Showing posts with label Security-Access-Control. Show all posts
Showing posts with label Security-Access-Control. Show all posts

Friday, January 04, 2013

Access Control In the Joint Operating Committee


One of the technical issues that need to be resolved in the Preliminary Specification is the manner in which access control to the data and information is managed in the Security & Access Control module. With the corporate model access control is simple, anyone within the firm can share the information that is developed and used within the corporation. Within the Joint Operating Committee, information may be developed from a variety of sources that specific access control to various members of the Joint Operating Committee need to have. This sharing between participants, or pooling as we call it in the Preliminary Specification, would normally not be permitted in the corporate model as the risk of some proprietary loss would be assumed. Our research has determined this risk of loss is immaterial and inconsistent with the needs of an innovative oil and gas industry. The Joint Operating Committee is the representation of the partnership that has been formed to maximise the profits from the property and assets in which each of the participants share. If a pooling of the contributions can not be conducted it will be because of the bureaucrats managing their turf, not from the loss of any proprietary information. What the Security & Access Control module strikes is a balance between harbouring data and information vs. deployment of the right information, by the right people at the right time.

Politics aside we still have a technical issue with respect to the access control of data and information within the Joint Operating Committees a producer / investor may have an interest in. Organizing around the Joint Operating Committee helps by making it the structure that we are focusing on. We are using the Joint Operating Committee as the basis of determining who has and who hasn't the access control rights. By doing this, it is the Joint Operating Committee that determines who has what type of access control rights. An individual that operates in the oil and gas industry, who uses the People, Ideas & Objects application modules would then be granted the necessary access control rights through the Security & Access Control module to the many Joint Operating Committees that they may be authorized by.

In addition to the specific access control privileges People, Ideas & Objects provide two additional levels of security that offer the producer with additional control. The first is the Military Command & Control Metaphor (MCCM) that was developed in the Preliminary Specification and the Oracle technologies that are used to provide the high levels of security in which all of the modules are operated under. The MCCM provides a means for a Joint Operating Committee to implement a command and control structure over the people that are working within the operation. This span of control includes the service industry representatives when they are conducting some operation. The MCCM includes a definable structure, a Job Order system and a manner in which all operations are documented. Again this structure will span the multiple organizations that the people are represented from.

We have talked about the division of labor and specialization that is used to deal with the various issues in the oil and gas industry. How the producer firm is a highly focused earth science and engineering capable organization. That many of the other aspects of the firm or Joint Operating Committee is sourced from service providers who specialize and bill for their services. These people may also need access to the data and information of the producer or Joint Operating Committee and it is with Oracle technologies that we can provide them with the limited access that they require. With Oracle we can grant that limited access to just the one element of data that they need access too, if that is all that is required. We also have high levels of security and specific access privileges that enable the firms most sensitive strategic and planning data and information is kept secret and for only certain users. All of this information can be determined by reading the Security & Access Control module of the Preliminary Specification.

The Preliminary Specification provides the oil and gas investor with the business model for profitable exploration and production. People, Ideas & Objects Revenue Model specifies the means in which investors can participate in these user defined software developments. Users are welcome to join me here. Together we can begin to meet the future demands for energy.

Monday, July 23, 2012

Final - Preliminary Specification - S&AC


I am pleased to begin the posting of the final module specifications of the Preliminary Specification. These will be posted here in the following days and at the end I will reveal the location of the wiki in which they are accessible from. Today's post is the Security & Access Control module. It is one of the smaller modules at 5,570 words, with some of the other modules being over 25,000 words. I will also at this point cease to post every day and will only be posting on every business day. Thank you.

Introduction

The Security & Access Control module is the place where dreams can be shattered or visions soar to fulfill the possibilities. It was suggested in the Draft Specification that the Security & Access Control module be one of the first modules to be developed. That would still be my recommendation.

What we have with using the Joint Operating Committee as the key organizational construct of the innovative oil and gas producer. Is the interactions of many producers and suppliers who are involved in the day to day commercial and strategic concerns of that JOC. What we need to concern ourselves within the Security & Access Control module is that the right people have the right access to the right information with the right authority at the right time and at the right place.

Throughout the Preliminary Specification we discuss one of the premier issues of the oil and gas industry. That being the demand for earth science and engineering effort is increasing with each barrel produced. This is best represented in the steep escalation of the costs involved in the exploration and production of oil and gas. At the same time the critical earth science and engineering resources are somewhat fixed and are difficult to expand in the short to medium term. Add to that, an anticipated retirement of this brain trust in the next twenty years, and the problem becomes of critical concern.

There are few short term solutions to the short fall in geologists and engineers over the next twenty years. It takes the better part of that time to train them to operate in the industry. What we do know are several “things” that are being applied in the People, Ideas & Objects Preliminary Specification. Key to a number of concepts application are what we call the Military Command & Control Metaphor. Which is a method developed in the Security & Access Control module of imposing command and control over any and all Joint Operating Committees, working groups, producer firms or organizations the producer may need to add structure to. The concepts are the further specialization and division of labor, and a reduction in the redundant building of capabilities within each oil and gas producer, or as we describe it, a pooling of resources in the Joint Operating Committee.

The first concept of specialization and division of labor is well known as a principle of economics that brings about greater amounts of economic productivity from the same volume of resources. Given that the volume of earth science and engineering resources are known for the foreseeable future, specialization and the division of labor will provide us with a tangible means in which to deal with the productivity of the oil and gas industry. In today’s marketplace to approach a heightened level of specialization and division of labor without the use of software to define and support it would be downright foolish.

The pooling concept is the solution to the current desire that each producer firm acquires the earth science and engineering capabilities necessary to deal with all the needs of their “operated” properties. This creates unneeded “just-in-time” capabilities for the scarce scientific resources. When each producer within the industry pursues this same strategy substantial redundancies are built into the industries capabilities. Redundancies that are left unused and unusable. What is proposed through the People, Ideas & Objects software application modules is that the producers operational strategy avoids the “operator” concept and begins pooling the technical resources through the partnership represented in the Joint Operating Committee. That way the redundancies that would have been present in the industry can be made available to the producers and used by the producers through an advanced specialization and division of labor.

What these concepts require therefore is what the Security & Access Control module is designed to provide. The system must provide access to the right person at the right time and the right place with the right authority to the right information. With the Military Command & Control Metaphor there will also be a manner in which the technical, and all the resources, that have been pooled from the producers, interact with an appropriate governance and chain of command.

Two Types of Data

When we talk about the various people within the producer firms affiliated with a Joint Operating Committee. And the number of Joint Operating Committees that a firm may have an interest in. And the number of people a firm may have employed. Access control becomes challenging. It becomes a challenge when you consider that your people certainly should have the access that you require, but the level of trust that you may have with respect to the other partner organizations is probably not as strong. This is how People, Ideas & Objects deal with the access and trust issue in the Security & Access Control module.

When we concern ourselves with the data and information of the firm, and the information that is cleared from the various Joint Operating Committees that the oil and gas producer has an interest in. We can all agree that this information is proprietary and is subject to the internal policies of each producer firm. (Information such as reserves data, accounting information, internal reports and correspondence, strategy documents.) What we are also concerned about is the information and data that is held in the Accounting Voucher module and the associated data that is common to the joint account. (well licenses, agreements, production data, capital and operating costs, revenue and royalties.)

Closer analysis of these two types of data and information that are held within the firm and the Joint Operating Committee fall within the proprietary and partnership domains. In Canada at least, most of the data and information in a Joint Operating Committee can be freely obtained through various regulatory agencies. Nonetheless, the majority of the data is shared through the partnership, vendors, contract purchasers and a variety of other groups who have an interest in the data and information. Not so for the producer firms data. Most of the information is kept close at hand and is only reported through filtered reserve report summaries and annual reports. Therefore keeping a handle on proprietary data, while operating the Joint Operating Committee as the key organizational construct of the innovative oil and gas producer, as proposed in People, Ideas & Objects, does not present any data leakage.

Access control can therefore be limited by precluding any company personnel from viewing any other companies files. While in People, Ideas & Objects access control is limited to the Joint Operating Committees of the firm and the firms files only. To extend this further we would have access control limited to the appropriate roles within the firm, then it is a matter for the user community to define a standard set of generic roles in which access is required to certain data types. This would also apply to the types of operations that can be handled by that role, for example, read, insert, update, delete. These generic roles could then be assigned to each individual within the organization based on their needs. Assigning multiple roles for more complex access. Access to your proprietary data would be for your company’s personnel eye’s only.

More on the MCCM

People, Ideas & Objects development of the Military Command & Control Metaphor (MCCM) of the Security & Access Control module is not without some historical context. Before the hierarchy, which I perceive as somewhat of a commercial development of the 20th century, there was only the military structure in terms of large organizations. The main difference between the two is rather subtle but significant. The military structure is much broader and flatter then the hierarchy. That is one of the ideals that we are seeking, but the more important feature is the ability for the chain of command to span multiple internal and external organizational structures.

If we analyze the U.S. Military we find a number of interesting attributes of using the military chain of command that will provide value in the use of People, Ideas & Objects software applications. First is the title and assignment of an individual in the military.  For example, “Sgt. Richard Knuth, Company A, Brigade Special Troops Battalion, 3rd Heavy Brigade Combat Team, 3rd Infantry Division.” A similar title and assignment for the people within a Joint Operating Committee would help to clarify the role and responsibilities, authority and capabilities the individual would have within the JOC. For example this individual might have the following “Richard Knuth, Chief Engineer, Field Straddle, Elmworth. Irrespective of which firm this individual is from each of the participants, and the People, Ideas & Objects system, would recognize that the authority of a Chief Engineer was the same throughout the industry and that the designation of Chief Engineer entitled the individual to authorize the appropriate actions.

Now this is not fundamentally different from how the industry operates today. What is different is the ability to operate in a fashion where the interactions between the producers in the JOC are done as if they were all employed by the JOC. Where multiple producer firms are contributing many full time staff to the JOC. This interaction between producers through the JOC can only be replicated if there is a recognizable chain of command between the firms that make up the JOC. In addition to the recognizable chain of command each organization must have additional governance concerns handled, and compliance plays a big part in this as well. (We will talk more about these in the Compliance & Governance module.) That although it would be an easy thing to implement from a people point of view, the actual implementation of pooling the staff from multiple organizations becomes complex when we consider all of the implications. However, with the Information Technologies that exist today, and the issues of the shortages of earth science and engineering talent we have few choices but to pursue this pooling concept.

The nature of the people that will be working through the chain of command that is layered over the Joint Operating Committee will include all of the disciplines that are involved in the oil and gas industry. The contributions of staff, financial and technical resources will include everyone that is employed by the industry today. I can foresee many of the office buildings being refurbished to accommodate the staff of a single JOC. There the staff from the different producers would be seconded to work for the JOC, working at a single JOC not at any particular producer firm.

In previously discussing the Military Command & Control Metaphor (MCCM). I noted this inter and intra organizational use of the MCCM was similar to that used by NATO. That armies of the various countries could work together and recognize personnel from each other's armies and immediately recognize and use the same chain of command. Unfortunately then came Libya and the failure of NATO may be well at hand. And the unfortunate parallel may be seen as a striking example as why the MCCM might not work in People, Ideas & Objects. I think otherwise as the Joint Operating Committee is the financial framework of the industry. This means that all of the members of a JOC are equally driven by their financial interests. And that financial interest drives consensus. Therefore, the analogy to Libya would be inappropriate as their objective is not financially driven and the NATO members can not form a consensus on what the objective is. The point in using the NATO example was to show the ability to recognize the chain of command spanning multiple organizations. Not to submit that countries driven by politically different philosophies could agree militarily.


Access, Roles and Responsibilities

This topic discusses the manner in which authorizations, roles and responsibilities are handled in the Security & Access Control module of the Preliminary Specification. We should also discuss, the topic of delegating the authority and responsibility during absences, which is something that can come up at any time.

As background we should recall that each individual would have different access levels and authorizations in terms of access to the People, Ideas & Objects systems. Assuming different roles and responsibilities would impose different access levels to data, information, processes and functionality. On top of that, the Security & Access Control module is the key module for imposing the Military Command & Control Metaphor throughout the People, Ideas & Objects application modules. This structure, particularly in a Joint Operating Committee, would work to weave the multiple producer firms under one chain of command. It also provides an interface to ensure the coverage of all the processes were “manned” to ensure compliance, governance and overall completeness of the process.

Throughout the Preliminary Specification there is the perception of a heightened role for technology in terms of enabling the authorization to conduct operations within the system. That is to say the ability to do things and get things done is through the collaborations with partners and to authorize actions through participation in the processes managed by the systems. This participation dictates that the designation of the roles in the Security & Access Control module “means” more than just data access; it also imputes authority and responsibility to undertake actions on behalf of Joint Operating Committees and / or producer firms.

It would also be necessary to be able to assign this authority within the Security & Access Control module during any absence. If someone with authority and responsibility were to be away for whatever reason, they should be able to assign their authority to another person to fill that role while they are away. This will ensure that the process isn’t held up during their absence. Delegations of authority have been used for years in larger firms and with a system that imposes the authorizations and responsibilities on specific roles, the ability to temporarily move them down, across or up the chain of command is a necessity to keep the organization functioning.

Lastly we should talk about the interface that helps to identify the missing elements of a process. It would simply show the command structure of the people who are assigned to a Joint Operating Committee or to a process and their related role, authorizations and responsibilities. If someone was to be away then it would show who was taking over their role. It would also help to identify how you could impose the chain of command to fill the void of any vacancies. This would be particularly important if the role or process was needed to be documented for compliance purposes.

People, Ideas & Objects and Oracle Corporation

Starting with the Security & Access Control module we find that Oracle Corporation have a comprehensive suite of applications that provide for the security and access control that we are looking for. Falling under the Oracle Identity Management brand name. These products include tools for Access Management, Identity Administration, Directory Services and Governance. These product classifications come in a variety of different products and are configured in some specialty industry and management suites.

Two areas that are going to be challenging are going to be the Military Command & Control Metaphor (MCCM) and the inter-relatedness of the Joint Operating Committee and service industry representatives. Early on in the specification we noted a number of research areas that were needed to be conducted. These are two areas that will take some research dollars to resolve. To have the MCCM recognize members of different organizations will not be the challenge. To engage them and have them interact in the manner that we expect them to when we expect them to, will.

Oracle Identity Management resides within the Oracle Fusion Middleware product layer. As we indicated earlier in the Preliminary Specification this is Oracle’s Java Enterprise Server. Therefore these applications are open to be tailored to the user’s needs. So when we do sit down with Oracle and define the Security & Access Control module based on the user needs. These needs can be accommodated by the technologies that we have selected.

And it is through the efforts of the user community that we will resolve these issues. It is also one of the reasons that the budgets of People, Ideas & Objects software developments are where they are. We will have challenges to resolve in delivering these innovative systems to the industry. I would also remind producers that our value proposition sees the one time costs of these developments amortized over our subscribing base of producers. Yet each one of those producers receives the full scope of that development effort in terms of the software application.

We now look into the Oracle product classification of Access Management. Included in the Access Management classification are the following products; Oracle Access Manager, Oracle Adaptive Access Manager, Oracle Entitlements Server, Oracle Identity Federation and Oracle Enterprise Single Sign-On Suite. Each of these products will be included in the Preliminary Specification as they have components that are required for the day to day use by the users, producers and Joint Operating Committees.

One area that I was surprised to learn that Oracle had been working on was in the area of working with partners, vendors and suppliers. Within the Oracle Access Manager it is noted that they are able to provide... “Building federated user communities that span company boundaries.” These are the beginning of both the pooling and Military Command & Control Metaphor (MCCM) that are critical to resolving so many of the issues that the oil and gas industry faces.

On the heels of Oracle Access Manager is their Adaptive Access Manager which takes the concept of intra partner interactions further with “Oracle Adaptive Access Manager makes exposing sensitive data, transactions and business processes to consumers, remote employees or partners via your intranet and extranet safer.” This is the nature of business in the future. Working with your partners, as is done in the Joint Operating Committee, is an effective means of reducing costs and increasing innovation in any industry. It’s only reasonable that the technologies are beginning to emulate these needs. In addition Oracle Adaptive Access Manager takes the level of security and authentication to a higher level. As a result, our demands regarding the pooling concept and the MCCM, I feel, will be less of a technical risk for the People, Ideas & Objects Preliminary Specification and subsequent developments.

The next application is the Oracle Entitlement Server which provides a dynamic access control element to the applications that use the server. Instead of hard wiring access control privileges into each application and user, you can dynamically generate them using the Oracle Entitlement Server. “The solution can manage complex entitlement policies with a standalone server or with a distributed approach that embeds information at the application level.” So when it needs to be determined if user X has access to Joint Operating Committee Y, a decision from the entitlement server, based on criteria within the application, can be made. If this information changes then the user would be denied access. This provides greater security based on policies and reduces the amount of detailed specific software development that is difficult, time consuming, and costly to maintain.

Federated Identities are also a major part of how the pooling concept and MCCM are implemented in the Preliminary Specification. Oracle Identity Federation provides high levels (attribute federation) to the applications that use it. We have specified in many of the modules, such as the Resource Marketplace module, the use of Federated Identities. Situations like where the contact and other information is maintained by the vendor. That information is comprehensive in nature and includes key organizational contacts, calendars and scheduling information. Working with the partners in the Joint Operating Committee and the representatives of the service industry in this way will effectively mitigate many of the technical software development issues we have.

One area that we will continue to face challenges however is in the Work Order. The ability to dynamically put together a working group to study some earth science or engineering research subject is critical to the innovative oil and gas producer. These are ad-hoc and made with partners that you may have no history with. Federated Identities will provide you with some of the information you need to form the partnership and grant application access, however, there is still the pooling of and sourcing of costs, and budgets which is the bureaucratic nightmare that mitigates and destroys the motivation for these working groups to form. We need to make sure these roadblocks do not get in the way. We have proposed to overcome these issues by developing an intuitive interface for the users forming the working group.

The last thing we want our users to be involved in is some form of mindless security access maze. Oracle Enterprise Single Sign-On Suite Plus promises to keep this from happening. Logging onto and off of systems as the user proceeds through the various modules and components of the applications is a must have. This product also promises the ability to provide this level of service on a remote basis. Which is much needed.

Oracle Identity Manager which will be used as the base product for role and identity management will also be the base of the Military Command & Control Metaphor for the People, Ideas & Objects Preliminary Specification. It is part of the Oracle Fusion Middleware product offering and as such is part of their Java Enterprise Server. Therefore we are able to build off the functionality that exists and enhance it with the user community's needs. Building off of the functionality will be somewhat limited as many of the concepts that are inherent in the MCCM are already captured in the Oracle Identity Manager.

Oracle Identity Manager is a highly flexible and scalable enterprise identity administration system that provides operational and business efficiency by providing centralized administration & complete automation of identity and user provisioning events across enterprise as well as extranet applications. It manages the entire identity and role lifecycle to meet changing business and regulatory requirements and provides essential reporting and compliance functionalities. By applying the business rules, roles, and audit policies, it ensures consistent enforcement of identity based controls and reduces ongoing operational and compliance costs

Oracle Internet Directory and Oracle Virtual Directory product offerings are up next. A little off topic but Oracle Internet Directory is a relational database derived directory server. That Oracle is providing the marketplace a directory server based on relational database technology speaks to the power of their relational database. They claim they have the performance for two billion users. I see advantages of using this product over their traditional directory server and have therefore selected it for the Preliminary Specification. It will provide us with some flexibility when we ask some of the comprehensive and demanding questions of the technologies.

Oracle Internet Directory could be deployed as an industry wide, and by that I mean oil and gas and service industry wide directory server. There it can integrate with the information that is held in other Oracle products, such as Oracle Identity Manager which would be deployed at the producer firm, Joint Operating Committee and service industry representative level. I think we could provide large volumes of information consisting of everything that exists in the industry. The producers, service industry, Joint Operating Committees, the people who work within the industry, etc. Because this is a database we have some interesting opportunities here.

And Oracle Virtual Directory may be the beginning of optimizing the relational database opportunities. So what we will have is a global database of names within the Oracle Internet Directory and these will relate to the information contained with Oracle Identity Manager and other applications. What Oracle Virtual Directory will provide us with is a seamless way in which to browse, and for applications to see, these datastores as one.

Within the Preliminary Specification we want to access the contact information of the people or firm that provide services or products to the producers or Joint Operating Committees. As we indicated we want the individuals and service industry providers to maintain their own contact and basic data. These will be maintained in the Oracle Internet Directory for each and every producer or Joint Operating Committee to access the most recent and up to date information. This will save an immense amount of time on behalf of the producers and Joint Operating Committees, as well as the individuals and service industry providers. When looking for someone the search capabilities will be significant as we have added the “Vendor / Supplier Contact Database” and the “Actionable Information Interface” to this base data in the Resource Marketplace module.

Now we want to look into Oracle Identity Analytics as part of the Security & Access Control module of the Preliminary Specification. The primary purpose of this application is to provide governance over the access privileges granted to the users of the People, Ideas & Objects application modules. Many of the functions and processes that are provided in Oracle Identity Analytics are either necessary or of significant value that it has been included in the Preliminary Specification.

The first area is the “why and how” of the users access. Providing documentation of what information was accessed by what users and if any of the access violates any of the established policies. Ensuring that data access by users is compliant with the corporate and application policies, that users are not unnecessarily being abused by overtly secure systems and overall good corporate governance is achieved. All of the data that is collected during data access, that is the “why and how” of the users access. Is compiled in a “Data Warehouse” for further analytical analysis and querying. This will help to show trends and usage patterns that will form new policies and procedures and security provisions.

Another useful function within the Oracle Identity Analytics application is the Segregation of Duties feature. In many areas of a corporation, certain process functions must be undertaken by specific individuals and in some cases different individuals. This feature provides for that assurance. It is also Sarbanes-Oxley compliant. This is important when the Joint Operating Committee is small, as we mentioned the other day. And we have to assign many roles to a few individuals. This application will ensure that the processes provide the appropriate governance is maintained by segregating the roles that need to be kept apart for compliance purposes.

There is a comprehensive and customizable dashboard interface for the users of the Oracle Identity Analytics software to analyze the data and particularly the data warehouse. Filled with reports and data that an effective user can use to determine where and how the People, Ideas & Object producer client might be susceptible to access control violations.

The last feature that I want to highlight is what Oracle calls their Role Lifecycle Management. This provides the Oracle Identity Analytics user with the ability to do “what if” analysis in terms of the implications to identities and roles within the People, Ideas & Objects application. It also contains a role change approval process, role versioning and a role rollback feature. These will be needed in determining and maintaining the Military Command & Control Metaphor.

We now step down from the Oracle Fusion Middleware layer to the actual Oracle Database for some of the security features that we seek. The first product in this stack is Oracle Advanced Security. It provides the authentication, and encryption of both the database and the network activity. It is possible, and I highly recommend that all the data and information that is used in the People, Ideas & Objects application modules be encrypted in the database and on the network. This increases the load on the systems and will require additional effort in terms of key management, however, I think the nature of the data and information and the manner in which the applications are provided, a “cloud based” solution, this level of security is necessary.

Oracle Audit Vault is another product that I recommend for the Preliminary Specification. It provides a central location and management of the audit information for compliance purposes. Giving our users the ability to manage the data, information, privacy policies and security. Oracle Audit Vault is also Sarbanes Oxley compliant.

This next Oracle product is a definite addition to the Preliminary Specification. Oracle Label Security will work in many different ways within the modules however here is how I see just two examples. What the application does is designate certain individuals with higher level security clearances. It also designates certain data fields with certain levels of security clearances. Those with high enough security clearances and appropriate authorizations are then able to read these database fields. Within the People, Ideas & Objects application we want to make sure that the reserves, accounting information and strategy discussions of each producer firm remain confidential to a select group of individuals within that firm. With Oracle Label Security that is possible. We also want to ensure that the appropriate people within the chain of command in the Military Command & Control Metaphor have access to the appropriate materials to make the appropriate decisions. This will allow those individuals to have access to these materials without making it available to everyone in the chain of command.

Although not that pertinent to the users of the People, Ideas & Objects applications we have also included Oracle Configuration Management, Oracle Database Firewall and Oracle Database Vault as part of the Preliminary Specification. These will help to keep the applications and the Oracle Database running as they should. Oracle Configuration Management will determine if there is a change in the configuration, either a patch, or if something has gone wrong it will correct itself back to the specified configuration. Ensuring that what is promised to the users of People, Ideas & Objects is what is provided. Oracle Database Firewall ensures no SQL statements that are inconsistent with the users or applications are passed through to the database. And Oracle Database Vault provides the ability to have only certain IP addresses or users to run certain SQL commands and to lock databases from having any operations being conducted on them.

Backing up your data and information are two of Oracle’s strengths. They provide excellent tools for this in Oracle Secure Backup. With the database being encrypted it is interesting that the backup is of the encrypted database. What we will need to do in the Preliminary Specification is to determine in great detail what precisely will be the backup strategy that will be used for the People, Ideas & Objects application.

Lastly there is Oracle Total Recall. A product that helps in accessing historical data. Oracle Fusion Applications provides some interesting solutions with respect to how they handle legacy applications and we will get into those as we proceed through the Preliminary Specification.

Conclusion


It is important to remember here in the Security & Access Control module of the Preliminary Specification. That the role and identity based Military Command & Control Metaphor (MCCM) as has been conceived here has not been implemented, developed or conceived of anywhere else before. We are taking the concept and technology of role and identity based management to the next level with the MCCM.

Why are we bothering with the MCCM and the pooling of the resources in the Joint Operating Committee anyways? The issue that we are resolving is the finite number of earth science and engineering resources that are available to the industry. With the anticipated retirement levels in the next 20 years. With the time requirements to bring on new levels of resources. And most importantly with the demands for more energy, and the demands for more earth science and engineering in each barrel of oil equivalent produced. We face a long term shortage of these critical resources. The need to organize the industry, to exploit specialization and division of labor are necessary to expand the output from the same number of resources. That begins with the Joint Operating Committee. And that imputes that we have contributions of earth scientists and engineers from multiple producers working together to meet the objectives of the Joint Operating Committee. Therefore we need a means in which they can organize themselves and that is the Military Command & Control Metaphor.

How the MCCM will be implemented will be determined by the user community. However, I can speculate that the Joint Operating Committee will have standard roles and identities that are used throughout the industry. This standardization will probably be necessary for the purposes of making the technology work. The need to have the various areas “covered off” in terms of compliance and other requirements will require a standard template be used by everyone. Then everyone will know that that position is responsible for that role and responsibility. When Joint Operating Committees are small and have only a few people assigned, then multiple roles can be assigned to one individual.

With the natural division in the types of information that are held within a producer and Joint Operating Committee. Producers will know that the Preliminary Specification will be able to deliver the right information to the right people at the right time. That leakage of their proprietary information can be mitigated by isolating the companies data, due to its unique nature and Oracle Label Securities ability to restrict access to database fields.

Oracle’s products provide a strong layer of mission critical capabilities in the Security & Access Control module. Although this comes with additional costs, I am certain that no one will argue with the quality and secure knowledge that these products bring.

Tuesday, June 05, 2012

The Preliminary Specification Part CCLXXXIII (S&AC Part XIII)


We now step down from the Oracle Fusion Middleware layer to the actual Oracle Database for some of the security features that we seek. The first product in this stack is Oracle Advanced Security. It provides the authentication, and encryption of both the database and the network activity. It is possible, and I highly recommend that all the data and information that is used in the People, Ideas & Objects application modules is encrypted in the database and on the network. This increases the load on the systems and will require additional effort in terms of key management, however, I think the nature of the data and information and the manner in which the applications are provided, a “cloud based” solution, this level of security is necessary.

Oracle Audit Vault is another product that I would recommend for the Preliminary Specification. It provides a central location and management of the audit information for compliance purposes. Giving our users the ability to manage the data, information, privacy policies and security. Oracle Audit Vault is also Sarbanes Oxley compliant.

This next Oracle product is a definite addition to the Preliminary Specification. Oracle Label Security will work in many different ways within the modules however here is how I see just two examples. What the application does is designate certain individuals with higher level security clearances. It also designates certain data fields with certain levels of security clearances. Those with high enough security clearances and appropriate authorizations are then able to read these database fields. Within the People, Ideas & Objects application we want to make sure that the reserves, accounting information and strategy discussions of each producer firm remain confidential to a select group of individuals within that firm. With Oracle Label Security that is possible. We also want to ensure that the appropriate people within the chain of command in the Military Command & Control Metaphor have access to the appropriate materials to make the appropriate decisions. This will allow those individuals to have access to these materials without making it available to everyone in the chain of command.

Although not that pertinent to the users of the People, Ideas & Objects applications we have also included Oracle Configuration Management, Oracle Database Firewall and Oracle Database Vault as part of the Preliminary Specification. These will help to keep the applications and the Oracle Database running as they should. Oracle Configuration Management will determine if there is a change in the configuration, either a patch, or if something has gone wrong it will correct itself back to the specified configuration. Ensuring that what is promised to the users of People, Ideas & Objects is what is provided. Oracle Database Firewall ensures no SQL statements that are inconsistent with the users or applications are passed through to the database. And Oracle Database Vault provides the ability to have only certain IP addresses or users to run certain SQL commands and to lock databases from having any operations being conducted on them.

Backing up your data and information are two of Oracle’s strengths. They provide excellent tools for this in Oracle Secure Backup. With the database being encrypted it is interesting that the backup is of the encrypted database. What we will need to do in the Preliminary Specification is to determine in great detail what precisely will be the backup strategy that will be used for the People, Ideas & Objects application.

Lastly there is Oracle Total Recall. A product that helps in accessing historical data. Oracle Fusion Applications provides some interesting solutions with respect to how they handle legacy applications and we will get into those as we proceed through the Preliminary Specification. Let us leave the discussion at this point with the addition of Oracle Total Recall in the Preliminary Specification and note that tomorrow we will begin the fifth or Oracle pass through the Resource Marketplace module.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Monday, June 04, 2012

The Preliminary Specification Part CCLXXXII (S&AC Part XII)


Today we look into Oracle Identity Analytics as part of the Security & Access Control module of the Preliminary Specification. The primary purpose of this application is to provide governance over the access privileges granted to the users of the People, Ideas & Objects application modules. Many of the functions and processes that are provided in Oracle Identity Analytics are either necessary or of significant value that it has been included in the Preliminary Specification.

The first area is the “why and how” of the users access. Providing documentation of what information was accessed by what users and if any of the access violates any of the established policies. Ensuring that data access by users is compliant with the corporate and application policies, that users are not unnecessarily being abused by overtly secure systems and overall good corporate governance is achieved. All of the data that is collected during data access, that is the “why and how” of the users access. Is compiled in a “Data Warehouse” for further analytical analysis and querying. This will help to show trends and usage patterns that will form new policies and procedures and security provisions.

Another useful function within the Oracle Identity Analytics application is the Segregation of Duties feature. In many areas of a corporation, certain process functions must be undertaken by specific individuals and in some cases different individuals. This feature provides for that assurance. It is also Sarbanes-Oxley compliant. This is important when the Joint Operating Committee is small, as we mentioned the other day. And we have to assign many roles to a few individuals. This application will ensure that the processes provide the appropriate governance is maintained by segregating the roles that need to be kept apart for compliance purposes.

There is a comprehensive and customizable dashboard interface for the users of the Oracle Identity Analytics software to analyze the data and particularly the data warehouse. Filled with reports and data that an effective user can use to determine where and how the People, Ideas & Object producer client might be susceptible to access control violations.

The last feature that I want to highlight is what Oracle calls their Role Lifecycle Management. This provides the Oracle Identity Analytics user with the ability to do “what if” analysis in terms of the implications to identities and roles within the People, Ideas & Objects application. It also contains a role change approval process, role versioning and a role rollback feature. These will be needed in determining and maintaining the Military Command & Control Metaphor.

Tomorrow we will be taking a step down from the Fusion Middleware layer, where all of the access control applications have been residing, to the Oracle Database itself to review the specific security provisions.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification. 

Sunday, June 03, 2012

The Preliminary Specification Part CCLXXXI (S&AC Part XI)


Some people may be wondering with the co-mingling of Oracle products within the Preliminary Specification what the implications are with respect to Intellectual Property (IP). The answer is simple, what is Oracle’s is clearly Oracle’s and what is the IP of the Preliminary Specification is clearly the Preliminary Specifications. In my dealings with Oracle in the past they have not been difficult in this area. As a matter of fact I would state that they have been very generous. Giving us very valuable technology that was provided matter of fact at no cost and with no expectations of any future revenues. All of our agreements with them renounced the IP to our firm. There are however cost implications in having the Oracle products as part of the Preliminary Specification.

Therefore I expect that a user in the People, Ideas & Objects application modules will seamlessly be alternating between some Oracle products, some Oracle products that have been heavily modified by People, Ideas & Objects and areas where only People, Ideas & Objects developers have worked. This will be less “violent” to the user then it initially sounds. All of these products will have the same look and feel and will be subject to the same user interface guidelines.

Today we want to discuss the Oracle Internet Directory and Oracle Virtual Directory product offerings in the Security & Access Control module. A little off topic but Oracle Internet Directory is a relational database derived directory server. That Oracle is providing the marketplace a directory server based on relational database technology speaks to the power of their relational database. They claim they have the performance for two billion users. I see advantages of using this product over their traditional directory server and have therefore selected it for the Preliminary Specification. It will provide us with some flexibility when we ask some of the comprehensive and demanding questions of the technologies.

Oracle Internet Directory could be deployed as an industry wide, and by that I mean oil and gas and service industry wide directory server. There it can integrate with the information that is held in other Oracle products, such as Oracle Identity Manager which would be deployed at the producer firm, Joint Operating Committee and service industry representative level. I think we could provide large volumes of information consisting of everything that exists in the industry. The producers, service industry, Joint Operating Committees, the people who work within the industry, etc. Because this is a database we have some interesting opportunities here.

And Oracle Virtual Directory may be the beginning of optimizing the relational database opportunities. So what we will have is a global database of names within the Oracle Internet Directory and these will relate to the information contained with Oracle Identity Manager and other applications. What Oracle Virtual Directory will provide us with is a seamless way in which to browse, and for applications to see, these datastores as one.

Within the Preliminary Specification we want to access the contact information of the people or firm that provide services or products to the producers or Joint Operating Committees. As we indicated we want the individuals and service industry providers to maintain their own contact and basic data. These will be maintained in the Oracle Internet Directory for each and every producer or Joint Operating Committee to access the most recent and up to date information. That is assuming the individual or company providing the service keeps their address and telephone numbers up to date in the directory. This will save an immense amount of time on behalf of the producers and Joint Operating Committees, as well as the individuals and service industry providers. When looking for someone the search capabilities will be significant as we have added the “Vendor / Supplier Contact Database” and the “Actionable Information Interface” to this base data in the Resource Marketplace module.

Having the Oracle Internet Directory reference the Oracle Identity Manager through a Primary Key constraint on the individual's name attribute would be an ideal situation. Then the two databases would be in harmony; and I’m dreaming in technicolor and therefore will stop here.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Saturday, June 02, 2012

The Preliminary Specification Part CCLXXX (S&AC Part X)


It is important to remember here in the Security & Access Control module of the Preliminary Specification. That the role and identity based Military Command & Control Metaphor (MCCM) as has been conceived here has not been implemented, developed or conceived of anywhere else before. We are taking the concept and technology of role and identity based management to the next level with the MCCM.

Why are we bothering with the MCCM and the pooling of the resources in the Joint Operating Committee anyways? The issue that we are resolving is the finite number of earth science and engineering resources that are available to the industry. With the anticipated retirement levels in the next 20 years. With the time requirements to bring on new levels of resources. And most importantly with the demands for more energy, and the demands for more earth science and engineering in each barrel of oil equivalent produced. We face a long term shortage of these critical resources. The need to organize the industry to exploit the specialization and division of labor are therefore necessary to expand the output from the same number of resources. That begins with the Joint Operating Committee. And that imputes that we have contributions of earth scientists and engineers from multiple producers working together to meet the objectives of the Joint Operating Committee. Therefore we need a means in which they can organize themselves and that is the Military Command & Control Metaphor.

How the MCCM will be implemented will be determined by the user community. However, I can speculate that the Joint Operating Committee will have standard roles and identities that are used throughout the industry. This standardization will probably be necessary for the purposes of making the technology work. The need to have the various areas “covered off” in terms of compliance and other requirements will require a standard template be used by everyone. Then everyone will know that that position is responsible for that role and responsibility. When Joint Operating Committees are small and have only a few people assigned, then multiple roles can be assigned to one individual.

Today we want to discuss Oracle Identity Manager which will be used as the base product for role and identity management. It will also be the base of the Military Command & Control Metaphor for the People, Ideas & Objects Preliminary Specification. It is part of the Oracle Fusion Middleware product offering and as such is part of their Java Enterprise Server. Therefore we are able to build off the functionality that exists and enhance it with the user community's needs. Building off of the functionality will be somewhat limited as many of the concepts that are inherent in the MCCM are already captured in the Oracle Identity Manager.

Oracle Identity Manager is a highly flexible and scalable enterprise identity administration system that provides operational and business efficiency by providing centralized administration & complete automation of identity and user provisioning events across enterprise as well as extranet applications. It manages the entire identity and role lifecycle to meet changing business and regulatory requirements and provides essential reporting and compliance functionalities. By applying the business rules, roles, and audit policies, it ensures consistent enforcement of identity based controls and reduces ongoing operational and compliance costs

Needless to say the Oracle Identity Manager will need to be a necessary part of the Preliminary Specification. There is an element of governance within this application, however, we will be talking about that in a few days, tomorrow we will be talking about Directory Services.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Friday, June 01, 2012

The Preliminary Specification Part CCLXXIX (S&AC Part IX)


Today we look into the Oracle product classification of Access Management. This is part of our review of Oracle products for the Security & Access Control module of the Preliminary Specification. Included in the Access Management classification are the following products; Oracle Access Manager, Oracle Adaptive Access Manager, Oracle Entitlements Server, Oracle Identity Federation and Oracle Enterprise Single Sign-On Suite. Each of these products will be included in the Preliminary Specification as they have components that are required for the day to day use by the users, producers and Joint Operating Committees.

One area that I was surprised to learn that Oracle had been working on was in the area of working with partners, vendors and suppliers. Within the Oracle Access Manager it is noted that they are able to provide “Building federated user communities that span company boundaries”. These are the beginning of both the pooling and Military Command & Control Metaphor (MCCM) that are critical to resolving so many of the big issues that the oil and gas industry faces.

On the heels of Oracle Access Manager is their Oracle Adaptive Access Manager which takes the concept of intra partner interactions further with “Oracle Adaptive Access Manager makes exposing sensitive data, transactions and business processes to consumers, remote employees or partners via your intranet and extranet safer.” This is the nature of business in the future. Working with your partners, as is done in the Joint Operating Committee, is an effective means of reducing costs and increasing innovation in any industry. It’s only reasonable that the technologies are beginning to emulate these needs. In addition Oracle Adaptive Access Manager takes the level of security and authentication to a higher level. As a result our demands regarding the pooling concept and the MCCM, I feel, will be less of a technical risk for the People, Ideas & Objects Preliminary Specification.

The next application is the Oracle Entitlement Server which provides a dynamic access control element to the applications that use the server. Instead of hard wiring access control privileges into each application and user you can dynamically generate them using the Oracle Entitlement Server. “The solution can manage complex entitlement policies with a standalone server or with a distributed approach that embeds information at the application level.” So when it needs to be determined if user x has access to Joint Operating Committee y, a decision from the entitlement server, based on criteria within the application, can be made. If this information changes then the user would be denied access. This provides greater security based on policies and reduces the amount of detailed specific software development that is difficult, time consuming, and costly to maintain.

Federated Identities are also a major part of how the pooling concept and MCCM are implemented in the Preliminary Specification. Oracle Identity Federation provides high levels (attribute federation) to the applications that use it. We have specified in many of the modules, such as the Resource Marketplace module, the use of Federated Identities. Situations like where the contact and other information is maintained by the vendor. That information is comprehensive in nature and includes key organizational contacts, calendars and scheduling information. Working with the partners in the Joint Operating Committee and the representatives of the service industry in this way will effectively mitigate many of the technical software development issues we have.

One area that we will continue to have difficulty however is in the Work Order. The ability to dynamically put together a working group to study some earth science or engineering research subject is critical to the innovative oil and gas producer. These are ad-hoc and made with partners that you may have no history with. Federated Identities will provide you with some of the information you need to form the partnership and grant application access, however, there is still the pooling of and sourcing of costs, and budgets which is the bureaucratic nightmare that mitigates and destroys the motivation for these working groups to form. We need to make sure these roadblocks do not get in the way.

The last thing we want our users to be involved in is some form of security access hell. Oracle Enterprise Single Sign-On Suite Plus promises to keep this from happening. Logging onto and off of systems as the user proceeds through the various modules and components of the applications is a must have. This product also promises the ability to provide this level of service on a remote basis. Much needed.

As we can see the technical risk associated with the Preliminary Specification dropped a few points today. I’m sure it will continue to do so. Tomorrow we will move onto the Oracle Identity Administration product.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Thursday, May 31, 2012

The Preliminary Specification Part CCLXXVIII (S&AC Part VIII)


And now we begin our fifth pass through the Preliminary Specification. Starting with the Security & Access Control module we find that Oracle Corporation have a comprehensive suite of applications that provide for the security and access control that we are looking for. Falling under the Oracle Identity Management brand name. These products include tools for Access Management, Identity Administration, Directory Services and Governance. These product classifications come in a variety of different products and are configured in some specialty industry and management suites.

What will need to be done in the Preliminary Specification is to breakdown in detail the requirements of the user community. Starting with the determination of the scope of the application, that is what is the geographic, scope and scale of the People, Ideas & Objects application modules needs here in the Preliminary Specification. From there we will know what the user will need in terms of the actual security and access control requirements. Matching those specific needs with those detailed in the Oracle product categories we will be able to sit down with the Oracle people and draw up a development plan on how to meet the users requirements for the Security & Access Control module. Remember the producers, Joint Operating Committees, service industry representatives are all critical members of the user community.

Two areas that we are going to have difficulties are going to be the Military Command & Control Metaphor (MCCM) and the inter-relatedness of the Joint Operating Committee and service industry representatives. Early on in the specification we noted a number of research areas that were needed to be conducted. These are two areas that will take some research dollars to resolve. To have the MCCM recognize members of different organizations will not be the difficulty. To engage them and have them interact in the manner that we expect them to when we expect them to, will. With respect to the access control of who has access to a Joint Operating Committee. Each user may have to have an encrypted “access control list” of Joint Operating Committees they have authorized access to. And they are only authorized to access JOC’s on that list. These user access control lists being part of the authorization by the chairman of the Joint Operating Committee.

Oracle Identity Management resides within the Oracle Fusion Middleware product. As we indicated earlier in the Preliminary Specification this is Oracle’s Java Enterprise Server. Therefore these applications are open to be tailored to the user’s needs. So when we do sit down with Oracle and define the Security & Access Control module based on the user needs. These needs can be accommodated by the technologies that we have selected.

And it is through the efforts of the user community that we will resolve these issues. It is also one of the reasons that the budgets of People, Ideas & Objects software developments are where they are. We have issues to resolve in delivering these innovative systems to the industry. I would also remind producers that our value proposition sees the one time costs of these developments amortized over our subscribing base of producers. Yet each one of those producers receives the full scope of that development effort in terms of the software application.

Tomorrow we’ll look a little closer at the Oracle Access Management tool.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Wednesday, May 30, 2012

The Preliminary Specification Part CCLXXVII (S&AC Part VII)


It has been a while since we wrote anything specific about the Security & Access Control module of the Preliminary Specification. It is maybe a generic module that has a fixed level of functionality and process management in comparison to the other modules. Our review to date has been about innovation and organizational change. And these topics have not necessarily been consistent with what Security & Access Control are all about.

In reviewing the posts to this point I want to highlight a few of the things that have to be the important features of the module. We are providing the Security & Access Control to the right people, who have the right access to the right information with the right authority at the right time and at the right place. What we know about relational databases, that they are based on predicate calculus and set theory, makes them ideal for enabling this access in the context of the Joint Operating Committee.

It is in the Security & Access Control module that the Military Command & Control Metaphor is established. That is the chain of command between the individuals from within the producer firm, the Joint Operating Committee and the service industry representatives. Each individual is provided with a rank level of “command” and is provided with established authority and responsibilities as a result. Lower ranks are also within the chain of command of higher ranks. This ranking and command structure provides the ability to have the pooling of the earth science and engineering, as well as other, resources pooled between members of the Joint Operating Committees.

We noted that the types of data that the producer firm and the Joint Operating Committee were dealing with were different in terms of their security requirements. Joint Operating Committees were dealing in data that was shared amongst the partnership and was not necessarily proprietary in nature. On the other hand the producer firm is where most of the proprietary information is held. The reserve reports, accounting information and strategy, and internal communications. This provides a separation of data from the domains of operation.

Authentication, and having the ubiquitous availability of anywhere and anytime access are issues that are needed to be addressed by advanced ERP systems. Secure access through iPad’s and phones brings about new challenges for producers and Joint Operating Committees. Encryption of all network traffic, and storage of data are necessary in this day and age. For compliance purposes a proposed ownership structure of the “cloud computing” infrastructure that meets the needs of the producers SEC requirements has been provided.

The Security & Access Control module will provide an interface that provides the appropriate governance requirements are met by the organization. If you have a requirement that a process is reviewed by certain individuals within your organization then they can be mapped within the organization. Any gaps could be filled and the process could then proceed. There is also the ability to have the delegation of authority and responsibilities assigned during absences.

This is a quick summary of the content of the Security & Access Control module of the Preliminary Specification. Now that we are reviewing the Oracle technologies, strategies and architectures we will be able to blend these requirements into their products and services and give users a better understanding of how these technologies will be implemented. The one area that will be unique is going to be the Military Command & Control Metaphor. However, as we will see that may not be technically too difficult to do.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle (private circle, accessible by members only) and begin building the community for the development of the Preliminary Specification.

Wednesday, October 26, 2011

The Preliminary Specification Part LXVII (S&AC Part VI)


This post discusses the manner in which authorizations, roles and responsibilities are handled in the Security & Access Control module of the Preliminary Specification. Although we have moved beyond vacation season, we should also discuss, the topic of delegating the authority and responsibility during absences, which is something that can come up at any time.

As background we should recall that each individual would have different access levels and authorizations in terms of access to the People, Ideas & Objects systems. Assuming different roles and responsibilities would impute different access levels to data, information, processes and functionality. On top of that, the Security & Access Control module is the key module for imposing the Military Command & Control Metaphor throughout the People, Ideas & Objects application modules. This structure, particularly in a Joint Operating Committee, would work to weave the multiple producer firms under one chain of command. It also provides an interface to ensure the coverage of all the processes were “manned” to ensure compliance, governance and overall completeness of the process.

Throughout the Preliminary Specification there is the perception of a heightened role for technology in terms of enabling the authorization to conduct operations within the system. That is to say the ability to do things and get things done is through the collaborations with partners and to authorize actions through participation in the processes managed by the systems. This participation dictates that the designation of the roles in the Security & Access Control module “means” more then just data access; but also imputes authority and responsibility to undertake actions on behalf Joint Operating Committees and / or producer firms.

Consideration should be given for whom has authorization to sign an AFE or who can sign for a payment. In a system such as People, Ideas & Objects, will there be the need for any paper? In order for the system to operate it must respect a chain of command or structure that imposes some authority and responsibility to those within the organization who have that authority. I know, (he says sarcastically) we’ll use the Military Command & Control Metaphor (MCCM). As it has been stated here before the MCCM is to be used throughout the Joint Operating Committee and the producer firm for these reasons.

It would also be necessary to be able to assign this authority within the Security & Access Control module during any absence. If someone with authority and responsibility were to be away for whatever reason, or for a short period of time, they should be able to assign their authority to another person to fill that role while they are away. This will ensure that the process isn’t held up during their absence. Delegations of authority have been used for years in larger firms and with a system that imposes the authorizations and responsibilities on specific roles, the ability to temporarily move them down, across or up the chain of command is a necessity to keep the organization functioning.

Lastly we should talk about the interface that helps to identify the missing elements of a process. It would simply show the command structure of the people who are assigned to a Joint Operating Committee or to a process and their related role, authorizations and responsibilities. If someone was to be away then it would show who was taking over their role. It would also help to identify how you could impose the chain of command to fill the void of any vacancies. This would be particularly important if the role or process was needed to be documented for compliance purposes.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle and begin building the community for the development of the Preliminary Specification. 

Thursday, September 22, 2011

The Preliminary Specification Part XXXIII (R&C Part I)


The last thing that we want to do in the Security & Access Control module is to make it difficult for people to collaborate. Innovation is about ideas, and the free flow of ideas is the point of our next two modules review. Making it difficult for people to access the system should not be the result of all of these security requirements. People and Ideas once authorized and authenticated should be able to complete their work, not be involved in mindless security or access control warnings.

We now move on to the Research & Capabilities module of the Preliminary Specification. This is a dual specification module in that it shares strong similarities with the Knowledge & Learning module. The difference is that the Research & Capabilities is a firm, or producer, facing module and the Knowledge & Learning module is a Joint Operating Committee module. The best way to think of these modules is that they are “marketplace” modules. The Research & Capabilities module looks at the producer firm in the context of the greater oil and gas industry from the point of view of a market.

This module is difficult to conceptually understand as it is not in practical use in oil and gas today. If we think that the Joint Operating Committee is the day to day operation of the oil and gas producer. The Knowledge & Learning module will provide a means in which the producers will be able to optimize the earnings of the JOC. The Research & Capabilities should therefore be seen as the means in which a producer can exercise long term value accretion from the firm. The firm of course being a holding of many JOC’s.

The Research & Capabilities module provides a window on the producer firm that is above the noise of the day to day. One that provides the user with the ability to see where the value may be added to the firm. This module moves the work that people are doing away from recording transactions. The management science falls into the category of "interactions" which includes transactional, tacit knowledge, and transformational activities of the producer, its partners and the vendors or marketplace. The Preliminary Specification deals with the automation of transactions to free up the resources of the firm and market. The generation and application of ideas is the area that the innovative energy producer needs to have their resources spending most of their time. The producers will use the Research & Capabilities and Knowledge & Learning modules to obtain windows on these activities.

In the future we need to concern ourselves with the kind of work that computers can’t do. These modules are involved in these new "types" of jobs that humans can do far better then computers. Making judgments, based on good data and information, and deciding on the best course of action. The scope of the application module is unlimited. The proprietary data and information that is accessible by the users of these modules would limit their use to a handful of senior individuals within the firm. However, that does not preclude them from receiving the full scope of engineering resources in terms of software developments. I could see substantial value being developed through the intuitions being confirmed in these applications modules.

What the People, Ideas & Objects application does for the producer firm is align the Joint Operating Committee’s legal, financial, operational decision making, cultural, communication, innovation and strategic frameworks with the hierarchies compliance and governance frameworks. This alignment provides new synergies in terms of operational performance in both the Joint Operating Committee and the producer firm. It also provides increases in the speed, innovativeness and accountability of both the firm and JOC. The Research & Capabilities module will be able to monitor and control these frameworks to see where the value can be gained and is maybe being lost. As we move away from the hierarchy this will be the tool that provides the window on “what” and “how” the transition will best be done. This is what I think will be one of the first uses of the tool.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle and begin building the community for the development of the Preliminary Specification.

Wednesday, September 21, 2011

The Preliminary Specification Part XXXII (S&AC Part V)


People, Ideas & Objects development of the Military Command & Control Metaphor (MCCM) of the Security & Access Control module is not without some historical context. Before the hierarchy, which I perceive as somewhat of a commercial development of the 20th century, there was only the military structure in terms of large organizations. The main difference between the two is rather subtle but significant. The military structure is much broader and flatter then the hierarchy. That is one of the ideals that we are seeking, but the more important feature is the ability for the chain of command to span multiple internal and external organizational structures.

If we analyze the U.S. Military we find a number of interesting attributes of using the military chain of command that will provide value in the use of People, Ideas & Objects software applications. First is the title and assignment of an individual in the military.  For example, “Sgt. Richard Knuth, Company A, Brigade Special Troops Battalion, 3rd Heavy Brigade Combat Team, 3rd Infantry Division”. A similar title and assignment for the people within a Joint Operating Committee would help to clarify the role and responsibilities, authority and capabilities the individual would have within the JOC. For example this individual might have the following “Richard Knuth, Chief Engineer, Field Straddle, Elmworth. Irrespective of which firm this individual is from each of the participants would recognize that the authority of a Chief Engineer was the same throughout the industry and that the designation of Chief Engineer entitled the individual to authorize the appropriate actions.

Now this is not fundamentally different from how the industry operates today. What is different is the ability to operate in a fashion where the interactions between the producers in the JOC are done as if they were all employed by the JOC. Where multiple producer firms are contributing many full time staff to the JOC. This interaction between producers through the JOC can only be replicated if there is a recognizable chain of command between the firms that make up the JOC. In addition to the recognizable chain of command each organization must have additional governance concerns handled, and compliance plays a big part in this as well. (We will talk more about these in the future in the Compliance & Governance module.) That although it would be an easy thing to implement from a people point of view, the actual implementation of pooling the staff from multiple organizations becomes complex when we consider all of the implications. However, with the Information Technologies that exist today, and the issues of the shortages of earth science and engineering talent we have few choices but to pursue this pooling concept.

The nature of the people that will be working through the chain of command that is layered over the Joint Operating Committee will include all of the disciplines that are involved in the oil and gas industry. The contributions of staff, financial and technical resources will include everyone that is employed by the industry today. I can foresee many of the office buildings being refurbished to accommodate the staff of a single JOC. There the staff from the different producers would be seconded to work for the JOC, working at a single JOC not at any particular producer firm.

In previous blog posts discussing the Military Command & Control Metaphor (MCCM). I noted this inter and intra organizational use of the MCCM was similar to that used by NATO. That armies of the various countries could work together and recognize personnel from each others armies and immediately recognize and use the same chain of command. Unfortunately then came Libya and the failure of NATO may be well at hand. And the unfortunate parallel may be seen as a striking example as why the MCCM might not work in People, Ideas & Objects. I think otherwise as the Joint Operating Committee is the financial framework of the industry. This means that all of the members of a JOC are equally driven by their financial interests. And that financial interest drives consensus. Therefore, the analogy to Libya would be inappropriate as their objective is not financially driven and the NATO members can not form a consensus on what the objective is. The point in using the NATO example was to show the ability to recognize the chain of command spanning multiple organizations. Not to submit that countries driven by politically different philosophies could agree militarily.

For the industry to successfully provide for the consumers energy demands, it’s necessary to build the systems that identify and support the Joint Operating Committee. Building the Preliminary Specification is the focus of People, Ideas & Objects. Producers are encouraged to contact me in order to support our Revenue Model and begin their participation in these communities. Those individuals that are interested in joining People, Ideas & Objects can join me here and begin building the software necessary for the successful and innovative oil and gas industry.

Please note what Google+ provides us is the opportunity to prove that People, Ideas & Objects are committed to developing this community. That this is user developed software, not change that is driven from the top down. Join me on the People, Ideas & Objects Google+ Circle and begin building the community for the development of the Preliminary Specification.