Feeds

Can't hear the sirens? Knobble evildoers with your massive integer

New project to help deaf people clobber criminals with BIG data

High performance access to file storage

A scheme to help deaf and hard-of-hearing people call the cops has been named as one of three finalists in a government-sponsored big data competition.

A trio of projects have made it to the final of the criminal justice section of the Open Data Challenge Series, which invites ideas on how to solve society's problems using big numbers. Each of the three contestants have been handed £5,000 to develop their project, with the overall winner given £40,000 after a final decision in February.

The second scheme is a stolen bike database imaginatively called Stolen Bikes UK, which helps pedal pushers find out if the two-wheeled steed they are buying was nicked from someone else. According to Nesta, this could help clamp down on an illicit industry worth £126m.

In a similar vein, the third scheme is called Total Car Check and allows drivers to pull the same trick, drawing on information within the DVLA's bulk data set and stolen vehicle database.

So where does big data fit into the police project? Well, it uses geolocation data, which allows people who are hard of hearing to alert cops of a crime taking place near them without having to pick up the phone. Currently, it takes a deaf person seven times as long to call the emergency service as people with perfect hearing, Nesta claimed.

Tris Dyson, director for the centre for challenge prizes at Nesta, said: “Open data is a valuable tool that at the moment is not used to its full potential. It presents a great opportunity to have real impact and through our Open Data Challenge Series we hope to identify some truly innovative projects that could deliver real change. Today’s finalists show the potential that’s out there.”

The government has ploughed £10m into a big data think-tank called the Open Data Institute, which has also been helped out with cash from the Omidyar Network, a funding network run by eBay founder Pierre Omidyar. It aims to use big data to solve big problems.

Stuart Coleman, commercial director of the Open Data Institute said: “It’s great to see such a range of people and ideas that use open data. The challenge approach means that we are seeing ideas that are unique, innovative and most importantly, bringing positive benefits to peoples’ daily lives. These aren’t pie in the sky concepts but practical uses of open data which could deliver huge social and economic value." ®

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.