A keynote Miguel Paz gave for a brown bag lunch at NPR in April, 2015, organized by the Research, Analysis and Data team of this awesome media organization. While it is focused on NPR most of the ideas apply to other news organizations as well.
Data Journalism lecture - Week 1: Introduction to Data Journalism
Lecture date: 9 Sep 2015
MA in Journalism
National University of Ireland, Galway
Title slide image from The Data Journalism Handbook
The presentatio offers an overview on big data in/for global development - i.e. how big data & data science are being developed in emerging and developing regions.
It is divided in three main sections:
(1) what is big data (as of today) & what is big data in/for development?
(2) Who is actually doing «big data for development»? Who are the main intrnational actors/stakeholders? What are main experiences?
(3) Why are we doing this? - i.e. are we doing this right? What are the main access, capacity / interpretation / ethical issues?
Explainable Fact Checking with Humans in-the-loopMatthew Lease
Invited Keynote at KDD 2021 TrueFact Workshop: Making a Credible Web for Tomorrow, August 15, 2021.
https://www.microsoft.com/en-us/research/event/kdd-2021-truefact-workshop-making-a-credible-web-for-tomorrow/#!program-schedule
Tim Estes - Generating dynamic social networks from large scale unstructured ...Digital Reasoning
Tim Estes, CEO of Digital Reasoning, delivered this presentation at the Strata Conference (Feb 2011). It discusses how large scale blog data can be mined to yield social networks of influencers, connections, discussion topics, etc.
Mining the Social Web for Fun & Profit Within Your OrganizationDigital Reasoning
In this talk, Matthew Russell explores why it is imperative for organizations and companies to leverage social media and how they can do it. In today's world of massive, rapidly evolving data streams, it is very challenging to sift through the data and extract the hidden nuggets of critical business intelligence. With advances in machine learning and natural language processing, decision makers can now look at all of their data and see what's really important. Matthew presents examples of how companies like Digital Reasoning are using social media to answer questions like:
Who know whom, and what friends do they have in common?
How frequently are certain people communicating with one another?
Who are the quietest/chattiest people in a network?
Who are the most influential/popular people in a network?
What are people chatting about (and is it interesting)?
Data Journalism lecture - Week 1: Introduction to Data Journalism
Lecture date: 9 Sep 2015
MA in Journalism
National University of Ireland, Galway
Title slide image from The Data Journalism Handbook
The presentatio offers an overview on big data in/for global development - i.e. how big data & data science are being developed in emerging and developing regions.
It is divided in three main sections:
(1) what is big data (as of today) & what is big data in/for development?
(2) Who is actually doing «big data for development»? Who are the main intrnational actors/stakeholders? What are main experiences?
(3) Why are we doing this? - i.e. are we doing this right? What are the main access, capacity / interpretation / ethical issues?
Explainable Fact Checking with Humans in-the-loopMatthew Lease
Invited Keynote at KDD 2021 TrueFact Workshop: Making a Credible Web for Tomorrow, August 15, 2021.
https://www.microsoft.com/en-us/research/event/kdd-2021-truefact-workshop-making-a-credible-web-for-tomorrow/#!program-schedule
Tim Estes - Generating dynamic social networks from large scale unstructured ...Digital Reasoning
Tim Estes, CEO of Digital Reasoning, delivered this presentation at the Strata Conference (Feb 2011). It discusses how large scale blog data can be mined to yield social networks of influencers, connections, discussion topics, etc.
Mining the Social Web for Fun & Profit Within Your OrganizationDigital Reasoning
In this talk, Matthew Russell explores why it is imperative for organizations and companies to leverage social media and how they can do it. In today's world of massive, rapidly evolving data streams, it is very challenging to sift through the data and extract the hidden nuggets of critical business intelligence. With advances in machine learning and natural language processing, decision makers can now look at all of their data and see what's really important. Matthew presents examples of how companies like Digital Reasoning are using social media to answer questions like:
Who know whom, and what friends do they have in common?
How frequently are certain people communicating with one another?
Who are the quietest/chattiest people in a network?
Who are the most influential/popular people in a network?
What are people chatting about (and is it interesting)?
Data standards for watchdogs: making a difference in Central and Eastern Europemysociety
This was presented by Anna Kuliberda (TechSoup) and Krzysztof Madejski (ePaństwo Foundation) at the Impacts of Civic Technology Conference (TICTeC2016) in Barcelona on 28th April. You can find out more information about the conference here: https://www.mysociety.org/research/tictec-2016/
AI & Work, with Transparency & the Crowd Matthew Lease
Invited talk at the 2019 AAAI Fall Symposium (https://aaai.org/Symposia/Fall/fss19.php) on Artificial Intelligence and Work (https://waim.network/fs19).
Tim Estes - Information Systems in an Entity Centric WorldDigital Reasoning
Tim Estes, CEO of Digital Reasoning, talks about the use of Hadoop and other scalable technologies along with Digital Reasoning's analytics for automated understanding of cloud-scale text challenges.
This presentation was delivered at Hadoop World in New York in Oct 2010
Data Science For Social Scientists WorkshopIan Hopkinson
The slides from a Workshop presentation on Data Science and Big Data given to academic social scientists. Lots of links to sources, should be interesting to those outside the original target field.
Open Data is a global trend. This presentation describes part of the trend, focuses on one of the most advanced initiatives - Dublinked.ie in Ireland and provides guidance on how to get started.
Using cognitive computing to better analyze human communicationDigital Reasoning
Dr. Marten den Haring, senior vice president of products at Digital Reasoning, explores how cognitive computing can be used to better analyze human communication (e.g. email, chat, social media, voice, etc.) in order to reveal suspicious activity. This presentation was part of a series at the recent Alpha Innovation Required (AIR) Summit, which was sponsored by Franklin Templeton Investments.
Got Chaos? Extracting Business Intelligence from Email with Natural Language ...Digital Reasoning
In this presentation, O'Reilly author and Digital Reasoning CTO Matthew Russell along with Dr. Steve Kramer, founder and chief scientist at Paragon Science, discuss how Digital Reasoning processed the Enron corpus with its advanced Natural Language Processing (NLP) technology - effectively transforming it into building blocks that are viable for data science. Then, Paragon Science used dynamic graph analysis inspired from particle physics to tease out insights from the data in order to better understand whether an enterprise fiasco such as the Enron scandal could have been thwarted.
Lightning Talk #12:7 cognitive biases we shouldn’t ignore in research by Ruth...ux singapore
There are cognitive biases lurking everywhere in the research process. Cognitive biases are psychological tendencies that cause the human brain to draw incorrect conclusions.
We all want our research to provide reliable input into our projects and most of us wouldn’t deliberately distort data. Yet, we’re human, and we’re all susceptible to many cognitive biases that can affect the outcomes at any stage of our projects.
Biases are unavoidable, but being a good researcher is about understanding our inherent biases and how we can minimise the effects.
Distorted or misleading results can be very detrimental to a project. It can misinform the direction of a project, or provide false confidence about decisions. This session will highlight seven common cognitive biases in research, from recruitment, to the actual sessions, and the analysis and reporting of research findings. This will be illustrated with examples and stories, along with how we can minimise the bias.
NTEN Webinar - Data Cleaning and Visualization Tools for NonprofitsAzavea
Slides from a webinar we conducted for NTEN that covers tools that nonprofits can use to clean and prepare their datasets and then visualize them via charts, maps, and graphs.
Data standards for watchdogs: making a difference in Central and Eastern Europemysociety
This was presented by Anna Kuliberda (TechSoup) and Krzysztof Madejski (ePaństwo Foundation) at the Impacts of Civic Technology Conference (TICTeC2016) in Barcelona on 28th April. You can find out more information about the conference here: https://www.mysociety.org/research/tictec-2016/
AI & Work, with Transparency & the Crowd Matthew Lease
Invited talk at the 2019 AAAI Fall Symposium (https://aaai.org/Symposia/Fall/fss19.php) on Artificial Intelligence and Work (https://waim.network/fs19).
Tim Estes - Information Systems in an Entity Centric WorldDigital Reasoning
Tim Estes, CEO of Digital Reasoning, talks about the use of Hadoop and other scalable technologies along with Digital Reasoning's analytics for automated understanding of cloud-scale text challenges.
This presentation was delivered at Hadoop World in New York in Oct 2010
Data Science For Social Scientists WorkshopIan Hopkinson
The slides from a Workshop presentation on Data Science and Big Data given to academic social scientists. Lots of links to sources, should be interesting to those outside the original target field.
Open Data is a global trend. This presentation describes part of the trend, focuses on one of the most advanced initiatives - Dublinked.ie in Ireland and provides guidance on how to get started.
Using cognitive computing to better analyze human communicationDigital Reasoning
Dr. Marten den Haring, senior vice president of products at Digital Reasoning, explores how cognitive computing can be used to better analyze human communication (e.g. email, chat, social media, voice, etc.) in order to reveal suspicious activity. This presentation was part of a series at the recent Alpha Innovation Required (AIR) Summit, which was sponsored by Franklin Templeton Investments.
Got Chaos? Extracting Business Intelligence from Email with Natural Language ...Digital Reasoning
In this presentation, O'Reilly author and Digital Reasoning CTO Matthew Russell along with Dr. Steve Kramer, founder and chief scientist at Paragon Science, discuss how Digital Reasoning processed the Enron corpus with its advanced Natural Language Processing (NLP) technology - effectively transforming it into building blocks that are viable for data science. Then, Paragon Science used dynamic graph analysis inspired from particle physics to tease out insights from the data in order to better understand whether an enterprise fiasco such as the Enron scandal could have been thwarted.
Lightning Talk #12:7 cognitive biases we shouldn’t ignore in research by Ruth...ux singapore
There are cognitive biases lurking everywhere in the research process. Cognitive biases are psychological tendencies that cause the human brain to draw incorrect conclusions.
We all want our research to provide reliable input into our projects and most of us wouldn’t deliberately distort data. Yet, we’re human, and we’re all susceptible to many cognitive biases that can affect the outcomes at any stage of our projects.
Biases are unavoidable, but being a good researcher is about understanding our inherent biases and how we can minimise the effects.
Distorted or misleading results can be very detrimental to a project. It can misinform the direction of a project, or provide false confidence about decisions. This session will highlight seven common cognitive biases in research, from recruitment, to the actual sessions, and the analysis and reporting of research findings. This will be illustrated with examples and stories, along with how we can minimise the bias.
NTEN Webinar - Data Cleaning and Visualization Tools for NonprofitsAzavea
Slides from a webinar we conducted for NTEN that covers tools that nonprofits can use to clean and prepare their datasets and then visualize them via charts, maps, and graphs.
Mitos, leyendas y verdades del vínculo Dinero y Política en ChilePoderomedia
Presentación sobre el sistema de financiamiento electoral y los casos de eventual corrupción política que se investigan en Chile.
Realizada en el panel "Transparencia en los tiemos del cólera" del Festival Internacional de innovación Social (FIIS). Viernes 23 de Octubre de 2015.
2010: A Web Hacking Odyssey - Top Ten Hacks of the YearJeremiah Grossman
Many notable and new Web hacking techniques have already been revealed in 2009. During his session, Jeremiah Grossman will describe the technical details of the top ten from 2009, as well as some of the prevalent security issues emerging in 2010. By attending Mr. Grossman’s session, attendees will be treated to a step-by-step guided tour of the newest threats targeting today’s corporate websites and enterprise users. With that knowledge, Mr. Grossman will then strategize what defensive solutions will have the most impact.
Mr. Grossman will begin his presentation by providing the audience with definitions of the key terms and techniques used in his session. After laying this foundation, Mr. Grossman will move on to identifying the top ten attacks in 2009, including hacks involving Rich Internet Applications, Social Networking, Cloud Computing, Mobile Web Applications, Next Generation Web Browsers and HTML 5. Mr. Grossman will briefly identify real-world examples of each of these vulnerabilities in action, outlining how the issue occurs, as well as what preventative measures can be taken.
Mr. Grossman will also stress the importance of security professionals remaining proactive and continuing to move research forward, as analysis of attacks from years past only goes so far as hackers continue to push the envelop of what’s possible in the ever-changing Web security landscape.
데이터 저널리즘을 이해할 수 있는 유용한 자료 입니다.
http://newsjel.ly
내부적 이해
1. 데이터 저널리즘 개념잡기
(1) 빅데이터 시대, 빅데이터란?
(2) 빅데이터의 종류와 활용분야
(3) 빅데이터와 저널리즘의 상관관계
(4) 데이터 - 중심 저널리즘
(5) 사례로 보는 데이터 저널리즘
2. 데이터 저널리즘 과정알기
(1) 데이터 저널리즘 과정
외부적 기회
3. 데이터 저널리즘의 미래 찾기
(1) 데이터 저널리즘 관련 기관/행사
(2) 데이터 저널리즘의 전망
The Internet Is My Religion: How to Build Authentic Community CMX
NationBuilder CEO Jim Gilliam on how to build authentic community (after pseudo community and chaos ensues). He shares 12 guiding principles for authentic community building. This talk is from CMX Summit West 2015.
In the Line of Fire - The Morphology of Cyber-AttacksRadware
Presentation from Dennis Usle during TakeDownCon in Huntsville, AL that discusses Availability-based threats; Attacks on U.S. banks and others popular attack patterns & trends.
Wireless has evolved from Marconi's station-to-station telegraphy, to audio and video broadcasting, to today’s person-to-person mobile digital communications. Each transition has surprised even the revolutionaries who brought it about, and each transformed civilization. We expect similar disruptions from the next phase of interconnectivity, in which a trillion objects join the conversation. Tech pundits have long talked about an Internet of Things, a vision most often dominated by machine-to-machine communications in industrial settings. Lee will make the case for the Internet of Everything in which humans will be involved in the most compelling applications yet to emerge. He will describe some possible futures, and how Stanford engineers are working to overcome significant challenges to realize those futures.
August Designstorm: Alternative Reporting FormatsAmanda Makulec
Monthly brainstorm and idea sharing session at JSI around data visualization. The August deck focuses on alternative reporting formats and questions to think through to reach various audiences, including tools like interactive timelines, interactive graphics and dashboards (Tableau & others), scrolling/parallax webpages, and key design principles.
PAARL's 1st Marina G. Dayrit Lecture Series held at UP's Melchor Hall, 5F, Proctor & Gamble Audiovisual Hall, College of Engineering, on 3 March 2017, with Albert Anthony D. Gavino of Smart Communications Inc. as resource speaker on the topic "Using Big Data to Enhance Library Services"
JIMS IT Flash , a monthly newsletter-An Initiative by the students of IT Department, shares the knowledge to its readers about the latest IT Innovations, Technologies and News.Your suggestions, thoughts and comments about latest in IT are always welcome at itflash@jimsindia.org.
Visit Website : http://jimsindia.org/
Building an Equitable Tech Future - By ThoughtWorks BrisbaneThoughtworks
At the heart of ThoughtWorks is an ambitious mission: to be a proactive agent of progressive change in the world. Aware of our own privilege, we strive to see the world from the perspective of the oppressed, the powerless and the invisible.
With QUT, here in Brisbane, we’re kicking off a series of research, projects, and conversations about the social impact of tech trends, with a view to building a more equitable tech future. Some of these topics include:
- Algorithmic accountability, transparency, bias & inclusion
- Responsible data practices (privacy and ownership of data)
- Automation and the future of work
- Data use in social media and elections
- Fake news and echo chambers
- Regulating decentralised technologies
- Blockchain for good
- End-user autonomy and privacy
Slides from: Felicity Ruby, Eru Penkman, Clayton Nyakana,
Assoc. Prof. Nic Suzor (QUT) & Dr. Monique Mann (QUT)
an introductory course for Librarians on using Big Data and Data Science applications on the field of Library Science. The course is a 2 hour course module for basic fundamentals of applying DS work.
Keynote by Seth Grimes, presented at the Knowledge Extraction from Social Media workshop, November 12, 2012, preceding the International Semantic Web Conference
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
The power of Structured Journalism & Hacker Culture in NPR
1. THE POWER OF STRUCTURED
JOURNALISM & HACKER CULTURE
IN NPR
a @Poderomedia brown bag lunch talk at NPR by @miguelpaz I april 9th, 2015
*Thanks to @tylrfishr and @jeremybowers for the color palette of this presentation
2. @miguelpaz, journalist, Nieman Berkman fellow at Harvard 15`,
founder of Poderopedia.org, president Poderomedia,
founder HacksHackersSCL…
(my first gig was in Radio when I was 17)
Who is this guy
3. Poderopedia
Map who is who in business and politics to show conflicts of
interest and newsworthy connections of powerful people and
organizations
4. Find & filter facts,
data
From news, gov, company
sites, open data, regulators
public and private databases.
Using crawlers, scrapers,
advanced search, a tool we
built called “NewsMapper”
Discover connections
documents & sources
Detect newsworthy relations
between people, institutions
and companies.
Including dates, types of relations
(family, education, work, clubs, etc)
Organize & structure
data
Validate newsworthy relations, write
profile, add connections, documents
and sources
Publish & distribute
Publish news focused profiles,
network maps,
documents & sources
Poderopedia model
5. News are made of a
triggering event + context + archive
News components
6. And they are made of people, conflict & power
News components
7. Poderopedia started with a question
Can we build something that includes many news
components and that can save 30% of a journalist`s
time on pre-reporting & fact checking?
8. Can we build something to save 40% of time on pre-reporting
& fact checking?
9. this is how we found out about
Structured Journalism
10. The way we do stories is by editing. We report and tell
the story. We leave a lot of things out, that we should use.
This is one way of understanding the potential of
Structured Journalism
Structured Journalism
11. Facts & data
Structured Journalism
Story Structured data New Products
{Source: Reg Chua “Structured Journalism”
12. • Help you tell a story or many stories better
• Provide new layers of context and information enrichment for
stories
• Generate new workflows, integrating news editors and data
editors (Librarians, Visuals, Insights teams) for new products
• Reuse NPR`s massive data & metadata for new products (Tiny
Desk concerts, Morning Edition, All Things…?)
• Make machines do work for you (and get $$$ while you sleep)
13. NPR *Awesome* Assets
• Court files and judicial structure data
• 800.000 stories
• 150.000 hours of programming
• 7.000 amazing pictures
• RAD Team> Research, Archives, Data
• Artemis & Orpheus
• Home made Robots
• Brand & Community
16. Poderopedia Data Mapper
Content Editors Data Editors
Content
Management
System
! !
"
"
Data
Management
System
"
"
Entities Profile Pages +
Connections + Maps + Sources +
Documents + Sources + Contextual
Information
Profiles and Relationship Maps
Articles + Photos + Videos + Audios
!
#
Content Editors can add information cards
of Entities in their articles and
relationship map previews into their news
and articles to provide context and new
layers of information.
Poderopedia Data Mapper automatically
extracta articles, photos, vídeos and
audios related to a entity and adds it to
the entity profile page
A news website A news database
Audios + Text + Photos +
Videos + Metadata
Integration Back and Forth
17. Globo Soccer
Credits: Daniel Schwabe, PUC Rio. Rafael Pena, globo.com “Using the Semantic Web for online Sports News Stories”
26. • Organize around Products, Users & Goals. Not disciplines.
• 2 Pizzas size Teams: Fast & lightweight communication
(keeps Talent from leaving)
• Release early, often, measure, learn, release: less risk, more
eficient, more impact
• Less is more (run away from Christmas trees)
• Inspect and adapt with data in hand
• Keep pace and flexibility to tone muscles
All this Ideas belong to Brian Boyer (NPR), Trei Brundrett (Vox Media) & Jeff Bezos
29. The history of Journalism and it`s Narrative Structure its defined by
technology
30. Today
News consumption and production =
Content + Distribution Channels / Time + Attention
- Other Contents - Other Platforms - Other Activities
of the User
31. Today
Every company is a tech company
Every product is a computer that does something
else
32. If NPR is a media organization that produces content
and quality journalism with a public mission…
33. should it be
Audience First
instead of radio device first?
“Audience First” concept by Amy Webb, 2015 Digital Trends
34. should it be a
Technology company
that produces content, software &
hardware platforms
instead of using technology to only distribute content?
35. can it become a
Responsive Operating System
that “has a Purpose that guides an agile (not linear) Process that enables
People who make (not manage) Products built to evolve (not built to last)
which become Platforms for the world (not just your company) to build
upon”?
Source: *”The Operating Model That Is Eating The World”, Aaron Dignan
36. • What is the Structured Journalism version of “having a
gift for the listener every hour?
• What is the Web version of this story in a radio script?
• What is the Data Journalism version of this interview?
• What is the Yik Yak version of NPR while I am walking in
campus?
• What is the Apple Watch version of a News Show ?
Exercise and Concept by Amy Webb, 2015 Digital Trends
Open Exercise
37. THANKS TO EVERYONE IN NPR
and you in the Internets :)
find us at @poderomedia @poderopedia team@poderopedia.com