recommended reading

The best open data releases of 2012

Digital Genetics\Shutterstock.com

Last year, Cities named ten of its favorite metro datasets of 2011 from cities across North America, illustrating the breadth of what we might learn (regarding mosquito traps! misplaced vehicles! energy consumption!) in the still relatively young field of urban open data. For this year's installment, we're going one step further. Sure, raw data is great. But useful tools, maps and data visualizations built with said data are even better.

Below, you'll find our picks for 2012's best open data releases from municipal vaults, with an emphasis on tools that can be used by anyone, not just developers and data geeks. If we missed your favorite, please add it in the comments.

1. Crime in Philadelphia. Philadelphia snuck onto our 2012 list just under the wire,publishing last week a big data set on all major crimes in the city dating back to January 1, 2006. The data is now updated daily, covering incidents of homicide, rape, robbery, assault and theft. Philadelphia now joins Chicago, which released 10 years of crime data last year. Baltimore has a similar dataset. For Philadelphians more interested in live trends than historic ones, the city is now also mapping recent crimes (see the above graphic). A smart bonus feature: when you click on an individual incident, the map gives you an opportunity to "submit a tip" to the Philadelphia Police Department.

2. Bikeshare rides in Boston. Boston’s Hubway bikeshare system published a massive file of historic trip data earlier this year, then invited riders and developers to turn the information into something useful with a data visualization challenge. This map comes from one of the winners, Ari Ofsevit, showing the average speeds across different routes between bikeshare stations. Capital Bikeshare in Washington also publishes trip data. Nice Ride in Minneapolis did so earlier this year as well, although that release ran into privacy complications when it turned out the anonymoized data wasn’t so anonymous after all.

Read more at The Atlantic Cities

(Image via Digital Genetics/Shutterstock.com)

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.