I try to write all of my own blog material – if I post anything else I will always tell you. I am posting this set of written explanations regarding my 8 rules for Information 2.0. It was written by Lisa Stein from our communications team, who does the most amazing presentations for me and generally makes me look good at keynotes and in front of groups. This was excerpted from a speech I gave a couple of weeks ago. 

It should serve to clarify, in more detail, what I consider will happen as we move to “Information 2.0”



1. Information is decoupled from applications – Information buried within applications has limited value; it can not be utilized by other applications or people. Moving from application-centric to information-centric computing means that the information is not constrained by the application where it resides. Now that information, freed from the application, can be shared and leveraged across the enterprise making it possible to extract value from the information. 

2. Information is accessible via Web Services – Information is only valuable if it’s available and accessible, therefore, information services and Web services must be one and the same. Viewing information as a peer to the application allows for connections from applications to information at the highest levels providing capabilities for managing information more effectively than ever before.

3. Information metadata is integrated with all data – 90% of information is unstructuredinformation such as videos, photos, and music, not suitable for management within a relational database. Adding structure to unstructured information, in the form of metadata, allows for the information to be indexed, queried, and searched. Embedded metadata is the enabler that transforms information from static to dynamic. 

4. Information security is explicit and built in- Firewalls assume two things: Everyone inside your organization is good. And, everyone outside your organization is bad. Rather than building moats, in the form of firewalls, to protect the castle organizations need to protect two things directly; the data and the identity of those using the data regardless of where either reside. 

5. Information optimizations are built in as services – Regardless of the application in use or where to the data resides, decisions about the information must be made: What tier of storage? What protection levels? How is the information backed up? Decoupling information from applications allows services such as tiering, virtualization, and consolidation to be delivered as a set of services to applications. In an information infrastructure optimization is delivered as an information service. 

6. Information is personalized –Every 1000 knowledge workers cost an organization $5.7M as these workers burrow their way through repositories, file systems and archives to find the information they need. The cost of lost, misplaced, or unidentifiable information is exorbitant. Therefore, to create value we must place the right information in front of the right people at the right time based on every individual’s changing needs.

7. Information is delivered both real time and on demand – More and more, information will be delivered two ways; real-time and on demand. However, over time I predict the decline of real-time delivery and the rise of on demand delivery. We will watch first-run movies and network television programs during our own leisure time, not on a network schedule. The capabilities required to facilitate the rise of on demand (more connectivity, more capacity and more bandwidth) are becoming a reality.  

8. Information is simply always available –As we build out information infrastructures with hundreds of applications, thousands – or hundreds of thousands- of users we are entrusted with, not only mission, but life and death critical information. IT systems and architectures must allow for zero downtime. Because you can never be 100% sure of who is accessing what type of information at what time IT infrastructures must never go down. End of story.

Read More