recommended reading

G-8 Seeks Apps for Agriculture

Ruud Morijn Photographer/Shutterstock.com

The U.S. government launched a new agriculture data community on Monday during a special Group of 8 conference in Washington aimed at using open data to produce better crops and more efficient markets.

The two day G-8 Conference is focused on better sharing of information that can improve agricultural performance internationally, ranging from data about plants’ genetic makeup to information about climate change and the computer code that underlies new farming technology.

The conference is also aimed at spurring entrepreneurs to use open agriculture data to develop Web and mobile applications for farmers and researchers.

Officials hope sharing more agricultural data will have the same effect as opening up weather and Global Positioning System data, which produced billion dollar industries.

The agriculture community will join other data sharing communities on the U.S. government information repository Data.gov on topics such as energy, manufacturing and oceans.

“This is one very important step in President Obama’s effort to ensure the direct results of our scientific research are available for the public and industry and the entire scientific community,” Agriculture Secretary Tom Vilsack said. “It will create a data ecosystem to fuel innovation and meet agricultural challenges we all face.”

The G-8 is composed of representatives from eight of the world’s wealthiest nations.

As an example of agriculture fueled by data sharing, Microsoft founder and global development advocate Bill Gates cited the Next Generation Cassava Breeding project, which aims to significantly reduce the amount of time it takes to bring new breeds of the cassava plant to market. The project would, in turn, drastically improve yields for African farmers.  

Vilsack cited mobile apps used by Kenyan farmers such as the State Department-sponsored iCow, which helps farmers determine when their cows are most fertile and allows them to track metrics such as daily milk production.

One of the greatest challenges for agriculture innovators and data collectors is the lack of solid metrics from developing nations in Africa and elsewhere, said World Bank Vice President Rachel Kyte. Just one in four African countries publishes basic national crop data, she said. 

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.