Open Framework, Information Management Strategy & Collaborative Governance | Data & Social Methodology - MIKE2.0 Methodology
Members
Collapse Expand Close

To join, please contact us.

Improve MIKE 2.0
Collapse Expand Close
Need somewhere to start? How about the most wanted pages; or the pages we know need more work; or even the stub that somebody else has started, but hasn't been able to finish. Or create a ticket for any issues you have found.
by: Bsomich
15  Apr  2014

Community Update

Missed what happened in the MIKE2.0 Community? Here’s a quick recap:

 logo.jpg

Business Drivers for Better Metadata Management

There are a number Business Drivers for Better Metadata Management that have caused metadata management to grow in importance over the past few years at most major organisations. These organisations are focused on more than just a data dictionary across their information – they are building comprehensive solutions for managing business and technical metadata.

Our wiki article on the subject explores many factors contributing to the growth of metadata and guidance to better manage it:  

Feel free to check it out when you have a moment.

Sincerely,MIKE2.0 Community

Contribute to MIKE:

Start a new article, help witharticles under construction or look for other ways to contribute.

Update your personal profile to advertise yourself to the community and interact with other members.

Useful Links:
Home Page
Login
Content Model
FAQs
MIKE2.0 Governance

Join Us on
42.gif

Follow Us on
43 copy.jpg

Join Us on
images.jpg

Did You Know?
All content on MIKE2.0 and any contributions you make are published under the Creative Commons license. This allows you free re-use of our content as long as you add a brief reference back to us.

 

This Week’s Blogs for Thought:

Departing Employees: How well are you closing the information loop? 

Every organization, regardless of size, understands the importance of good on-boarding procedures for incoming employees and new hires. We have a slew of welcome packets, orientations, procedures and trainings to ensure we’re providing our incoming talent with the right tools to be successful in their new roles. But how often are we taking the same care to off board our departing employees when sensitive company information and intellectual property is at stake?

Read more. 

On Sharing Data

While security and privacy issues prevent sensitive data from being shared (e.g., customer data containing personal financial information or patient data containing personal health information), do you have access to data that would be more valuable if you shared it with the rest of your organization—or perhaps the rest of the world?Read more.

 

Evernote’s Three Laws of Data Protection

“It’s all about bucks, kid. The rest is conversation.” –Michael Douglass as Gordon Gekko, Wall Street (1987) Sporting more than 60 million users, Evernote is one of the most popular productivity apps out there these days. You may in fact use the app to store audio notes, video, pics, websites, and perform a whole host of other tasks.Read more.

  Forward this message to a friend

 

 

Category: Information Development
No Comments »

by: Bsomich
11  Apr  2014

Departing Employees: How well are you closing the information loop?

Every organization, regardless of size, understands the importance of good on-boarding procedures for incoming employees and new hires. We have a slew of welcome packets, orientations, procedures and trainings to ensure we’re providing our incoming talent with the right tools to be successful in their new roles. But how often are we taking the same care to off board our departing employees when sensitive company information and intellectual property is at stake?

This topic has really hit home for our organization this year, as we began to develop procedures for operations that haven’t been clearly defined or documented, impacting critical departments such as HR, IT and Finance. Developing SOPs for these “gray areas” of the business has uncovered some interesting gaps that were not previously being closed. In the end, we discovered that while we had very clear instructions for bringing new talent into the company, we had no formal process for those who left and most off boarding activities were being carried out on an ad hoc basis.

Lesson learned: Regardless of company size or resources, taking the right approach to off boarding can save a giant headache when it comes to information security. It should be a preventive measure and not a reactive process.

As a baseline, organizations should give careful thought to the following information access points:

- Email

- Phone Directories

- Documents/File Sharing Systems

- CRM/Mailing Lists

- Company Intranets

- Website or FTPs

 

How well is your team closing the gap with respect to these information access points? Does your HR department communicate off boarding needs to IT, and do employees sign an NDA upon hire? How are you ensuring your intellectual property and other critical enterprise information is being safeguarded from departing talent?

 

Category: Information Development
No Comments »

by: Bsomich
31  Mar  2014

Community Update

Missed what happened in the MIKE2.0 community this past week? Read on:

 

 logo.jpg

The Five Phases of MIKE2.0

In order to realize results more quickly, the MIKE2.0 Methodology has abandoned the traditional linear or waterfall approach to systems development. In its stead, MIKE2.0 has adopted an iterative, agile approach called continuous implementation. This approach divides the development and rollout of anentire system into a series of implementation cycles. These cycles identify and prioritize the portions of the system that can be constructed and rolled out before the entire system is complete. Each cycle also includes

  • A feedback step to evaluate and prioritize the implementation results
  • Strategy changes
  • Improvement requests on the future implementation cycles.

Following this approach, there are five phases to the MIKE2.0 Methodology:

Feel free to check them out when you have a moment.

Sincerely,

MIKE2.0 Community

Contribute to MIKE:

Start a new article, help with articles under construction or look for other ways to contribute.

Update your personal profile to advertise yourself to the community and interact with other members.

Useful Links:
Home Page
Login
Content Model
FAQs
MIKE2.0 Governance

Join Us on
42.gif

Follow Us on
43 copy.jpg

Join Us on
images.jpg

Did You Know?
All content on MIKE2.0 and any contributions you make are published under the Creative Commons license. This allows you free re-use of our content as long as you add a brief reference back to us.

This Week’s Food for Thought:

Now that’s magic!

When I was a kid growing up in the UK, Paul Daniels was THE television magician. With a combination of slick high drama illusions, close-up trickery and cheeky end-of-the-pier humour, (plus a touch of glamour courtesy of The Lovely Debbie McGee TM), Paul had millions of viewers captivated on a weekly basis and his cheeky catch-phrases are still recognised to this day.Read more.

Login with Social Media

With a little work, social networks have the potential to be as valuable in confirming an identity as a passport.  It is the power of the crowd that can prove the integrity of the account holder, perhaps best described as crowdsourcing identity.

There are usually two goals of identity.  The first is to confirm you are you who you say you are and the second is to work out your relationship to other people.
Read more.

Does your company need data visualization apps?

Few learned folks dispute the fact that the era of Big Data has arrived. Debate terms if you like, but most of us are bombarded with information these days. The question is turning to, How do we attempt to understand all of this data?

Read more.

 

  Forward this message to a friend

Category: Information Development
No Comments »

by: Ocdqblog
30  Mar  2014

On Sharing Data

While security and privacy issues prevent sensitive data from being shared (e.g., customer data containing personal financial information or patient data containing personal health information), do you have access to data that would be more valuable if you shared it with the rest of your organization—or perhaps the rest of the world?

We are all familiar with the opposite of data sharing within an organization—data silos. Somewhat ironically, many data silos start with data that was designed to be shared with the entire organization (e.g., from an enterprise data warehouse), but was then replicated and customized in order to satisfy the particular needs of a tactical project or strategic initiative. This customized data often becomes obsolesced after the conclusion (or abandonment) of its project or initiative.

Data silos are usually denounced as evil, but the real question is whether the data hoarded within a silo is sharable—is it something usable by the rest of the organization, which may be redundantly storing and maintaining their own private copies of the same data, or are the contents of the data silo something only one business unit uses (or is allowed to access in the case of sensitive data).

Most people decry data silos as the bane of successful enterprise data management—until you expand the scope of data beyond the walls of the organization, where the enterprise’s single version of the truth becomes a cherished data asset (i.e., an organizational super silo) intentionally siloed from the versions of the truth maintained within other organizations, especially competitors.

We need to stop needlessly replicating and customizing data—and start reusing and sharing data.

Historically, replication and customization had two primary causes:

  • Limitations in technology (storage, access speed, processing speed, and a truly sharable infrastructure like the Internet) meant that the only option was to create and maintain an internal copy of all data.
  • Proprietary formats and customized (and also proprietary) versions of common data was viewed as a competitive differentiation—even before the recent dawn of the realization that data is a corporate asset.

Hoarding data in a proprietary format and viewing “our private knowledge is our power” must be replaced with shared data in an open format and viewing “our shared knowledge empowers us all.”

This is an easier mantra to recite than it is to realize, not only within an organization or industry, but even more so across organizations and industries. However, one of the major paradigm shifts of 21st century data management is making more data publicly available, following open standards (such as MIKE2.0) and using unambiguous definitions so data can be easily understood and reused.

Of course, data privacy still requires sensitive data not be shared without consent, and competitive differentiation still requires intellectual property not be shared outside the organization. But this still leaves a vast amount of data, which if shared, could benefit our increasingly hyper-connected world where most of the boundaries that used to separate us are becoming more virtual every day. Some examples of this were made in the recent blog post shared by Henrik Liliendahl Sørensen about Winning by Sharing Data.

Category: Information Development
No Comments »

by: Alandduncan
29  Mar  2014

Now that’s magic!

When I was a kid growing up in the UK, Paul Daniels was THE television magician. With a combination of slick high drama illusions, close-up trickery and cheeky end-of-the-pier humour, (plus a touch of glamour courtesy of The Lovely Debbie McGee TM), Paul had millions of viewers captivated on a weekly basis and his cheeky catch-phrases are still recognised to this day.

Of course. part of the fascination of watching a magician perform is to wonder how the trick works. “How the bloody hell did he do that?” my dad would splutter as Paul Daniels performed yet another goofy gag or hair-raising stunt (no mean fear, when you’re as bald as a coot…) But most people don’t REALLY want to know the inner secrets, and ever fewer of us are inspired to spray a riffle-shuffled a pack of cards all over granny’s lunch, stick a coin up their nose or grab the family goldfish from its bowl and hide it in the folds of our nether-garments. (Um, yeah. Let’s not go there…)

Penn and Teller are great of course, because they expose the basic techniques of really old, hackneyed tricks and force more innovation within the magician community. They’re at their most engaging when they actually do something that you don’t get to see the workings of. Illusion maintained, audience entertained.

As data practitioners, I think we can learn a few of these tricks. I often see us getting too hot-and-bothered about differentiating data, master data, reference data, metadata, classification scheme, taxonomy, dimensional vs relational vs data vault modelling etc. These concepts are certainly relevant to our practitioner world, but I don’t necessarily believe they need to be exposed at the business-user level.

For example, I often hear business users talking about “creating the metadata” for an event or transaction, when they’re talking about compiling the picklist of valid descriptive values and mapping these to the contextualising descriptive information for that event (which by my reckoning, really means compiling the reference data!). But I’ve found that business people really aren’t all that bothered about the underlying structure or rigour of the modelling process.

That’s our job.

There will always be exceptions. My good friend and colleague Ben Bor is something a special case and has the talent to combine data management and magic.

But for the rest of us mere mortals, I suggest that we keep the deep discussion of data techniques for the Data Magic Circle, and just let the paying customers enjoy the show….

Category: Business Intelligence, Data Quality, Enterprise Data Management, Information Development, Information Governance, Information Management, Information Strategy, Information Value, Master Data Management, Metadata
No Comments »

by: Robert.hillard
28  Mar  2014

Login with social media

With a little work, social networks have the potential to be as valuable in confirming an identity as a passport.  It is the power of the crowd that can prove the integrity of the account holder, perhaps best described as crowdsourcing identity.

There are usually two goals of identity.  The first is to confirm you are you who you say you are and the second is to work out your relationship to other people.

Social networks can solve both.  We’re all familiar with the burgeoning number of websites that allow you to “login” with Facebook, LinkedIn or Twitter.  The vast majority, though, are simply using a convenient approach to challenge and permit access.  Rather than maintaining a new set of credentials, they are using a mechanism that maintains those sensitive details externally.

This is to be applauded and is entirely consistent with the objectives of cloud to share services rather than build complete vertical solutions from the ground up.  However, just accepting a social network’s credentials only uses a fraction of the capability that aligning with these services offers.

Telephone directories

In past decades, our grandparents carefully checked the telephone directory when it came out to make sure all their family and friends were listed correctly.  With the whole city doing the same thing, any mistakes (or even deliberate fraudsters) were pretty quickly uncovered.

Today, phone directories are barely looked at and are, at best, incomplete.  Once you get through an ID check, your details are entirely within your control and very likely to go unchallenged.

Social networks are different.  While the profile that is created is self-regulated, its exposure to the friends forces a level of honesty.  It may be easy to create a false identity, but a profile that is fully connected with the network and is actively maintained is much harder to fake for an extended period.  Some of the things to look for include: levels of activity, numbers of “friends” or connections who are themselves active and connected, cross-posting and the amount of detail on the profile.

A CV to be trusted

Many employers now prefer LinkedIn to a CV for the simple reason that it is harder to fake qualifications and experience.  A CV prepared for an employer requires reference checking and verification that often doesn’t happen.

The media is full of stories of senior people who have been caught claiming qualifications that they never completed.  Compare that to the profile on LinkedIn where there are usually hundreds of connections, any one of which will call out if a false qualification is claimed or the description of employment is exaggerated.

Moreover, for most employers the network of connections in common is extensive and a whole range of potential points of verification are added, even if confidentiality requires waiting until after employment has commenced.  Just the knowledge that this is likely to happen discourages would-be fakes.

Credentials that aren’t shared

Just as people will grab their smartphone before almost any other possession in an emergency, it seems that they value their social media login credentials above almost any other password.

People will often happily give out their credentials for video streaming services (such as Netflix).  They allow their trusted family members to use their banking user details.  They will even allow support staff at work to have their network password.  But ask for access to their Facebook or LinkedIn account and they will refuse as it sits at the centre of their trusted friend network.  Access to this core is just too sensitive to share.

In the future we could see building security where you “login with Facebook” and banks using social media credentials as part of identifying a customer when creating a new account.

A fair exchange of value

Whether a business or government service, it is important that the consumer or citizen receives fair value for using social media to identify themselves.  The key is full disclosure.

If all that the Google, Facebook, Twitter or LinkedIn account is doing is providing access then the exchange is one of convenience.  For the user, there is one less password to maintain and the site owner there is one less point of exposure.

However, it may be that the site or service needs to know about relationships, locations or other details which are maintained in the service.  Full disclosure allows the user to feel confident on what is being used and why.  If the use is appropriate to the user’s needs then this approach provides a way of updating their personal details without their filling out as many forms.

Many online services need not have any username or password data at all and those that do may only need it for those customers or citizens who want to opt-out of the social media revolution.  Arguably, this last group maintain less of their details online and are usually less exposed in the event of security breach.

Good practice suggests using social media as part of an identity service rather than government or business trying to create yet another master, standalone, identity solution of their own.

Category: Enterprise2.0, Information Value, Web2.0
1 Comment »

by: Bsomich
18  Mar  2014

Weekly IM Update.

 logo.jpg

What is an Open Methodology Framework?

An Open Methodology Framework is a collaborative environment for building methods to solve complex issues impacting business, technology, and society.  The best methodologies provide repeatable approaches on how to do things well based on established techniques. MIKE2.0′s Open Methodology Framework goes beyond the standards, techniques and best practices common to most methodologies with three objectives:

  • To Encourage Collaborative User Engagement
  • To Provide a Framework for Innovation
  • To Balance Release Stability with Continuous Improvement

We believe that this approach provides a successful framework accomplishing things in a better and collaborative fashion. What’s more, this approach allows for concurrent focus on both method and detailed technology artifacts. The emphasis is on emerging areas in which current methods and technologies lack maturity.

The Open Methodology Framework will be extended over time to include other projects. Another example of an open methodology, is open-sustainability which applies many of these concepts to the area of sustainable development. Suggestions for other Open Methodology projects can be initiated on this article’s talk page.

We hope you find this of benefit and welcome any suggestions you may have to improve it.

Sincerely,

MIKE2.0 Community

Popular Content

Did you know that the following wiki articles are most popular on Google? Check them out, and feel free to edit or expand them!

What is MIKE2.0?
Deliverable Templates
The 5 Phases of MIKE2.0
Overall Task List
Business Assessment Blueprint
SAFE Architecture
Information Governance Solution

Contribute to MIKE:

Start a new article, help with articles under construction or look for other ways to contribute.

Update your personal profile to advertise yourself to the community and interact with other members.

Useful Links:
Home Page
Login
Content Model
FAQs
MIKE2.0 Governance

Join Us on
42.gif

Follow Us on
43 copy.jpg

Join Us on images.jpg

 

This Week’s Blogs for Thought:

Is it finally the year of IoT?
In previous posts on this blog, The Internet of Humans and The Quality of Things, I have pondered aspects of the Internet of Things (IoT), which is something many analysts have promised for several years would soon be a pervasive phenomenon. There is reason to believe, however, that it is finally the year of IoT.
In a sense IoT is already with us, Christopher Mims explained in his Quartz three-part series about IoT.

Read more.

Grover: A Business Syntax for Semantic English

Grover is a semantic annotation markup syntax based on the grammar of the English language. Grover is related to the Object Management Group’s Semantics of Business Vocabulary and Rules (SBVR), explained later. Grover syntax assigns roles to common parts of speech in the English language so that simple and structured English phrases are used to name and relate information on the semantic web. By having as clear a syntax as possible, the semantic web is more valuable and useful.
An important open-source tool for semantic databases is SemanticMediaWiki that permits everyone to create a personal “wikipedia” in which private topics are maintained for personal use. The Grover syntax is based on this semantic tool and the friendly wiki environment it delivers, though the approach below might also be amenable to other toolsets and environments.Read more.

The Data Doctor is in

Being a data management practitioner can be tough.
You’re expected to work your data quality magic, solve other people’s data problems, and help people get better business outcomes. It’s a valuable, worthy and satisfying profession. But people can be infuriating and frustrating, especially when the business user isn’t taking responsibility for the quality of their own data.

It’s a bit like being a Medical Doctor in general practice.
Read more.

 

Forward to a Friend!

Know someone who might be interested in joining the Mike2.0 Community? Forward this message to a friendQuestions?

If you have any questions, please email us at mike2@openmethodology.org.

 


If you no longer wish to receive these emails, please reply to this message with “Unsubscribe” in the subject line or si

Category: Information Development
No Comments »

by: Ocdqblog
12  Mar  2014

Is it finally the Year of IoT?

In previous posts on this blog, The Internet of Humans and The Quality of Things, I have pondered aspects of the Internet of Things (IoT), which is something many analysts have promised for several years would soon be a pervasive phenomenon. There is reason to believe, however, that it is finally the year of IoT.

In a sense IoT is already with us, Christopher Mims explained in his Quartz three-part series about IoT. “For one thing, anyone with a smartphone has already joined the club. The average smartphone is brimming with sensors — an accelerometer, a compass, GPS, light, sound, altimeter. It’s the prototypical internet-connected listening station, equally adept at monitoring our health, the velocity of our car, the magnitude of earthquakes, and countless other things that its creators never envisioned. Smartphones are also becoming wireless hubs for other gadgets and sensors.”

The Invisible Buttons of our increasingly Cybered Spaces

While the challenge previously thwarting it was that connecting devices to IoT was expensive and difficult, Mims predicts that in 2014 we will see the convergence of ever-smarter smartphones and other connected things that are cheaper and easier to use. These connected things are often referred to as invisible buttons.

“An invisible button,” Mims explained, “is simply an area in space that is ‘clicked’ when a person or object, such as a smartphone, moves into that physical space. If invisible buttons were just rigidly defined on-off switches, they wouldn’t be terribly useful. But because the actions they trigger can be modified by an infinitude of other variables, such as the time of day, our previous actions, the actions of others, or what Google knows about our calendar, they quickly become a means to program our physical world.”

An example was written about by Matt McFarland in his Washington Post article How iBeacons could change the world forever. “With iOS 7,” McFarland reported, “Apple unveiled iBeacon, a feature that uses Bluetooth 4.0, a location-based technology. This makes it possible for sensors to detect — within inches — how close a phone is.” McFarland’s article lists nine interesting examples of how IoT technology like iBeacon could enhance the average person’s life.

The End of the Interface as We Know It

“That we currently need a cell phone,” Mims explained, “to act as a proximity sensor is just an artifact of where the technology is at present. The same can be accomplished with any number of other internet-connected sensors.” In fact, the rise of what is known as anticipatory computing might be signaling the end of the interface as we know it. As Mims explained, IoT doesn’t just give us another way to explicitly tell computers what we want. “Instead, by sensing our actions, the internet-connected devices around us will react automatically, and their representations in the cloud will be updated accordingly. In some ways, interacting with computers in the future could be more about telling them what not to do — at least until they’re smart enough to realize that we are modifying our daily routine.”

Every Internet needs its HTML

A critical piece of the IoT puzzle, however, remains to be solved, Mims concluded. “What engineers lack is a universal glue to bind all the of the ‘things’ in the internet of things to each other and to the cloud. A lack of standards means most devices on the internet of things are going to use existing methods of connection — Wi-Fi, Bluetooth and the like — to connect to one another. But eventually, something like HTML, the language of the web, will be required to make the internet of things realize its potential.”

As Robert Hillard blogged, the race to IoT is a marathon. While 2014 does appear to be the Year of IoT, it is still early in the marathon and IoT has many more miles to run. It is going to be a fun run, no doubt about it, but IoT will need open standards, and the interoperability they provide, in order to get us across the finish line.

Category: Information Development
No Comments »

by: John McClure
06  Mar  2014

Grover: A Business Syntax for Semantic English

Grover is a semantic annotation markup syntax based on the grammar of the English language. Grover is related to the Object Management Group’s Semantics of Business Vocabulary and Rules (SBVR), explained later. Grover syntax assigns roles to common parts of speech in the English language so that simple and structured English phrases are used to name and relate information on the semantic web. By having as clear a syntax as possible, the semantic web is more valuable and useful.

An important open-source tool for semantic databases is SemanticMediaWiki that permits everyone to create a personal “wikipedia” in which private topics are maintained for personal use. The Grover syntax is based on this semantic tool and the friendly wiki environment it delivers, though the approach below might also be amenable to other toolsets and environments.

Basic Approach. Within a Grover wiki, syntax roles are established for classes of English parts of speech.

  • Subject:noun(s) -- verb:article/verb:preposition -- Object:noun(s)

refines the standard Semantic Web pattern:

  • SubjectURL -- PredicateURL -- ObjectURLwhile in a SemanticMediaWiki environment, with its relative URLs, this is the pattern:
  • (Subject) Namespace:pagename -- (Predicate) Property:pagename -- (Object) Namespace:pagename.

 

nouns
In a Grover wiki, topic types are nouns, more precisely nounal expressions, are concepts. Every concept is defined by a specific semantic database query, these queries being the foundation of a controlled enterprise vocabulary. In Grover every pagename is the name of a topic and every pagename includes a topic-type prefix. Example: Person:Barack Obama and Title:USA President of the United States of America, two topics related together through one or more predicate relations, for instance “has:this”. Wikis are organized into ‘namespaces’ — its pages’ names are each prefixed with a namespace-name, which function equally as topic-type names. Additionally, an ‘interwiki prefix’ can indicate the URL of the wiki where a page is located — in a manner compatible with the Turtle RDF language.

Nouns (nounal expressions) are the names of topic-types and or of topics; in ontology-speak, nouns are class resources or nouns are individual resources but rarely are nouns defined as property resources (and thereby used as a ‘predicate’ in the standard Semantic Web pattern, mentioned above). This noun requirement is a systemic departure from today’s free-for-all that allows nouns to be part of the name of predicates, leading to the construction of problematic ontologies from the perspective of common users.verbsIn a Grover wiki, “property names” are an additional ontology component forming the bedrock of a controlled semantic vocabulary. Being pages in the “Property” namespace means these are prefixed with the namespace name, “Property”. However the XML namespace is directly implied, for instance has:this implies a “has” XML Namespace. The full pagename of this property is “Property:has:this. The tenses of a verb — infinitive, past, present and future — are each an XML namespace, meaning there are separate have, has, had and will-have XML Namespaces. The modalities of a verb are also separate XML Namespace, may and must. Lastly the negation form for verbs (involving not) are additional XML Namespaces.

The “verb” XML Namespace name is only one part of a property name. The other part of a property name is either a preposition or it is a grammatical author. Together, these comprise an enterprise’s controlled semantic vocabulary.

prepositions
As in English grammar, prepositions are used to relate an indirect object or object of a preposition, to a subject in a sentence. Example: “John is at the Safeway” uses a property named “is:at” to yield the triple Person:John -- is:at -- Store:Safeway. There are approximately about one hundred english prepositions possible for any particular verbal XML Namespace. Examples: had:from, has:until and is:in.
articles
As in English grammar, articles such as “a” and “the” are used to relate direct objects or predicate nominatives to a subject in a sentence. As for prepositions above, articles are associated with a verb XML Namespace. Example: has:a:, has:this, has:these, had:some has:some and will-have:some.

adjectivesIn a Grover wiki, definitions in the “category” namespace include adjectives, such as “Public” and “Secure”. These categories are also found in a controlled modifier vocabulary. The category namespace also includes definitions for past participles, such as “Secured” and “Privatized”. Every adjective and past participle is a category in which any topic can be placed. A third subclass of modifiers include ‘adverbs’, categories in which predicate instances are placed.

That’s about all that’s needed to understand Grover, the Business Syntax for Semantic English! Let’s use the Grover syntax to implement a snippet from the Object Management Group’s Semantics of Business Vocabulary and Rules (SBVR) which has statements such as this for “Adopted definition”:

adopted definition
Definition: definition that a speech community adopts from an external source by providing a reference to the definition.
Necessities: (1) The concept ‘adopted definition’ is included in Definition Origin. (2) Each adopted definition must be for a concept in the body of shared meanings of the semantic community of the speech community.

 

Now we can use Grover’s syntax to ‘adopt’ the OMG’s definition for “Adopted definition”.
Concept:Term:Adopted definition -- is:within -- Concept:Definition
Concept:Term:Adopted definition -- is:in -- Category:Adopted
Term:Adopted definition -- is:a -- Concept:Term:Adopted definition
Term:Adopted definition -- is:also -- Concept:Term:Adopted definition
Term:Adopted definition -- is:of -- Association:Object Management Group
Term:Adopted definition -- has:this -- Reference:http://www.omg.org/spec/SBVR/1.2/PDF/
Term:Adopted definition -- must-be:of -- Concept:Semantic Speech Community
Term:Adopted definition -- must-have:some -- Concept:Reference

This simplified but structured English permits the widest possible segment of the populace to participate in constructing and perfecting an enterprise knowledge base built upon the Resource Description Framework.

More complex information can be specified on wikipages using standard wiki templates. For instance to show multiple references on the “Term:Adopted definition” page, the “has:this” wiki template can be used:
{{has:this|Reference:http://www.omg.org/spec/SBVR/1.1/PDF/;Reference:http://www.omg.org/spec/SBVR/1.2/PDF/}}
Multi-lingual text values and resource references would be as follows, using the wiki templates (a) {{has:this}} and (b) {{skos:prefLabel}}
{{has:this |@=en|@en=Reference:http://www.omg.org/spec/SBVR/1.2/PDF/}}
{{skos:prefLabel|@=en;de|@en=Adopted definition|@de=Angenommen definition}}

One important feature of the Grover approach is its modification of our general understanding about how ontologies are built. Today, ontologies specify classes, properties and individuals; a data model emerges from listings of range/domain axioms associated with a propery’s definition. Instead under Grover, an ontology’s data models are explicitly stated with deontic verbs that pair subjects with objects; this is an intuitively stronger and more governable approach for such a critical enterprise resource as the ontology.

Category: Business Intelligence, Enterprise Content Management, Enterprise Data Management, Enterprise2.0, Information Development, Semantic Web
No Comments »

by: Alandduncan
04  Mar  2014

The (Data) Doctor Is In: ADD looks for a data diagnosis…

Being a data management practitioner can be tough.

You’re expected to work your data quality magic, solve other people’s data problems, and help people get better business outcomes. It’s a valuable, worthy and satisfying profession. But people can be infuriating and frustrating, especially when the business user isn’t taking responsibility for the quality of their own data.

It’s a bit like being a Medical Doctor in general practice.

The patent presents with some early indicative symptoms. The MD then performs a full diagnosis and recommends a course of treatment. It’s then up to the patient whether or not they take their MD’s advice…

AlanDDuncan: “Doctor, Doctor. I get very short of breath when I go upstairs.”
MD: Yes, well. Your Body Mass Index is over 30, you’ve got consistently high blood pressure, your heatbeat is arrhythmic, and cholesterol levels are off the scale.”
ADD: “So what does that mean, doctor?”
MD: “It means you’re fat, you drink like a fish, you smoke like a chimney, your diet consists of fried food and cakes and you don’t do any exercise.”
ADD: “I’m Scottish.”
MD: “You need to change your lifestyle completely, or you’re going to die.”
ADD: “Oh. So, can you give me some pills?….”

If you’re going to get healthy with your data, you’ll going to have to put the pies down, step away from the Martinis and get off the couch folks.

Category: Business Intelligence, Data Quality, Information Development, Information Governance, Information Management, Information Strategy, Information Value, Master Data Management, Metadata
No Comments »

Calendar
Collapse Expand Close
TODAY: Sat, April 19, 2014
April2014
SMTWTFS
303112345
6789101112
13141516171819
20212223242526
27282930123
Recent Comments
Collapse Expand Close