; the rules that govern and constrain how things get done.



                 Focus on the real-world proceedings that stimulate business activity – sometimes in a pre-defined sequence but
  Events         often not. These are the triggers for action.



                 Focus on the documents, conversations or messages that are produced and consumed by business activities. These
 Content         are the dialogues we use to share a plan, a concept, a history and/or the details of a person, place or thing.



                 Focus on fostering trust between all parties engaged in a system of value. Trust changes over time, and
   Trust         understanding and fostering trust relationships are critical to useful IT. Values will be more authentically
                 disclosed and more values will be declare the deeper the trust relationship. Trust can be defined as Trust =
                 Intimacy + Credibility / Risk.


Using business language to discuss these 5 dimensions enables the business to
  express an Externalisation agenda – and the output is also meaningful to IT
                                 specialists.                                 15
Implementing Externalised Information Sharing within the UK
Criminal Justice Department
The UK Criminal Justice Exchange


The Exchange provides national operational services
for information sharing to a federation of Criminal
Justice Organisations, other government
departments and external practitioners.

Today, the Exchange processes around 2 million
messages a month and provides secure
application access to hundreds CJS users

The Exchange is secure information sharing
environment run by CJIT

The Exchange is being built to a Managed Service
vision which emphasises capability re-use and
rapid deployment and business process flexibility
through user configuration




    This is the story of how we applied innovative approach to the business and technology
                                   challenges faced by CJIT


                                                                                         17
An Example Future Process Supported by The Exchange




    Investigate       Arrest &                            Review &           Prepare for       Court Hearing       Justice &
1                 2                3 Charge Suspect   4                  5                 6                   7
    Incident          Pre-Charge                          Prepare Case       Hearing           & Outcome           Rehabilitation




           The Criminal Justice ‘Supply Chain’ is a combination of many such
                                       processes

                                                                                                                               18
And the bigger picture – a ‘Web’ of connected Information Sources


                                                           • Report
                                                           • View
                                                           • Alerts




                         C   r       i   m   e         P              r   e     v5   e   n        t   i   o7   n
                 1               2            3            4                                  6




                         Beyo2 d
                             n           the      C r i m4i n a l             J u s t i c6e       Sys7em
                                                                                                     t
                     1                      3                                  5




                                                                                                                   19
A 10 Year Journey – From Messaging Hub to CJS Web Platform

                                                                   The Vision
                                              The
                                            Exchange



                                                                                      r
                                                       1   2   3             4        5       6   7
                                                                                      o
                                                                           • Alerts
                                                                           • View
                                                                           • Report




                                                                     Ch
                                                                     arg
                                                                     e
                                                       1   2   3                4     5       6   7
                                                                                          g
                                                                     Su
                                                                     spe
                                                                     ct




  The
Exchange




                                                                                                      20
The Exchange Services Architecture – Channels and Configurable Services
                                                                                     Today, The Exchange offers
Browser
                                                                                     messaging, file transfer and
                                                                                     portal channel services are being added ..
                                                                                       New channel services
                                                                                       E.g. Data Access (demonstrated in the
                                                                                       Proof of Concept )
 MSG
                                                                                                    In the future, The Exchange will
                                                                                                    offer new channel services
                                                                                                    such as RFID and Voice and
                                                                                                    others…



                                                                                                                                       Browser
  RFID
                                                                                 The
                                                                               Exchange

                                                                                                                                            MSG




                                                                              Overtime, a range of common
                                                                              platform services will become
                                                                              customer configurable. Many of
                               BPEL
          Route
                                                                              these services are in
                              Interpret             External
                                                      WS
                                                                              development today.
                                                                   Discover

                  Transform               Publish          Work Flow



                                                                                                                                       21
The Exchange Services Architecture - the journey to a ‘CJS Web’
Browser


                                                                                                        The Exchange can be configured to store
                                                                                                        XML documents (e.g. Events & Content) on
 MSG                                                                                                    any authorised government server.

                                                                                                        This will provide the foundation for an
                                                                                                        incrementally developed Criminal Justice
                                                                                                        “Semantic Web”- The CJS Web.


                                                                             Collectively, these
                                                                        configurable services will be                                     Browser
  RFID
                                                                                    The
                                                                       the basis of future Composite
                                                                                Exchange
                                                                            Application Services

                                                                                                                                                MSG



                                                                                          Business
                                                                                           Events



                                                                                                   Business
                               BPEL
          Route
                              Interpret                                                            Content
                                                    External
                                                      WS
                                                                                                  Documents
                                                                   Discover

                  Transform               Publish          Work Flow



                                                                                                                                           22
Events – The focal point of Externalised Information
                     Systems?
Three ‘Event-Driven’ patterns – Business, Academia and Technology

 Global Parcel Tracking Systems
  • Federal Express, DHL, UPS
  • Standardised Checkpoint messages – Business Events
  • Advanced use of Barcode Technologies



 The X-Internet and CEP
  • Original concept from MIT
  • Adopted by the AutoID/RFID tagging community - EPC Global
  • Complex Event Processing – Professor David Luckham at Stanford
  • Real-time Business Activity Monitoring



 Web 2.0, SOA, and Agents
  • Events-trigger News Feeds - Real Simple Syndication (RSS Feeds)
  • Events trigger services in a SOA and/or SaaS model
  • Real-world events provide triggers to Software Agents to profile, analyse and
    make inferences




                                                                                    24
Events versus Content




                        25
Events can be imprecise - Freedom from Data Model Dictatorship – Part I
Fuzzy and Precise Events:
 Events can be regarded as both highly structured and precise and highly unstructured and
 imprecise messages within a common Event ‘envelope’ (general structure).
 For example, a movement tracking system may receive highly structured signals from RFID or
 GPS devices which are then converted into equally structured human-readable business events,
 But the same system might also receive much more unstructured Event information, possibly
 capture a ‘text’ message on a mobile phone that might alert of a delay caused by heavy traffic.


                                                 Business-meaningful Events are simply
     Planned and Unplanned
              Events                             events that would be useful to know
                                                 about – however imprecise!
                                                 It’s better to know that someone called
                       Missed Call:
                                                 me even if I don’t have their details in my
                       From Joe at 10
                            AM                   mobile phone (the phone’s ‘data model’
                                                 Events may be expected or unexpected
                          Missed Call:
                           From 01777
                           23456 at 11
                               AM


Should the emphasis is placed on the value to the human consumer as opposed to
                        information engineering rigour?
                                                                                               26
Football Results and Weather Events Matter to the Oil Industry




                                                                 27
Externalised Communities and Services Here and Now!
Useful ‘Shadow IT’ is more accessible
  and is more often outside the ‘four walls’ of corporate IT
User creativity has been
constrained by the technology
available to them…

                   “Mequot;

                                               Mainframe


                                              Departmental
   And the information resources
     I can personally access…                Networked PC
                                                   Web


   This creativity has probably been a blessing in the past, however…
   Might personally useful information networks and services take Shadow IT further outside the enterprise?
   As users access more of these information sources and services are there increasing security, content
   pedigree and legal implications?



                       Is this a present issue for corporate governance?

                                                                                                              29
Web 2.0 – Emerging Patterns in the Consumer Internet


                              Mass Peer
                             Publishing &             Others’
                               Review               Resources as
     Dynamic Self-                                    Platform
      Organising
     Communities


                                 Web 2.0 – The
                                                                  Monetising
                                  Web as the
                                                                 The Long Tail
                                   Platform
        Bottom-up
       Emergence
       not Up-front
         Design

                                                    Citation,
                           Tagging not
                                                   Authority &
                            Taxonomy
                                                   Referencing




                      “The User Controls Their Own Data”…
                                                                                 30
Direction of Travel - Web Epochs and Enterprise IT

         Web 1.0                                             Web 2.0                       Web 3.0+
    “the widely read-only Web”                            “the widely read-write Web”
                                                                                           The coming together
                                                                                        of Web and Enterprise IT?




                                                                                                 externalised
                                                                                                 enterprise IT




                                                                                        The Web is now evolving to be the
                                                                                        Platform of Reuse and Participation


                                                                                        From Islands of Information to a
                                                                                        Communities of Information


                                                                                        Will we see similar patterns in
                                                                                        Enterprise Information?
Original Source: Dion Hinchcliffe http://web2.wsj2.com/

                                                                                                                              31
Is the Semantic Web (Web 3.0) the complete answer?
Relevant Web 2.0 Pattern: User-Provided Tagging or –
Freedom from Data Model Dictatorship – Part II

  The step beyond Google’s word-matching
    • without resorting to taxonomies
    • and without waiting for the semantic web


  Is User-provided Unconstrained Tagging (referred to as
  ‘Folksonomies’)
    • Not enforcing the originator to capture everything that might be
     needed


  You can then exploit patterns in Tags / ‘Tagclouds’


  But it can only work if the participant is incentivised to take part
    • E.g. Del.ici.ous bookmarks, Flickr Photo Organisation


  What might this mean for Enterprise Information
  Sharing?

       Where would user-organised information be
       useful, and how would users be incentivised to
       participate?

                                                                         33
SOA, REST and Information-as-a-Service

Grown-up SOA?
                                      Information-as-a-Service:
 Can the maturing SOA                 “… approaches information integration in loosely-coupled,
 frameworks combined with REST        coarse-grained, asynchronous in manner that seeks to avoid
                                      the requirements of comprehensive data modelling prior to
 styles and Information-as-a-         integrating them”
 Service approaches provide the
                                                   - Ronald Schmelzer
 ‘fabric’ for the externalisation
 agenda?
                                      REST
  • To mediate this ‘publishing,
    citation and emergence’ ?         Representational State Transfer is intended to evoke an image of
                                      how a well-designed Web application behaves: a network of web
  • Dynamically managing the          pages (a virtual state-machine), where the user progresses
    metadata and the routing          through an application by selecting links (state transitions),
                                      resulting in the next page (representing the next state of the
  • Using Policies, Events and
                                      application) being transferred to the user and rendered for their
    Content rather than Top-Down      use.”
    Decomposition                                   - Dr. Roy Fielding




 Could an Externalisation Agenda be the, business relevant, ‘Killer app’ for SOA
 and provide the business rationale for REST and the Semantic Web?


                                                                                                    34
Externalised Identity driven by the ‘On-Demand’ vendors

                         OpenID
                           OpenID is a lightweight, decentralized identity system
                           that provides web single sign-on. We have merged the
                           technology and use cases of the Simple Extensible
                           Identity Protocol (SXIP) and Digital Identity Exchange
                           (DIX) into the OpenID 2.0 specifications. OpenID 2.0
                           features include improved extensibility, increased
                           security, substantive identity data attribute exchange
                           abilities, and third-party signed assertion capabilities.


                         Identity 2.0
                           Identity 2.0 is an open, standards-based, yet
                           fundamentally decentralized identity model. First coined
                           by us in January 2005, Identity 2.0 describes the
                           concept of an ID that can be trusted and used anywhere
                           and requires no centralized consultation with the ID
                           authority that issues the credential.

Will adoption drive an externalised approach to user authentication and single
                                   sign-on?



                                                                                       35
Ubiquitous Identity -Recent thinking from MIT
                U T R I - Unified Theory of Relativistic Identification of Information
                      Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6
                                                    By Dr. Shoumen Palit Austin Datta, MIT




“The suggestion here is to use the 128-bit
IPv6, a scheme that already at hand and
being deployed, gradually but globally. This
may be the “one-size-fits-all” hyper-id that is
unique.”


“Think IPv6 as the solution that is preagreed
for global adoption. Think about contextual
relevance of data and how to “number the
numbers” but especially how to route
numbers (data) which may be identical but
with different identities.”




   What are the possibilities for externalised information sharing if we can uniquely
       identify objects and people, within the context of processes, globally?

                                                                                                                           36
Will Externalised Information Sharing become BAU?



                                                 Event
                             Identity
                                               Processing
                           Management
                                               Standards
                            Standards
                                        SOA
                                        REST

                           Folksonomy          Ontology




What might be the effect of the combining such ‘externalising’ technologies and patterns?

Could they, in combination, be the foundation of a truly business-enabling Semantic Web ?



                                                                                        37
Externalisation Agenda Guidelines for Enterprise Architects
•    Discover the need - Consider a new architectural style (such as VPEC-T) for
     defining and agreeing an Externalisation Agenda with the business

•    Explain why - Help the business see the value of an externalised approach –
     develop the story that explains how SOA/REST/Web 2.0/3.0 etc. support the
     businesses Externalisation Agenda

•    Prove it early - Start small and think coarse-grained. Be pragmatic &
     incrementally build to a long-range vision




     When people converse we externalise information naturally – we can bring
    this concept to the IS we use and in doing so, make it easier for businesses
                                    to consume.

        Should businesses be working on an Externalisation Agenda now?



                                                                                   38
Questions or Comments?




                         39

More Related Content

What's hot

Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...jodischneider
 
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...Umair ul Hassan
 
Linked Open Government Data
Linked Open Government DataLinked Open Government Data
Linked Open Government DataDerilinx
 
Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Andrea Pesoli
 
Fusion of Bandwidth on Demand and Virtual Organizations
Fusion of Bandwidth on Demand and Virtual OrganizationsFusion of Bandwidth on Demand and Virtual Organizations
Fusion of Bandwidth on Demand and Virtual OrganizationsEd Dodds
 
Collaboration is Happening
Collaboration is HappeningCollaboration is Happening
Collaboration is HappeningHarold Teunissen
 
Smart Business Networks: Concepts and Empirical Evidence
Smart Business Networks: Concepts and Empirical EvidenceSmart Business Networks: Concepts and Empirical Evidence
Smart Business Networks: Concepts and Empirical EvidenceEric van Heck
 
Fusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsFusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsHarold Teunissen
 
Social collaboration and your business
Social collaboration and your businessSocial collaboration and your business
Social collaboration and your businessHyperOffice
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik MollerHPDutchWorld
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 
Using Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementUsing Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementMichelle Farabough
 
AAAI 2012 at Standord
AAAI 2012 at StandordAAAI 2012 at Standord
AAAI 2012 at StandordTed Vickey
 
BP303 Taxonomy versus Folksonomy: Document Management in a Social Age
BP303 Taxonomy versus Folksonomy: Document Management in a Social AgeBP303 Taxonomy versus Folksonomy: Document Management in a Social Age
BP303 Taxonomy versus Folksonomy: Document Management in a Social AgeFemke Goedhart
 
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...Benjamin Heitmann
 
FOCUS Newsletter by AIR Technology Services
FOCUS Newsletter by AIR Technology ServicesFOCUS Newsletter by AIR Technology Services
FOCUS Newsletter by AIR Technology ServicesJack Taugher
 
Leveraging Networks to Accelerate Learning
Leveraging Networks to Accelerate LearningLeveraging Networks to Accelerate Learning
Leveraging Networks to Accelerate LearningMaya Townsend
 
PDP Training Courses Catalogue
PDP Training Courses CataloguePDP Training Courses Catalogue
PDP Training Courses CataloguePDP
 
Enterprise Content Management Briefing Paper
Enterprise Content Management Briefing PaperEnterprise Content Management Briefing Paper
Enterprise Content Management Briefing PaperBrett Rosynek
 

What's hot (20)

Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...
 
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...
Towards Expertise Modelling for Routing Data Cleaning Tasks within a Communit...
 
Linked Open Government Data
Linked Open Government DataLinked Open Government Data
Linked Open Government Data
 
Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0
 
1109 siit jfriedrich v02
1109 siit jfriedrich v021109 siit jfriedrich v02
1109 siit jfriedrich v02
 
Fusion of Bandwidth on Demand and Virtual Organizations
Fusion of Bandwidth on Demand and Virtual OrganizationsFusion of Bandwidth on Demand and Virtual Organizations
Fusion of Bandwidth on Demand and Virtual Organizations
 
Collaboration is Happening
Collaboration is HappeningCollaboration is Happening
Collaboration is Happening
 
Smart Business Networks: Concepts and Empirical Evidence
Smart Business Networks: Concepts and Empirical EvidenceSmart Business Networks: Concepts and Empirical Evidence
Smart Business Networks: Concepts and Empirical Evidence
 
Fusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsFusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizations
 
Social collaboration and your business
Social collaboration and your businessSocial collaboration and your business
Social collaboration and your business
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik Moller
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
Using Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementUsing Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge Management
 
AAAI 2012 at Standord
AAAI 2012 at StandordAAAI 2012 at Standord
AAAI 2012 at Standord
 
BP303 Taxonomy versus Folksonomy: Document Management in a Social Age
BP303 Taxonomy versus Folksonomy: Document Management in a Social AgeBP303 Taxonomy versus Folksonomy: Document Management in a Social Age
BP303 Taxonomy versus Folksonomy: Document Management in a Social Age
 
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...
Leveraging existing Web Frameworks for a SIOC explorer (Scripting for the Sem...
 
FOCUS Newsletter by AIR Technology Services
FOCUS Newsletter by AIR Technology ServicesFOCUS Newsletter by AIR Technology Services
FOCUS Newsletter by AIR Technology Services
 
Leveraging Networks to Accelerate Learning
Leveraging Networks to Accelerate LearningLeveraging Networks to Accelerate Learning
Leveraging Networks to Accelerate Learning
 
PDP Training Courses Catalogue
PDP Training Courses CataloguePDP Training Courses Catalogue
PDP Training Courses Catalogue
 
Enterprise Content Management Briefing Paper
Enterprise Content Management Briefing PaperEnterprise Content Management Briefing Paper
Enterprise Content Management Briefing Paper
 

Similar to Externalization Trend

InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapMarten den Haring
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Big data and big content
Big data and big contentBig data and big content
Big data and big contentJohn Mancini
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieOutsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieJohn Septer
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Mark Heid
 
Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)Andrea Pesoli
 
E government avoiding a Dot Gov Bubble
E government   avoiding a Dot Gov BubbleE government   avoiding a Dot Gov Bubble
E government avoiding a Dot Gov BubbleDaniel Gruia
 
Analytics big data ibm
Analytics big data ibmAnalytics big data ibm
Analytics big data ibmAccenture
 
IBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep diveIBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep diveKun Le
 
Semantic Web Mining of Un-structured Data: Challenges and Opportunities
Semantic Web Mining of Un-structured Data: Challenges and OpportunitiesSemantic Web Mining of Un-structured Data: Challenges and Opportunities
Semantic Web Mining of Un-structured Data: Challenges and OpportunitiesCSCJournals
 
Enterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammerEnterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammeraufaittechnologies
 
Projections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamProjections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamneutrinoBI
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalAccenture the Netherlands
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Collabor8now Ltd
 

Similar to Externalization Trend (20)

Social Intranet
Social IntranetSocial Intranet
Social Intranet
 
InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And Roadmap
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
Industry 4.0 module 4
Industry 4.0 module 4Industry 4.0 module 4
Industry 4.0 module 4
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Outsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan InformatiestrategieOutsmart Your Business - Stappenplan Informatiestrategie
Outsmart Your Business - Stappenplan Informatiestrategie
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
SaaS E- Book Part 1
SaaS E- Book Part 1SaaS E- Book Part 1
SaaS E- Book Part 1
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
Informatics technologies in an evolving r & d landscape
Informatics technologies in an evolving r & d landscapeInformatics technologies in an evolving r & d landscape
Informatics technologies in an evolving r & d landscape
 
Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)
 
E government avoiding a Dot Gov Bubble
E government   avoiding a Dot Gov BubbleE government   avoiding a Dot Gov Bubble
E government avoiding a Dot Gov Bubble
 
Analytics big data ibm
Analytics big data ibmAnalytics big data ibm
Analytics big data ibm
 
IBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep diveIBM-Infoworld Big Data deep dive
IBM-Infoworld Big Data deep dive
 
Semantic Web Mining of Un-structured Data: Challenges and Opportunities
Semantic Web Mining of Un-structured Data: Challenges and OpportunitiesSemantic Web Mining of Un-structured Data: Challenges and Opportunities
Semantic Web Mining of Un-structured Data: Challenges and Opportunities
 
Enterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammerEnterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammer
 
Projections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI teamProjections for BI in 2012 from the neutrinoBI team
Projections for BI in 2012 from the neutrinoBI team
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - Technical
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 

More from Nigel Green

Horses & Unicorns: Britchamber july 2016
Horses & Unicorns: Britchamber july 2016Horses & Unicorns: Britchamber july 2016
Horses & Unicorns: Britchamber july 2016Nigel Green
 
Designing digital transformation v.2.7
Designing digital transformation v.2.7Designing digital transformation v.2.7
Designing digital transformation v.2.7Nigel Green
 
Business Change Design Episode 1 v1.0
Business Change Design  Episode 1 v1.0Business Change Design  Episode 1 v1.0
Business Change Design Episode 1 v1.0Nigel Green
 
VPEC-T @TOG London 2009
VPEC-T @TOG  London 2009VPEC-T @TOG  London 2009
VPEC-T @TOG London 2009Nigel Green
 
Epochs Web 1 2 3 V3 0b
Epochs Web 1 2 3   V3 0bEpochs Web 1 2 3   V3 0b
Epochs Web 1 2 3 V3 0bNigel Green
 
VPEC-T The Movie (Book Trailer)
VPEC-T The Movie          (Book Trailer) VPEC-T The Movie          (Book Trailer)
VPEC-T The Movie (Book Trailer) Nigel Green
 

More from Nigel Green (7)

Horses & Unicorns: Britchamber july 2016
Horses & Unicorns: Britchamber july 2016Horses & Unicorns: Britchamber july 2016
Horses & Unicorns: Britchamber july 2016
 
Designing digital transformation v.2.7
Designing digital transformation v.2.7Designing digital transformation v.2.7
Designing digital transformation v.2.7
 
Business Change Design Episode 1 v1.0
Business Change Design  Episode 1 v1.0Business Change Design  Episode 1 v1.0
Business Change Design Episode 1 v1.0
 
VPEC-T @TOG London 2009
VPEC-T @TOG  London 2009VPEC-T @TOG  London 2009
VPEC-T @TOG London 2009
 
Epochs Web 1 2 3 V3 0b
Epochs Web 1 2 3   V3 0bEpochs Web 1 2 3   V3 0b
Epochs Web 1 2 3 V3 0b
 
VPEC-T The Movie (Book Trailer)
VPEC-T The Movie          (Book Trailer) VPEC-T The Movie          (Book Trailer)
VPEC-T The Movie (Book Trailer)
 
Generic Vpec-T
Generic Vpec-TGeneric Vpec-T
Generic Vpec-T
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Externalization Trend

  • 1. Externalisation – The Next Principle for Information Sharing? Can We Apply Web Principles to Corporate IT? The Open Group Enterprise Architecture Practitioners Conference Paris, France ~ 23-25 April, 2007 Nigel Green, Capgemini UK
  • 2. The IT Butterfly Effect… . 2
  • 3. Blah, blah, What I'll be talking about today… Define what I mean by externalisation How we might think about business information when we put 'externalisation' front of mind Provide an example of an externalised approach to Information Sharing with UK government Provide a high level point-of-view on what I see as the critical externalising IT enablers and trends Illustrate why I think this topic is business relevant and immediate Leave you with some ideas, emerging patterns and a number of unanswered questions! What I won't be talking about... Zzzz. ...RDF/OWL, WS and Ontology (well not much anyway!) ...Or Open Group Standards (you're the experts) 3
  • 4. What’s different Today? There is the fundamental difference between the way the Web works and traditional enterprise IT systems: •The Web starts with the premise that any resource can be used by anyone for any purpose •Traditional Enterprise IT systems starts with a constrained, internal, perspective - usually in support of specific processes. Externalisation is about bringing these two worlds together to meet business needs for ubiquitous information sharing. Externalisation is about the deliberate application Web patterns and approaches to Enterprise IT to address business information sharing needs more effectively. Externalisation is not focused on replacing traditional IT systems per se, rather it is focused on implementing coarse-grained, loosely-coupled and broadly sharable information within and between business domains. The Opportunity: many of the standards and tools are available to make Externalisation a viable and business relevant approach. The Risk: Businesses are seeing their employees are already ‘Externalising’ using ‘Shadow IT’. 4
  • 5. What do I mean by ‘Externalisation’ in the context of corporate IT? Externalisation: Breaking apart the concepts of applications and databases to expose the business-meaningful parts of an Information System and, at the same time, making tacit, human, knowledge and behaviour explicit. Integrating externally owned information sources and services of value to the Business Information System Consuming and publishing meaningful events within and outside the enterprise 5
  • 6. A picture of Externalisation The access to information and 4 1 Information 2 communities on the Web by Services organisations and the people within them Collaboration with people and 2 1 visibility of events (process state changes) outside the enterprise Ubiquitous Event visibility 3 within the enterprise 5 The use of external information 4 and data processing services 3 by people and corporate IT Web Enterprise Enterprise IT Applications The opening-up of data from 5 within corporate applications – for sharing within the enterprise and, selectively, beyond 4 Processing Services 6
  • 7. Brains, Buckets, Boxes and Buildings Information relevant to the business is held in various 'containers' within the business The heads of employees data buckets filing systems Business information systems are inherently 'internalised’ within these and offices containers.. 7
  • 8. Information Containers Highly Internalised Highly Externalised Container: Container: Container: Applications Container: The Organisation Web Communities & Databases Human Brains The Web 8
  • 9. The Nature of Each Container Affects Its Content Highly Internalised Highly Externalised Container: Container: Container: Applications Container: The Organisation Web Communities & Databases Human Brains The Web Technology Creativity Web Standards & Corporate Translation Perception Ubiquitous Access Values, Privacy, Structure & & Selective Self-regulating Policy & Binding recall Communities Regulation Each type of container has an affect on the information held within it.. 9
  • 10. Information is only understood within the context of its container Highly Internalised Highly Externalised Container: Container: Container: Applications Container: The Organisation Web Communities & Databases Human Brains The Web Useful Information Only 10% of and services might business process Shadow IT is Applications & be out there…. Information is used to Databases are automated by IT – Is my business support gaps built to meet limited Corporate visible to these in corporate IT vertical needs visibility communities? Outcome: Information Exhaust & Corporate Blindness 10
  • 11. Externalisation: An Approach Re-shapes the Business Systems Container Highly Internalised Highly Externalised Container: Container: Container: Applications Container: The Organisation Web Communities & Databases Human Brains The Web Container: Externalised Business Systems Dissolves the barriers between internal containers by adopting external information standards and technologies focused on the information rather than function 11
  • 12. A new Architectural Style for expressing desired Business Outcomes? An Architectural Style that focuses on: • The analysis of the behaviour of people and organisations and their interaction with information systems • Real world events, content and policies • Values of people and organisations and their trust relationships • Freeing-up analysis activities from engineering rigour (which should come as a second step) – thereby helping decision makers • User adoption approaches from the outset thereby materially increasing implementation success • Business outcomes and communication to business stakeholders to aid decision making processes – contrast with engineering tools (business process and IT) A style that is complementary to necessary and proven methods for process and IT design, for example: − Enterprise Architecture frameworks and methods (e.g. TOGAF, IAF, Zachman) − Process Design frameworks (e.g. IDEF, SCOR etc) − IT Solution Design frameworks and methods (e.g. RUP, Package specific design methods) We believe this style is based on 5 simple, abstracted, analysis dimensions: Values, Policies, Events, Content and Trust 12
  • 13. Focusing on VPEC-T: Externalisation Within the 4 Walls Externalising the key aspects of the Information System e.g.: Business Events Content & Dialogues Policies & Contracts Values, Outcomes & Goals Values Values Values Policies Policies Policies Trust Models & Profiles Content Content Content Events Events Events Trust Trust Trust Focusing on these aspects as discrete, re-usable, information components xxxx creates the foundation for externalised information sharing across the business 13
  • 14. Focusing on VPEC-T: Externalisation With the World The Web Values Values Values Values Policies Policies Policies Policies Content Content Content Content Events Events Events Events Trust Trust Trust Trust And increases the ease of interaction with the outside world 14
  • 15. VPEC-T: The 5 key focus areas for Externalised Information Sharing Dimension Applying emphasis and techniques to: Focus on understanding the values and desired outcomes of both the individual and the business, and the values of Values individuals and businesses you interact with. Values can be thought of as constraining beliefs (e.g. ethics) and goals (e.g. desired outcomes) Focus on the broad range of mandates and agreements such as internal policies, law, external contracts across the Policies business; the rules that govern and constrain how things get done. Focus on the real-world proceedings that stimulate business activity – sometimes in a pre-defined sequence but Events often not. These are the triggers for action. Focus on the documents, conversations or messages that are produced and consumed by business activities. These Content are the dialogues we use to share a plan, a concept, a history and/or the details of a person, place or thing. Focus on fostering trust between all parties engaged in a system of value. Trust changes over time, and Trust understanding and fostering trust relationships are critical to useful IT. Values will be more authentically disclosed and more values will be declare the deeper the trust relationship. Trust can be defined as Trust = Intimacy + Credibility / Risk. Using business language to discuss these 5 dimensions enables the business to express an Externalisation agenda – and the output is also meaningful to IT specialists. 15
  • 16. Implementing Externalised Information Sharing within the UK Criminal Justice Department
  • 17. The UK Criminal Justice Exchange The Exchange provides national operational services for information sharing to a federation of Criminal Justice Organisations, other government departments and external practitioners. Today, the Exchange processes around 2 million messages a month and provides secure application access to hundreds CJS users The Exchange is secure information sharing environment run by CJIT The Exchange is being built to a Managed Service vision which emphasises capability re-use and rapid deployment and business process flexibility through user configuration This is the story of how we applied innovative approach to the business and technology challenges faced by CJIT 17
  • 18. An Example Future Process Supported by The Exchange Investigate Arrest & Review & Prepare for Court Hearing Justice & 1 2 3 Charge Suspect 4 5 6 7 Incident Pre-Charge Prepare Case Hearing & Outcome Rehabilitation The Criminal Justice ‘Supply Chain’ is a combination of many such processes 18
  • 19. And the bigger picture – a ‘Web’ of connected Information Sources • Report • View • Alerts C r i m e P r e v5 e n t i o7 n 1 2 3 4 6 Beyo2 d n the C r i m4i n a l J u s t i c6e Sys7em t 1 3 5 19
  • 20. A 10 Year Journey – From Messaging Hub to CJS Web Platform The Vision The Exchange r 1 2 3 4 5 6 7 o • Alerts • View • Report Ch arg e 1 2 3 4 5 6 7 g Su spe ct The Exchange 20
  • 21. The Exchange Services Architecture – Channels and Configurable Services Today, The Exchange offers Browser messaging, file transfer and portal channel services are being added .. New channel services E.g. Data Access (demonstrated in the Proof of Concept ) MSG In the future, The Exchange will offer new channel services such as RFID and Voice and others… Browser RFID The Exchange MSG Overtime, a range of common platform services will become customer configurable. Many of BPEL Route these services are in Interpret External WS development today. Discover Transform Publish Work Flow 21
  • 22. The Exchange Services Architecture - the journey to a ‘CJS Web’ Browser The Exchange can be configured to store XML documents (e.g. Events & Content) on MSG any authorised government server. This will provide the foundation for an incrementally developed Criminal Justice “Semantic Web”- The CJS Web. Collectively, these configurable services will be Browser RFID The the basis of future Composite Exchange Application Services MSG Business Events Business BPEL Route Interpret Content External WS Documents Discover Transform Publish Work Flow 22
  • 23. Events – The focal point of Externalised Information Systems?
  • 24. Three ‘Event-Driven’ patterns – Business, Academia and Technology Global Parcel Tracking Systems • Federal Express, DHL, UPS • Standardised Checkpoint messages – Business Events • Advanced use of Barcode Technologies The X-Internet and CEP • Original concept from MIT • Adopted by the AutoID/RFID tagging community - EPC Global • Complex Event Processing – Professor David Luckham at Stanford • Real-time Business Activity Monitoring Web 2.0, SOA, and Agents • Events-trigger News Feeds - Real Simple Syndication (RSS Feeds) • Events trigger services in a SOA and/or SaaS model • Real-world events provide triggers to Software Agents to profile, analyse and make inferences 24
  • 26. Events can be imprecise - Freedom from Data Model Dictatorship – Part I Fuzzy and Precise Events: Events can be regarded as both highly structured and precise and highly unstructured and imprecise messages within a common Event ‘envelope’ (general structure). For example, a movement tracking system may receive highly structured signals from RFID or GPS devices which are then converted into equally structured human-readable business events, But the same system might also receive much more unstructured Event information, possibly capture a ‘text’ message on a mobile phone that might alert of a delay caused by heavy traffic. Business-meaningful Events are simply Planned and Unplanned Events events that would be useful to know about – however imprecise! It’s better to know that someone called Missed Call: me even if I don’t have their details in my From Joe at 10 AM mobile phone (the phone’s ‘data model’ Events may be expected or unexpected Missed Call: From 01777 23456 at 11 AM Should the emphasis is placed on the value to the human consumer as opposed to information engineering rigour? 26
  • 27. Football Results and Weather Events Matter to the Oil Industry 27
  • 28. Externalised Communities and Services Here and Now!
  • 29. Useful ‘Shadow IT’ is more accessible and is more often outside the ‘four walls’ of corporate IT User creativity has been constrained by the technology available to them… “Mequot; Mainframe Departmental And the information resources I can personally access… Networked PC Web This creativity has probably been a blessing in the past, however… Might personally useful information networks and services take Shadow IT further outside the enterprise? As users access more of these information sources and services are there increasing security, content pedigree and legal implications? Is this a present issue for corporate governance? 29
  • 30. Web 2.0 – Emerging Patterns in the Consumer Internet Mass Peer Publishing & Others’ Review Resources as Dynamic Self- Platform Organising Communities Web 2.0 – The Monetising Web as the The Long Tail Platform Bottom-up Emergence not Up-front Design Citation, Tagging not Authority & Taxonomy Referencing “The User Controls Their Own Data”… 30
  • 31. Direction of Travel - Web Epochs and Enterprise IT Web 1.0 Web 2.0 Web 3.0+ “the widely read-only Web” “the widely read-write Web” The coming together of Web and Enterprise IT? externalised enterprise IT The Web is now evolving to be the Platform of Reuse and Participation From Islands of Information to a Communities of Information Will we see similar patterns in Enterprise Information? Original Source: Dion Hinchcliffe http://web2.wsj2.com/ 31
  • 32. Is the Semantic Web (Web 3.0) the complete answer?
  • 33. Relevant Web 2.0 Pattern: User-Provided Tagging or – Freedom from Data Model Dictatorship – Part II The step beyond Google’s word-matching • without resorting to taxonomies • and without waiting for the semantic web Is User-provided Unconstrained Tagging (referred to as ‘Folksonomies’) • Not enforcing the originator to capture everything that might be needed You can then exploit patterns in Tags / ‘Tagclouds’ But it can only work if the participant is incentivised to take part • E.g. Del.ici.ous bookmarks, Flickr Photo Organisation What might this mean for Enterprise Information Sharing? Where would user-organised information be useful, and how would users be incentivised to participate? 33
  • 34. SOA, REST and Information-as-a-Service Grown-up SOA? Information-as-a-Service: Can the maturing SOA “… approaches information integration in loosely-coupled, frameworks combined with REST coarse-grained, asynchronous in manner that seeks to avoid the requirements of comprehensive data modelling prior to styles and Information-as-a- integrating them” Service approaches provide the - Ronald Schmelzer ‘fabric’ for the externalisation agenda? REST • To mediate this ‘publishing, citation and emergence’ ? Representational State Transfer is intended to evoke an image of how a well-designed Web application behaves: a network of web • Dynamically managing the pages (a virtual state-machine), where the user progresses metadata and the routing through an application by selecting links (state transitions), resulting in the next page (representing the next state of the • Using Policies, Events and application) being transferred to the user and rendered for their Content rather than Top-Down use.” Decomposition - Dr. Roy Fielding Could an Externalisation Agenda be the, business relevant, ‘Killer app’ for SOA and provide the business rationale for REST and the Semantic Web? 34
  • 35. Externalised Identity driven by the ‘On-Demand’ vendors OpenID OpenID is a lightweight, decentralized identity system that provides web single sign-on. We have merged the technology and use cases of the Simple Extensible Identity Protocol (SXIP) and Digital Identity Exchange (DIX) into the OpenID 2.0 specifications. OpenID 2.0 features include improved extensibility, increased security, substantive identity data attribute exchange abilities, and third-party signed assertion capabilities. Identity 2.0 Identity 2.0 is an open, standards-based, yet fundamentally decentralized identity model. First coined by us in January 2005, Identity 2.0 describes the concept of an ID that can be trusted and used anywhere and requires no centralized consultation with the ID authority that issues the credential. Will adoption drive an externalised approach to user authentication and single sign-on? 35
  • 36. Ubiquitous Identity -Recent thinking from MIT U T R I - Unified Theory of Relativistic Identification of Information Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6 By Dr. Shoumen Palit Austin Datta, MIT “The suggestion here is to use the 128-bit IPv6, a scheme that already at hand and being deployed, gradually but globally. This may be the “one-size-fits-all” hyper-id that is unique.” “Think IPv6 as the solution that is preagreed for global adoption. Think about contextual relevance of data and how to “number the numbers” but especially how to route numbers (data) which may be identical but with different identities.” What are the possibilities for externalised information sharing if we can uniquely identify objects and people, within the context of processes, globally? 36
  • 37. Will Externalised Information Sharing become BAU? Event Identity Processing Management Standards Standards SOA REST Folksonomy Ontology What might be the effect of the combining such ‘externalising’ technologies and patterns? Could they, in combination, be the foundation of a truly business-enabling Semantic Web ? 37
  • 38. Externalisation Agenda Guidelines for Enterprise Architects • Discover the need - Consider a new architectural style (such as VPEC-T) for defining and agreeing an Externalisation Agenda with the business • Explain why - Help the business see the value of an externalised approach – develop the story that explains how SOA/REST/Web 2.0/3.0 etc. support the businesses Externalisation Agenda • Prove it early - Start small and think coarse-grained. Be pragmatic & incrementally build to a long-range vision When people converse we externalise information naturally – we can bring this concept to the IS we use and in doing so, make it easier for businesses to consume. Should businesses be working on an Externalisation Agenda now? 38