Apps Make Semantic Web a Reality

Amit Sheth
Amit ShethFounding Director, Artificial Intelligence Institute at University of South Carolina

Discusses a variety of Semantic Web technology powered commercial applications powered by Semagix Freedom that used ontologies, semantic annotations, and semantic search, browsing, path computations, etc.

advanced
     
Back  Issues      
  
  
  
  
  
  
Apps  Make  Semantic  Web  a  Reality
By  Yvonne  L.  Lee
April  1,  2005  —  SAN  FRANCISCO  —  The  Semantic  Web  has
moved  from  a  theoretical  construct  to  its  initial  uses  in
building  systems  that  ensure  legal  compliance,  track
terrorists,  create  smarter  movie-­search  applications  and
integrate  corporate  IT,  according  to  attendees  at  the
Semantic  Technology  Conference  held  here  in  March.
The  market  for  semantic  technologies  will  grow  at  a  compound  annual  growth
rate  of  between  60  percent  and  70  percent  until  2010,  when  it  will  grow  from  its
current  size  of  US$2  billion  to  $63  billion,  according  to  TopQuadrant,  a
consulting  firm  that  specializes  in  Semantic  Web  technologies.
New  tools  are  coming  not  with  fancy  names  reflecting  the  World  Wide  Web
Consortium’s  next  great  vision,  but  as  an  evolution  of  current  Web  services
and  database  technology,  said  Eric  Miller,  the  W3C’s  Semantic  Web  activity
lead.  The  current  Web  is  an  extension  of  tools  such  as  gopher  and  ftp  that
existed  in  the  early  1990s,  he  asserted.  These  tools  linked  files  together  but
did  not  reveal  anything  about  the  text  inside  the  files.  The  current  Web  links
documents  and  can  be  searched  according  to  the  text  inside  the  files,  but
doesn’t  reveal  context  of  the  text,  he  said.  The  Semantic  Web  takes  that  next
step.
Existing  applications  that  will  add  Semantic  Web  capabilities  include  Adobe’s
Extensible  Metadata  Platform  (XMP)  and  Oracle’s  database.  XMP  is  an  open-­
source  package  available  now  for  tagging  information.  It  adheres  to  the  W3C’s
Resource  Description  Framework  (RDF),  which  is  one  of  the  pillars  of  the
Semantic  Web.  The  other  two  are  the  Web  Ontology  Language  (OWL)  and
XML.
RDF  is  a  metadata  model  for  describing  objects  and  the  relationships  among
them.  OWL  is  a  markup  language  for  creating  exhaustive  descriptions—
ontologies—of  objects.  The  software  development  kit  includes  documentation,
tools  and  sample  code  for  creating  applications  that  use  this  metadata  for
intelligent  searches  across  various  file  types.
Oracle  will  include  RDF  support  in  Database10g  Release  2  later  this  year,
according  to  Miller.
Although  a  scant  eight  companies  together  with  Stanford  University’s
Knowledge  Systems  Lab  presented  at  the  expo  portion  of  the  show,  several
companies  said  their  products  were  being  used  in  government,  financial  and
commercial  applications.
Amit  Sheth,  chief  technology  officer  at  Semagix,  said  his  company’s  Freedom
software  was  being  used  by  an  unidentified  bank  to  help  comply  with  the  U.S.
government’s  Patriot  Act,  by  a  European  police  force  to  follow  crime  patterns,
and  by  a  telephone  service  provider  to  create  an  application  that  provides
information  about  pay-­per-­view  movies.
He  also  said  Regulatory  Data  Corp.,  a  group  founded  by  20  of  the  global  banks,
is  using  it  to  help  minimize  risks  of  money  laundering,  fraud  and  terrorist
financing.
  
  
Spotlight  On
Eclipse
  
  
  
  
  
  
financing.
The  Patriot  Act  requires  banks  to  track  and  account  for  the  customers  with
whom  they  do  transactions.  Sheth  said  his  application  could  provide  the
contextual  information  that  goes  beyond  business  intelligence  applications  and
standard  search  engines  to  show  relationships  among  people  and
organizations.
“Typically,  when  you  type  something  in  Google,  it  doesn’t  know  if  it’s  a  name  of
a  person  or  something  like  that,”  he  said.
Freedom  can  tie  together  information  from  a  variety  of  different  formatted  data
sources  to  ferret  out  that  a  customer  may  have  a  relationship  with  someone
associated  with  a  terrorist  organization,  he  said.
The  software  also  could  sift  through  what  he  called  “dirty”  data  with  acronyms,
spelling  errors,  multiple  formats  or  formats  that  are  inappropriate  for  the  field.
Another  application  financial  organizations  are  using  to  sift  through  data  is
Unicorn’s  Unicorn  System.  “Enterprises  have  accumulated  an  incredible
amount  of  mess,”  said  Unicorn  CEO  Zvi  Schreiber.
The  system  includes  a  repository  linking  various  enterprise  data  sources  and
the  ontologies,  metadata  scanners,  mapping  tools  to  visually  map  schema  to
ontology  models,  and  modeling  tools.
In  addition  to  investment  banks,  the  Metropolitan  Life  Insurance  Company,  the
U.S.  Department  of  Defense  and  the  Tennessee  Valley  Authority  have  used
Unicorn  to  integrate  enterprise  data,  to  comply  with  regulations  such  as
Sarbanes-­Oxley,  the  Patriot  Act  and  Basel  II,  and  to  automate  processes,
Schreiber  said.
“We’re  tying  semantics  back  to  real  IT  systems,”  he  said.  “By  attaching
business  meaning  to  the  IT  systems,  then  [organizations  are]  able  to  comply
better.”
Email  this  article Print  friendly  format Send  feedback
login  |  news  |  current  issue  |  letters  |  columns  |  opinions  |  resource  links  |  about  |  site  map  |
subscriptions  |  media  kit  |  privacy  |  contact  us
Copyright  ©  1999-­2005  BZ  Media  LLC,  all  rights  reserved.
Phone:  +1-­631-­421-­4158  •  E-­mail:info@bzmedia.com
  

Recommended

Gap finder finding inconsistency of security information from unstructured text by
Gap finder finding inconsistency of security information from unstructured textGap finder finding inconsistency of security information from unstructured text
Gap finder finding inconsistency of security information from unstructured textShakas Technologies
12 views1 slide
Data Transparency 2013 - OrgPedia by 3 Round Stones by
Data Transparency 2013 - OrgPedia by 3 Round StonesData Transparency 2013 - OrgPedia by 3 Round Stones
Data Transparency 2013 - OrgPedia by 3 Round Stones3 Round Stones
602 views11 slides
Big Data from cheap phones by
Big Data from cheap phonesBig Data from cheap phones
Big Data from cheap phonesLenin Alevski Huerta Arias
933 views12 slides
Unit 1 by
Unit 1Unit 1
Unit 1kanchan khedikar
650 views25 slides
A unified framework for user identification across online and offline data by
A unified framework for user identification across online and offline dataA unified framework for user identification across online and offline data
A unified framework for user identification across online and offline dataShakas Technologies
18 views1 slide
Achieve Federal Open Data Policy Compliance - Slides by
Achieve Federal Open Data Policy Compliance - SlidesAchieve Federal Open Data Policy Compliance - Slides
Achieve Federal Open Data Policy Compliance - SlidesSocrata
653 views15 slides

More Related Content

What's hot

Data-Driven Government: Explore the Four Pillars of Value by
Data-Driven Government: Explore the Four Pillars of ValueData-Driven Government: Explore the Four Pillars of Value
Data-Driven Government: Explore the Four Pillars of ValueThomas Robbins
1.7K views24 slides
Friending The Statehouse by
Friending The StatehouseFriending The Statehouse
Friending The StatehouseMark Headd
355 views16 slides
Web Scraping reveals top tech trends and company’s media mentions in 2017 by
Web Scraping reveals top tech trends and company’s media mentions in 2017Web Scraping reveals top tech trends and company’s media mentions in 2017
Web Scraping reveals top tech trends and company’s media mentions in 2017PromptCloud
1.7K views34 slides
GDPR BigDataRevealed Readiness Requirements and Evaluation by
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationSteven Meister
215 views7 slides
Web Mining Projects Topics by
Web Mining Projects TopicsWeb Mining Projects Topics
Web Mining Projects TopicsPhdtopiccom
77 views5 slides
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe... by
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET Journal
13 views5 slides

What's hot(7)

Data-Driven Government: Explore the Four Pillars of Value by Thomas Robbins
Data-Driven Government: Explore the Four Pillars of ValueData-Driven Government: Explore the Four Pillars of Value
Data-Driven Government: Explore the Four Pillars of Value
Thomas Robbins1.7K views
Friending The Statehouse by Mark Headd
Friending The StatehouseFriending The Statehouse
Friending The Statehouse
Mark Headd355 views
Web Scraping reveals top tech trends and company’s media mentions in 2017 by PromptCloud
Web Scraping reveals top tech trends and company’s media mentions in 2017Web Scraping reveals top tech trends and company’s media mentions in 2017
Web Scraping reveals top tech trends and company’s media mentions in 2017
PromptCloud1.7K views
GDPR BigDataRevealed Readiness Requirements and Evaluation by Steven Meister
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and Evaluation
Steven Meister215 views
Web Mining Projects Topics by Phdtopiccom
Web Mining Projects TopicsWeb Mining Projects Topics
Web Mining Projects Topics
Phdtopiccom77 views
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe... by IRJET Journal
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET- A Novel Approach for Accomplishing Data Reliability and Isolation Safe...
IRJET Journal13 views
Sources of data collection for business applications by PromptCloud
Sources of data collection for business applicationsSources of data collection for business applications
Sources of data collection for business applications
PromptCloud968 views

Viewers also liked

Semantic Search Engine That Reads Your Mind by
Semantic Search Engine That Reads Your MindSemantic Search Engine That Reads Your Mind
Semantic Search Engine That Reads Your MindAmit Sheth
69 views5 slides
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation... by
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...Amit Sheth
159 views2 slides
Smart Data and real-world semantic web applications (2004) by
Smart Data and real-world semantic web applications (2004)Smart Data and real-world semantic web applications (2004)
Smart Data and real-world semantic web applications (2004)Amit Sheth
189 views2 slides
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014 by
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014 (Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014 Lora Aroyo
5.1K views20 slides
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014 by
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014Lora Aroyo
8.2K views34 slides
The Streaming Search Engine That Reads Your Mind by
The Streaming Search Engine That Reads Your MindThe Streaming Search Engine That Reads Your Mind
The Streaming Search Engine That Reads Your MindAmit Sheth
240 views5 slides

Viewers also liked(6)

Semantic Search Engine That Reads Your Mind by Amit Sheth
Semantic Search Engine That Reads Your MindSemantic Search Engine That Reads Your Mind
Semantic Search Engine That Reads Your Mind
Amit Sheth69 views
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation... by Amit Sheth
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...
Semagix' CIRAS - A 'Trend-Setting Product of 2003'; Recognition of Innovation...
Amit Sheth159 views
Smart Data and real-world semantic web applications (2004) by Amit Sheth
Smart Data and real-world semantic web applications (2004)Smart Data and real-world semantic web applications (2004)
Smart Data and real-world semantic web applications (2004)
Amit Sheth189 views
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014 by Lora Aroyo
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014 (Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014
(Presentation Chris) Crowdsourcing & Semantic Web: Dagstuhl 2014
Lora Aroyo5.1K views
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014 by Lora Aroyo
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014
Truth is a Lie: 7 Myths about Human Annotation @CogComputing Forum 2014
Lora Aroyo8.2K views
The Streaming Search Engine That Reads Your Mind by Amit Sheth
The Streaming Search Engine That Reads Your MindThe Streaming Search Engine That Reads Your Mind
The Streaming Search Engine That Reads Your Mind
Amit Sheth240 views

Similar to Apps Make Semantic Web a Reality

Exposing the Hidden Web by
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden WebLuis Taveras EMBA, MS
886 views18 slides
Web Search For Web Searching Engine Essay by
Web Search For Web Searching Engine EssayWeb Search For Web Searching Engine Essay
Web Search For Web Searching Engine EssayKaren Nelson
2 views43 slides
My blogs on big data and cybersecurity in banks by
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksKishore Jethanandani, MBA, MA, MPhil,
460 views6 slides
Appinions Information Technology Influence Study_August 2013 by
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions
3.9K views17 slides
Selecting Password Based On Computer Scientific And... by
Selecting Password Based On Computer Scientific And...Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...Alexis Naranjo
4 views81 slides
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber... by
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
289 views14 slides

Similar to Apps Make Semantic Web a Reality(20)

Web Search For Web Searching Engine Essay by Karen Nelson
Web Search For Web Searching Engine EssayWeb Search For Web Searching Engine Essay
Web Search For Web Searching Engine Essay
Karen Nelson2 views
Appinions Information Technology Influence Study_August 2013 by Appinions
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
Appinions3.9K views
Selecting Password Based On Computer Scientific And... by Alexis Naranjo
Selecting Password Based On Computer Scientific And...Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...
Alexis Naranjo4 views
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber... by Black Duck by Synopsys
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
356 Part II • Predictive AnalyticsMachine LearningFace re.docx by domenicacullison
356 Part II • Predictive AnalyticsMachine LearningFace re.docx356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
Deconstructing: Artificial Intelligence Regulation by Olivia Kresic
Deconstructing: Artificial Intelligence RegulationDeconstructing: Artificial Intelligence Regulation
Deconstructing: Artificial Intelligence Regulation
Olivia Kresic955 views
Federal Agencies Collaborate with Web-based Building Information Models by Mike Bordenaro
Federal Agencies Collaborate with Web-based Building Information ModelsFederal Agencies Collaborate with Web-based Building Information Models
Federal Agencies Collaborate with Web-based Building Information Models
Mike Bordenaro377 views
What Are Strategies Used For The Home And Professional... by Vickie Western
What Are Strategies Used For The Home And Professional...What Are Strategies Used For The Home And Professional...
What Are Strategies Used For The Home And Professional...
Vickie Western3 views
Don't Panic. Making Progress on the 'Going Dark' Debate by Fabio Chiusi
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi2.6K views
Open Source Insight: Happy Birthday Open Source and Application Security for ... by Black Duck by Synopsys
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Leveraging Financial Social Media Data forCorporate Fraud De.docx by croysierkathey
Leveraging Financial Social Media Data forCorporate Fraud De.docxLeveraging Financial Social Media Data forCorporate Fraud De.docx
Leveraging Financial Social Media Data forCorporate Fraud De.docx
croysierkathey4 views
The Role of AI Technology for Legal Research and Decision Making by IRJET Journal
The Role of AI Technology for Legal Research and Decision MakingThe Role of AI Technology for Legal Research and Decision Making
The Role of AI Technology for Legal Research and Decision Making
IRJET Journal7 views
WP-Privacy-IoT-Era - PRODUCTION by John Pinson
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
John Pinson259 views
Software Market Trends 2012 2.0 by allaboutsyed
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0
allaboutsyed807 views

Recently uploaded

PRELIMS ANSWER.pptx by
PRELIMS ANSWER.pptxPRELIMS ANSWER.pptx
PRELIMS ANSWER.pptxsouravkrpodder
56 views60 slides
NodeJS and ExpressJS.pdf by
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdfArthyR3
53 views17 slides
BUSINESS ETHICS MODULE 1 UNIT I_B.pdf by
BUSINESS ETHICS MODULE 1 UNIT I_B.pdfBUSINESS ETHICS MODULE 1 UNIT I_B.pdf
BUSINESS ETHICS MODULE 1 UNIT I_B.pdfDr Vijay Vishwakarma
55 views21 slides
Career Building in AI - Technologies, Trends and Opportunities by
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and OpportunitiesWebStackAcademy
51 views44 slides
Volf work.pdf by
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
91 views43 slides

Recently uploaded(20)

NodeJS and ExpressJS.pdf by ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR353 views
Career Building in AI - Technologies, Trends and Opportunities by WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy51 views
Pharmaceutical Analysis PPT (BP 102T) by yakshpharmacy009
Pharmaceutical Analysis PPT (BP 102T) Pharmaceutical Analysis PPT (BP 102T)
Pharmaceutical Analysis PPT (BP 102T)
yakshpharmacy009118 views
ANGULARJS.pdf by ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR354 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
JQUERY.pdf by ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3114 views
Introduction to AERO Supply Chain - #BEAERO Trainning program by Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih135 views
Education of marginalized and socially disadvantages segments.pptx by GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati552 views
Guess Papers ADC 1, Karachi University by Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz109 views

Apps Make Semantic Web a Reality

  • 1. advanced     Back  Issues                 Apps  Make  Semantic  Web  a  Reality By  Yvonne  L.  Lee April  1,  2005  —  SAN  FRANCISCO  —  The  Semantic  Web  has moved  from  a  theoretical  construct  to  its  initial  uses  in building  systems  that  ensure  legal  compliance,  track terrorists,  create  smarter  movie-­search  applications  and integrate  corporate  IT,  according  to  attendees  at  the Semantic  Technology  Conference  held  here  in  March. The  market  for  semantic  technologies  will  grow  at  a  compound  annual  growth rate  of  between  60  percent  and  70  percent  until  2010,  when  it  will  grow  from  its current  size  of  US$2  billion  to  $63  billion,  according  to  TopQuadrant,  a consulting  firm  that  specializes  in  Semantic  Web  technologies. New  tools  are  coming  not  with  fancy  names  reflecting  the  World  Wide  Web Consortium’s  next  great  vision,  but  as  an  evolution  of  current  Web  services and  database  technology,  said  Eric  Miller,  the  W3C’s  Semantic  Web  activity lead.  The  current  Web  is  an  extension  of  tools  such  as  gopher  and  ftp  that existed  in  the  early  1990s,  he  asserted.  These  tools  linked  files  together  but did  not  reveal  anything  about  the  text  inside  the  files.  The  current  Web  links documents  and  can  be  searched  according  to  the  text  inside  the  files,  but doesn’t  reveal  context  of  the  text,  he  said.  The  Semantic  Web  takes  that  next step. Existing  applications  that  will  add  Semantic  Web  capabilities  include  Adobe’s Extensible  Metadata  Platform  (XMP)  and  Oracle’s  database.  XMP  is  an  open-­ source  package  available  now  for  tagging  information.  It  adheres  to  the  W3C’s Resource  Description  Framework  (RDF),  which  is  one  of  the  pillars  of  the Semantic  Web.  The  other  two  are  the  Web  Ontology  Language  (OWL)  and XML. RDF  is  a  metadata  model  for  describing  objects  and  the  relationships  among them.  OWL  is  a  markup  language  for  creating  exhaustive  descriptions— ontologies—of  objects.  The  software  development  kit  includes  documentation, tools  and  sample  code  for  creating  applications  that  use  this  metadata  for intelligent  searches  across  various  file  types. Oracle  will  include  RDF  support  in  Database10g  Release  2  later  this  year, according  to  Miller. Although  a  scant  eight  companies  together  with  Stanford  University’s Knowledge  Systems  Lab  presented  at  the  expo  portion  of  the  show,  several companies  said  their  products  were  being  used  in  government,  financial  and commercial  applications. Amit  Sheth,  chief  technology  officer  at  Semagix,  said  his  company’s  Freedom software  was  being  used  by  an  unidentified  bank  to  help  comply  with  the  U.S. government’s  Patriot  Act,  by  a  European  police  force  to  follow  crime  patterns, and  by  a  telephone  service  provider  to  create  an  application  that  provides information  about  pay-­per-­view  movies. He  also  said  Regulatory  Data  Corp.,  a  group  founded  by  20  of  the  global  banks, is  using  it  to  help  minimize  risks  of  money  laundering,  fraud  and  terrorist financing.     Spotlight  On Eclipse            
  • 2. financing. The  Patriot  Act  requires  banks  to  track  and  account  for  the  customers  with whom  they  do  transactions.  Sheth  said  his  application  could  provide  the contextual  information  that  goes  beyond  business  intelligence  applications  and standard  search  engines  to  show  relationships  among  people  and organizations. “Typically,  when  you  type  something  in  Google,  it  doesn’t  know  if  it’s  a  name  of a  person  or  something  like  that,”  he  said. Freedom  can  tie  together  information  from  a  variety  of  different  formatted  data sources  to  ferret  out  that  a  customer  may  have  a  relationship  with  someone associated  with  a  terrorist  organization,  he  said. The  software  also  could  sift  through  what  he  called  “dirty”  data  with  acronyms, spelling  errors,  multiple  formats  or  formats  that  are  inappropriate  for  the  field. Another  application  financial  organizations  are  using  to  sift  through  data  is Unicorn’s  Unicorn  System.  “Enterprises  have  accumulated  an  incredible amount  of  mess,”  said  Unicorn  CEO  Zvi  Schreiber. The  system  includes  a  repository  linking  various  enterprise  data  sources  and the  ontologies,  metadata  scanners,  mapping  tools  to  visually  map  schema  to ontology  models,  and  modeling  tools. In  addition  to  investment  banks,  the  Metropolitan  Life  Insurance  Company,  the U.S.  Department  of  Defense  and  the  Tennessee  Valley  Authority  have  used Unicorn  to  integrate  enterprise  data,  to  comply  with  regulations  such  as Sarbanes-­Oxley,  the  Patriot  Act  and  Basel  II,  and  to  automate  processes, Schreiber  said. “We’re  tying  semantics  back  to  real  IT  systems,”  he  said.  “By  attaching business  meaning  to  the  IT  systems,  then  [organizations  are]  able  to  comply better.” Email  this  article Print  friendly  format Send  feedback login  |  news  |  current  issue  |  letters  |  columns  |  opinions  |  resource  links  |  about  |  site  map  | subscriptions  |  media  kit  |  privacy  |  contact  us Copyright  ©  1999-­2005  BZ  Media  LLC,  all  rights  reserved. Phone:  +1-­631-­421-­4158  •  E-­mail:info@bzmedia.com