The document discusses unstructured information management and obstacles to effective information access. It addresses the different perspectives of strategic, operational, and tactical levels in an organization. Content creation processes and a lack of common language can hamper effective searches. Taxonomies, controlled vocabularies, and ontologies can help establish frameworks to assist in classification, search, and sense-making of large amounts of unstructured information. End-user generated tagging, or folksonomies, can also help on a detailed level.
Defrag Keynote: Social Computing and the Enterprise-Bridging the GapMark Koenig
Slides for Keynote Address at Defrag Conference, Denver CO. November 3, 2008.
Before citing, please review Saugatuck's Citation Policy at http://www.saugatech.com/citationpolicy.htm
Originally presented at the Boston KM Forum meeting at Bentley, Wednesday, April 9, 2008.
At the time, our first-quarter 2008 “Market IQ” on Enterprise 2.0 had just been completed, and a survey of 441 people revealed a subset who are having more success with Enterprise 2.0 than the general survey population. Does Enterprise 2.0 signify the birth of KM 2.0? We’ll examine some of the findings, and discuss the implications for new and old KM implementations.
Defrag Keynote: Social Computing and the Enterprise-Bridging the GapMark Koenig
Slides for Keynote Address at Defrag Conference, Denver CO. November 3, 2008.
Before citing, please review Saugatuck's Citation Policy at http://www.saugatech.com/citationpolicy.htm
Originally presented at the Boston KM Forum meeting at Bentley, Wednesday, April 9, 2008.
At the time, our first-quarter 2008 “Market IQ” on Enterprise 2.0 had just been completed, and a survey of 441 people revealed a subset who are having more success with Enterprise 2.0 than the general survey population. Does Enterprise 2.0 signify the birth of KM 2.0? We’ll examine some of the findings, and discuss the implications for new and old KM implementations.
Cloud Based Dev/Test Environments for .NET and SharePoint Using CloudShareJohn Calvert
Cloud-based platform and software environments are a hot topic these days. Why bother hosting, managing and licensing VMs and software for your development projects and test labs when the VMs are often only required for a few months or a year. Explore the possibilities with CloudShare for your .NET and SharePoint development environment and tools.
Intellisqa offers a wide range of Quality Assurance and Software testing services to various
industry verticals and for multiple platforms ranging from web to mobile and across cloud.
We offer independent software quality assurance and testing services across multiple domains.
Our quality assurance services help enterprises to address software quality issues and improve application performance.
We have been assisting enterprises in planning and managing their critical software testing processes using a dedicated Testing Center of Excellence (TCoE) model,
which helps in leveraging our experience garnered over the years.
Enterprise Docker Requires a Private RegistryChris Riley ☁
From a webinar I did with Sonatype. In it I discuss the importance of a private registry to make sure Docker adoption is successful and sustainable in the Enterprise.
Webinar presentation--A Framework for Enterprise Adoption of Virtual Worlds--by Rob Edmonds of Virtual Worlds @ Work, a research initiative of SRI Consulting Business Intelligence (a spin out from SRI International, formerly Stanford Research Institute) in Menlo Park, in Silicon Valley
Cloud Based Dev/Test Environments for .NET and SharePoint Using CloudShareJohn Calvert
Cloud-based platform and software environments are a hot topic these days. Why bother hosting, managing and licensing VMs and software for your development projects and test labs when the VMs are often only required for a few months or a year. Explore the possibilities with CloudShare for your .NET and SharePoint development environment and tools.
Intellisqa offers a wide range of Quality Assurance and Software testing services to various
industry verticals and for multiple platforms ranging from web to mobile and across cloud.
We offer independent software quality assurance and testing services across multiple domains.
Our quality assurance services help enterprises to address software quality issues and improve application performance.
We have been assisting enterprises in planning and managing their critical software testing processes using a dedicated Testing Center of Excellence (TCoE) model,
which helps in leveraging our experience garnered over the years.
Enterprise Docker Requires a Private RegistryChris Riley ☁
From a webinar I did with Sonatype. In it I discuss the importance of a private registry to make sure Docker adoption is successful and sustainable in the Enterprise.
Webinar presentation--A Framework for Enterprise Adoption of Virtual Worlds--by Rob Edmonds of Virtual Worlds @ Work, a research initiative of SRI Consulting Business Intelligence (a spin out from SRI International, formerly Stanford Research Institute) in Menlo Park, in Silicon Valley
Applying Web 2.0 Concepts to Your Businessdigitalev
This presentation was originally delivered by Neal Sharma of Digital Evolution Group for the Triple-I Executive Forum (April 2009) and for the Wichita Chamber of Commerce (May 2009).
A Practical Guide For Implementing Web 2 0 LearningMrLynnRClemons
A Practical Guide for Implementing Web 2.0 Learning is a tool no business professional should go without reviewing. This was delivered at the Aberdeen HCM 2009 Summit held in Atlanta. I will post more of these findings as I review them and clean them for client specific content, execept who the author is and how to contact them.
Lynn Clemons - Shared Learning Sorce.
Evolution of Collaborative Content Management
Even as IT spending slides, IT departments are having to handle more content, more users, provide more productivity, as well as more compliance.
They have to do all this at less cost.
The enterprise hasn't kept up with advances in collaboration - most still uses a shared drive + MS Office + Email.
Most knowledge workers:
- can't find documents
- can't find the right version of documents
- find it easier to search for competitors' info than their own company's info
- have lots more noise than signal
This presentation talks about the collaborative enteprise. Essentially providign Facebook-like features for the Enterprise.
● The Cost of Poor Collaborative Content Management
● Best Practice – On the Web and in the Enterprise
● Alfresco
● Alfresco Share
● Standards Support
● Total Cost of Ownership
● More Information
A presentation to the Bazaarvoice "Social Commerce Summit" (http://www.socialcommercesummit.co.uk) in London, November 2008.
This presentation built upon my address to the e-consultancy.com "Future of Digital Marketing" conference, taking a particular look at how data and data exchange underpin not only social commerce on the web, but lead to greater insights as the 'network effect' takes over.
The 'data evolution' is outlined as:
• Data evolution
– accurate
– enriched
– meta
– actionable
– mashed
– semantic
– autonomous &
- predictive
(Slide 6).
Two trends come together:
1) better data (eg behavioural and attention/behavioural profiling), and
2) freer exchange (eg via standard like APML and microformats).
The implications from these trends are that:
- you only see part of the picture
- the _customer_ only ever sees part of the picture
- the complete picture is both 'in the network', modal and contextual
- this openness and exchange at a data level also requires new business approaches
- the battle for businesses is to get the maximal share of (qualified, appropriate, profitable) attention.
Please contact me if you've any questions on this, or the links to sites/services cited are not clear.
A presentation to the Bazaarvoice "Social Commerce Summit" (http://www.socialcommercesummit.co.uk) in London, November 2008.
This presentation built upon my address to the e-consultancy.com "Future of Digital Marketing" conference, taking a particular look at how data and data exchange underpin not only social commerce on the web, but lead to greater insights as the 'network effect' takes over.
The 'data evolution' is outlined as:
• Data evolution
– accurate
– enriched
– meta
– actionable
– mashed
– semantic
– autonomous &
- predictive
(Slide 6).
Two trends come together:
1) better data (eg behavioural and attention/behavioural profiling), and
2) freer exchange (eg via standard like APML and microformats).
The implications from these trends are that:
- you only see part of the picture
- the _customer_ only ever sees part of the picture
- the complete picture is both 'in the network', modal and contextual
- this openness and exchange at a data level also requires new business approaches
- the battle for businesses is to get the maximal share of (qualified, appropriate, profitable) attention.
Please contact me if you've any questions on this, or the links to sites/services cited are not clear.
The web enables many things. Also the ability to liquify your brand and its values. Brand building and establishing and securing are getting more and more important, as we are running towards a generation of multi digital output devices. This presentation creates awareness for that topic, explores how User Experience Design and Documentation can contribute to a cohesive brand experience across all channels.
Focus is on understanding Information Professionals and how they connect with solution providers.
This was presented at the Document Management Solution Providers Executive Forum (http://www.aiim.org/dmspef).
This presentation was delivered at the BI SIG in Palo Alto. It provides an overview of the market shift away from on-premise solutions to on-demand in the business intelligence industry.
A Strategic View of Enterprise Reporting and Analytics: The Data FunnelInside Analysis
The Briefing Room with Colin White and Jaspersoft
Slides from the Live Webcast on June 12, 2012
As the corporate appetite for analytics and reporting grows, companies must find a way to secure a strategic view of their information architecture. End users with varying degrees of expertise need a wide range of data and reports delivered in a timely fashion. As the audience for analytics expands, that puts pressure on IT infrastructure and staff. And now with the promise of Hadoop and MapReduce, the organization's desire for business insight becomes even more significant.
In this episode of The Briefing Room, veteran Analyst Colin White of BI Research will explain the value of being strategic with enterprise reporting. White will be briefed by Karl Van den Bergh of Jaspersoft, who will tout his company's “data funnel” concept, which is designed to strategically manage an organization's information architecture. By aligning information assets along this funnel, IT can effectively address the spectrum of analytical needs – from simple reporting to complex, ad hoc analysis – without over-taxing personnel and system resources.
A few slides that we use in our intelligence training and also when we explain our approach working in over 180 countries via our different intelligence and information companies.
Presentation at the Bernadotte Academy in 2007 by Infosphere CEO Mats Björe about the concept of OSINT. Examples from tools like Silobreake is included
Infosphere AB presentationof forces that affect the situation in the Russian Federation.. The presentation is part of a 3 hour workshop for top level management in middle sized and large corporation
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. AGENDA
Obstacles to information access
•
Key success factors for information
Key success factors for information
•
access
How can an organization make sense
•
of its unstructured information?
of its unstructured information?
The information management
•
tongue
Practical examples of information a
•
retrieval solution that combines
different technologies to assist sense
making
ki
3. AGREEMENT ON BASICS: INFORMATION VALUE CHAIN
LEVEL OF SYNTHESIS (ANALYSIS) AND CONTEXT
( )
FUTURE
PAST PASSIVE PRESENT ACTIVE PROACTIVE
Contextualized
Consequences
Categorized
Connections
Calculated
Conversations
DATA INFORMATION INTELLIGENCE
Corrected
Chances
Condensed
Compared
Connections
Calculated
Intelligence becomes information
when not needed
Data becomes information when asked for
Information becomes data when not needed
INFORMATION VOLUME
6. THE USER‐CTO/CIO‐
THE USER‐CTO/CIO‐LEADERSHIP DIVIDE
WE HAVE CREATED A COMPUTERIZED,
INTERACTIVE ARTIFICIAL
INTELLIGENCE PROFILING INTRANET WONDERFUL. MAKE SOME
DEVICE FOR THE COMPANY WITH PHOTOCOPIES AND ROUTE IT
ENTITY EXTRACTION AGENTS AND AROUND.
VIZUALIZATION.
VIZUALIZATION I CALL IT THE ”I-
I- BUT I REALLY ONLY ASKED
CENTER” AND IT CONTAINS A BASIC FOR THE NAME OF THE
TAXONOMY WITH A USER GENERATED MANAGER IN OUR ITALIAN
FOLKSONOMI FUNCTION! COMAPNY
10. OVERVIEW –
OVERVIEW – LINGUA SEARCH IN REALITY
One way of assisting both search engines and humans in finding the relevant answers is to match
documents against different set of defined universe.
A taxonomy define the organizational environment on a high level. An
organizational taxonomy should be aligned to the business objectives and
STRATEGIC strategies. ( Category, bucket, silo, domain) A taxonomy can be used in the
content creation process by meta‐tagging the documents.
LEVEL
A controlled vocabulary assist in the classification on a more detailed
level in a domain, than the overarching taxonomy. The controlled set can
level in a domain than the overarching taxonomy The controlled set can
be of different size depending on the complexity of the defining term. A
OPERATIONAL controlled vocabulary can assist in automatic tagging of articles. The
relationships in a domain is called an ontology.
LEVEL
An ontology assist in creating relations between different entities and
provide a context by linking words and docuements to eachother.
End user generated vocabularies can assist in sense making an
knowledge sharing on the very detailed level but also on a
TACTICAL macro/document level ( folksonomy) by dynamically map and assist in
validation, quality and relation control a on micro level.
LEVEL
11. CONCEPT: TAXONOMY
•Taxonomy is the science of classification according to a pre‐
determined system, with the resulting catalogue used to provide a
conceptual framework for discussion, analysis, or information
retrieval.
retrieval
•A systematic way of classifying knowledge
•A hierarchical structure of concepts
A hierarchical structure of concepts
TAXONOMY
•A common language for sharing knowledge
•An artificial, formal construct acting as a symbolic model of an
information domain
•In theory the development of a good taxonomy takes into
In theory, the development of a good taxonomy takes into
account the importance of separating elements of a group (taxon)
into subgroups (taxa) that are mutually exclusive, unambiguous,
and taken together, include all possibilities.
•In practice, a good taxonomy should be simple, easy to remember,
and easy to use.
12. •Group content into a controlled set of
categories
TAXONOMIES AGAIN?
•There is no inherent relationship among the
categories ‐ they are co‐equal groups with labels
•The structure is one of ‘membership’ in the
taxonomy
•List of industries
List of industries
•Lists of countries or states
Energy Environment Education Crime Transport Trade Labor Agriculture
•Lists of currencies
Faceted taxonomy architecture looks like a •Controlled vocabularies
star. Each node in the star structure is •List of security classification values
associated with the object in the center.
associated with the object in the center
Metadata is one type of faceted taxonomy
A hierarchical taxonomy is
Each attribute is a facet of a content object
represented as a tree
Creator/Author
architecture. The tree consists of
architecture The tree consists of
Title
Publication Date, etc nodes and links. The
relationships become
‘associations’ with meaning.
Meanings in a hierarchy are fairly
limited in scope – group
li it d i
membership,
Type, instance. In a hierarchical
taxonomy, a node can have only
In a network one parent.
taxonomy each node
can have more than
one parent. Any item
in a this structure can
Network taxonomies allow us to
be linked to any other
design complex thesauri
thesauri,
item.
item Links can be
ontologies, concept maps, topic
meaningful &
maps, knowledge maps,
different.
knowledge representations
13. SO WHAT IS IT?
Concept Definition (one interpretation) What is it good for?
Taxonomy is the science of classification according to a Provides a top structure
Taxonomy
predetermined system used to provide a conceptual framework for storing and retrieving
for discussion, analysis or information retrieval.
f di i li if ti ti l
A controlled vocabulary is an organized lists of words and Assist in tagging retrieving
Controlled
phrases, or notation systems, that are used to initially tag documents
vocabulary
content, and then to find it through navigation or search. This
g g
means that a CV is a type of metadata that functions as a subset
of natural language.
An ontology is a model that represents a set of concepts within a An ontology defines a
gy p p gy
Ontology
domain and the relationships between those concepts. A domain
domain ontology (or domain‐specific ontology) models a specific
domain, or part of the world. It represents the particular
meanings of terms as they apply to that domain. Most
g y pp y
ontologies describe individuals (instances), classes (concepts),
attributes, and relations
User generated input
Socially constructed classification schemes . User‐generated
Folksonomy
metadata
metadata ”tactical level”
tactical level
Information that describes, or supplements, the central data. Can provide some context,
Metadata
but not always.
14. TECHNOLOGY CHALLENGES
Sounds great, I read Yeah whatever,
that portals will change our as long as
I need your signature for life and will connect the I will have this on
the corporate information hidden gems in my CV, and no one
software acquisition I love this
our company. interferes with
portal
Will be great to tell my pr j ct
project
approach!
h!
our board that we
What a
have a Intelligence Portal!
change!
IT staff too often get carried away with adding functionality and data that the end user
just does not need.
j td t d
Organizations need to look beyond technology and its architecture when
implementing tools, and consider a much broader integrated focus that
p g , g
simultaneously addresses organizational and process issues
16. DIFFERENT TECHNOLOGIES ASSIST IN THE INFORMATION TO
INTERPRETATION VALUE CHAIN
Interpretation of new
Visualization
insights through
insights through
applications
Taxonomy Expertise Relationships Alerts / Profiling
Extract valuable
Clustering
g Classification Summarization
insights through
i i ht th h
mining techniques
Feature Extraction Language Identification
Search / Retrieval (Indexing)
Search / Retrieval (Indexing)
Access the available
Document Filters information
Connectors (Spiders, Crawlers)
C (S id C l)
Stored information
Databases Content Management File Repositories
1
6
17. SUMMARY
User generated validation,
quality control and contextual
rights
A search/ retrival fuction that is open
and that accomadates contextual search
A content management /creation structure &
p py
philosophy
A basic taxonomy (simple)
An information audit – who needs what and when and why?
Communcation of business/orgaizational objectivess
g j
20. PATENTS
The search result for
“ethanol” provides related
“h l” id ld
patents, structured data
about the compound and its
taxonomy belonging, charts
illustrating patent
publication trends and the
most relevant inventors,
grantees and legal
representatives as well as
related compounds,
keywords, processes,
reactions and subclasses.
Every item is clickable for
drill‐downs and equivalent
360‐degree views.
2
0
21. FIND KEY CLUSTERS OF PEOPLE
The visualisation tools can be
used to cluster the most
prominent inventors (and /or any
i ti t ( d/
other entity/term type) around a
specific company (deduced from
the patent data) for competitive
p ) p
intelligence purposes
2
1