SlideShare a Scribd company logo
Applying a Formal Ontology
 Approach in Government
          Ian Bailey

       www.modelfutures.com




         © Model Futures Ltd. 2008
IS/IT in Government
• Why are large IT programmes in Govt often seen to 
  have failed ?
   – Govt sets standards for IT, project management, quality, 
     accessibility.
   – Most Govt Depts have tightly controlled infrastructures 
     and application portfolios
   – Govt Depts are no longer worried about paying to get the 
     best consultants
   – In‐house training in Govt Depts is easily as good as 
     industry if not better




                         © Model Futures Ltd. 2008
The Reality of Govt IT
• Actually, the projects are run just the same as the 
  ones in industry…but…
   – Much easier to get more funding for project overruns in 
     industry – it’s not tax‐payers’ money, so not subject to as 
     much scrutiny
   – Easy to build‐in contingency – it’s much harder to persuade 
     the tax‐payer to part with an extra 25% on the assumption 
     that the project will go pear‐shaped
   – Easier to move the goal‐posts – if a project doesn’t deliver 
     what is was supposed to, change the requirement
   – Greater readiness to take legal action against sloppy work
   – Greater readiness to allow on‐the‐fly innovation


                          © Model Futures Ltd. 2008
Information Systems
• Moving the goalposts
   – As mentioned before this is reasonably common practice in 
     industry…and perhaps a little in Govt projects too
   – But why does this have to happen ?
   – How do we get it so badly wrong every time ?
• Problem is usually associated with large‐scale 
  information systems
   – Often don’t deliver the required functionality
   – Complaints from users that the old system was better
   – Byzantine work‐around procedures required to conduct 
     business‐as‐usual
• Is it a problem of requirement capture or 
  implementation?


                          © Model Futures Ltd. 2008
How was your System Built ?
Stage 1:                           business          Reliant on interview or observation,
Process Modelling                  analyst           both of which are flawed approaches

Stage 2 (opt 1):                   data              Model produced depends on “school”,
Data Modelling                     modeller          …and there are plenty of those

                                                     Model is again dependent on school and
Stage 2 (opt 2):                   object            methodology (e.g. RUP, GoF, etc.). 
Model‐Driven                       modeller
                                                     Database implementation tends to be 
Architecture
                                                     auto‐generated

                                                         Tendency to “know better” and also
Stage 3:                           in-house
                                   IT                    dangerous tendency to “try out new
Implementation
                                                         technology”

                                               Tendency to “leverage experience from
                                   “solutions” other projects” and “make use of COTS”
                                   provider
                                                – i.e. re‐badge the last thing they 
                                               developed (BOHICA)
                             © Model Futures Ltd. 2008
IT & The Real World
•   By piling methodology upon methodology (few of which, if any, are 
    defensible) we move our final implementation further and further away 
    from the real world.
                                                                       ?   ?   ?




• The problems we’re supposed to be solving exist in the real world.
• The users exist in the real world.
• The funding exists in the real world

• The IT lives in a parallel universe
• Very rare that two applications will implement the same information in 
  the same way – leading to problems of interoperability


                               © Model Futures Ltd. 2008
It Gets Worse…
• The methods used are rarely defensible or repeatable
   – Will two different business analysts come up with the same 
     process model ? 
   – Will two data modellers, even given the same process model, 
     come up with the same data models ?
   – Will two architects, given the same process model and data 
     model, come up with the same system design ?
   – Will two programmers, given the same system design, come up 
     with the same application
• Semantic Overlap, Syntactic Disconnect
   – Lack of repeatability
   – Number of degrees of separation from the real world
   – Two applications which (at least partially) cover the same things 
     are never going to be interoperable (unless they are designed 
     together)



                            © Model Futures Ltd. 2008
How to Make Systems Interoperable ‐ 1
• Just use one system
   – The approach favoured by ERP consultants
   – Easy to sell to management (simple financial case)
• Adapt the business processes, not the software
   – Run an out of the box solution
   – Re‐train staff to a new way of working
   – Arcane procedures often put in place for even the simplest 
     things
   – Enormously demoralising effect
• But…
   –   …reality is that it’s never “out of the box”
   –   …and it never scales to the whole enterprise
   –   …so you end up with localised adaptations and tunings
   –   …and you still have no interoperability


                            © Model Futures Ltd. 2008
How to Make Systems Interoperable ‐ 2
• Corporate Data Models
   – always, always, always, always fail
   – bit of a fashion in the 90s
   – fail for the reasons discussed before – they are inevitably 
     someone’s view of the world
   – …or designed by committee
• Data model Repositories
   – make it difficult to buy COTS
   – hard to account for every implementation route – RDBMS, XML, 
     OODB, etc.
   – they can work for reference data though
• People hate being told what to do
   – Specialist communities have specialist terminology for good 
     reason
   – Expecting them to work with someone else’s view of the world 
     isn’t going to work

                            © Model Futures Ltd. 2008
How to Make Systems Interoperable ‐ 3
• Enterprise Application Integration
   – Most are point‐to‐point
   – Some are hub‐and‐spoke
   – Both need a lot of TLC
   – Work well in an tightly‐controlled IT environment
   – Still problems of semantic integration though – someone 
     has to decide when “Contact” means the same as “Address 
     Record” or “Under Fire”
   – Often, the first cut is based on common terms




                        © Model Futures Ltd. 2008
How to Make Systems Interoperable ‐ 4
• Service‐Oriented Architecture
   – Superb idea
   – Usually misinterpreted or mis‐sold
   – Should be about componentising the business and the IT 
     and creating an agile enterprise composed of 
     interoperable and interchangeable services
   – …sadly the technology is leading the business requirement
   – Needs to be top‐down designed – governance and 
     reusability is key to SOA
   – Often just moves the interoperability problem onto the 
     service bus



                        © Model Futures Ltd. 2008
How to Make Systems Interoperable ‐ 5
• Design them properly in the first place
   – Eh?
   – Surely not ?
   – But what would the consultants do for a living ?


• Use a consistent, defensible method to develop them
   – Heresy!
• One that ensures two different projects will come up 
  with the same data structures to define the same 
  things in the real world
   – Surely this is the stuff of fairy tales ?

                            © Model Futures Ltd. 2008
Forensic Approach
• Why did all those smart process and business modelling 
  methods ignore the legacy data ?
   – Might have looked at the legacy data structure, but probably not 
     the data itself
   – Nasty stuff legacy data – full of “data quality problems”
• What are those data quality problems ?
   –   Often typos, sometimes inconsistent codification
   –   Sometimes the user has put inappropriate data in a text field
   –   But is it inappropriate ?
   –   What if the application didn’t support their work particularly 
       well, and they just needed to put this data “somewhere”
• The legacy data can tell you much more about what a 
  business does than any process model or data model


                             © Model Futures Ltd. 2008
The BORO Method™
• A simple (boring, even) method for re‐engineering 
  legacy data into a new model
• Process is grounded in:
   – Set theory
   – Physical reality
• Process is repeatable
   – Requires experience and discipline, but when followed to 
     the letter, it always produces the same results
• Process is defensible
   – Not based on anyone’s view of the world (this is an 
     ontology in the purest sense)
   – Always traces back to things in the real world


                         © Model Futures Ltd. 2008
BORO Flowchart




Image Crown Copyright, BORO Process Owned by BORO Centre
               © Model Futures Ltd. 2008
Where’s it Used
• Finance

• Oil & Gas

• MOD
  – MOD Ontology Demonstrator


• IDEAS
  – AUSCANUKUS + Sweden + NATO
  – Developing a common ontology for enterprise architecture


                       © Model Futures Ltd. 2008
Ontology
• That was the title of the presentation, after all
• Caveat Emptor
   – Just using a “semantic web” approach will not give you an ontology
   – OWL is just a syntax
   – Without the necessary philosophical and mathematical rigour you get 
     the same problems as in traditional information systems
   – Most ontologies you will encounter are in fact just old data models, re‐
     rendered in OWL
• IT definition of semantic
   – The structure behind the syntax
• Mathematical/philosophical understanding is different
   – The things in the real world that are being referred to
• IT semantics are still one step removed from the real world
   – Need tighter coupling to reality


                              © Model Futures Ltd. 2008
Getting Closer to the Real World
• BORO develops an ontology that is tightly coupled to the 
  real world
• A data/information model is two steps removed
   – This is very hard to get across to information management 
     professionals
   – Can take months before the penny drops




                           © Model Futures Ltd. 2008
Last Slide
• Problem with information systems is their disconnect 
  from the real world
   – Arbitrary model development is to blame
   – And there’s no reason why this problem should magically go 
     away just because you’re using semantic web technology
• Legacy data is the key
   – it’s not nice and shiny and new, but it makes a better witness 
     than a business analyst
• Use a method that is repeatable and defensible
   – BORO seems to work
   – Needs more extensive testing
   – Other methods may be out there too


                            © Model Futures Ltd. 2008

More Related Content

Similar to Applying a Formal Ontology Approach in Government

How to justify technical debt mitigations in Software Engineering
How to justify technical debt mitigations in Software EngineeringHow to justify technical debt mitigations in Software Engineering
How to justify technical debt mitigations in Software Engineering
André Agostinho
 
Documentation on bigmarket copy
Documentation on bigmarket   copyDocumentation on bigmarket   copy
Documentation on bigmarket copy
swamypotharaveni
 
Defrag Keynote: Social Computing and the Enterprise-Bridging the Gap
Defrag Keynote: Social Computing and the Enterprise-Bridging the GapDefrag Keynote: Social Computing and the Enterprise-Bridging the Gap
Defrag Keynote: Social Computing and the Enterprise-Bridging the Gap
Mark Koenig
 
Cobi T Top Down Bottom Up
Cobi T Top Down  Bottom UpCobi T Top Down  Bottom Up
Cobi T Top Down Bottom Up
Dave Kohrell
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmap
iCMG International
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
GovCloud Network
 
Businessimprovementselected
BusinessimprovementselectedBusinessimprovementselected
Businessimprovementselected
Symphony3
 
Bilot 3mode
Bilot 3modeBilot 3mode
Bilot 3mode
Bilot
 
An analysis of novel business practices (Technology in the corporate world)
An analysis of novel business practices (Technology in the corporate world) An analysis of novel business practices (Technology in the corporate world)
An analysis of novel business practices (Technology in the corporate world)
Roberto Gregoratti
 
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
Matt Stubbs
 
Bimodal IT and EDW Modernization
Bimodal IT and EDW ModernizationBimodal IT and EDW Modernization
Bimodal IT and EDW Modernization
Robert Gleave
 
A Modern Data Architecture for Risk Management... For Financial Services
A Modern Data Architecture for Risk Management... For Financial ServicesA Modern Data Architecture for Risk Management... For Financial Services
A Modern Data Architecture for Risk Management... For Financial Services
Mammoth Data
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
Health Level Seven
 
Designing digital transformation v.2.7
Designing digital transformation v.2.7Designing digital transformation v.2.7
Designing digital transformation v.2.7
Nigel Green
 
Birdie Project Proposal
Birdie Project ProposalBirdie Project Proposal
Birdie Project Proposal
Benjamin Kreeger
 
Web 20- 2: Architecture Patterns And Models For The New Internet
Web 20- 2: Architecture Patterns And Models For The New InternetWeb 20- 2: Architecture Patterns And Models For The New Internet
Web 20- 2: Architecture Patterns And Models For The New Internet
tvawler
 
Metamorphosis from Forms to Java: a tech lead's perspective (paper)
Metamorphosis from Forms to Java: a tech lead's perspective (paper)Metamorphosis from Forms to Java: a tech lead's perspective (paper)
Metamorphosis from Forms to Java: a tech lead's perspective (paper)
Michael Fons
 
Using the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis CanvasUsing the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis Canvas
Marc-Andre Leger
 
Walking The Talk On Openness
Walking The Talk On OpennessWalking The Talk On Openness
Walking The Talk On Openness
Trond Arne Undheim
 
Build Intelligence System with AI. Antimo Musone, Ernst & Young
Build Intelligence System with AI. Antimo Musone, Ernst & YoungBuild Intelligence System with AI. Antimo Musone, Ernst & Young
Build Intelligence System with AI. Antimo Musone, Ernst & Young
Data Driven Innovation
 

Similar to Applying a Formal Ontology Approach in Government (20)

How to justify technical debt mitigations in Software Engineering
How to justify technical debt mitigations in Software EngineeringHow to justify technical debt mitigations in Software Engineering
How to justify technical debt mitigations in Software Engineering
 
Documentation on bigmarket copy
Documentation on bigmarket   copyDocumentation on bigmarket   copy
Documentation on bigmarket copy
 
Defrag Keynote: Social Computing and the Enterprise-Bridging the Gap
Defrag Keynote: Social Computing and the Enterprise-Bridging the GapDefrag Keynote: Social Computing and the Enterprise-Bridging the Gap
Defrag Keynote: Social Computing and the Enterprise-Bridging the Gap
 
Cobi T Top Down Bottom Up
Cobi T Top Down  Bottom UpCobi T Top Down  Bottom Up
Cobi T Top Down Bottom Up
 
Architecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmapArchitecture Driven IT Modernization & Migration roadmap
Architecture Driven IT Modernization & Migration roadmap
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Businessimprovementselected
BusinessimprovementselectedBusinessimprovementselected
Businessimprovementselected
 
Bilot 3mode
Bilot 3modeBilot 3mode
Bilot 3mode
 
An analysis of novel business practices (Technology in the corporate world)
An analysis of novel business practices (Technology in the corporate world) An analysis of novel business practices (Technology in the corporate world)
An analysis of novel business practices (Technology in the corporate world)
 
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
Big Data LDN 2018: HOW AUTOMATION CAN ACCELERATE THE DELIVERY OF MACHINE LEAR...
 
Bimodal IT and EDW Modernization
Bimodal IT and EDW ModernizationBimodal IT and EDW Modernization
Bimodal IT and EDW Modernization
 
A Modern Data Architecture for Risk Management... For Financial Services
A Modern Data Architecture for Risk Management... For Financial ServicesA Modern Data Architecture for Risk Management... For Financial Services
A Modern Data Architecture for Risk Management... For Financial Services
 
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
IHIC 2012 - Key note - HL7 Italia - S.Lotti - Is it really useful to have a f...
 
Designing digital transformation v.2.7
Designing digital transformation v.2.7Designing digital transformation v.2.7
Designing digital transformation v.2.7
 
Birdie Project Proposal
Birdie Project ProposalBirdie Project Proposal
Birdie Project Proposal
 
Web 20- 2: Architecture Patterns And Models For The New Internet
Web 20- 2: Architecture Patterns And Models For The New InternetWeb 20- 2: Architecture Patterns And Models For The New Internet
Web 20- 2: Architecture Patterns And Models For The New Internet
 
Metamorphosis from Forms to Java: a tech lead's perspective (paper)
Metamorphosis from Forms to Java: a tech lead's perspective (paper)Metamorphosis from Forms to Java: a tech lead's perspective (paper)
Metamorphosis from Forms to Java: a tech lead's perspective (paper)
 
Using the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis CanvasUsing the Emerging Technology Analysis Canvas
Using the Emerging Technology Analysis Canvas
 
Walking The Talk On Openness
Walking The Talk On OpennessWalking The Talk On Openness
Walking The Talk On Openness
 
Build Intelligence System with AI. Antimo Musone, Ernst & Young
Build Intelligence System with AI. Antimo Musone, Ernst & YoungBuild Intelligence System with AI. Antimo Musone, Ernst & Young
Build Intelligence System with AI. Antimo Musone, Ernst & Young
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

Applying a Formal Ontology Approach in Government

  • 1. Applying a Formal Ontology Approach in Government Ian Bailey www.modelfutures.com © Model Futures Ltd. 2008
  • 2. IS/IT in Government • Why are large IT programmes in Govt often seen to  have failed ? – Govt sets standards for IT, project management, quality,  accessibility. – Most Govt Depts have tightly controlled infrastructures  and application portfolios – Govt Depts are no longer worried about paying to get the  best consultants – In‐house training in Govt Depts is easily as good as  industry if not better © Model Futures Ltd. 2008
  • 3. The Reality of Govt IT • Actually, the projects are run just the same as the  ones in industry…but… – Much easier to get more funding for project overruns in  industry – it’s not tax‐payers’ money, so not subject to as  much scrutiny – Easy to build‐in contingency – it’s much harder to persuade  the tax‐payer to part with an extra 25% on the assumption  that the project will go pear‐shaped – Easier to move the goal‐posts – if a project doesn’t deliver  what is was supposed to, change the requirement – Greater readiness to take legal action against sloppy work – Greater readiness to allow on‐the‐fly innovation © Model Futures Ltd. 2008
  • 4. Information Systems • Moving the goalposts – As mentioned before this is reasonably common practice in  industry…and perhaps a little in Govt projects too – But why does this have to happen ? – How do we get it so badly wrong every time ? • Problem is usually associated with large‐scale  information systems – Often don’t deliver the required functionality – Complaints from users that the old system was better – Byzantine work‐around procedures required to conduct  business‐as‐usual • Is it a problem of requirement capture or  implementation? © Model Futures Ltd. 2008
  • 5. How was your System Built ? Stage 1:  business Reliant on interview or observation, Process Modelling analyst both of which are flawed approaches Stage 2 (opt 1):  data Model produced depends on “school”, Data Modelling modeller …and there are plenty of those Model is again dependent on school and Stage 2 (opt 2):  object methodology (e.g. RUP, GoF, etc.).  Model‐Driven modeller Database implementation tends to be  Architecture auto‐generated Tendency to “know better” and also Stage 3:  in-house IT dangerous tendency to “try out new Implementation technology” Tendency to “leverage experience from “solutions” other projects” and “make use of COTS” provider – i.e. re‐badge the last thing they  developed (BOHICA) © Model Futures Ltd. 2008
  • 6. IT & The Real World • By piling methodology upon methodology (few of which, if any, are  defensible) we move our final implementation further and further away  from the real world. ? ? ? • The problems we’re supposed to be solving exist in the real world. • The users exist in the real world. • The funding exists in the real world • The IT lives in a parallel universe • Very rare that two applications will implement the same information in  the same way – leading to problems of interoperability © Model Futures Ltd. 2008
  • 7. It Gets Worse… • The methods used are rarely defensible or repeatable – Will two different business analysts come up with the same  process model ?  – Will two data modellers, even given the same process model,  come up with the same data models ? – Will two architects, given the same process model and data  model, come up with the same system design ? – Will two programmers, given the same system design, come up  with the same application • Semantic Overlap, Syntactic Disconnect – Lack of repeatability – Number of degrees of separation from the real world – Two applications which (at least partially) cover the same things  are never going to be interoperable (unless they are designed  together) © Model Futures Ltd. 2008
  • 8. How to Make Systems Interoperable ‐ 1 • Just use one system – The approach favoured by ERP consultants – Easy to sell to management (simple financial case) • Adapt the business processes, not the software – Run an out of the box solution – Re‐train staff to a new way of working – Arcane procedures often put in place for even the simplest  things – Enormously demoralising effect • But… – …reality is that it’s never “out of the box” – …and it never scales to the whole enterprise – …so you end up with localised adaptations and tunings – …and you still have no interoperability © Model Futures Ltd. 2008
  • 9. How to Make Systems Interoperable ‐ 2 • Corporate Data Models – always, always, always, always fail – bit of a fashion in the 90s – fail for the reasons discussed before – they are inevitably  someone’s view of the world – …or designed by committee • Data model Repositories – make it difficult to buy COTS – hard to account for every implementation route – RDBMS, XML,  OODB, etc. – they can work for reference data though • People hate being told what to do – Specialist communities have specialist terminology for good  reason – Expecting them to work with someone else’s view of the world  isn’t going to work © Model Futures Ltd. 2008
  • 10. How to Make Systems Interoperable ‐ 3 • Enterprise Application Integration – Most are point‐to‐point – Some are hub‐and‐spoke – Both need a lot of TLC – Work well in an tightly‐controlled IT environment – Still problems of semantic integration though – someone  has to decide when “Contact” means the same as “Address  Record” or “Under Fire” – Often, the first cut is based on common terms © Model Futures Ltd. 2008
  • 11. How to Make Systems Interoperable ‐ 4 • Service‐Oriented Architecture – Superb idea – Usually misinterpreted or mis‐sold – Should be about componentising the business and the IT  and creating an agile enterprise composed of  interoperable and interchangeable services – …sadly the technology is leading the business requirement – Needs to be top‐down designed – governance and  reusability is key to SOA – Often just moves the interoperability problem onto the  service bus © Model Futures Ltd. 2008
  • 12. How to Make Systems Interoperable ‐ 5 • Design them properly in the first place – Eh? – Surely not ? – But what would the consultants do for a living ? • Use a consistent, defensible method to develop them – Heresy! • One that ensures two different projects will come up  with the same data structures to define the same  things in the real world – Surely this is the stuff of fairy tales ? © Model Futures Ltd. 2008
  • 13. Forensic Approach • Why did all those smart process and business modelling  methods ignore the legacy data ? – Might have looked at the legacy data structure, but probably not  the data itself – Nasty stuff legacy data – full of “data quality problems” • What are those data quality problems ? – Often typos, sometimes inconsistent codification – Sometimes the user has put inappropriate data in a text field – But is it inappropriate ? – What if the application didn’t support their work particularly  well, and they just needed to put this data “somewhere” • The legacy data can tell you much more about what a  business does than any process model or data model © Model Futures Ltd. 2008
  • 14. The BORO Method™ • A simple (boring, even) method for re‐engineering  legacy data into a new model • Process is grounded in: – Set theory – Physical reality • Process is repeatable – Requires experience and discipline, but when followed to  the letter, it always produces the same results • Process is defensible – Not based on anyone’s view of the world (this is an  ontology in the purest sense) – Always traces back to things in the real world © Model Futures Ltd. 2008
  • 16. Where’s it Used • Finance • Oil & Gas • MOD – MOD Ontology Demonstrator • IDEAS – AUSCANUKUS + Sweden + NATO – Developing a common ontology for enterprise architecture © Model Futures Ltd. 2008
  • 17. Ontology • That was the title of the presentation, after all • Caveat Emptor – Just using a “semantic web” approach will not give you an ontology – OWL is just a syntax – Without the necessary philosophical and mathematical rigour you get  the same problems as in traditional information systems – Most ontologies you will encounter are in fact just old data models, re‐ rendered in OWL • IT definition of semantic – The structure behind the syntax • Mathematical/philosophical understanding is different – The things in the real world that are being referred to • IT semantics are still one step removed from the real world – Need tighter coupling to reality © Model Futures Ltd. 2008
  • 18. Getting Closer to the Real World • BORO develops an ontology that is tightly coupled to the  real world • A data/information model is two steps removed – This is very hard to get across to information management  professionals – Can take months before the penny drops © Model Futures Ltd. 2008
  • 19. Last Slide • Problem with information systems is their disconnect  from the real world – Arbitrary model development is to blame – And there’s no reason why this problem should magically go  away just because you’re using semantic web technology • Legacy data is the key – it’s not nice and shiny and new, but it makes a better witness  than a business analyst • Use a method that is repeatable and defensible – BORO seems to work – Needs more extensive testing – Other methods may be out there too © Model Futures Ltd. 2008