Feeds

Southampton Uni shows way to a truly open web

Making Berners-Lee's vision a reality

Seven Steps to Software Security

Untangling the semantic web Southampton is pushing to be the go-to place for expertise on linked data in the UK, and researchers at its main university launched a site earlier this month containing no less than 21 "non-confidential" datasets that underline that semantic web desire.

The University of Southampton (UoS) is one of the first academic institutions in Blighty to follow in the footsteps of its neighbour – map-making agency the Ordnance Survey, which released some open datasets in April 2010. Indeed, some of the city's boffins are dead keen to put a linked data strategy for government, academic and public sector organisations on the map, if you'll pardon the pun. However, finding wider enthusiasm expressed in Southampton for Sir Tim Berners-Lee's relatively newborn and somewhat niche software modeling system remains a big challenge.

After all, there's a of lot baggage in the way of all that juicy data. Genuine enthusiasts for linked data, which was a term coined by Berners-Lee back in 2006, need to first brush aside web standards' arguments and political grandstanding among MPs apparently desperate to push a "transparency" agenda. On top of that, they also have to work around the big social content farms and closed data silos, like Facebook and chums, whose vision of an "open web" has massively undermined what is now considered an almost redundant term.

Mark Zuckerberg has famously declared that he "is trying to make the world a more open place" with his social network site Facebook. Recently, Berners-Lee publicly questioned Zuck's supposed claim.

"The sites [Facebook, LinkedIn, Friendster and others] assemble these bits of data into brilliant databases and reuse the information to provide value-added service – but only within their sites. Once you enter your data into one of these services, you cannot easily use them on another site. Each site is a silo, walled off from the others," he said in the December 2010 issue of Scientific American.

"Yes, your site's pages are on the web, but your data are not. You can access a web page about a list of people you have created in one site, but you cannot send that list, or items from it, to another site."

The likes of the UoS linked data team are fighting that silo effect by freeing up useful datasets to help the university better cope with its non-confidential student bureaucracy. Some would argue that their efforts should be applauded, even if questions remain about how such a model to make data even more accessible online might be eventually used to link big, unwieldy government datasets together in a truly meaningful way. Others might complain that trust and privacy could take an almighty blow online if such supposedly non-sensitive data, even if considered entirely vanilla and "out there in HTML form anyway", was so easily opened up on a grand scale to all comers.

"What we need is an information shaman," explains Christopher Gutteridge, a member of the technical staff at the UoS. Gutteridge has worked closely with big data researchers for a long time and launched the institution's linked data site with a small team earlier this month.

"Bring the data back for everyone and then it's useful, and you don't just bring it back in silos," he says.

But he acknowledges that the linked data model isn't for everyone.

Boost IT visibility and business value

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.