<?xml version="1.0"?>
<?xml-stylesheet href="/transform" type="text/xsl"?>
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:bs="http://purl.org/ontology/bibo/status/" xmlns:ci="https://vocab.methodandstructure.com/content-inventory#" xmlns:dct="http://purl.org/dc/terms/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:xhv="http://www.w3.org/1999/xhtml/vocab#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" lang="en" prefix="bibo: http://purl.org/ontology/bibo/ bs: http://purl.org/ontology/bibo/status/ ci: https://vocab.methodandstructure.com/content-inventory# dct: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ rdf: http://www.w3.org/1999/02/22-rdf-syntax-ns# xhv: http://www.w3.org/1999/xhtml/vocab# xsd: http://www.w3.org/2001/XMLSchema#" vocab="http://www.w3.org/1999/xhtml/vocab#" xml:lang="en">
  <head>
    <title property="dct:title">Annual Program, 2019</title>
    <base href="https://doriantaylor.com/9ca6d80b-dc6b-4e64-a060-ed2038526729"/>
    <link href="document-stats#ENSUmbhgwt_-nQOSYR1aWL" rev="ci:document"/>
    <link href="elsewhere" rel="alternate bookmark" title="Elsewhere"/>
    <link href="this-site" rel="alternate index" title="This Site"/>
    <link href="//privatealpha.com/ontology/content-inventory/1#circulated" rel="bibo:status"/>
    <link href="http://purl.org/ontology/bibo/status/published" rel="bibo:status"/>
    <link href="person/dorian-taylor#me" rel="dct:creator" title="Dorian Taylor"/>
    <link href="file/abcs-of-content-driven-systems" rel="dct:hasPart"/>
    <link href="file/cool-uris-dont-change" rel="dct:hasPart"/>
    <link href="file/data-sovereignty" rel="dct:hasPart"/>
    <link href="file/documents-make-lousy-documentation" rel="dct:hasPart"/>
    <link href="person/dorian-taylor" rel="meta" title="Who I Am"/>
    <link about="./" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="f07f5044-01bc-472d-9079-9b07771b731c" rel="alternate" type="application/atom+xml"/>
    <link about="./" href="this-site" rel="alternate"/>
    <link about="./" href="elsewhere" rel="alternate"/>
    <link about="./" href="e341ca62-0387-4cea-b69a-cdabc7656871" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="3f36c30c-6096-454a-8a22-c062100ae41f" rel="alternate" type="application/atom+xml"/>
    <link about="verso/" href="this-site" rel="alternate"/>
    <link about="verso/" href="elsewhere" rel="alternate"/>
    <meta content="false" datatype="xsd:boolean" property="ci:indexed"/>
    <meta content="2019-04-18T01:04:55+00:00" datatype="xsd:dateTime" property="dct:created"/>
    <meta content="2019-05-15T22:57:30+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2019-06-15T15:36:57+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2019-06-25T21:00:19+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta content="2022-05-31T15:10:50+00:00" datatype="xsd:dateTime" property="dct:modified"/>
    <meta about="person/dorian-taylor#me" content="Dorian Taylor" name="author" property="foaf:name"/>
    <meta content="summary" name="twitter:card"/>
    <meta content="@doriantaylor" name="twitter:site"/>
    <meta content="Annual Program, 2019" name="twitter:title"/>
    <object>
      <nav>
        <ul>
          <li>
            <a href="document-stats#ENSUmbhgwt_-nQOSYR1aWL" rev="ci:document" typeof="qb:Observation">
              <span>urn:uuid:3525266e-1830-4b7f-bfa7-40e498475696</span>
            </a>
          </li>
        </ul>
      </nav>
    </object>
  </head>
  <body about="" id="EnKbYC9xr5kBg7SA4UmcpK" typeof="bibo:Article">
    <p>I am, by all accounts, an independent researcher. In general I focus on slow trends and neglected problems in the digital landscape, and generate open-source tools and techniques that help solve them. The way this has worked so far is that I pick in broad strokes what I'm going to investigate, and then find organizations whose needs dovetail with those targets in finer grain. Clients get <em>their</em> problems treated&#x2014;and their staff trained&#x2014;first. So far, this has happened in something of an ad-hoc way.</p>
    <p>In 2019 I am trying something a little bit different: I am publishing a set of themes for the work I'm currently best set up to pursue. If it works, I will make it an annual thing.</p>
    <aside role="note" id="EvmzGesPFpc7msv4FNb0GL">
    <p>This is a note to myself to fill the thematic categories in with specific offerings. The services themselves range from strategic and economic modeling, to technical training, all the way to implementing prototypes, or, if you ask nicely, production infrastructure.</p>
    </aside>
    <section id="ECrXXNqPoIbc20LcFf1S0I">
      <h2><em>Theme Zero</em>: Data Sovereignty</h2>
      <figure id="E7BPpGGEWc29y7dYKKjUkK">
        <img src="file/data-sovereignty;knockout" alt=""/>
      </figure>
      <blockquote id="EtIsKeujPy8FvLh0Ksz-bJ">
        <p><strong>Possession is nine tenths of the law</strong></p>
      </blockquote>
      <p>In a little over a decade, <dfn>software as a service</dfn>, otherwise known as <dfn>the cloud</dfn>, has mushroomed. For a number of very good reasons, a hosted service, sold by subscription, is rapidly becoming the de facto method of providing business and professional software. <em>However</em>:</p>
      <ul>
        <li>Some data will always be too sensitive to share outside the four walls of the organization,</li>
        <li>Some operations over an organization's data, sensitive or otherwise, will always be too idiosyncratic to be accommodated efficiently by <em>any</em> platform.</li>
      </ul>
      <p>While incredibly convenient and easy to get into, cloud software companies are extremely conspicuous hacking targets; <a href="https://www.theregister.co.uk/2019/05/17/salesforce_database_outage/" rel="dct:references">they are liable to outages</a>, bankruptcy, or acquisition by (your) competitors; they are profligate data miners, and on average they are, often by design, difficult to sever relations with.</p>
      <p>The idea of <dfn>data sovereignty</dfn> is, for customers of these services, to establish strategies for improving one's bargaining position, where the extreme solution is running the service yourself. For providers, it's about designing products and services where privacy, customizability, and exportability are principal differentiators. A growing number of organizations fit both of these descriptions at the same time.</p>
      <figure id="E0PNpT2aixdaQ26Z6_rEQJ">
        <p>[image here]</p>
        <figcaption>Some services are more commodity, while others are more idiosyncratic. Open standards, unsurprisingly, track with commodity, while breadth of features tracks with idiosyncrasy.</figcaption>
      </figure>
      <section id="EcZdgi_3ZYgIILhGZ-09zI">
        <h3>The Program</h3>
        <p>The program of this theme is to come up with a set of methods for <em>grading</em> both the sensitivity of an organization's data, and the peculiarity of the necessary operations over it, as well as costing alternatives to <abbr title="software-as-a-service">SaaS</abbr>&#x2014;<em>or</em> just plain alternative <abbr>SaaS</abbr>. The goal is for a user of the resulting technique to make more prudent decisions regarding their relationships with vendors, and ultimately figure out the right <em>mix</em> of information infrastructure that is delegated, and infrastructure that is developed on-site. The same process can be applied to <em>vendors</em>, to anticipate the inevitable: a more sophisticated clientele.</p>
      </section>
    </section>
    <section id="EvGKC6UP2ckoyRBzxQo4GJ">
      <h2><em>Theme One</em>: The ABCs of Content-Driven Systems</h2>
      <figure id="EXfZwKK2OIxvN3ZXIBlcKL">
        <img src="file/abcs-of-content-driven-systems;knockout" alt=""/>
      </figure>
      <blockquote id="Er0EuGjP-5MHqwOc6HwaQL">
        <p><strong>Decoupling Access control from Branding and Content</strong></p>
      </blockquote>
      <p>Digital designers of all kinds talk endlessly about the importance of separating content from presentation, but I argue there is a third consideration, and that&#x2019;s <em>who</em> gets to see <em>what</em>. Overwhelmingly, access control is coupled to the application, and this makes it hard to provision, extend and integrate. The net effect is that to get through their day, people need a zillion different usernames and passwords in a hodgepodge of systems that do not interact with one another. The goal here is to figure out design patterns for (primarily Web-based) infrastructure software <span class="parenthesis" title="OMG/LOL/WTF">(<abbr title="content management system">CMS</abbr>/<abbr title="enterprise resource planning">ERP</abbr>/<abbr title="customer relationship management">CRM</abbr>)</span> that fully decouple the access control functionality from the content and the presentation. The result is simpler, more secure systems that work better for users. <strong>ABC</strong>:</p>
      <ul>
        <li><strong>Access control</strong> (i.e., authentication and authorization),</li>
        <li><strong>Branding</strong> (along with the rest of the presentation layer),</li>
        <li><strong>Content</strong> (including data and business logic).</li>
      </ul>
      <section id="EvV79JW9QBi19f7QA42VMI">
        <h3>The Program</h3>
        <p>The program of this theme is to define a set of <em>technical</em> criteria that afford the clean separation of access control from content and presentation in a Web-based information system, including the development of technique for modulating the presentation based on whether or not a user is authenticated, or, if authenticated, what access level they have. The proposition is to solve for the general case using open-source implementations of open standards, and where necessary, tailor the solution to specific platforms used by the client.</p>
      </section>
      <section id="EBS5-LAlTuC4XK6Gpu0I5J">
        <h3>The Client</h3>
        <p>This theme is crafted mainly with companies in mind, who in some measure make Web-based software, and whose team is already fully loaded down with existing product development. The idea is to produce something your team can assimilate into a future revision of your product, without having to read a lot of specs and write a lot of prototypes.</p>
      </section>
    </section>
    <section id="Ei9d8yKCvsUwfiIUaDjI0J">
      <h2><em>Theme Two</em>: Documents Make Lousy Documentation</h2>
      <figure id="EDumkblklmeM2TEkBiNjPK">
        <img src="file/documents-make-lousy-documentation;knockout" alt=""/>
      </figure>
      <blockquote id="Ew78AmhqL4mnIe-Zuq4k4K">
        <p><strong>Disencumbering organizational reference material</strong></p>
      </blockquote>
      <p>Documents&#x2014;deliberately-prepared, edited, curated, formatted, <em>sequences</em> of content&#x2014;are great for telling <em>stories</em>. They're great for conveying <em>arguments</em>. However, if you already buy the argument and you're just looking for <em>facts</em>, documents have a number of characteristics that, when compared to newer&#x2014;as in <em>invented sometime in the last few decades</em>&#x2014;technology, simply get in the way.</p>
      <p>We are 30 years into the Web, meaning we are 30 years into a robust and mature global hypermedia system. Why, then, are we still so preoccupied with documents? Why do Word, Excel, and Powerpoint (and their Google and <abbr>PDF</abbr>-taxidermied counterparts) still dominate? Why, when we need to locate some intraorganizational reference material, do we still have to slog through simulated paper where the information we want is buried in superfluous exposition? Especially now, in the burgeoning era of <dfn>design systems</dfn>, <a href="design-system-as-style-manual-with-web-characteristics" rel="dct:references" title="Design System as Style Manual With Web Characteristics">which are inherently hypertextual?</a></p>
      <p> The best kinds of references are the ones that get you in and out with the information you need with the least overhead lost to searching and scanning. It is also important to be able to filter, aggregate, reformat, and ultimately repurpose said information, so merely indexing your documents for full-text search doesn't finish the job. What it means is <dfn>hypertext</dfn>. There are two obvious targets under this theme:</p>
      <ol>
        <li>How to go into an organization and dissolve a corpus of documents into a tight hypermedia reference,</li>
        <li>How (e.g.) an agency could package and deliver such an asset to a client.</li>
      </ol>
    </section>
    <section id="Eko1wnBHF_nv3vgAg5ywhK">
      <h2><em>Theme Three</em>: Cool <abbr>URIs</abbr> Don't Change</h2>
      <figure id="Efe-HHsGoJ0U_YOE6JzmOJ">
        <img src="file/cool-uris-dont-change;knockout" alt=""/>
      </figure>
      <blockquote id="EKzJN126b89Uh-cskdBiGL">
        <p><strong>How much value gets lost to broken links?</strong></p>
      </blockquote>
      <p><time>21 years ago</time>, the inventor of the Web <a href="https://www.w3.org/Provider/Style/URI" rel="dct:references">wrote a memo</a>. Its title, infamous in some circles, is the same as this segment. Its message was simple: there is no excuse for broken links, at least within the confines of a given website. Two decades on, this problem has still not been solved&#x2014;or perhaps more accurately, the problem <em>has</em> been solved, it's just that the solution is not evenly distributed.</p>
      <p>In raw technical terms, stable addresses and unbreakable links are not that big of a challenge: I have been running 404-free websites on a shoestring for well over a decade, ever since Sir Tim's memo first came on my radar. While I have developed <em>some</em> techniques over the years, I have yet to make them work past my own idiosyncratic process and infrastructure.</p>
      <p>Deploying this technique is at least as big a design problem&#x2014;and a <em>organizational</em> problem&#x2014;as it is a technical one. First, somebody has to care, and caring about unbreaking links has to be somebody's official responsibility&#x2014;that is to say <dfn>content governance</dfn>. Next, development processes have to be changed&#x2014;in my opinion only slightly&#x2014;to accommodate the policy. Finally, the technical infrastructure needs to be modified, which can be a small job or a prohibitive one, depending on the particular products in use.</p>
      <p>The benefit of exploring this theme is archive-grade reliability for information resources. It's a problem you solve exactly <em>once</em> for your organization, and your users will never again trip on a 404, as long there is an internet.</p>
    </section>
  </body>
</html>
