Feeds

'Climategate' university to open up data

Gets JISC funding

Build a business case: developing custom apps

The University of East Anglia is to receive JISC funding for a project to open up its research on global warming to scrutiny and re-use.

The university, which was at the centre of a scandal revealed by leaked emails from its Climatic Research Unit, will examine how best to expose climate data for re-use, make it easier for researchers to find the data and to understand its validity.

The results will be used by the British Atmospheric Data Centre, which already provides access to a significant proportion of the climate data output of the UK research community.

Dr Simon Hodson, programme manager at JISC, said: "Climate scientists have been under the spotlight recently: there have been technical and cultural challenges to making data and methods openly available, and a perception of failure to do so has been taken by critics of mainstream climate science as an indication of unsound science.

"Clearly, confidence in research findings – among scientists and the general public – depends upon the underpinning data and methods being open, reusable and verifiable.

"What is more, researchers aren't just producers of data, they are also consumers. By funding projects which will improve practice and will give climate scientists and others better guidance on research data management, Jisc aims to help them make that data more usable and valuable."

The UEA project is one of six to receive a total of £600,000 from JISC to explore ways of making data and the code used for computer assisted analysis more openly available, in some cases by linking them to publications.

King's College London is working on data relating to the classical world. The project will make existing datasets about inscriptions and documents from the early Roman Empire more accessible and reusable for analysis by providing mechanisms for linking concepts and terms.

It will also create reviews of so-called 'linked data' tools and a set of online tutorials to help researchers use the same approach with other datasets.

The other universities involved in the research are Bath, Cambridge, Manchester, Newcastle, Oxford and Southampton. The areas covered include materials science, freshwater biology, epidemiology and data intensive modelling to predict disease.

The projects will run from August 2010 for a year.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Next gen security for virtualised datacentres

More from The Register

next story
Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
Is this the real life? Is this just fantasy?
China building SUPERSONIC SUBMARINE that travels in a BUBBLE
Shanghai to San Fran in two hours would be a trick, though
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
Galileo, Galileo! Galileo, Galileo! Galileo fit to go. Magnifico
I'm just a poor boy, nobody loves me. But at least I can find my way with ESA GPS by 2017
Astronomers scramble for obs on new comet
Amateur gets fifth confirmed discovery
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.