SlideShare a Scribd company logo
The Web’s Influence
             On Your Data

Richard Wallis
Technology Evangelist
http://consulting.talis.com
      @rjw
Leading Semantic Web technology company
Leading Semantic Web technology company



     40 year rich metadata heritage
Leading Semantic Web technology company



     40 year rich metadata heritage



     An ethos of sharing innovation
Structure
Structure

• Talis Group Ltd
Structure

• Talis Group Ltd
• Talis Education Ltd
Structure

• Talis Group Ltd
• Talis Education Ltd
• Kasabi
Structure

•   Talis Group Ltd
•   Talis Education Ltd
•   Kasabi
•   Talis Systems Ltd
Structure

•   Talis Group Ltd
•   Talis Education Ltd
•   Kasabi
•   Talis Systems Ltd
•   Talis Consulting
The Web’s Influence
  On Your Data
The Web’s Influence
  On Your Data
The Web’s Influence
The Web’s Influence
The Web’s Influence
     On Data
The Web’s Influence
     On Data
The Web’s Influence
     On Data
The Web’s Influence
     On Data

     Minimal
The Web’s Influence
     On Data

     Minimal
Links to datasets ✔
The Web’s Influence
      On Data

       Minimal
  Links to datasets ✔
Links within datasets ✘
The Web’s Influence
      On Data

       Minimal
  Links to datasets ✔
Links within datasets ✘
    until recently....
Linked Data
Linked Data
      is
Web Native Data
Linked Data
        is
Web Native Data
    building a
 Web of Data
The Web’s Influence
  On Your Data

More Related Content

Similar to The Web's Influence on Your Data

Linked Data an Introduction
Linked Data an IntroductionLinked Data an Introduction
Linked Data an Introduction
Talis Consulting
 
Schema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & HowSchema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & How
Richard Wallis
 
The Web of Data is Our Opportunity
The Web of Data is Our OpportunityThe Web of Data is Our Opportunity
The Web of Data is Our Opportunity
Richard Wallis
 
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
National Information Standards Organization (NISO)
 
Contextual Computing - Knowledge Graphs & Web of Entities
Contextual Computing - Knowledge Graphs & Web of EntitiesContextual Computing - Knowledge Graphs & Web of Entities
Contextual Computing - Knowledge Graphs & Web of Entities
Richard Wallis
 
Contextual Computing: Laying a Global Data Foundation
Contextual Computing: Laying a Global Data FoundationContextual Computing: Laying a Global Data Foundation
Contextual Computing: Laying a Global Data Foundation
Richard Wallis
 
Semantic Web For Dummies
Semantic Web For DummiesSemantic Web For Dummies
Semantic Web For Dummies
Jeffrey T. Pollock
 
LD4L OCLC Data Strategy
LD4L OCLC Data StrategyLD4L OCLC Data Strategy
LD4L OCLC Data Strategy
Richard Wallis
 
Nova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web TalkNova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web Talk
syawal
 
SEO in the Age of the Semantic Web by David Amerland
SEO in the Age of the Semantic Web by David AmerlandSEO in the Age of the Semantic Web by David Amerland
SEO in the Age of the Semantic Web by David Amerland
Search Marketing Expo - SMX
 
Evolution Towards Web 3.0: The Semantic Web
Evolution Towards Web 3.0: The Semantic WebEvolution Towards Web 3.0: The Semantic Web
Evolution Towards Web 3.0: The Semantic Web
LeeFeigenbaum
 
Your first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.netYour first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.net
keemojohn
 
DAT307_Modern Cloud Data Warehousing
DAT307_Modern Cloud Data WarehousingDAT307_Modern Cloud Data Warehousing
DAT307_Modern Cloud Data Warehousing
Amazon Web Services
 
Rhode Island 2.0
Rhode Island 2.0Rhode Island 2.0
Rhode Island 2.0
NIC Inc | EGOV
 
Evaluating Drupal for the Enterprise
Evaluating Drupal for the EnterpriseEvaluating Drupal for the Enterprise
Evaluating Drupal for the Enterprise
ultimike
 
Identifying The Benefit of Linked Data
Identifying The Benefit of Linked DataIdentifying The Benefit of Linked Data
Identifying The Benefit of Linked Data
Richard Wallis
 
"Twitter, Pray, Love" at State Policy Network 2010
"Twitter, Pray, Love" at State Policy Network 2010"Twitter, Pray, Love" at State Policy Network 2010
"Twitter, Pray, Love" at State Policy Network 2010
Cord Blomquist
 
Lv.net internet services a solution for amazing wireless internet!
Lv.net internet services a solution for amazing wireless internet!Lv.net internet services a solution for amazing wireless internet!
Lv.net internet services a solution for amazing wireless internet!
Roger Bluteau
 
Evaluating web sites
Evaluating web sitesEvaluating web sites
Evaluating web sites
ewaszolek
 
Designing Linked Data Software & Services for Libraries
Designing Linked Data Software & Services for LibrariesDesigning Linked Data Software & Services for Libraries
Designing Linked Data Software & Services for Libraries
Richard Wallis
 

Similar to The Web's Influence on Your Data (20)

Linked Data an Introduction
Linked Data an IntroductionLinked Data an Introduction
Linked Data an Introduction
 
Schema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & HowSchema.org Structured data the What, Why, & How
Schema.org Structured data the What, Why, & How
 
The Web of Data is Our Opportunity
The Web of Data is Our OpportunityThe Web of Data is Our Opportunity
The Web of Data is Our Opportunity
 
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
NISO Webinar: Back From the Endangered List: Using Authority Data to Enhance ...
 
Contextual Computing - Knowledge Graphs & Web of Entities
Contextual Computing - Knowledge Graphs & Web of EntitiesContextual Computing - Knowledge Graphs & Web of Entities
Contextual Computing - Knowledge Graphs & Web of Entities
 
Contextual Computing: Laying a Global Data Foundation
Contextual Computing: Laying a Global Data FoundationContextual Computing: Laying a Global Data Foundation
Contextual Computing: Laying a Global Data Foundation
 
Semantic Web For Dummies
Semantic Web For DummiesSemantic Web For Dummies
Semantic Web For Dummies
 
LD4L OCLC Data Strategy
LD4L OCLC Data StrategyLD4L OCLC Data Strategy
LD4L OCLC Data Strategy
 
Nova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web TalkNova Spivack - Semantic Web Talk
Nova Spivack - Semantic Web Talk
 
SEO in the Age of the Semantic Web by David Amerland
SEO in the Age of the Semantic Web by David AmerlandSEO in the Age of the Semantic Web by David Amerland
SEO in the Age of the Semantic Web by David Amerland
 
Evolution Towards Web 3.0: The Semantic Web
Evolution Towards Web 3.0: The Semantic WebEvolution Towards Web 3.0: The Semantic Web
Evolution Towards Web 3.0: The Semantic Web
 
Your first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.netYour first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.net
 
DAT307_Modern Cloud Data Warehousing
DAT307_Modern Cloud Data WarehousingDAT307_Modern Cloud Data Warehousing
DAT307_Modern Cloud Data Warehousing
 
Rhode Island 2.0
Rhode Island 2.0Rhode Island 2.0
Rhode Island 2.0
 
Evaluating Drupal for the Enterprise
Evaluating Drupal for the EnterpriseEvaluating Drupal for the Enterprise
Evaluating Drupal for the Enterprise
 
Identifying The Benefit of Linked Data
Identifying The Benefit of Linked DataIdentifying The Benefit of Linked Data
Identifying The Benefit of Linked Data
 
"Twitter, Pray, Love" at State Policy Network 2010
"Twitter, Pray, Love" at State Policy Network 2010"Twitter, Pray, Love" at State Policy Network 2010
"Twitter, Pray, Love" at State Policy Network 2010
 
Lv.net internet services a solution for amazing wireless internet!
Lv.net internet services a solution for amazing wireless internet!Lv.net internet services a solution for amazing wireless internet!
Lv.net internet services a solution for amazing wireless internet!
 
Evaluating web sites
Evaluating web sitesEvaluating web sites
Evaluating web sites
 
Designing Linked Data Software & Services for Libraries
Designing Linked Data Software & Services for LibrariesDesigning Linked Data Software & Services for Libraries
Designing Linked Data Software & Services for Libraries
 

More from Talis Consulting

Linked data under the hood
Linked data under the hoodLinked data under the hood
Linked data under the hood
Talis Consulting
 
Linked data our experience
Linked data our experienceLinked data our experience
Linked data our experience
Talis Consulting
 
Linked data your journey
Linked data your journeyLinked data your journey
Linked data your journey
Talis Consulting
 
Semantic News
Semantic NewsSemantic News
Semantic News
Talis Consulting
 
Linked data your journey
Linked data your journeyLinked data your journey
Linked data your journey
Talis Consulting
 
Linked data our experience
Linked data our experienceLinked data our experience
Linked data our experience
Talis Consulting
 
Linked Data Under the Hood
Linked Data Under the Hood Linked Data Under the Hood
Linked Data Under the Hood
Talis Consulting
 
Ordnance Survey and Linked Data
Ordnance Survey and Linked Data Ordnance Survey and Linked Data
Ordnance Survey and Linked Data
Talis Consulting
 
Linked Data Workshop Stanford University
Linked Data Workshop Stanford University Linked Data Workshop Stanford University
Linked Data Workshop Stanford University
Talis Consulting
 
OpenAIRE schirrwagen
OpenAIRE schirrwagenOpenAIRE schirrwagen
OpenAIRE schirrwagen
Talis Consulting
 
LODUM: Linked Open Data University of Münster
LODUM: Linked Open Data University of MünsterLODUM: Linked Open Data University of Münster
LODUM: Linked Open Data University of Münster
Talis Consulting
 
Linked Data our Experience
Linked Data our ExperienceLinked Data our Experience
Linked Data our Experience
Talis Consulting
 
Introduction to Talis
Introduction to TalisIntroduction to Talis
Introduction to Talis
Talis Consulting
 
Linked Data Under the Hood
Linked Data Under the HoodLinked Data Under the Hood
Linked Data Under the Hood
Talis Consulting
 
Linked Data in Action
Linked Data in ActionLinked Data in Action
Linked Data in Action
Talis Consulting
 

More from Talis Consulting (15)

Linked data under the hood
Linked data under the hoodLinked data under the hood
Linked data under the hood
 
Linked data our experience
Linked data our experienceLinked data our experience
Linked data our experience
 
Linked data your journey
Linked data your journeyLinked data your journey
Linked data your journey
 
Semantic News
Semantic NewsSemantic News
Semantic News
 
Linked data your journey
Linked data your journeyLinked data your journey
Linked data your journey
 
Linked data our experience
Linked data our experienceLinked data our experience
Linked data our experience
 
Linked Data Under the Hood
Linked Data Under the Hood Linked Data Under the Hood
Linked Data Under the Hood
 
Ordnance Survey and Linked Data
Ordnance Survey and Linked Data Ordnance Survey and Linked Data
Ordnance Survey and Linked Data
 
Linked Data Workshop Stanford University
Linked Data Workshop Stanford University Linked Data Workshop Stanford University
Linked Data Workshop Stanford University
 
OpenAIRE schirrwagen
OpenAIRE schirrwagenOpenAIRE schirrwagen
OpenAIRE schirrwagen
 
LODUM: Linked Open Data University of Münster
LODUM: Linked Open Data University of MünsterLODUM: Linked Open Data University of Münster
LODUM: Linked Open Data University of Münster
 
Linked Data our Experience
Linked Data our ExperienceLinked Data our Experience
Linked Data our Experience
 
Introduction to Talis
Introduction to TalisIntroduction to Talis
Introduction to Talis
 
Linked Data Under the Hood
Linked Data Under the HoodLinked Data Under the Hood
Linked Data Under the Hood
 
Linked Data in Action
Linked Data in ActionLinked Data in Action
Linked Data in Action
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

The Web's Influence on Your Data