Four Pillars of Microshare

Four Pillars of Microshare 2017-08-09T19:52:04+00:00

Four Pillars of Microshare

The Internet of Things (IoT) has been the focus of considerable excitement for several years now. The following describes the cornerstones of the Microshare platform and how they relate to the Internet of Things. The four pillars will make it possible to exchange massive amounts of data and unlock its value.

Ingestion  |  Transformation  |  Sharing  |  Governance

Ingestion


Microshare™ ingests data from any source in any format through a single API.  Data is accepted from on-cloud or on-premises locations and stored in its native state, e.g. structured, unstructured, links, queries, video, voice, etc.

All input is annotated with ownership meta data and preserved in its original form in the microshare Data™ for audit and control purposes.

Transformation


Microshare™ transforms input data in preparation for serving future requests, making it identifiable, actionable and secure.  For example, encrypted data is de-encrypted, packed data is unpacked and sharing rules are interpreted from the rules engine and annotated with the data.

All transformation actions are tagged with meta data describing the source, action, date, time etc. and stored in microshare data for governance and audit purposes.

Sharing


Data owners set microshare™ rules that govern the context for request fulfillment such as permissions, thresholds, and guidelines for sharing.

Sharing is allowed at request-time only if all access criteria are met and abide by the rules. Requests are presented through a single RESTful API which remains constant over time.  The rules, however, are easily updated to evolve with the business.

For audit purposes, all requests and fulfillments are captured and annotated with meta data describing the request including, requestor, time, date and whether it was fulfilled or rejected.

Governance

All microshare™ constructs – Ingestion, Transformation, Sharing –  are designed to support data governance and ensure data is secure according to business rules established by the data owner.

Every microshare™ action is logged and stored for analysis and reporting purposes.  Ingestion details, transformation activity, information requests and sharing grants on every piece of data is captured, annotated and stored as data for audit and control purposes.  These records are then available as required for data analytics and trend awareness as well as reporting for compliance, fraud detection and management dashboards.