1 / 0

The Enterprise Information Web (EIW) : Analytics, Efficiency and Security

The Enterprise Information Web (EIW) : Analytics, Efficiency and Security. June 26, 2012. Jonathan Underly, Program Manager. Our landscape. More than…. 3.2 million people. 5,000 sites. 2,700 systems. information visibility. +. federation of systems. = MAJOR problem.

ramya
Download Presentation

The Enterprise Information Web (EIW) : Analytics, Efficiency and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Enterprise Information Web (EIW) : Analytics, Efficiency and Security June 26, 2012 Jonathan Underly, Program Manager
  2. Our landscape More than… 3.2 million people 5,000 sites 2,700 systems
  3. information visibility + federation of systems = MAJOR problem we call the solution the Enterprise Information Web …better known as EIW
  4. with this solution, comes… EFFICIENCY (in business operations) while adhering to SECURITY requirements and enabling NET-CENTRICITY
  5. Business Process RE-ENGINEERED understand, define, transform, merge… =avg(G2:G92) txt csv OSD Analyst xls =sum(E2:E857) Decision Maker xml Make data call Generate output Receive data Prepare data Analyze data Finalize report EIW $$$$ Enterprise Information Web = ¢¢¢ process * reporting frequency * number of data sources =
  6. NDAA 2012 ‘‘(c) ENTERPRISE ARCHITECTURE FOR DEFENSE BUSINESS SYSTEMS.— (1) The Secretary of Defense, acting through the DefenseBusiness Systems Management Committee, shall develop— ‘‘(A) an enterprise architecture, known as the defense businessenterprise architecture, to cover all defense business systems,and the functions and activities supported by defensebusiness systems, which shall be sufficiently defined to effectivelyguide, constrain, and permit implementation of interoperabledefense business system solutions and consistent withthe policies and procedures established by the Director of theOffice of Management and Budget; and Green = New terminology
  7. Interoperability = Compliance Fragile Interoperability (of systems) a system of systems transformed by the Semantic BEA BEA
  8. Svc Member Airman Sailor A Vision for DoD Solution Architectures Relationship described in OWL Data described in RDF W3C Open Standards Legend: DoD Authoritative Data Source Business Enterprise Architecture (BEA) DoD EA User executes End-to-End Business Process (E2E BP) OMG Primitives Conformance class 2.0 BP models uniformly described E2E BP executes via BEA directly SameAs Query BEA directly: Acq Domain Vocabulary Enterprise analytics Compliance IRB/portfolio management Warfighter Domain Vocabulary SameAs Real Prop Domain Vocabulary Log Domain Vocabulary SameAs SameAs SameAs Fin Domain Vocabulary (GFMDI) (EDIPI) HR Domain Vocabulary OUID position billet dept
  9. Map once. Use many. System A Contracting System B ERP/Accounting System C Invoicing Clean Audit Funds & Contract Management Visibility in Theater Contract Number Invoice Number Invoice Amount Contract Number Award Date Funding Amount Contract Number Domain Ontology Invoice Number Invoice Amount AwardDate FundingAmount
  10. Strike the right balance. manage the tension How much security is effective? Should security weigh more than accessibility? accessible secure PKI
  11. Staying Secure Where does security begin and end? Information Assurance (IA) Identity & Access Management (IDAM) PKI Data Aggregation Certification & Accreditation (C&A)
  12. PKI-Enabled Dashboard Gadgets Domain Ontology Mapping Ontology Instance Data (Rules) Query Ontology JSON RDF Store SPARQL SPARQL SPARQL Federation SPARQL SPARQL SPARQL PKI PKI SPARQLizer SPARQLizer Native Query Language Native Query Language Data Source Data Source Rules Execution
  13. Enabling Net-Centricity EIW Strategy Dashboard Gadgets DoD Net-Centric Strategy dashboard SPARQL endpoint semantically described provenance with PKI RDF/OWL near real-time analytics visible accessible understandable trusted interoperable responsive RDF Store Federator PKI SPARQLizer SPARQLizer Data Source Data Source
  14. see EIW live.
  15. Questions? Jonathan Underly EIW Program Manager jonathan.underly@osd.mil
  16. http://dcmo.defense.gov
  17. Backup
  18. NDAA 2012 ‘‘(d) COMPOSITION OF ENTERPRISE ARCHITECTURE.—The defensebusiness enterprise architecture developed under subsection(c)(1)(A) shall include the following: ‘‘(1) An information infrastructure that, at a minimum,would enable the Department of Defense to— ‘‘(A) comply with all applicable law, including Federalaccounting, financial management, and reporting requirements; ‘‘(B) routinely produce timely, accurate, and reliablebusiness and financial information for management purposes; ‘‘(C) integrate budget, accounting, and programinformation and systems; and ‘‘(D) provide for the systematic measurement ofperformance, including the ability to produce timely, relevant, and reliable cost information. ‘‘(2) Policies, procedures, data standards, performance measures, and system interface requirements that are to apply uniformly throughout the Department of Defense. Green = New terminology
  19. EIW Alignment to DoD Information Priorities
  20. Enabling Strategic Management 4.0 Preserve and Enhance the All-Volunteer Force 2.0 Support Contingency Business Operations 4.2.10 Percentage of the Dept. AD who meet objectives for time deployed vs time at home Strategic Objectives Dwell Time BEA Ontology Semantic Description DoD Personnel Management E2E Enterprise E2E and OSD Policies Operational Process and Service Policies Army Dwell Time E2E USMC Dwell Time E2E CII CII ODSE ODSE ADS Department of Defense
  21. EIW Approach to Information Visibility EIW reaches into Authoritative Data Sources (ADS) to satisfy enterprise information needs by… reporting near real-time, authoritative information on-demand. supporting enterprise information standards (e.g. Open; HRM ES, SFIS, etc). supporting IT flexibility/agility. Multiple Sources Single view Aggregation HR Data Store HR Data Store HR Data Store DMDC Data Stores Federator HR Source BEA HR Source HR Source HR Source Services Data External Data EIW Project Management Office (PMO) Department of Defense
  22. Interoperability & Compliance BEA Semantic BEA System of Systems automating interoperability and compliance validation (near) Exponential Integration problem (n2 – n) (near) Linear Integration problem(2n-1) Inflexible data model Total interoperability for 100 systems > $4B* Promotes operational silos Promotes data duplication Infinitely extensible data model Total interoperability for 100 systems <$40M* Promotes cross-domain reasoning Encourages data reduction = EFFICIENCY * Assumes $400K/interface
More Related