In case you've not seen this, some excellent discussion about the use of SWORD with research data...
-- The University of Edinburgh is a charitable body, registered in Scotland, with registration number SC005336. -----Original Message----- From: Research Data Management discussion list [mailto:research-data...@jiscmail.ac.uk] On Behalf Of Mahendra Mahey Sent: 11 May 2012 11:23 To: research-data...@jiscmail.ac.uk Subject: Managing Research Data Hack Days Event Report Colleagues DevCSI (http://devcsi.ukoln.ac.uk) and JISC recently ran a 'Managing Research Data Hack event' (http://devcsi.ukoln.ac.uk/past-events/mrd-hack-days/) on the 3-4 May in Manchester,2012. The event report has now been published on the DevCSI blog: http://devcsi.ukoln.ac.uk/2012/05/11/event-report-managing-research-data-hack-day/ Some highlights include: - Considering the use of SWORD 2 and BitTorrent to deal with large datasets - A proof-of-concept centralised service for tracking activity data around research projects and individual datasets - User perspectives on metadata for datasets and examining a common schema to describe metadata for datasets There are several multimedia interviews with attendees who talked about what they learned, discussed and worked on at the event. We hope you find the blog report useful and please feel free to reply to it or contact me for further details. Please watch out for similar future follow up events in this area from DevCSI and JISC. Thanks ---------------------------------------------- Mr Mahendra Mahey Project Manager DevCSI Research Officer Innovation Support Centre UKOLN University of Bath, Bath, BA2 7AY Mobile: ++44 (0) 07581069575 Fax: ++44 (0) 1225 386256 email: m.ma...@ukoln.ac.uk skypeID: mr_mahendra_mahey http://devcsi.ukoln.ac.uk/ http://cerify.ukoln.ac.uk/ http://www.ukoln.ac.uk ----------------------------------------------- ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ sword-app-tech mailing list sword-app-tech@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sword-app-tech