Feeds

Databases in academia

University research isn't always up on the latest in business IT

  • alert
  • submit to reddit

3 Big data security analytics techniques

Last week I was at Cambridge, learning what Henslow taught Darwin (Kohn, Murrell, Parker and Whitehorn, Nature, vol. 436, 4 August 2005, p643 – available online if you subscribe/register).

Henslow, elected Professor of Botany at Cambridge in 1825, was a careful scientist, the first university lecturer to illustrate his lectures (yes, even before PowerPoint), and a creationist who investigated the variation within species in order to show that species were created as fundamentally stable things that just varied widely in response to conditions.

Darwin was his pupil (Henslow helped arrange for Darwin’s presence on the Beagle), but Darwin made the intellectual leap that allowed him to interpret Henslow’s records of variation - not as evidence of a fixed set of created species with variations, but as evidence of the evolution of new species in action.

Why was I there representing Reg Developer? Well, John Parker’s research establishing exactly what Henslow was doing and its importance to Darwin’s work was assisted by Mark Whitehorn, Reg Developer columnist and database expert, who got his PhD with Parker many years ago.

Shows John Parker with Henslow samples

The research team was cross-disciplinary in the first place – it included David Kohn, a historian from Drew University in New Jersey, USA (who “went white” when he learnt what Henslow had been doing, since he had to rewrite a chunk of his book, yet to be published, on Darwin); Gina Murrell from the Cambridge University Herbarium; as well as Parker, who is from the Cambridge University Botanic Garden.

However, it was largely chance that Mark was around to point out that correlating Henslow’s plant collections with the time of collection, the people involved, Darwin’s published work and so on using a card index, was woefully inefficient. He designed a database to hold all the information available from Henslow’s collections (found in sheds and attics around Cambridge, as I remember it) and advised and assisted with the extensive data cleansing needed.

He chose Microsoft SQL Server (although he says any reasonable relational database would have done) to store the data, because he considers its query and analysis facilities to be unparalleled today – and he used SQL Server 2005 in its beta incarnation, simply because it made the management of the database and analysis very much easier than with the previous version. And, the research team’s enthusiasm for the way they could now ask questions of their data and get immediate answers and visualisations was palpable.

Shows Henslow tree-planting in Cambridge.

Of course, Henslow’s sheets of paper with collections of plants stuck to them, illustrating variations within a single species, is also a database of sorts. These days, we’d photograph the plants and store them in an electronic database as an extended datatype (although whether recreating the database from a set of CDs in a box in a cupboard some 150 years later would be as feasible as recreating Henslow’s work is moot). But perhaps we wouldn’t.

Although computers are widely used in theoretical physics and such research, the tools taken as routine in business are being overlooked in academia – if Mark hadn’t taken a PhD with John Parker and then moved into databases (he’s in the Department of Applied Computing at the University of Dundee) this research would have been based on shuffling index cards in a card index box (or, at best, on something like a spreadsheet).

Makes you think. And one thing it makes me think is that there are still unexplored opportunities for database specialists out there. And, frankly, 20 years or more after James Martin first excited me with the potential of Relational Databases, that rather surprises me.

Photographs by David Norfolk, who is also the author of IT Governance, published by Thorogood. More details here.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.