Strategy-Building Using 3D Free-Form-Search Knowledgebases


Updated 2022-07-05

In a recent LinkedIn post, the founder of Architecture Thinking Association, Wolfgang Goebl, states that “Most IT landscapes of larger companies consist of hundreds of applications that are interconnected via poorly designed interfaces.”

Note the two issues raised i.e., “interconnected applications” and “poorly designed interfaces”.

The mess IT is in is the result, in the main, from picking solutions instead of analyzing requirements.

One remedy is to put in place a process for building a list of requirements before trying to build \ implement Enterprise Architecture for an organization.

Our group has used the following model for enterprise-wide strategy building over 30 years.

Infrastructure\Resources -> Capabilities -> Prospective Initiatives (problems or opportunities) -> Risks\Vulnerabilities -> Ranking of Initiatives -> Shortlisting (ROI/SROI, business fit) -> Funding a few Initiatives

We knew from RBV (Resource-Based View) that organizations make better decisions when staff are able to “view/see” the factors impacting decisions. To this end, we built platforms that made it easy to consolidate data for conversion to information and knowledge and we implemented one-stop-shop methods and tools at platforms that made it easy to onboard strategists and business analysts.

Here below are scenarios illustrating how to build strategies and how not to build strategies.

3D Shadow Ontology

Here below is a 3D shadow ontology hosting some 1,000 nodes belonging to nine (9) Entities for an IED Demining Operation (Suppliers, Business Partners, Competitors, Country Profiles, Customers, Standards, Best Practices, Reference Material, Sites)..

Some of these e-canvases have 50-100 Entities, each with 50-1000 nodes

The screenshots have been blurred for confidentiality reasons . . . .

Processing by blur.imageonline.co
Image 2

Each Entity is a shallow hierarchy with NO crosslinks between any node in one Entity that may have something in common with other nodes in other Entities and such other nodes.

The time to construct this shadow e-map is a small fraction of the time that would be needed to put in place “all” possible linkages for a multi-root hierarchy. 

Full mapping for this demining application would have taken several months resulting in over 100,000 linkages, with no guarantee that analysts would succeed in putting place all possible linkages.

The secret-sauce is to let the search engine build linkages “on-the-fly. (i.e. Launch, search, reduce clutter, display).

Launch a search, the search engine highlights the ‘hits’ and hides any Entities where there are no ‘hits’.

Let’s launch a search for ‘dog’ – we get 22 hits.

Clicking on any node results in pop-up of the underlying document, text, image or video.

Bottom line:

Easy to build (the construction can be automated from ordinary delimited text “records”).

Easy to search\browse..

Traditional node-to-node linking

Same e-canvas, this time using directional arrows (showing a small subset of all possible connections).


..

Bottom line:

Examples: (Improvised Explosive Device Disposal Command and Control application)

  • Build, via drag and drop, outlines comprising clones of certification standards for assignment to individual field operator for training\re-training.
  • Set up Entities for various IED work sites, allocate moveable resources to the sites, track their use, ensure return to sourcing warehouses.

About kwkeirstead@civerex.com

Management consultant and process control engineer (MSc EE) with a focus on bridging the gap between operations and strategy in the areas of critical infrastructure protection, major crimes case management, healthcare services delivery, and b2b/b2c/b2d transactions. (C) 2010-2023 Karl Walter Keirstead, P. Eng. All rights reserved. The opinions expressed here are those of the author, and are not connected with Civerex Systems Inc. (Canada).
This entry was posted in #strategy, Decision Making, Knowledge Bases, Risk Analysis. Bookmark the permalink.

Leave a comment