{"id":1722,"date":"2010-06-03T23:09:21","date_gmt":"2010-06-04T03:09:21","guid":{"rendered":"http:\/\/www.easterbrook.ca\/steve\/?p=1722"},"modified":"2010-06-03T23:09:21","modified_gmt":"2010-06-04T03:09:21","slug":"reconstructing-context-from-email-databases","status":"publish","type":"post","link":"http:\/\/www.easterbrook.ca\/steve\/2010\/06\/reconstructing-context-from-email-databases\/","title":{"rendered":"Reconstructing context from email databases"},"content":{"rendered":"<p>I thought I wouldn&#8217;t blog any more about the CRU emails story, but this one is very close to my heart, so I can&#8217;t pass it up. Brian Angliss, over at Scholars and Rogues, has written <a title=\"Scholars and Rogues: How much context is in the Climategate emails?\" href=\"http:\/\/www.scholarsandrogues.com\/2010\/06\/03\/context-climategate-emails\/\" target=\"_blank\">an excellent piece on the lack of context in the stolen emails<\/a>, and the reliability of any conclusions that might be based on them. To support his analysis, he quotes extensively from the paper &#8220;<a title=\"Aranda and Venolia, ICSE 2009\" href=\"http:\/\/portal.acm.org\/citation.cfm?id=1555045\" target=\"_blank\">the Secret Life of Bugs<\/a>&#8221; by Jorge Aranda and Gena Venolia from last year&#8217;s ICSE, in which they convincingly demonstrated that electronic records of discussions about software bugs are frequently unreliable, and that there is a big difference between the recorded discussions and what you find when you actually track down the participants and ask them directly.<\/p>\n<p>BTW <a title=\"Jorge's blog, Catenary\" href=\"http:\/\/catenary.wordpress.com\/\" target=\"_blank\">Jorge will be defending his PhD thesis<\/a> in a couple of weeks, and it&#8217;s full of interesting ideas about how software teams develop a shared understanding of the software they develop, and the implications that this has on team organisation. I&#8217;ll be mining it for ideas to explore in my own\u00a0<a title=\"Serendipity: Studying team coordination and software verification practices for earth system modeling\" href=\"http:\/\/www.easterbrook.ca\/steve\/?p=1701\" target=\"_blank\">studies of climate modellers<\/a> later this year&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I thought I wouldn&#8217;t blog any more about the CRU emails story, but this one is very close to my heart, so I can&#8217;t pass it up. Brian Angliss, over at Scholars and Rogues, has written an excellent piece on the lack of context in the stolen emails, and the reliability of any conclusions that [&hellip;]<\/p>\n","protected":false},"author":392,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/posts\/1722"}],"collection":[{"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/users\/392"}],"replies":[{"embeddable":true,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/comments?post=1722"}],"version-history":[{"count":1,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/posts\/1722\/revisions"}],"predecessor-version":[{"id":1723,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/posts\/1722\/revisions\/1723"}],"wp:attachment":[{"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/media?parent=1722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/categories?post=1722"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.easterbrook.ca\/steve\/wp-json\/wp\/v2\/tags?post=1722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}