SlideShare a Scribd company logo
Paul Downey

Technical Architect

Government Digital Service

@psd
GDS@psd
Confidentiality
Availability
Integrity
Integrity of Information
Most of the public discussion regarding cyber threats has focused on the
confidentiality and availability of information; cyber espionage
undermines confidentiality, whereas denial-of-service operations and
data deletion attacks undermine availability. In the future, however, we
might also see more cyber operations that will change or manipulate
electronic information in order to compromise its integrity (i.e. accuracy
and reliability) instead of deleting it or disrupting access to it. Decision
making by senior government officials (civilian and military), corporate
executives, investors, or others will be impaired if they cannot trust the
information they are receiving.
— Worldwide Threat Assessment of the US
Intelligence Community, Senate Armed Services
Committee, February 26, 2015


GDS@psd
Blood group
GDS@psd
“Integrity, i.e.
accuracy and
reliability”
GDS@psd
Molly Dishman &
Martin Fowler on
agile architecture:
GDS@psd
“Architecture is
about things which
are hard to change”
GDS@psd
“complexity comes
from irreversibility”
GDS@psd
“remove things from
the system which are
hard to change”
It’s quite difficult to
unboil an egg
GDS@psd
Integrity: things you
want to be difficult to
change break
GDS@psd
We need to talk
about rotting …
memorandum mori
GDS@psd
Big data
Open data
Linked data
Raw data
GDS@psd
Data proliferation
(1977)
GDS@psd
Data ≈ stuff
GDS@psd
Sturgeon’s
revelation (law)
GDS@psd
Data
warehousing
GDS@psd
Software ≈ stuff
you can easily
change that does
stuff to stuff
GDS@psd
Work out what’s
needed
GDS@psd
1. Start with needs
2. Do less
3. Design with data
4. Do the hard work to make it simple
5. Iterate. Then iterate again.
6. This is for everyone
7. Understand context
8. Build things people can build on
9. Be consistent, not uniform
10. Make things open: it makes things better
Design Principles
Start with needs*
* user needs, not government needs
Building systems with integrity
Building systems with integrity
https://www.gov.uk/
service-manual
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
Building systems with integrity
36
Building systems with integrity
GDS@psd
Registers:
important lists of
things
GDS@psd
Government has
a lot of registers:
GDS@psd
companies, charities, trade unions, courts,
schools, universities, hospitals, zoos, circuses,
inspections, licences, certificates, births,
marriages, deaths, electoral roll, insolvencies,
bankruptcies, passports, animal passports,
drivers, vehicles, land parcels, land ownership,
land use, legal boundaries, awards, tax rates,
benefits, livestock movements, flood risk, river
levels, companies, fish caught, patents,
trademarks, designs, non-native invasive
plants, bank holidays, clock changes …
GDS@psd
things people
need to be able
to trust
GDS@psd
and government
is the canonical
official source
Building systems with integrity
Building systems with integrity
GDS@psd
“An alternative to
scurrilous gossip &
rumour”
GDS@psd
Integrity: being honest
and having strong
principles
GDS@psd
The systems we
build should reflect
our values
GDS@psd
“As Chief Registrar of
Foo, I need to know the
Foo system of record
hasn’t been tampered
with”
GDS@psd
IOW: Should be
tamper proof
GDS@psd
https://
www.gov.uk
https://
www.gov.uk/
after-a-death
https://
www.gov.uk/
info/
after-a-death
Design with Data
gov.uk/performance
Psychic
paper
GDS@psd
“As someone with an
interest in Foo I need to
know a Foo record came
from the Foo Registry and it
hasn’t been tampered with”
GDS@psd
IOW: provenance
is important
A digital signature is …
I am me I agree!&
Building systems with integrity
Building systems with integrity
Simon Wardley 

http://blog.gardeviance.org/
http://blog.gardeviance.org/2013/03/basics-repeated-again.html
http://blog.gardeviance.org/2013/03/basics-repeated-again.html
GDS@psd
Choosing
technology
GDS@psd
The main thing is you
must be able to change
your mind
Building systems with integrity
GDS@psd
The Web is
rotting
Building systems with integrity
GDS@psd
The Web is links
GDS@psd
Link rot
GDS@psd
Url shorteners
Abuse
Transnational law
Blocking
Advertising
Privacy and security
Additional layer of complexity
GDS@psd
Purl — Persistent uniform
resource locator
GDS@psd
http://
Building systems with integrity
ourincrediblejourney.tumblr.com
https://adactio.com/
journal/tags/
preservation
Building systems with integrity
Building systems with integrity
Building systems with integrity
It must be gov, yeah, yeah!
No link left behind!
Do less
Building systems with integrity
Building systems with integrity
Building systems with integrity
Use the HTTP:
Building systems with integrity
GDS@psd
Stuff rots
Writing law
demands a certain
level of
commitment
from goats, calves
and sheep
Building systems with integrity
Building systems with integrity
GDS@psd
Horcruxes?
GDS@psd
Backups!
GDS@psd
Physical media
My precious!
GDS@psd
Robot tape
libraries
GDS@psd
Computers rot
and fail
GDS@psd
Bitrot
GDS@psd
Digital dark ages
GDS@psd
Digital
obsolescence
GDS@psd
Digital dark ages
BBC Doomsday project
https://github.com/digital-preservation
GDS@psd
Rotten data
Building systems with integrity
Building systems with integrity
GDS@psd
Cruft?
Building systems with integrity
Building systems with integrity
GDS@psd
People inject
entropy
“People stuff up, but if you really want
to stuff up you need a computer”
– Anon
GDS@psd
“If you really want to stuff things up,
add more people”
– (paraphrasing Fred Brooks)
GDS@psd
P.E.B.C.A.K
GDS@psd
GDS@psd
Can you turn it on
and off again?
Autonomy Mastery Purpose
Building systems with integrity
GDS@psd
Learn from your*
mistakes
* collective noun
GDS@psd
“Anyone who’s worked with technology at
any scale is familiar with failure. Failure cares
not about the architecture designs you slave
over, the code you write and review, or the
alerts and metrics you meticulously pore
through.”
— John Allspaw, Blameless Post Mortems
and a Just Culture
GDS@psd
Do things that scare
you, often
Building systems with integrity
GDS
gdstechnology.blog.
gov.uk/2015/02/06/
running-a-game-
day-for-gov-uk/
GDS@psd
Fight the entropy!
GDS@psd
Ship of Theseus
ISE Shrine

– Clay Shirky, Here comes everybody
GDS@psd
Facts don’t rot!
GDS@psd
Architecture
Do the hard work
to make it simple
Building systems with integrity
Building systems with integrity
Knocking down the
Towers of SIAM
Register appliance
Certificate
transparency
Merkle tree magic
redecentralize.org
Build in the context of your domain,
organisation The Web
Paul Downey

Technical Architect

Government Digital Service

@psd

More Related Content

PPTX
Consensys and amd develop blockchain based cloud infrastructure
PDF
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 21, 20 -...
PDF
Future of value of data asia iot-asia presentation - 22 march 2018
PDF
About Scott Goldstein: MortgageOrb Person of the Week
PDF
A future security landscape
PPT
EDI Multi-Tenant Platform Integration with API
PDF
Linked Data and Canadian Legal Resources
PPTX
Traversing the triangle
Consensys and amd develop blockchain based cloud infrastructure
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 1 Issue 21, 20 -...
Future of value of data asia iot-asia presentation - 22 march 2018
About Scott Goldstein: MortgageOrb Person of the Week
A future security landscape
EDI Multi-Tenant Platform Integration with API
Linked Data and Canadian Legal Resources
Traversing the triangle

Similar to Building systems with integrity (20)

PDF
Registers
PDF
The Digital Universe in 2020 - United States
 
PDF
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
PDF
Big Data - CRM's Promise Land
PDF
141900791 big-data
PDF
BBDO Proximity: Big-data May 2013
PDF
Big Data
PDF
Data provenance - world in 2030
PDF
CAN DATA SCIENCE COMMAND THE FUTURE OF BUSINESSES IN 2025.pdf
PDF
Big Data and Fast Data – Big and Fast Combined, is it Possible?
PDF
Business with Big data
PDF
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
PPTX
Big data seminar at Broadridge
PPTX
Big Data seminar BR-new
PPTX
Big Data Seminar At Broadridge
PPTX
The Meaning and Impact of the General Data Protection Regulation
PPT
Information+System+Development+Limit+To+Information
PDF
The Rise of Intelligent Content Services
PDF
Big Data Scotland 2017
PDF
Exploring the Benefits and Challenges of Data Mining in a Big Data
Registers
The Digital Universe in 2020 - United States
 
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Big Data - CRM's Promise Land
141900791 big-data
BBDO Proximity: Big-data May 2013
Big Data
Data provenance - world in 2030
CAN DATA SCIENCE COMMAND THE FUTURE OF BUSINESSES IN 2025.pdf
Big Data and Fast Data – Big and Fast Combined, is it Possible?
Business with Big data
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...
Big data seminar at Broadridge
Big Data seminar BR-new
Big Data Seminar At Broadridge
The Meaning and Impact of the General Data Protection Regulation
Information+System+Development+Limit+To+Information
The Rise of Intelligent Content Services
Big Data Scotland 2017
Exploring the Benefits and Challenges of Data Mining in a Big Data
Ad

More from Paul Downey (17)

PDF
ODI Lunchtime Talk, Creating an open register – what it takes and why
PDF
Building systems with integrity
PDF
Standards are Great, but Standardisation is a Really Bad Idea
PDF
Who am I? Who are you? Who is anybody?
PDF
Open Source Hardware at OTA11
PPT
PDF
ETSI Hell's Kitchen Debate, Nice 2009
PDF
Denver
PDF
XML Schema Patterns for Databinding
PDF
The Best Web APIs are Web Sites
PDF
Publishing Web Services Policies
PDF
The Web Is Agreement Opentech2008
PDF
Vrm Wedding
PDF
Versioning XML and Open Source Tools
PDF
Open Source, Agile, Life-Style
PDF
Extensibility And Versioning
PDF
Mashing up The Mobile
ODI Lunchtime Talk, Creating an open register – what it takes and why
Building systems with integrity
Standards are Great, but Standardisation is a Really Bad Idea
Who am I? Who are you? Who is anybody?
Open Source Hardware at OTA11
ETSI Hell's Kitchen Debate, Nice 2009
Denver
XML Schema Patterns for Databinding
The Best Web APIs are Web Sites
Publishing Web Services Policies
The Web Is Agreement Opentech2008
Vrm Wedding
Versioning XML and Open Source Tools
Open Source, Agile, Life-Style
Extensibility And Versioning
Mashing up The Mobile
Ad

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology

Building systems with integrity