Friday, October 31, 2008

From Enterprise Architecture, through Collaboration Oriented Architectures, to Customer Centric Architecture!

Many IT Enterprise Architects, are still struggling to achieve their ultimate peak, which they have determined to be the optimisation and complete integration of the Enterprise. Historically they have determined that their primary focus is optimising the benefit of usng IT to their total Enterprise (represented by the Green shape), the integration and productivity benefits accruing from connecting a few organisations within an Enterprise as the second priority (the orange colour). Leaving the optimisation of single organisations as the third priority (Light Blue). This is often hard as each internal organisation sets more store by the value that IT can bring to their own organisation, than considering the optimal usage of IT across the Enterprise. This results in a large amount of wasted effort as each internal function battles for the resources to maximise the benefits of IT for themselves.

Even more unfortunate is the fact that this internally focussed and selfish optimisation approach results in barriers to collaboration between Enterprises. The recently published Collaboration Oriented Architecture framework from the Open Group highlights key steps to take reduce the friction between Enterprises, while minimising the risks to the Enterprises and their Customers.

However, even this refined collaboration oriented approach still does not resolve the key issues and opportunities for the most important constituents of all Enterprises: their Customers! Customers are impacted most badly by architectural approaches that do not hold them at the centre.



The new Yellow layer in the diagram above signifies a new Customer Centric layer. Architects who understand the importance of this new layer will be scrambling to drop their Enterprise or Collaboration titles and adopt the attitudes and title of a Customer Centric Architect. Now we have to start thinking about what exactly that means, we could do well by starting to think about how Identity and Access Management systems optimised to meet the needs of individual Enterprises might be architected with the Customer in the forefront of all our minds.

There is a lot to do to change our architecture mindsets. We need to stop thinking internally of our own Enterprises and change to think FIRST of our Customers. It was hard enough trying to achieve Enterprise Architecture, one can only imagine the difficulties that will be encountered on this journey. However the benefits are even more legion than those which drove us to strive for Enterprise Architecture. Now all we have to do is to persuade the internal functions why this makes more sense than focussing on their special needs. Perhaps it will be easier to persuade them to give up their own gains, if it is the Customer that wins rather than a colleague in another department/organisation!?

However it won't be that easy to accomplish as the legacy systems are all facing the wrong way, akin to each organisation or function in an Enterprise having its clothes on inside out! Perhaps the challenge of changing this state of affairs should not be imagined, as the resulting vision of Enterprises in varying states of undress will not be not pretty. But imagine it we must, happily we have pointers and emerging tools and services. The tenets are similar to those espoused in the Jericho Forum COA, the benefits will however be more profound. Additionaly, SOA, the Cloud, Mobilisation, Web 2.0 (The Social Web) and in the future Web 3.0 (The Semantic Web) are all emerging at the right time. With these tools Enterprises will be at least able to consider the transformation, assuming of course they have Customer Centric Architects that get it, and internal functions that are willing to take their "clothes" off! Perhaps that is the real result of Consumerisation, not just of the devices and services, but of whole Enterprises! Now that is a nice thing to imagine!

Sunday, October 26, 2008

Aha Number 1: On the relationship between my Personas and my "Me" Tags

I created this Blog Space, out of some weird sense that I didn't want to be blogging on this subject to my usual reader! Something about wanting to reach/please a different audience. This week while on the Leading Edge Forum Cloud Study Tour, I watched as @mastermark decided to reduce his tweets under the #lef tag, because he felt he was overwhelming his audience. This must have got my subconcious thinking as I woke this Sunday morning knowing that Personas and Personal Tagging were very closely related.

So for some definitions:
A Persona is a public facing identity that normally has a name like Adrius42
Personal Tagging will come in three basic forms, the lowest level is self asserted, next comes from the aggregation of third party tags (vis By public acclaimation Adrius42 is a Geek, and those of you who know me will know that I would be mighty proud of such an acclaimation!) this second form of tagging is what others tag me as, the final form of tagging is a claim that can be authenticated via a thrid party, eg I am a Doctor ( I am not so I would have a hard time having the BMA authenticating that claim, whereas my son would not)

So onto my Aha! this e-trust blog space is simply a poor attempt of mine to tag my Web2.0 persona.

What would be better is if the Social Media Tools (starting with my friends at FaceBook who really didn't get what I was talking about when I raised the topic!) were to implement Personal Tagging it will be the early beginning of Identity and Access Management in the Social Space.

Instead of "following" all of Adrius42 you could "follow" my Web2.0 persona articulated at the application level by Adrius42#Web2.0. I would be more comfortable letting some of you into that, than the whole me!. So when you accessed Adrius42, you would get to see those persona#tags that you have chosen to follow and that I have let you see. You can also chose to unfollow one of my persona#tags if I start to get too nerdy in it, as you might my upcoming Adrius42#greencomposting persona#tag!

I would also be able to define the folks who could see my persona#tags. For example my Adrius42#web2.0 tag I might make public, whereas Adrius42#holidays I might make visible to friends so that they could choose to follow it and I could choose to let them.


So here's to Persona#tags

Now all I need is for this post to go Viral and for my FaceBook friends to get what I was jabbering on about.... then my Twitter friends then my Del.icio.us friends... and then my whole Social Media Universe. And then Mark and I would be able to stop feeling guilty about what we were blabbing on about!!!

Wednesday, August 20, 2008

Latest Version of IAM Module

Latest Version based on all your kind feedback..

Module Overview
In a world where collaboration is increasingly the norm, information is an increasingly valuable asset. High profile attacks on organisations from foreign states, credit card information being stolen from unprotected wireless networks, or simply the loss of personal data sent through the post on CD-ROMs, all demonstrate the changing shape of the risks to that value. Information Systems are used to store and disseminate these information assets within and between organisations. Organisations therefore need to ensure they protect the communication and storage of this information in these systems by understanding the risks they face and putting in place appropriate measures to prevent their information assets from being compromised. This module will explore this Information Asset Management (IAM), and the role that information professionals take in IAM. Opening with the framing and history of IAM, the module will use key industry resources and knowledge of business information systems to approach the analysis of business risk and planning of information risk management, realised through real-life case studies and guest lectures.

Learning Outcomes
By the end of the module the student will be expected to be able to:
• Understand the different types of information threats and vulnerabilities that an information system may experience, and how they may impact businesses.
• Evaluate the information risks an information system may bring to a business and communicate the potential business impact of those risks.
• Analyse the security elements of information technology services, systems and assets within an organisation. This will include the competencies required to manage the confidentiality, integrity, and availability of data and information.
• Develop appropriate controls and/or mitigations to maximise the business value of an information asset, while ensuring the risk is kept to an appropriate level
• Show understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
• Demonstrate understanding of the techniques used to manage data and information within an organisation and as it crosses into and out of an organisation. This includes the IT and information management processes involved in the acquisition, creation, categorisation, storage, transfer and disposal of data and information.


Initial Plans for the Assessment

2 hour unseen examination

Initial Group development and implementation of an Audit Plan:
Based on a case study of Company X, that holds a number of information risks of various degrees of complexity and transparency. In groups, students will produce an audit plan, and implement the information risk assessment. The case study is based upon real-life situations.
Groups will have the opportunity to interview a guest IT professional and the lecturer who will both role-play Business and IT Leaders in the Case.

To address the following learning outcomes:
- Evaluate the information risks information systems may bring to a business and communicate the potential business impact of those risks.
- Analyse the security elements of information technology services, systems and assets within an organisation. This also covers the competencies required to manage the confidentiality, integrity of and availability of data and information
- Show their understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
The development and implementation of the audit plan allows discovery of the risks. Feedback will be given on the approaches the groups have taken.

Group Information Risk Assessment and Control Plan Presentation:
Subsequently the groups should analyse their assessment develop their proposals for the final phase. In this phase the groups will present their assessment and proposals, as if to Company X’s Audit Committee. They will produce a written audit document, to include; an executive summary, a detailed information risk assessment, an outline of the potential impacts, and any proposed policies, controls and/or mitigations.

To address the following learning outcomes:
- Evaluate the information risks an information system may bring to a business and communicate the potential business impact of those risks.
- Analyse the security elements of information technology services, systems and assets within an organisation. This also covers the competencies required to manage the confidentiality, integrity of and availability of data and information
- Develop appropriate controls and/or mitigations to maximise the business value of an information asset, while ensuring the risk is kept to an appropriate level.
- Show their understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
The Information Risk Assessment and Control Plan will be marked per group, but an individual portion of the marks will be assigned based on how well each student worked within the group.

Monday, August 18, 2008

Information Asset Management: Draft Learning Objectives

I am starting on the journey of module development... lecturing on Information Asset Management to third year computing students at a UK University.

I have the passion for the subject, I know that they really need to know this stuff, especially in the collaborative "cloud" world we have racing at us fast! My challenge is that there are apparently few courses out there for me to build upon, and even less reading material written on the subject. I am excited at the opportunity to help prepare information professionals in this way. So given the nudge I had this morning on Twitter from @gblnetwkr, I decided to start to call upon the wisdom of the crowds!!!

Draft Module Aims
This module will focus on the importance of managing information assets to maximise value and mange risk to an appropriate level. It will explore the various agencies, roles, policies, processes and technologies involved, while highlighting the importance of the role Information Professionals, and others, need to play in managing information assets.

I am using the e-skills PROCOM work as a guide, though that is still in draft, and is not too strong in the area of Information Security. I will also be using PROCOM, COBIT and ITIL more formally when I figure out the appropriate approvals and copyright implications.

My first ever "initial" draft set of Learning Outcomes !!!

By the end of the module the student will be expected to be able to:
• Understand the different types of information threats and vulnerabilities that an information system may experience, and how they may impact businesses.
• Evaluate the information risks an information system may bring to a business and communicate the potential business impact of those risks.
• Develop appropriate controls and/or mitigations to maximise the business value of an information asset, while ensuring the risk is kept to an appropriate level.
• Ensure the security of information technology services, systems and assets within an organisation. This also covers the competencies required to manage the confidentiality, integrity, and availability of data and information.
• Show their understanding of the various aspects of information asset governance, including policy development and related regulations, compliance practises and issues.
• Demonstrate their understanding of the techniques used to manage data and information within an organisation and as it crosses into and out of an organisation. This includes the IT and information management processes involved in the acquisition, creation, categorisation, storage, transfer and disposal of data and information.

All that draft language should give you the clue, feedback welcome.

...on three counts
1) If you were a student would you want to come to the lectures?
2) Is the content right?
3) Any other perspective you might have....?

Sunday, August 10, 2008

How to Trust Apple's Time Machine and Time Capsule

For reasons I am still not totally clear on, but that I suspect could be down to poor coding, my Apple Time Capsule and Apple Time Machine became unworthy of e-trust.

The dreaded words "Preparing Backup" being the harbinger of doom for many, and for those who enjoy console logs the still scarier words "Node requires deep traversal" tended to signify a VERY long wait for the backup to prepare, my record stint of patience being over two weeks! This is not one users experience according to various forums. However those same forums hold some gems that helped me regain control of my errant backup processes, while I wait impatiently for Apple to figure out that they really do have a problem with their Time Machine and Time Capsule.

So for those who have the same problem I will be placing in this blog a few of the gems I have gleaned from the various fora.

I will also be attributing the finds, but for now some quick pointers

1) Use the Console (iashton in Apple Support Forum)
Try starting Console - its in Applications/Utilities
Click on system.log in the left hand pane and then type backupd into the filter box in the top right of the window
Click the Time Machine icon on the top menu bar and select Back Up Now.
A backup should start and you can check its progress in the Console window.

2) A Fix (Patty Patty in Apple Support Forum)
1) Turn Time Machine off
2) Trash the com.apple.TimeMachine.plist in /Library/Preferences
3) Restart
4) Full Spotlight reindex of the Macintosh HD
5) Added a bunch of folders to the "Do Not Backup" list in Time Machine
6) Turn Time Machine on

3) A Great Tool The Time Machine Editor
I used this to reduce the number of backups

Monday, July 28, 2008

Civility 2.0


I am finding it more and more difficult to decide what to Blog, Tweet, Status Update, Wall Post and I don't even have a word for what I do in Identi.ca! in short I am experiencing a Social Network Overload of Tools (or SNOT for short) Too often I resort back to eMail, with the resulting loss of Knols.

One reason for my difficulty was exemplified in my real world existance this afternoon at TMO's (But you would need to read my Martian Observer Blog to relate that label to anything) Suffice to say that the two of us were deeply engaged in a rich and varied dialogue on the wonders of Everything 2.0 (a numeric label that he hates incidentally) During this wide ranging discourse I was watching the face of his spouse known as SWMBO, waves of different looks from sheer disinterest, boredom, and frustration washed across her visage. I believe it was TMO who first offered to change the subject, and we got the very dangerous response "It's alright.... I'm used to it!" Needless to say we changed topic immediately, neither of us being totally neanderthal!

The issue: We were not being Civil, in fact we were being plain rude!
The subject matter of our discourse did not match the audience present.


I have thus developed a communications model making use of the G8 Traffic Light Protocol, (which is my favourite classification tool comprising 4 colours White, Green, Amber and Red. )

Imagine you are in a Restaurant and you have 4 means of Communication:

White=SHOUT

Green=Talk Loud Enough So The Whole Table Can Hear

Amber=Talk to the persons either side of you

Red=whisper



Apply the right Traffic Light Colour to each of the following communications
"Shall we all split the bill?"

"FIRE! FIRE!"

"You touch me again like that and I will tell your partner!"

"What are you both ordering, I'm going for the steak"


The above exercise did not include the more complicated topic or group based segmentation, but hopefully showed how easy it is to classify communication type in the real world.

In the more virtual worlds of social networking we have just one communication type and that is SHOUT. Unless one switches back to email where we have a number of techniques ranging from type of addressee (To: cc: and bcc:) to group lists and the Subject Line that allow us to target our messages, and thus be more civil.

Social Networking Tools have not yet evolved Civility Features, this blog is hopefully the start of a common design pattern that will allow all developers to develop "civil" tools.

The colours are basically a form of Meta Data.
WHITE= Public Broadcast equivalent to SHOUT
GREEN= All Community Members equivalent to talking to the whole table.
AMBER= Defined Group(s)= Normal Voice between a few people
RED= Defined Individual(s)= Whisper

Title and Category fields would be an additional set of parameters that allows effective decision consume/notconsume from the audience/reader

I look forward to avoiding the need of going to so many places.... or feeling less restricted.