In case you've not seen this, some excellent discussion about the use of SWORD 
with research data...



-- 
The University of Edinburgh is a charitable body, registered in
Scotland, with registration number SC005336.


-----Original Message-----
From: Research Data Management discussion list 
[mailto:research-data...@jiscmail.ac.uk] On Behalf Of Mahendra Mahey
Sent: 11 May 2012 11:23
To: research-data...@jiscmail.ac.uk
Subject: Managing Research Data Hack Days Event Report

Colleagues

DevCSI (http://devcsi.ukoln.ac.uk) and JISC recently ran a 'Managing Research 
Data Hack event' 
(http://devcsi.ukoln.ac.uk/past-events/mrd-hack-days/) on the 3-4 May in 
Manchester,2012.

The event report has now been published on the DevCSI blog:

http://devcsi.ukoln.ac.uk/2012/05/11/event-report-managing-research-data-hack-day/

Some highlights include:

- Considering the use of SWORD 2 and BitTorrent to deal with large datasets
- A proof-of-concept centralised service for tracking activity data around 
research projects and individual datasets
- User perspectives on metadata for datasets and examining a common schema to 
describe metadata for datasets

There are several multimedia interviews with attendees who talked about what 
they learned, discussed and worked on at the event.

We hope you find the blog report useful and please feel free to reply to it or 
contact me for further details. Please watch out for similar future follow up 
events in this area from DevCSI and JISC.

Thanks

----------------------------------------------
Mr Mahendra Mahey

Project Manager DevCSI
Research Officer
Innovation Support Centre
UKOLN
University of Bath,
Bath,
BA2 7AY

Mobile: ++44 (0) 07581069575
Fax: ++44 (0) 1225 386256

email: m.ma...@ukoln.ac.uk
skypeID: mr_mahendra_mahey
http://devcsi.ukoln.ac.uk/
http://cerify.ukoln.ac.uk/
http://www.ukoln.ac.uk
-----------------------------------------------

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
sword-app-tech mailing list
sword-app-tech@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sword-app-tech

Reply via email to