Presentation is loading. Please wait.

Presentation is loading. Please wait.

Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial.

Similar presentations


Presentation on theme: "Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial."— Presentation transcript:

1 Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial 2, copyright, Paul S Prueitt 2005

2 The BCNGroup Inc, is a not for profit foundation registered in the Commonwealth of Virginia. www.bcngroup.org since 1997.www.bcngroup.org Our conjecture is that a new open systems based science is being created. The formalism extends Hilbert type mathematics. Human-centric Information Production (HIP) replaces the current Information Technology paradigm. A proposal is currently directed towards government agencies who need ontology management systems. Proposals have been discussed in the context of a Treasury / IC / DHS / State Department knowledge science and technology program. The second step in this program is to develop an universally accessible CoreSystem CoreOntology expression medium. (20 M over two years) Current and future relevant IP will be compensated according to a Red hat type business model. The third step is to fund the development of a K-12 curriculum in the knowledge sciences. (1.2 B over five years) This funding is offset by reducing funding for computer science and IT programs.

3 Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Cyber Security Data National Targeting Center Data Detailed work with tools over available data Practical problem: Limited access to data means that who gets the right to work on the solution is strongly constrained by business criterion. A Core System CoreOntology would change this circumstance. Integrated collection of reified ontologies with specific inferences, information organization and retrieval Possible deployment as Intelligence Community (TIA) capability

4 Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Advanced Trade Data Harmonized Tariff Schedule Detailed work with tools over available data Practical problem: Provide the three Cs, clarity, consistency, and completeness in EACH judicial review of a commodity in passage across national boarders. Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as U. S. Custom’s Total Information Awareness (TIA) capability

5 Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics DHS Data acquisition centers National intelligence analysis centers Detailed work with tools over available data Practical problem: Each community of practice is observed to use a specific managed vocabulary. These vocabularies can be used to store data in locations that are the context (and thus requiring no search). Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as department wide Department of Homeland Security (TIA) capability

6 Semantic Extraction Link Analysis Pattern recognition Ontology Tools Statistics Medical data acquisition centers National biodefense rapid analysis center Detailed work with tools over available data Practical problem: Medical community is not deeply trustful of the intelligence communities. A Core System Core Ontology would lay cards on the top and make trust relationship negotiable based on shared knowledge of mutual value. Integrated collection of reified ontologies with some specific inferences and some information organization and retrieval Possible deployment as National Bioterrorism Response System

7 What is and is not a hard problem 1)New ways of thinking are introduced that are supported by actual new product lines appearing in the marketplace. A comprehensive review of the leading edge aspect of the market is suggested. 2)Use cases and data flow can be used to demonstrate these new ways of thinking, and existing commercial product can be shown to be available to architect a demonstration of Semantic Web capabilities. 3)A small community of leading scientists have defined a knowledge sharing core concept, that when equipped with the best Semantic Web capabilities will serve individual Governmental agencies and departments. 4)CoreTalk Inc is a commercial entity with a capability to re-factor the selected technical capabilities and express these as a CoreSystem CoreOntology.

8 Observation: In regards to evaluating Semantic Web products the standard choice is not always the right choice To elaborate on this observation: Standard IT development processes do not adequately support individual understanding of the long term hard issues, e.g. no educational processes occurs over relevant Semantic Web technology. Easy Difficult Short termLong term In government procurement of IT, a mismatch between what is available and what is evaluated is often created. The development of questions to be given to screen software vendors may not be well focused – either by what SW informed architects might want to do nor by what the product lines are designed to do. The final selection of vendors may not be fully informed by what the market is bringing forward. Expected result = wrong software integrated in the wrong way using a simple-minded architecture.

9 Semantic Web mismatch issues Because the SW issues are not well known, business decisions focuses on short term simple minded problems, where perceived risk are minimal. Mismatch between low risk decisions and true problems create process that can not be rationalized. The dysfunction can be ignored in an business environment where marketing and public relations often disguises the absence of progress. Short termLong term Easy Difficult

10 Evaluating Semantic Web products: the identification of by-pass Many problems that are critical are in fact mis-classified as long term and difficult when a simplification is being fielded by the markets. The simplification may involve the use of ontology to organize how information is organized. For Example: The definition of an ontology as a { concepts } expressed within an constraint language. The check box “does the product import and export OWL?” may be improperly asked if the understanding of what is an ontology, and what is a constraint language is not present. Short termLong term Easy Difficult

11 Many problems that are critical are in fact classified as long term and difficult In many cases, a by-pass around a long term difficult problem can be seen. The by-pass moves the problem to the easy and short term category. However: In security environments open minded search to re-frame problems is problematic for several understandable reasons. 1) Only a limited number of individuals have security clearance and have the training necessary to understand the history of semantic technology development. 2) Business practices themselves often re-enforce what is perceived to be minimization of professional risk, and thus these practices closes off an open discussion (even within secure environments). Short termLong term Easy Difficult

12 Many problems that are critical are in fact mis-classified as being long term and difficult Example of by-pass Problem: Write 1/3 into a computer. This problem is considered to be unsolvable since in base 10 we have 1/3 = 0.33333... Where the three dots means repeat to infinity. But 1/3 in base ten is also the same as 1/3 in base 6. In base 6, 1/3 = 0.2 So where did the intractable problem go?


Download ppt "Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial."

Similar presentations


Ads by Google