SlideShare a Scribd company logo
1 of 54
Download to read offline
Walking the Walk
The experience of using Web 2.0
tools in active research projects

       Cameron Neylon
1. The long tail
    2. Data is the next Intel inside
    3. Users add value
    4. Network effects by default
    5. Some rights reserved
    6. Perpetual Beta
    7. Cooperate donā€™t control
    8. Software above the level of a single device
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=5
What does Web 2.0 offer a
           researcher in practice?




http://ļ¬‚ickr.com/photos/heymans/480396810/
http://tinyurl.com/friendfeed-mthk-request
ā€¢ Open tender and response
ā€¢ Not mass participation or opinion markets
ā€¢ There just arenā€™t that many researchers
ā€¢ A good community and a well built and
  cared for network are critical
The Polymath Project
27 January 2009




http://gowers.wordpress.com/
27 January 2009

                 February 1 2009




http://gowers.wordpress.com/
27 January 2009

                 February 1 2009


                               March 10 2009




http://gowers.wordpress.com/
ā€¢ Successful project
ā€¢ Small core group of participants
ā€¢ Much larger group of watchers
ā€¢ Concerns over embarrassment, keeping up,
  mechanisms for giving credit

ā€¢ Issues over management of large numbers
  of very active threads
Open Notebook Challenge
http://onschallenge.wikispaces.com/Exp026
http://tinyurl.com/ons-challenge-spreadsheet
http://oru.edu/cccda/sl/descriptorspace/ds.php
http://slurl.com/secondlife/Drexel/165/178/24
113 individual measurements
       (plus 71 literature values)
   14 researchers in four countries
  One undergraduate chemistry class
$6000 funding (for prizes and chemicals)
113 individual measurements
       (plus 71 literature values)
   14 researchers in four countries
  One undergraduate chemistry class
$6000 funding (for prizes and chemicals)

             Four months
 One (invited) book chapter submitted
     Second paper in preparation
ā€¢ Collaboration enabled via open data licensing
ā€¢ Still relatively small numbers of people
ā€¢ Are massive collaborative projects even possible?
ā€¢ 90% arenā€™t aware of it, 9% are passive watchers
ā€¢ 0.9% make occasional contributions and 0.1% are
  core players - does that add up to more than one?
Galaxy Zoo
ā€¢ Compelling and comprehensible story
ā€¢ Much work gone into building a system that
  enables people to make a contribution

ā€¢ Responsive and appealing user experience
ā€¢ Still a self selecting community but drawn
  from a much wider pool
Deploying the LaBLog at RAL
Screenshot - 26 March
ā€¢ ā€œItā€™s going to be great but we need to put a lot of
  work into getting it going...ā€

ā€¢ ā€œI donā€™t have the time to put all the stuff in...ā€
ā€¢ Get what the advantages are but havenā€™t
  necessarily bought in to the process

ā€¢ Concerns over data re-use and ā€œscoopingā€
Where does this leave us?
1. The long tail
    2. Data is the next Intel inside
    3. Users add value
    4. Network effects by default
    5. Some rights reserved
    6. Perpetual Beta
    7. Cooperate donā€™t control
    8. Software above the level of a single device
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=5
1. The long tail
1. The long tail
                        ugh
                    eno
                fat
           snā€™t
         i
unless you w
                ork real hard
                              at it
 c.f. galaxy zo
                 o, FoldIt etc
                               .
2. Data is the new Intel inside
          well duh!
nt   to
      a
    w
  ou 3. Users add value
Y
 but why do they want t
                        o?
4. Network effects by default
4. Network effects by default
                         SP
                      rU
                   ou
                sy
            atā€™
         th
     if               ow
  ut              pn
b              eu
            giv
        en
     th
5. Some rights reserved
 licensing matters, even i
                           f
everyone thinks itā€™s bori
                          ng
is not an excuse for
giving people rubbish

  6. Perpetual beta
is not an excuse for
giving people rubbish

  6. Perpetual beta
is not an excuse for
 giving people rubbish

   6. Perpetual beta

             provement
continual im
ating
                            tegr
                      in in
               e lies
          valu
   l the
Al                           g it
                       ardin
                  n ho
            not i
      data,
    7. Cooperate donā€™t control
ating
                            tegr
                      in in
               e lies
          valu
   l the
Al                           g it
                       ardin
                  n ho
            not i
      data,
    7. Cooperate donā€™t control
   licensing matters, even i
                             f
  everyone thinks itā€™s bori
                            ng
ating
                            tegr
                      in in
               e lies
          valu
   l the
Al                           g it
                       ardin
                  n ho
            not i
      data,
    7. Cooperate donā€™t control
  licensing matters, even i
                              f
 everyone thinks itā€™s bori
                             ng
                      ecause it
          ike is bad b
share-al
                   perability
       eaks intero
    br
8. Software above the level of a
         single device
collaboration
8. Software above the level of a
         single device
collaboration
8. Software above the level of a
         single device
                    vice
                ser
What are the design patterns
for successful research tools?
1. Deļ¬ne and understand your target audience

2. Solve a pressing problem they have or tell them a story
   they understand and want to contribute to

3. Build the service into an existing workļ¬‚ow or a established
   framework that the target audience understands

4. Get the licensing right and give users a sense of control
   over their own data and contribution

5. Build for network effects but donā€™t rely on them

6. Plan to build (and resource the building of) your community

7. Build for interoperability; technical and legal
Friendfeed as a research community
http://friendfeed.com
http://tinyurl.com/dku869
Pulling items from external services via RSS
ā€¢ Aggregating content (solving a problem)
ā€¢ Works without a network; network effects follow
ā€¢ Collecting comments and ratings (data)
ā€¢ Straightforward pumping of data in and pulling it
  backout via API (licensing, interoperability)



ā€¢ Community, community, community
ā€¢ Building your own network
If you just build it they
(probably) wonā€™t come
If you donā€™t build it they
  deļ¬nitely wonā€™t come
The community is more
important than the service
Researchers are already the tail

More Related Content

Similar to Walking the walk - the practical experience of Web2 in research

IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET Journal
Ā 
Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 WebinarProofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 WebinarJason Williams
Ā 
From šŸ¤¦ to šŸæļø
From šŸ¤¦ to šŸæļøFrom šŸ¤¦ to šŸæļø
From šŸ¤¦ to šŸæļøOri Pekelman
Ā 
cloud-based_technology
cloud-based_technologycloud-based_technology
cloud-based_technologySolly Ezekiel
Ā 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysOri Pekelman
Ā 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategyHimanshu Bari
Ā 
Hasegawa gfke 2014
Hasegawa gfke 2014Hasegawa gfke 2014
Hasegawa gfke 2014innovationoecd
Ā 
Cloud HR: clear flying or congested chaos?
Cloud HR: clear flying or congested chaos?Cloud HR: clear flying or congested chaos?
Cloud HR: clear flying or congested chaos?Rob Scott
Ā 
Error in hadoop
Error in hadoopError in hadoop
Error in hadoopLen Bass
Ā 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineSagi Brody
Ā 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
Ā 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Hackfest Communication
Ā 
IoT 7 Critical Musts
IoT 7 Critical MustsIoT 7 Critical Musts
IoT 7 Critical MustsClint Smith
Ā 
Osimo crossover md
Osimo crossover mdOsimo crossover md
Osimo crossover mdosimod
Ā 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Phil Windley
Ā 
Tea-time with Testers February 2011 Year 1 Issue I
Tea-time with Testers February 2011  Year 1  Issue ITea-time with Testers February 2011  Year 1  Issue I
Tea-time with Testers February 2011 Year 1 Issue ILalit Bhamare
Ā 
Physical Computing
Physical ComputingPhysical Computing
Physical Computingkturvey
Ā 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
Ā 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
Ā 
Taking Virtual Economies to the Next Level
Taking Virtual Economies to the Next LevelTaking Virtual Economies to the Next Level
Taking Virtual Economies to the Next LevelWilliam Grosso
Ā 

Similar to Walking the walk - the practical experience of Web2 in research (20)

IRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments DetectionIRJET - YouTube Spam Comments Detection
IRJET - YouTube Spam Comments Detection
Ā 
Proofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 WebinarProofpoint Emerging Threats Suricata 5.0 Webinar
Proofpoint Emerging Threats Suricata 5.0 Webinar
Ā 
From šŸ¤¦ to šŸæļø
From šŸ¤¦ to šŸæļøFrom šŸ¤¦ to šŸæļø
From šŸ¤¦ to šŸæļø
Ā 
cloud-based_technology
cloud-based_technologycloud-based_technology
cloud-based_technology
Ā 
From DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed ApidaysFrom DevOps to NoOps how not to get Equifaxed Apidays
From DevOps to NoOps how not to get Equifaxed Apidays
Ā 
Big dataplatform operationalstrategy
Big dataplatform operationalstrategyBig dataplatform operationalstrategy
Big dataplatform operationalstrategy
Ā 
Hasegawa gfke 2014
Hasegawa gfke 2014Hasegawa gfke 2014
Hasegawa gfke 2014
Ā 
Cloud HR: clear flying or congested chaos?
Cloud HR: clear flying or congested chaos?Cloud HR: clear flying or congested chaos?
Cloud HR: clear flying or congested chaos?
Ā 
Error in hadoop
Error in hadoopError in hadoop
Error in hadoop
Ā 
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider DisciplineTroubleshooting: A High-Value Asset For The Service-Provider Discipline
Troubleshooting: A High-Value Asset For The Service-Provider Discipline
Ā 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Ā 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
Ā 
IoT 7 Critical Musts
IoT 7 Critical MustsIoT 7 Critical Musts
IoT 7 Critical Musts
Ā 
Osimo crossover md
Osimo crossover mdOsimo crossover md
Osimo crossover md
Ā 
Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011Shaping Strategies and the Live Web - Kynetx Impact 2011
Shaping Strategies and the Live Web - Kynetx Impact 2011
Ā 
Tea-time with Testers February 2011 Year 1 Issue I
Tea-time with Testers February 2011  Year 1  Issue ITea-time with Testers February 2011  Year 1  Issue I
Tea-time with Testers February 2011 Year 1 Issue I
Ā 
Physical Computing
Physical ComputingPhysical Computing
Physical Computing
Ā 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
Ā 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Ā 
Taking Virtual Economies to the Next Level
Taking Virtual Economies to the Next LevelTaking Virtual Economies to the Next Level
Taking Virtual Economies to the Next Level
Ā 

More from Cameron Neylon

OA Advocacy Today
OA Advocacy TodayOA Advocacy Today
OA Advocacy TodayCameron Neylon
Ā 
Open Knowledge Institutions: Is there a future for the university in a networ...
Open Knowledge Institutions: Is there a future for the university in a networ...Open Knowledge Institutions: Is there a future for the university in a networ...
Open Knowledge Institutions: Is there a future for the university in a networ...Cameron Neylon
Ā 
Research Excellence is a Neo-Colonial Agenda
Research Excellence is a Neo-Colonial AgendaResearch Excellence is a Neo-Colonial Agenda
Research Excellence is a Neo-Colonial AgendaCameron Neylon
Ā 
Network Enabled Research: Connectivity, groups and growth in the production o...
Network Enabled Research: Connectivity, groups and growth in the production o...Network Enabled Research: Connectivity, groups and growth in the production o...
Network Enabled Research: Connectivity, groups and growth in the production o...Cameron Neylon
Ā 
Open Science Needs Open Indicators
Open Science Needs Open IndicatorsOpen Science Needs Open Indicators
Open Science Needs Open IndicatorsCameron Neylon
Ā 
Excellence is a neo-colonial agenda...and what we can do about
Excellence is a neo-colonial agenda...and what we can do aboutExcellence is a neo-colonial agenda...and what we can do about
Excellence is a neo-colonial agenda...and what we can do aboutCameron Neylon
Ā 
The Power of Infrastructures and the Infrastructures of Power
The Power of Infrastructures and the Infrastructures of PowerThe Power of Infrastructures and the Infrastructures of Power
The Power of Infrastructures and the Infrastructures of PowerCameron Neylon
Ā 
Will we still know ourselves? Identity and Community in a Transforming Knowle...
Will we still know ourselves? Identity and Community in a Transforming Knowle...Will we still know ourselves? Identity and Community in a Transforming Knowle...
Will we still know ourselves? Identity and Community in a Transforming Knowle...Cameron Neylon
Ā 
Beyond Open: Culture and Scaling in the Making of Knowledge
Beyond Open: Culture and Scaling in the Making of KnowledgeBeyond Open: Culture and Scaling in the Making of Knowledge
Beyond Open: Culture and Scaling in the Making of KnowledgeCameron Neylon
Ā 
Excellence is Bullshit
Excellence is BullshitExcellence is Bullshit
Excellence is BullshitCameron Neylon
Ā 
From Cycles to Networks
From Cycles to NetworksFrom Cycles to Networks
From Cycles to NetworksCameron Neylon
Ā 
Where next for Open Scholarship?
Where next for Open Scholarship?Where next for Open Scholarship?
Where next for Open Scholarship?Cameron Neylon
Ā 
Openness in Scholarship: A return to core values?
Openness in Scholarship: A return to core values?Openness in Scholarship: A return to core values?
Openness in Scholarship: A return to core values?Cameron Neylon
Ā 
Interpreting Shadows on the Elephant in the Room
Interpreting Shadows on the Elephant in the RoomInterpreting Shadows on the Elephant in the Room
Interpreting Shadows on the Elephant in the RoomCameron Neylon
Ā 
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...Sustaining Scholarly Infrastructures through Collective Action: The lessons t...
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...Cameron Neylon
Ā 
Sustainable Futures for Research Communication
Sustainable Futures for Research CommunicationSustainable Futures for Research Communication
Sustainable Futures for Research CommunicationCameron Neylon
Ā 
Investing in Scholarly Futures
Investing in Scholarly FuturesInvesting in Scholarly Futures
Investing in Scholarly FuturesCameron Neylon
Ā 
Excellence, Innovation, Evaluation: Collaboration x Innovation
Excellence, Innovation, Evaluation: Collaboration x InnovationExcellence, Innovation, Evaluation: Collaboration x Innovation
Excellence, Innovation, Evaluation: Collaboration x InnovationCameron Neylon
Ā 
No stories without evidence, no evidence without stories
No stories without evidence, no evidence without storiesNo stories without evidence, no evidence without stories
No stories without evidence, no evidence without storiesCameron Neylon
Ā 

More from Cameron Neylon (20)

OA Advocacy Today
OA Advocacy TodayOA Advocacy Today
OA Advocacy Today
Ā 
Open Knowledge Institutions: Is there a future for the university in a networ...
Open Knowledge Institutions: Is there a future for the university in a networ...Open Knowledge Institutions: Is there a future for the university in a networ...
Open Knowledge Institutions: Is there a future for the university in a networ...
Ā 
Research Excellence is a Neo-Colonial Agenda
Research Excellence is a Neo-Colonial AgendaResearch Excellence is a Neo-Colonial Agenda
Research Excellence is a Neo-Colonial Agenda
Ā 
Network Enabled Research: Connectivity, groups and growth in the production o...
Network Enabled Research: Connectivity, groups and growth in the production o...Network Enabled Research: Connectivity, groups and growth in the production o...
Network Enabled Research: Connectivity, groups and growth in the production o...
Ā 
Open Science Needs Open Indicators
Open Science Needs Open IndicatorsOpen Science Needs Open Indicators
Open Science Needs Open Indicators
Ā 
Excellence is a neo-colonial agenda...and what we can do about
Excellence is a neo-colonial agenda...and what we can do aboutExcellence is a neo-colonial agenda...and what we can do about
Excellence is a neo-colonial agenda...and what we can do about
Ā 
The Power of Infrastructures and the Infrastructures of Power
The Power of Infrastructures and the Infrastructures of PowerThe Power of Infrastructures and the Infrastructures of Power
The Power of Infrastructures and the Infrastructures of Power
Ā 
Will we still know ourselves? Identity and Community in a Transforming Knowle...
Will we still know ourselves? Identity and Community in a Transforming Knowle...Will we still know ourselves? Identity and Community in a Transforming Knowle...
Will we still know ourselves? Identity and Community in a Transforming Knowle...
Ā 
Beyond Open: Culture and Scaling in the Making of Knowledge
Beyond Open: Culture and Scaling in the Making of KnowledgeBeyond Open: Culture and Scaling in the Making of Knowledge
Beyond Open: Culture and Scaling in the Making of Knowledge
Ā 
Excellence is Bullshit
Excellence is BullshitExcellence is Bullshit
Excellence is Bullshit
Ā 
From Cycles to Networks
From Cycles to NetworksFrom Cycles to Networks
From Cycles to Networks
Ā 
Where next for Open Scholarship?
Where next for Open Scholarship?Where next for Open Scholarship?
Where next for Open Scholarship?
Ā 
Openness in Scholarship: A return to core values?
Openness in Scholarship: A return to core values?Openness in Scholarship: A return to core values?
Openness in Scholarship: A return to core values?
Ā 
Interpreting Shadows on the Elephant in the Room
Interpreting Shadows on the Elephant in the RoomInterpreting Shadows on the Elephant in the Room
Interpreting Shadows on the Elephant in the Room
Ā 
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...Sustaining Scholarly Infrastructures through Collective Action: The lessons t...
Sustaining Scholarly Infrastructures through Collective Action: The lessons t...
Ā 
Sustainable Futures for Research Communication
Sustainable Futures for Research CommunicationSustainable Futures for Research Communication
Sustainable Futures for Research Communication
Ā 
Warning
WarningWarning
Warning
Ā 
Investing in Scholarly Futures
Investing in Scholarly FuturesInvesting in Scholarly Futures
Investing in Scholarly Futures
Ā 
Excellence, Innovation, Evaluation: Collaboration x Innovation
Excellence, Innovation, Evaluation: Collaboration x InnovationExcellence, Innovation, Evaluation: Collaboration x Innovation
Excellence, Innovation, Evaluation: Collaboration x Innovation
Ā 
No stories without evidence, no evidence without stories
No stories without evidence, no evidence without storiesNo stories without evidence, no evidence without stories
No stories without evidence, no evidence without stories
Ā 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĆŗjo
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 

Walking the walk - the practical experience of Web2 in research

  • 1. Walking the Walk The experience of using Web 2.0 tools in active research projects Cameron Neylon
  • 2. 1. The long tail 2. Data is the next Intel inside 3. Users add value 4. Network effects by default 5. Some rights reserved 6. Perpetual Beta 7. Cooperate donā€™t control 8. Software above the level of a single device http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=5
  • 3. What does Web 2.0 offer a researcher in practice? http://ļ¬‚ickr.com/photos/heymans/480396810/
  • 5. ā€¢ Open tender and response ā€¢ Not mass participation or opinion markets ā€¢ There just arenā€™t that many researchers ā€¢ A good community and a well built and cared for network are critical
  • 8. 27 January 2009 February 1 2009 http://gowers.wordpress.com/
  • 9. 27 January 2009 February 1 2009 March 10 2009 http://gowers.wordpress.com/
  • 10. ā€¢ Successful project ā€¢ Small core group of participants ā€¢ Much larger group of watchers ā€¢ Concerns over embarrassment, keeping up, mechanisms for giving credit ā€¢ Issues over management of large numbers of very active threads
  • 16. 113 individual measurements (plus 71 literature values) 14 researchers in four countries One undergraduate chemistry class $6000 funding (for prizes and chemicals)
  • 17. 113 individual measurements (plus 71 literature values) 14 researchers in four countries One undergraduate chemistry class $6000 funding (for prizes and chemicals) Four months One (invited) book chapter submitted Second paper in preparation
  • 18. ā€¢ Collaboration enabled via open data licensing ā€¢ Still relatively small numbers of people ā€¢ Are massive collaborative projects even possible? ā€¢ 90% arenā€™t aware of it, 9% are passive watchers ā€¢ 0.9% make occasional contributions and 0.1% are core players - does that add up to more than one?
  • 20.
  • 21.
  • 22. ā€¢ Compelling and comprehensible story ā€¢ Much work gone into building a system that enables people to make a contribution ā€¢ Responsive and appealing user experience ā€¢ Still a self selecting community but drawn from a much wider pool
  • 25. ā€¢ ā€œItā€™s going to be great but we need to put a lot of work into getting it going...ā€ ā€¢ ā€œI donā€™t have the time to put all the stuff in...ā€ ā€¢ Get what the advantages are but havenā€™t necessarily bought in to the process ā€¢ Concerns over data re-use and ā€œscoopingā€
  • 26. Where does this leave us?
  • 27. 1. The long tail 2. Data is the next Intel inside 3. Users add value 4. Network effects by default 5. Some rights reserved 6. Perpetual Beta 7. Cooperate donā€™t control 8. Software above the level of a single device http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html?page=5
  • 28. 1. The long tail
  • 29. 1. The long tail ugh eno fat snā€™t i unless you w ork real hard at it c.f. galaxy zo o, FoldIt etc .
  • 30. 2. Data is the new Intel inside well duh!
  • 31. nt to a w ou 3. Users add value Y but why do they want t o?
  • 32. 4. Network effects by default
  • 33. 4. Network effects by default SP rU ou sy atā€™ th if ow ut pn b eu giv en th
  • 34. 5. Some rights reserved licensing matters, even i f everyone thinks itā€™s bori ng
  • 35. is not an excuse for giving people rubbish 6. Perpetual beta
  • 36. is not an excuse for giving people rubbish 6. Perpetual beta
  • 37. is not an excuse for giving people rubbish 6. Perpetual beta provement continual im
  • 38. ating tegr in in e lies valu l the Al g it ardin n ho not i data, 7. Cooperate donā€™t control
  • 39. ating tegr in in e lies valu l the Al g it ardin n ho not i data, 7. Cooperate donā€™t control licensing matters, even i f everyone thinks itā€™s bori ng
  • 40. ating tegr in in e lies valu l the Al g it ardin n ho not i data, 7. Cooperate donā€™t control licensing matters, even i f everyone thinks itā€™s bori ng ecause it ike is bad b share-al perability eaks intero br
  • 41. 8. Software above the level of a single device
  • 42. collaboration 8. Software above the level of a single device
  • 43. collaboration 8. Software above the level of a single device vice ser
  • 44. What are the design patterns for successful research tools?
  • 45. 1. Deļ¬ne and understand your target audience 2. Solve a pressing problem they have or tell them a story they understand and want to contribute to 3. Build the service into an existing workļ¬‚ow or a established framework that the target audience understands 4. Get the licensing right and give users a sense of control over their own data and contribution 5. Build for network effects but donā€™t rely on them 6. Plan to build (and resource the building of) your community 7. Build for interoperability; technical and legal
  • 46. Friendfeed as a research community
  • 49. Pulling items from external services via RSS
  • 50. ā€¢ Aggregating content (solving a problem) ā€¢ Works without a network; network effects follow ā€¢ Collecting comments and ratings (data) ā€¢ Straightforward pumping of data in and pulling it backout via API (licensing, interoperability) ā€¢ Community, community, community ā€¢ Building your own network
  • 51. If you just build it they (probably) wonā€™t come
  • 52. If you donā€™t build it they deļ¬nitely wonā€™t come
  • 53. The community is more important than the service