This presentation is part of the requirements for the Digital Studies and Methods (DSAM) Certificate at the University of Pittsburgh. This presentation was executed on 12 December 2018.
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Data mining and analysis has been dominated by the big looking at the small. Businesses, institutions and governments examine our habits with an eye to commercial opportunities, welfare, and security. However, big data is migrating analysis into the arena of networking and association to enhance services: advertising, ‘pre-selling,’ healthcare, security and tax avoidance reduction. But this leaves the critical arena of Small Data unaddressed - the small looking at the small - individuals and things examining and exploiting their own data.
Here we consider a future of ubiquitous tagging, sensors, measuring and networked monitoring powered by the IoT. Key conclusions see many devices talking to each other at close range with little (or no) need of internet connection, and more network connections generated between things than those on the net.
This document discusses data science and data analytics education. It provides an overview of the WPI Data Science program, which takes an interdisciplinary approach involving the business school and departments of computer science and mathematical sciences. The core curriculum covers topics such as statistical methods, data management, data analytics, and business intelligence. Students in the program come from diverse educational and industry backgrounds. They acquire technical skills in areas like machine learning, big data tools, and programming, as well as professional skills in business uses, teamwork, and communication. The program aims to prepare students to extract value and insights from large and complex data sources.
The document provides an overview of trends impacting government agencies and discusses strategies for the future. It covers the following key points in 3 sentences:
It summarizes current trends among various types of government agencies like housing authorities, park districts, and transit agencies in areas like broadband, data analytics, and drones. It then discusses shifting societal, organizational, and individual trends and potential future trends related to infrastructure, automation, redefining work, and experiencing government. It concludes by offering tactics for government agencies to operate like exponential organizations by innovating, focusing on experiences, finding partners, and being prepared to change.
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
This document outlines a vision for communication programs at a university. It proposes renaming the Faculty of Communication and Information to the Faculty of Creative Enterprise to promote more innovative thinking. It discusses how communication can be defined broadly as storytelling in business contexts. There is agreement within the industry on core competencies for communication graduates. The document prioritizes securing opportunities for interdisciplinary learning, completing industry engagement initiatives, rethinking postgraduate qualifications, aligning communications with related fields, and enacting an internal communications strategy to promote the faculty.
Mirko Lorenz Data Driven Journalism Overview Seminar Ordine dei Giornalisti d...Massimiliano Crosato
A seminar by Mirko Lorenz @MIRKOLORENZ (EJC European Journalism Center) on Data Driven Journalism topics at Ordine dei Giornalisti del Veneto, Venezia. 14 April 2015 #DDJ
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Data mining and analysis has been dominated by the big looking at the small. Businesses, institutions and governments examine our habits with an eye to commercial opportunities, welfare, and security. However, big data is migrating analysis into the arena of networking and association to enhance services: advertising, ‘pre-selling,’ healthcare, security and tax avoidance reduction. But this leaves the critical arena of Small Data unaddressed - the small looking at the small - individuals and things examining and exploiting their own data.
Here we consider a future of ubiquitous tagging, sensors, measuring and networked monitoring powered by the IoT. Key conclusions see many devices talking to each other at close range with little (or no) need of internet connection, and more network connections generated between things than those on the net.
This document discusses data science and data analytics education. It provides an overview of the WPI Data Science program, which takes an interdisciplinary approach involving the business school and departments of computer science and mathematical sciences. The core curriculum covers topics such as statistical methods, data management, data analytics, and business intelligence. Students in the program come from diverse educational and industry backgrounds. They acquire technical skills in areas like machine learning, big data tools, and programming, as well as professional skills in business uses, teamwork, and communication. The program aims to prepare students to extract value and insights from large and complex data sources.
The document provides an overview of trends impacting government agencies and discusses strategies for the future. It covers the following key points in 3 sentences:
It summarizes current trends among various types of government agencies like housing authorities, park districts, and transit agencies in areas like broadband, data analytics, and drones. It then discusses shifting societal, organizational, and individual trends and potential future trends related to infrastructure, automation, redefining work, and experiencing government. It concludes by offering tactics for government agencies to operate like exponential organizations by innovating, focusing on experiences, finding partners, and being prepared to change.
Telecom customer services appear to be stuck in the early 20th Century with the telephone call the primary channel for service provision that can take days to affect. Compare that to Google, Amazon, IBM, Apple and other modern companies where customers control service provision by the minute or second.
Modem business is driven by the accumulation of customer data, but the Telecom Industry sees vast amounts of customer-related data dormant and untapped. As a result, many new opportunities are lost. For example, the behavior of people, devices, systems, and networks give the earliest indicators of potential security problems.
OTT operators exploit networks and make far greater profits than any other sector and this might be further amplified by the roll-out of 5G. But without a fundamental rethink of FTTP, 5G will fail to deliver sufficient coverage and the advertised data rates. This pending failure is already seeing alternative solutions from outside the industry along with the realization that most ‘things’ on the IoT will never connect to the internet!
This document outlines a vision for communication programs at a university. It proposes renaming the Faculty of Communication and Information to the Faculty of Creative Enterprise to promote more innovative thinking. It discusses how communication can be defined broadly as storytelling in business contexts. There is agreement within the industry on core competencies for communication graduates. The document prioritizes securing opportunities for interdisciplinary learning, completing industry engagement initiatives, rethinking postgraduate qualifications, aligning communications with related fields, and enacting an internal communications strategy to promote the faculty.
Mirko Lorenz Data Driven Journalism Overview Seminar Ordine dei Giornalisti d...Massimiliano Crosato
A seminar by Mirko Lorenz @MIRKOLORENZ (EJC European Journalism Center) on Data Driven Journalism topics at Ordine dei Giornalisti del Veneto, Venezia. 14 April 2015 #DDJ
These technologies are gradually reshaping the financial services industry:
- Artificial intelligence, deep learning, analytics, blockchain, and robotic process automation are emerging technologies applied in finance.
- Analytics has been a top technology trend for over a decade and is going through four stages from basic business intelligence to real-time streaming analytics.
- Blockchain uses distributed ledger technologies and consensus algorithms to securely record transactions in a decentralized manner, having applications for cryptocurrency, smart contracts, and identity management.
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...Lucidworks
Policing in the next decade is anticipated to be very different from historical methods. More data driven, more focused on the intricacies of communities they serve and more open and collaborative to make informed recommendations a reality. Whether its social populations, NIBRS or organization improvement that’s the driver, the IT requirement is largely the same. Provide 360 access to large volumes of siloed data to gain a full 360 understanding of existing connections and patterns for improved insight and recommendation.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data innovation improves officers' engagement with existing data and streamlines investigation workflows by enhancing collaboration. This improved visibility into existing police data allows for a more intelligent and responsive police force.
In this webinar, we'll cover:
The technology needs of an intelligent police force.
How a Global Search improves an officer's interaction with existing data.
Featuring
-Simon Taylor, VP, Worldwide Channels & Alliances, Lucidworks
-Michael Cizmar, Managing Director, MC+A
-Ian Williams, Manager of Analytics & Innovation, Toronto Police Service
This talk introduces microservices as a tool in an API developer's arsenal. We'll introduce what they are, see how and why they could fit into a modern application (and when they may not), and tools that will make dealing with a microservices architecture easier than ever before.
The document discusses the role of artificial intelligence and data in conflict resolution. It notes that technology is not isolated from politics and power is concentrated in few countries. It provides examples of how data and maps can be used as political tools, and how citizens can actively contribute data. The document also cautions that we should not assume computers always get it right, and that trade-off analytics using AI like IBM Watson may help negotiations but many questions remain unanswered.
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Lucidworks
Intelligent Policing. Leveraging Data to more effectively Serve Communities.
Policing in the next decade is anticipated to be very different from historical methods. More data driven, more focused on the intricacies of communities they serve and more open and collaborative to make informed recommendations a reality. Whether its social populations, NIBRS or organization improvement that’s the driver, the IT requirement is largely the same. Provide 360 access to large volumes of siloed data to gain a full 360 understanding of existing connections and patterns for improved insight and recommendation.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data innovation improves officers' engagement with existing data and streamlines investigation workflows by enhancing collaboration. This improved visibility into existing police data allows for a more intelligent and responsive police force.
In this webinar, we'll cover:
-The technology needs of an intelligent police force.
-How a Global Search improves an officer's interaction with existing data.
Featuring:
-Simon Taylor, VP, Worldwide Channels & Alliances, Lucidworks
-Michael Cizmar, Managing Director, MC+A
-Ian Williams, Manager of Analytics & Innovation, Toronto Police Service
Policing organizations face the same data access challenges as other organizations. Large volumes of siloed data make getting a full 360 understanding of existing connections and patterns difficult.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis across platforms difficult. The document proposes using open standards like xAPI to improve interoperability and enable more personalized, lifelong learning through analytics. It highlights lessons from developing the Connected Learning Analytics Toolkit to process multi-source data, including the importance of context and using recipes to define common data structures.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective across multiple contexts. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis difficult. The document proposes using open standards like xAPI to better link learning data across systems and support personalized, lifelong learning through interoperable analysis.
Launch of the Digital Trade Estimates Project in Brussels (12 October 2016). You can browse our database of measures on digital trade at www.ecipe.org/dte/database
SELF-INTEREST IN INNOVATION DIFFUSION DECISION PROCESS: THE CASE OF EXTENDIN...Idongesit Williams (Ph.D)
read full paper at:https://www.researchgate.net/publication/237194989_Self_-_Interest_in_Innovation_Diffusion_ProcessThe_Case_of_Extending_Broadband_Internet_Services_to_Rural_Areas_in_Ghana?ev=prf_pub
The document describes mapping strategies and techniques used at the Claremont Colleges library. It discusses mapping the learner experience, contexts like the 7 Claremont campuses, curriculum mapping, and using maps for assessment, planning, community building, and visualization. A case study describes creating a map of the Environmental Analysis program that informed instruction strategies and outcomes like integrating the map into the program's website. The library then scaled up its mapping efforts using an IMLS grant.
Presentation from the Austin Regional CIO Conference on August 14, 2018. Uber, Amazon, Alexa, Siri, AirBnB – these are just a few of the innovations that have given rise to entirely new paradigms in customer experience. Can government do the same? Absolutely. There’s not really much choice. Sooner or later, it must be done. The good news is that it’s closer and more attainable than one might think. This session looks at innovative tools and strategies that can revamp and revitalize government’s relationship with its citizens.
The document describes the Digital Trade Estimates project which aims to track measures impacting digital trade across 65 countries. The project includes a database of over 1000 measures across 13 areas of digital trade. It also includes the development of a Digital Trade Estimates Index and annual reports. The database aims to provide a comprehensive, regularly updated resource on digital trade barriers and regulations.
Como transformar servidores em cientistas de dados e diminuir a distância ent...Rommel Carvalho
Palestra ministrada pelo Dr. Rommel Novaes Carvalho, Coordenador-Geral do Observatório da Despesa Pública e Professor do Mestrado Profissional em Computação Aplicada da UnB.
Evento: Brasil 100% Digital: Integração e transparência a serviço da sociedade
Website: http://www.brasildigital.gov.br/
Data: 10/11/2016
Vídeo: https://www.youtube.com/watch?v=3WYQlPR-RLw&feature=youtu.be&t=2h4m44s
Internet of Things (IoT) Past, Present, and FutureLosant
A look at the state of the Internet of Things in the world today. This includes a brief history of how the term came to be and how we got to our present place.
Today, in the world of IoT there are a number of industries that are taking advantage of the technology. This includes manufacturing, logistics, retail, and more.
Finally, this includes a brief description of Losant, https://losant.com. Losant is an IoT developer platform for building connected solutions.
This was originally presented to The Circuit in Cincinnati on May 19, 2016.
In most developed nations the proportion of old people is increasing along with their demands on healthcare services as they transit toward their eventual exit from this life. People no longer, live, work, retire and die in short order! Far more likely, they experience a series of complex, and often protracted, episodes an a concatenation of individual organ failure.
We therefore see a growing healthcare crisis across the First World with politicians resorting to very simple/similar ‘spend more, train more, and support more’ solutions. But this lacks any deep analysis. Reality is that no amount of money or people will cure this - it is a self sustaining loop of medical advance, improving survival rates, longer life spans, falling birth rates, fewer young people of sufficient talents, and reducing tax returns!
“This is an complex (non-linear) problem & there are no simple solutions”
Doing more with less, but far better, at a lower cost, by continually exploiting the latest technology is something already been pioneered/experienced by industry. It is the basic mechanism that now powers our progress - including many supporting healthcare technologies. This general principle is now a long overdue essential for healthcare professionals and patients; and absolutely necessary, if are to see any significant improvement in services.
Here we present examples of technologies that are available toady and most likely to be available in the next decade along with some necessary and key behavioural and responsibility changes.
The document discusses 4th generation data warehousing and analytics. It describes integrating both structured and unstructured data from internal and external sources using a data supply framework. This framework includes an operational data store, data warehouse, analytics data store, and data marts to support strategic, tactical and operational decision making. It also discusses using descriptive and predictive analytics from big data and measuring the outcomes and benefits.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
More Related Content
Similar to Rose dsam capstone presentation 12 dec 2018
These technologies are gradually reshaping the financial services industry:
- Artificial intelligence, deep learning, analytics, blockchain, and robotic process automation are emerging technologies applied in finance.
- Analytics has been a top technology trend for over a decade and is going through four stages from basic business intelligence to real-time streaming analytics.
- Blockchain uses distributed ledger technologies and consensus algorithms to securely record transactions in a decentralized manner, having applications for cryptocurrency, smart contracts, and identity management.
[Webinar] Intelligent Policing. Leveraging Data to more effectively Serve Com...Lucidworks
Policing in the next decade is anticipated to be very different from historical methods. More data driven, more focused on the intricacies of communities they serve and more open and collaborative to make informed recommendations a reality. Whether its social populations, NIBRS or organization improvement that’s the driver, the IT requirement is largely the same. Provide 360 access to large volumes of siloed data to gain a full 360 understanding of existing connections and patterns for improved insight and recommendation.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data innovation improves officers' engagement with existing data and streamlines investigation workflows by enhancing collaboration. This improved visibility into existing police data allows for a more intelligent and responsive police force.
In this webinar, we'll cover:
The technology needs of an intelligent police force.
How a Global Search improves an officer's interaction with existing data.
Featuring
-Simon Taylor, VP, Worldwide Channels & Alliances, Lucidworks
-Michael Cizmar, Managing Director, MC+A
-Ian Williams, Manager of Analytics & Innovation, Toronto Police Service
This talk introduces microservices as a tool in an API developer's arsenal. We'll introduce what they are, see how and why they could fit into a modern application (and when they may not), and tools that will make dealing with a microservices architecture easier than ever before.
The document discusses the role of artificial intelligence and data in conflict resolution. It notes that technology is not isolated from politics and power is concentrated in few countries. It provides examples of how data and maps can be used as political tools, and how citizens can actively contribute data. The document also cautions that we should not assume computers always get it right, and that trade-off analytics using AI like IBM Watson may help negotiations but many questions remain unanswered.
Intelligent Insight Driven Policing with MC+A, Toronto Police Service and Luc...Lucidworks
Intelligent Policing. Leveraging Data to more effectively Serve Communities.
Policing in the next decade is anticipated to be very different from historical methods. More data driven, more focused on the intricacies of communities they serve and more open and collaborative to make informed recommendations a reality. Whether its social populations, NIBRS or organization improvement that’s the driver, the IT requirement is largely the same. Provide 360 access to large volumes of siloed data to gain a full 360 understanding of existing connections and patterns for improved insight and recommendation.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data innovation improves officers' engagement with existing data and streamlines investigation workflows by enhancing collaboration. This improved visibility into existing police data allows for a more intelligent and responsive police force.
In this webinar, we'll cover:
-The technology needs of an intelligent police force.
-How a Global Search improves an officer's interaction with existing data.
Featuring:
-Simon Taylor, VP, Worldwide Channels & Alliances, Lucidworks
-Michael Cizmar, Managing Director, MC+A
-Ian Williams, Manager of Analytics & Innovation, Toronto Police Service
Policing organizations face the same data access challenges as other organizations. Large volumes of siloed data make getting a full 360 understanding of existing connections and patterns difficult.
Join us for a round table discussion of how the Toronto Police Service is better serving their community through deploying a unified intelligent data platform.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis across platforms difficult. The document proposes using open standards like xAPI to improve interoperability and enable more personalized, lifelong learning through analytics. It highlights lessons from developing the Connected Learning Analytics Toolkit to process multi-source data, including the importance of context and using recipes to define common data structures.
Data Interoperability for Learning Analytics and Lifelong LearningMegan Bowe
This document discusses the need for data interoperability to enable lifelong learning analytics. It notes that currently most learning analytics focus on understanding and optimizing formal learning environments rather than the learner perspective across multiple contexts. The lack of interoperability between different education systems means data is often stored in incompatible ways, making analysis difficult. The document proposes using open standards like xAPI to better link learning data across systems and support personalized, lifelong learning through interoperable analysis.
Launch of the Digital Trade Estimates Project in Brussels (12 October 2016). You can browse our database of measures on digital trade at www.ecipe.org/dte/database
SELF-INTEREST IN INNOVATION DIFFUSION DECISION PROCESS: THE CASE OF EXTENDIN...Idongesit Williams (Ph.D)
read full paper at:https://www.researchgate.net/publication/237194989_Self_-_Interest_in_Innovation_Diffusion_ProcessThe_Case_of_Extending_Broadband_Internet_Services_to_Rural_Areas_in_Ghana?ev=prf_pub
The document describes mapping strategies and techniques used at the Claremont Colleges library. It discusses mapping the learner experience, contexts like the 7 Claremont campuses, curriculum mapping, and using maps for assessment, planning, community building, and visualization. A case study describes creating a map of the Environmental Analysis program that informed instruction strategies and outcomes like integrating the map into the program's website. The library then scaled up its mapping efforts using an IMLS grant.
Presentation from the Austin Regional CIO Conference on August 14, 2018. Uber, Amazon, Alexa, Siri, AirBnB – these are just a few of the innovations that have given rise to entirely new paradigms in customer experience. Can government do the same? Absolutely. There’s not really much choice. Sooner or later, it must be done. The good news is that it’s closer and more attainable than one might think. This session looks at innovative tools and strategies that can revamp and revitalize government’s relationship with its citizens.
The document describes the Digital Trade Estimates project which aims to track measures impacting digital trade across 65 countries. The project includes a database of over 1000 measures across 13 areas of digital trade. It also includes the development of a Digital Trade Estimates Index and annual reports. The database aims to provide a comprehensive, regularly updated resource on digital trade barriers and regulations.
Como transformar servidores em cientistas de dados e diminuir a distância ent...Rommel Carvalho
Palestra ministrada pelo Dr. Rommel Novaes Carvalho, Coordenador-Geral do Observatório da Despesa Pública e Professor do Mestrado Profissional em Computação Aplicada da UnB.
Evento: Brasil 100% Digital: Integração e transparência a serviço da sociedade
Website: http://www.brasildigital.gov.br/
Data: 10/11/2016
Vídeo: https://www.youtube.com/watch?v=3WYQlPR-RLw&feature=youtu.be&t=2h4m44s
Internet of Things (IoT) Past, Present, and FutureLosant
A look at the state of the Internet of Things in the world today. This includes a brief history of how the term came to be and how we got to our present place.
Today, in the world of IoT there are a number of industries that are taking advantage of the technology. This includes manufacturing, logistics, retail, and more.
Finally, this includes a brief description of Losant, https://losant.com. Losant is an IoT developer platform for building connected solutions.
This was originally presented to The Circuit in Cincinnati on May 19, 2016.
In most developed nations the proportion of old people is increasing along with their demands on healthcare services as they transit toward their eventual exit from this life. People no longer, live, work, retire and die in short order! Far more likely, they experience a series of complex, and often protracted, episodes an a concatenation of individual organ failure.
We therefore see a growing healthcare crisis across the First World with politicians resorting to very simple/similar ‘spend more, train more, and support more’ solutions. But this lacks any deep analysis. Reality is that no amount of money or people will cure this - it is a self sustaining loop of medical advance, improving survival rates, longer life spans, falling birth rates, fewer young people of sufficient talents, and reducing tax returns!
“This is an complex (non-linear) problem & there are no simple solutions”
Doing more with less, but far better, at a lower cost, by continually exploiting the latest technology is something already been pioneered/experienced by industry. It is the basic mechanism that now powers our progress - including many supporting healthcare technologies. This general principle is now a long overdue essential for healthcare professionals and patients; and absolutely necessary, if are to see any significant improvement in services.
Here we present examples of technologies that are available toady and most likely to be available in the next decade along with some necessary and key behavioural and responsibility changes.
The document discusses 4th generation data warehousing and analytics. It describes integrating both structured and unstructured data from internal and external sources using a data supply framework. This framework includes an operational data store, data warehouse, analytics data store, and data marts to support strategic, tactical and operational decision making. It also discusses using descriptive and predictive analytics from big data and measuring the outcomes and benefits.
Similar to Rose dsam capstone presentation 12 dec 2018 (20)
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
The Microsoft 365 Migration Tutorial For Beginner.pptx
Rose dsam capstone presentation 12 dec 2018
1. School of Computing & Information
U N I V E R S I T Y O F P I T T S B U R G H
Telecom Policy, Regulation, & Enforcement
Radio Spectrum
Digital Studies and Methods Certificate
Capstone
J Stephanie Rose
JSR67@PITT.EDU
DSAM Portfolio: http://www.pitt.edu/~jsr67/radio.html
12 December 2018
2. OVERVIEW
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Public Knowledge. “https://www.publicknowledge.org/news-blog/videos/wireless-spectrum-
how-to-use-it-and-why-you-might-lose-it”. 14 Feb 2014
3. INTRODUCTION
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Electromagnetic Spectrum & Regulation – Enforcement
Spectrum is everywhere, and the need for it is increasing
The Federal Communications Commission (FCC) – A Regulatory Authority
Current spectrum solutions focus on how to manage access to spectrum better
Enforcement of spectrum is not usually considered or discussed
So what does the FCC do besides allocate spectrum as a part of their regulatory obligations?
4. THE DATASET
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
In 2017, I came across the FCC Enforcement Bureau (EB) transitional website. The EB
adjudicates various violations that fall under the purview of the FCC.
8000+ records (administrative decisions, violations, market disputes, case dismissals, etc.)
Not coded in a way for traditional digital methods of data collection ( e.g. scraping)
Unorganized in many ways (inconsistent record keeping, broken/missing links, not searchable)
FCC Database– Recap
Reviewed each record and parsed out spectrum specific violations
National Archives– Recap
Archives II Visit – Hoped to find supplemental information to incorporate into my dataset
5. THE DATASET CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
6. PREVIOUS ITERATIONS
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Research Questions:
How often does spectrum interference occur?
Who are the primary offenders (individuals, businesses, etc.)?
What kind of offenses/ interference occurs?
Project Goals:
Initial data collection
Testing digital tools
Analyzing w/ each iteration
Reflecting on the entire process and future goals
The previous iterations were like dating a data collection approach and flirting with digital tools.
7. MILESTONE I - LIS 3600 | FALL 2017
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
My initial data collection and first digital tools
What is the best method for collecting this data, it cannot be scraped
Welcome to Geospatial Information Systems
What kinds of GIS tools exist and how do I use them?
What do the results tell me?
8. MILESTONE I - LIS 3600 | FALL 2017
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ1 | How often does spectrum interference occur?
9. MILESTONE I - LIS 3600 | FALL 2017
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ2 | Who are the primary offenders (individuals, businesses, etc.)?
10. MILESTONE I - LIS 3600 | FALL 2017
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ3 | What kind of offenses/ interference occurs?
11. MILESTONE II - LIS 3902 | SPRING
2018
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
More data collection and narrowing down digital tools
Consistent data collection
Adopted Tableau
Started running into errors regarding importing my data into tools
Results remained mostly the same as milestone I
12. MILESTONE II - LIS 3902 | SPRING
2018 CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ1 | How often does spectrum interference occur?
13. MILESTONE II - LIS 3902 | SPRING
2018 CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ2 | Who are the primary offenders (individuals, businesses, etc.)?
14. MILESTONE II - LIS 3902 | SPRING
2018 CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ3 | What kind of offenses/ interference occurs?
15. POINTS OF FAILURE – Discarded Digital Tools & Methods
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Some tools were not the best approach for my data, also some user error and teachable
moments
Color Brewer
No description for data
Scribble Maps
Intimidating
QGIS
Also Intimidating, but may have future promise
CAST
Required additional plug-ins
Google Fusion Tables
Works, but…no longer being maintained
Voyant?
16. ADOPTED DIGITAL TOOLS & METHODS
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Down to Two Tools
Google Maps
Familiarity
Able to embed into a website (e.g. digital portfolio)
Easy to read legend
Descriptive information for each violation event - FULL
Tableau
Variety of visualization tools (e.g. bubble plots, traditional charts and graphs, etc.)
Link data sources
Ready to import data such as the U.S. Census
17. LEARNING OPPORTUNITIES
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
DATA 101: INTRODUCTION TO MAPPING
Hands-on activities where we plotted and mapped different things
Spatial thinking
SHANNON MATTERN
Programmatic themes and group work
Other disciplines and their approach
LUNCH W/ ANNETTE VEE
Discussion about spectrum and administrative red tape
Keep trucking…
18. LEARNING OPPORTUNITIES
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
JACK HESSEL
Computer-based workshop – machine learning
In the future, I may want to attempt to adopt machine learning the records
WORLD HISTORY SYMPOSIUM (w/ GIS WORKSHOP)
Exposure to a discipline I am not traditionally exposed to
How they deal with data and GIS
19. Milestone III - Capstone | Fall 2018
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
The final stretch of my research… for now.
Research Questions:
How often does spectrum interference occur?
Who are the primary offenders (individuals, businesses, etc.)?
What kind of offenses/ interference occurs?
Project Goals:
Complete data collection
Parse out spectrum violations and clean data
Work with Google Maps and Tableau to resolve errors
Analyze Data
Complete capstone deliverables
20. Milestone III - Capstone | Fall 2018
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ 1 | How often does spectrum interference occur?
21. Milestone III - Capstone | Fall 2018
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ 2 | Who are the primary offenders (individuals, businesses, etc.)?
First Milestone – Fall 2017 Third Milestone – Fall 2018
22. Milestone III - Capstone | Fall 2018
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ 2 | Who are the primary offenders (individuals, businesses, etc.)?
23. Milestone III - Capstone | Fall 2018
CON’D
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
RQ 3 | What kind of offenses/ interference occurs?
24. LIMITATIONS
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
These aren’t real limitations, just learning experiences that have been perceived incorrectly
Data disparities
Inconsistent or missing data – made the decision to drop records (unable to verify at Archives II)
Failure to import records without errors
Had to drop additional data points – cases that were missing city or null valued rows
Skill level
I am still learning
Informational blackouts
Interesting violations, but I got distracted instead of staying on task
25. NOT A LIMITATIONS, BUT A SCARE
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
https://www.fcc.gov/reports-research/maps/fcc-enforcement-actions-against-pirate-radio-location/
26. FUTURE WORK
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Replicate this entire process for my dissertation
Instead of data collection, I will be focused on categorizing the violations
Upgrade my version in Tableau
Dedicate time to QGIS
Sufficient time to analyze and investigate different perspectives or unobserved factors
that are effecting my data (e.g. policy changes, FCC manpower and operations, and NTIA)
27. FINAL REFLECTION & DISCUSSION
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Everything is a learning process and even mistakes and mishaps can produce progress
Exposed to a suite of GIS tools, learning opportunities, and people
The iterative process works
Approaching my research from a new perspective
An aside for my DSAM colleagues:
“Take meticulous notes, you’ll thank me later”
28. S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
QUESTIONS?
29. LINKS TO IMPORTANT PRES THINGS
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Spectrum Globe – My GoogleMaps Only
The FCC Data - 1999 View
Tableau Online - Not the Same as My Desktop Versions, yes I have multiple – no linkage
FCC Action Against Pirate Radio – Is My Research Redundant?
The Guardian – The GIS I Really Liked
30. ADDITIONAL SLIDES – GIS Goals
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
The Visualization I Really Wanted My End Product to Look Like
The Guardian
https://www.theguardian.com/environment/interactive/2013/may/14
/alaska-villages-frontline-global-warming
31. ADDITIONAL POINTS OF FAILURE
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
More about Google Maps and Errors
Added supplemental data, that cleared up some of the issues however, since some of the
records do not include all of the location data a few records needed to be dropped from the
imported dataset.
32. ADDITIONAL POINTS OF FAILURE
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
More about Tableau and Errors
Unable to locate specific points
33. ADDITIONAL POINTS OF FAILURE
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
More about Voyant and Errors
Similar to the issue with not being able to scrape, I believe this error may have been
thrown due to the way the documents are encoded.
34. ADDITIONAL POINTS OF FAILURE
S c h o o l o f C o m p u t i n g & I n f o r m a t i o n S c i e n c e s a t P i t t | w w w . s c i . p i t t . e d u
Excel and GIS
TBD