Think about the library. Think about its every floor, hallway and shelf as silos of information excellence. Valuable information tucked away … just begging to be shared. Now exactly how would such sharing occur?
I introduced the Information Sharing Paradox a few months back. This basically highlights the fact that one must construct and use a central directory to efficiently determine who has what.
At the library the card file is used to point to the location of a book. A Google search does not scour the Earth for the results, no, a pre-constructed index is searched and the results -- pointers to the real documents -- are returned to the inquirer.
This is the only model that scales. And as the Librarian tasked with keeping this central catalog current gets more sophisticated, enterprise awareness and Perpetual Analytics begin to unfold.
So, in short, information sharing is a second base affair. You cannot get there without going by first base, first. And first base is discovery.
From a policy standpoint, if enterprise information assets are not registered in the central index (directory, card file, or whatever you want to call the thingee) then this information is hardly an enterprise asset at all … because it is virtually undiscoverable.
My next blog post, to be published next week, will be: "Discoverability: The First Information Sharing Principle".
Postings on this site don’t necessarily represent IBM’s positions, strategies or opinions.
Jeff Jonas is the chief scientist of IBM Software Group’s Threat and Fraud Intelligence unit and works on technologies designed to maximize enterprise awareness. Jeff also spends a large chunk of his time working on privacy and civil liberty protections. He will be writing a series of guest posts for Netcrime Blog.
For more on Entity Analytics, click here.