Feeds

Q: What's government-owned, designed to kill, and now more transparent? A: DARPA!

Skunkworks research lab launches 'Open Catalog' to share research information

Choosing a cloud hosting partner with confidence

While one part of the US government tries to slink further back into the shadows, another is pushing itself into the light via a new transparency scheme at DARPA.

The US's defense boffins at DARPA announced the launch of the its Open Catalog on Tuesday – an initiative designed to drum up support from the wider research community into co-development of DARPA projects by giving information on what bits of open source software and publications have been part-funded by the development lab.

"Making our open source catalog available increases the number of experts who can help quickly develop relevant software for the government," said Chris White, a DARPA program manager, in a canned statement.

"Our hope is that the computer science community will test and evaluate elements of our software and afterward adopt them as either standalone offerings or as components of their products."

To begin with, the Open Catalog incorporates assets from Darpa's XDATA program which involves research into distributed analysis of large and sometimes incomplete datasets.

DARPA plans to expand this out to include the fruits of research in other programs like Broad Operational Language Translation, and Visual Media Reasoning.

Some of this DARPA-backed software includes cutting-edge data center management tech like the Apache Mesos and Tachyon projects, along with less well known but sophisticated projects like the Vowpal Wabbit out-of-core learning system, or the Julia dynamic programming language.

A peruse of the catalog shows that private companies like IBM and MDA Information Systems have already produced large amounts of research for the company in this area, while public institutions like the University of California at Berkeley, Carnegie Mellon University, Georgia Tech, and others have all done significant amounts of part-DARPA-funded research.

"DARPA is interested in building communities around government-funded software and research. If the R&D community shows sufficient interest, DARPA will continue to make available information generated by DARPA programs, including software, publications, data and experimental results," DARPA wrote.

Given the fact that DARPA is funded by US taxpayers, and that the research it funds has broad applicability beyond the defense uses, it seems like a good idea for interested parties to reward this bout of openness and use the Catalog to inform them about where a minute fraction of their tax dollars are going. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.