Provides a high-level view of how organizations can leverage Big Data in the digital space. Covers topics such as structured vs unstructured data, curating disparate data sources and exploiting the data correlation opportunities.
The power of the modern Web, which is frequently called the Social Web or Web 2.0, is frequently traced to the power of users as contributors of various kinds of contents through Wikis, blogs, and resource sharing sites. However, the community power impacts not only the production of Web content, but also the access to all kinds of Web content. A number of research groups worldwide explore what we call social information access techniques that help users get to the right information using “collective wisdom” distilled from actions of those who worked with this information earlier.
Social information access can be formally defined as a stream of research that explores methods for organizing users' past interaction with an information system (known as explicit and implicit feedback), in order to provide better access to information to the future users of the system. It covers a range of rather different systems and technologies from social navigation to collaborative filtering. An important feature of all social information access systems is self-organization. Social information access systems are able to work with little or no involvement of human indexers, organizers, or other kinds of experts. They are truly powered by a community of users. Due to this feature, social information access technologies are frequently considered as an alternative to the traditional (content-oriented) technologies. The goal of this tutorial is to provide an overview of the emerging social information access research stream and to provide some practical guidelines for building social information access systems.
Integrating Social Bookmarking into Library ContentKen Varnum
The University of Michigan library launched MTagger, a social bookmarking tool, in the winter of 2008. MTagger allows users to tag webpage on the library site, catalog records, or digital images, or anywhere else. MTagger is deeply integrated into our VuFind experimental catalog (launched February 2009), providing the mechanism for users to select and sort their “Favorites.” It is also part of our new Drupal web site (launched August 2009). MTagger preserves the concept of “collections” and enables a faceted approach for users to narrow search results. The tool was intended to enhance findability across collections and to expose “hidden” collections. Learn about the library’s original design, how we conducted usability testing, what we found, and how we changed the application in response.
Lecture 5: Mining, Analysis and VisualisationMarieke van Erp
This is the fourth lecture in the Social Web course at the VU University Amsterdam
Visit the website for more information: <a>Social Web 2012</a>
How can we mine, analyse and visualise the Social Web?
In this lecture, you will learn about mining social web data for analysis. Data preparation and gathering basic statistics on your data.
The power of the modern Web, which is frequently called the Social Web or Web 2.0, is frequently traced to the power of users as contributors of various kinds of contents through Wikis, blogs, and resource sharing sites. However, the community power impacts not only the production of Web content, but also the access to all kinds of Web content. A number of research groups worldwide explore what we call social information access techniques that help users get to the right information using “collective wisdom” distilled from actions of those who worked with this information earlier.
Social information access can be formally defined as a stream of research that explores methods for organizing users' past interaction with an information system (known as explicit and implicit feedback), in order to provide better access to information to the future users of the system. It covers a range of rather different systems and technologies from social navigation to collaborative filtering. An important feature of all social information access systems is self-organization. Social information access systems are able to work with little or no involvement of human indexers, organizers, or other kinds of experts. They are truly powered by a community of users. Due to this feature, social information access technologies are frequently considered as an alternative to the traditional (content-oriented) technologies. The goal of this tutorial is to provide an overview of the emerging social information access research stream and to provide some practical guidelines for building social information access systems.
Integrating Social Bookmarking into Library ContentKen Varnum
The University of Michigan library launched MTagger, a social bookmarking tool, in the winter of 2008. MTagger allows users to tag webpage on the library site, catalog records, or digital images, or anywhere else. MTagger is deeply integrated into our VuFind experimental catalog (launched February 2009), providing the mechanism for users to select and sort their “Favorites.” It is also part of our new Drupal web site (launched August 2009). MTagger preserves the concept of “collections” and enables a faceted approach for users to narrow search results. The tool was intended to enhance findability across collections and to expose “hidden” collections. Learn about the library’s original design, how we conducted usability testing, what we found, and how we changed the application in response.
Lecture 5: Mining, Analysis and VisualisationMarieke van Erp
This is the fourth lecture in the Social Web course at the VU University Amsterdam
Visit the website for more information: <a>Social Web 2012</a>
How can we mine, analyse and visualise the Social Web?
In this lecture, you will learn about mining social web data for analysis. Data preparation and gathering basic statistics on your data.
March 6 building visibility for yr projectHack the Hood
Want to get more eyeballs on your project or site? Use the 5 best practices in SEO, social media marketing, using metrics and partnering to grow audience--with maximum impact, more minimal effort.
Pinterest as Digital Archive, IA Summit 2016, AtlantaNoreen Whysel
Worldwide, people are increasingly accessing digital content within social media applications. To survive, it is essential for organizations in the fields of journalism, publishing, research, libraries, archives and other providers of deep content to incorporate social media as a content delivery method, not just for outreach and marketing campaigns.
My work at Architecture_MPS goes a step further in using social media, Pinterest in particular, as a front end interface for the organization’s resource repository, organizing content and driving users to our digital assets. At the same time, this mechanism promotes discovery via links to external content such as books, conferences, exhibitions and articles related to our research interests, serving as a "webliography" for further research on these topics.
Full blog post at http://tinyurl.com/3yc8q5. Presented at Graphing Social Patterns, March 3, 2008 in San Diego. Theme: "Social networks will be like air".
"Enemies of Development" is an artefact designed to target the populace of a developing country, to create the awareness that developmental flaws isn't only as a result of government officials and their misappropriation of funds as it is generally perceived. But rather all and sundry fall victim of this epidemic and it will take the collective effort of the same "enemies of development", to bring about a sustainable progress in all facets of development
The Popularity Myth - A Guide to Mean Girls with Julie HiramineGenerations of Virtue
We've all dealt with mean behavior. This presentation was developed to accompany Julie Hiramine and Generations of Virtue as they equipped an all girls school to deal with the subject of bullying.
March 6 building visibility for yr projectHack the Hood
Want to get more eyeballs on your project or site? Use the 5 best practices in SEO, social media marketing, using metrics and partnering to grow audience--with maximum impact, more minimal effort.
Pinterest as Digital Archive, IA Summit 2016, AtlantaNoreen Whysel
Worldwide, people are increasingly accessing digital content within social media applications. To survive, it is essential for organizations in the fields of journalism, publishing, research, libraries, archives and other providers of deep content to incorporate social media as a content delivery method, not just for outreach and marketing campaigns.
My work at Architecture_MPS goes a step further in using social media, Pinterest in particular, as a front end interface for the organization’s resource repository, organizing content and driving users to our digital assets. At the same time, this mechanism promotes discovery via links to external content such as books, conferences, exhibitions and articles related to our research interests, serving as a "webliography" for further research on these topics.
Full blog post at http://tinyurl.com/3yc8q5. Presented at Graphing Social Patterns, March 3, 2008 in San Diego. Theme: "Social networks will be like air".
"Enemies of Development" is an artefact designed to target the populace of a developing country, to create the awareness that developmental flaws isn't only as a result of government officials and their misappropriation of funds as it is generally perceived. But rather all and sundry fall victim of this epidemic and it will take the collective effort of the same "enemies of development", to bring about a sustainable progress in all facets of development
The Popularity Myth - A Guide to Mean Girls with Julie HiramineGenerations of Virtue
We've all dealt with mean behavior. This presentation was developed to accompany Julie Hiramine and Generations of Virtue as they equipped an all girls school to deal with the subject of bullying.
Obitel 2012 - Transnacionalización de la Ficción Televisiva em los Países Ibe...Silvia Torreglossa
El prsente Anuario Obitel constituye el sexto de na serie iniciada en 2007 y refleja la maduración de una metodología que combina el estudio de base cuantitativa con el análisis contextual de la ficción televisiva, su transmediación en otras pantallas y las dinámicas socio-culturales que están presentes en los contextos de cada uno de los países participantes
Real world examples of what to expect, and what to prepare for whenever possible. Not every organization is ready to avoid inspections or fines if they do not have senior staff in place, and/or if they have not been audited in the past.
Curso y prueba selectiva de habilitación de consultores en el Sistema Español de Acreditación de la Transparencia
MURCIA.
Viernes 25 y sábado 26 de julio de 2014
Social Media Strategy - Moving Beyond the "How to"John Chen
Every day associations are jumping on the social media bandwagon before thinking about what is best for their organizations. Chances are your organization has signed up for Twitter, Facebook, LinkedIn and more, and now you're wondering what to do, how to manage these outposts, and how to fit them into your strategic initiatives. Gain a high-level view of how to effectively leverage your social media program, with a strong emphasis on strategy, approach, and business value. Go beyond the basics to the 30,000 foot view of what these technologies mean for your association.
This was presented at ASAE's 2011 Technology Conference in Washington, DC on December 7-8, 2011.
Web analytics and social media metrics provide you with powerful ways to track how people interact with your content and what they’re saying about your foundation. They help you understand what works (and what doesn’t!) with your constituents and donors.
This session will focus on defining and measuring success for social media campaigns. Join us for an exploration of the various common Key Performance Indicators (KPIs) and the best practice methods for measuring them. Make sure to bring your campaign ideas and challenges as we'll be analyzing some of your examples!
Takeaways:
- Real metrics for success (hint: it's not about the followers!)
- Practical and cost effective ways to measure them
- A good understanding of how to use the data to improve
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Univ. of AZ Global Racing Symposium 2015 - Digital Strategies
1. University of Arizona Global Racing Symposium
“DIGITAL MARKETING STRATEGIES”
Leveraging The “Back-End” Tools
Dec. 8, 2015
2. 2
Agenda
• What is “Big Data”?
- Creating a Frame of Reference
- The “4 V’s” – Drivers of Big Data
• Social Media Data Sources & Technology Landscape
• Data Types: Structured vs. Unstructured
• Consumer Insights & Today’s Systems
- Implementing Unstructured Data
- Data Visualization
Social Media Influencers
- The “Klout” Score
- Identifying Social Media Influencers
- Measuring Influencer Value
• Identifying Racing Data
• Key Takeaways
3. 3
What is Big Data?
Data sets with sizes beyond the ability of commonly used software tools
to capture, curate, manage, and process data within a reasonable amount of time.
4. 4
Data Frame of Reference
Megabyte (MB) - A good sized novel.
Gigabyte (GB) - 1600 books. About 300 MP3s.
Terrabyte (TB) – 1.6M books. 30 weeks worth of high-quality audio.
Petabyte (PB) – 160M books.
Exabyte (EB) – 3000 times the entire content of the Library of Congress.
Zettabyte (ZB) – 1 billion Terrabytes; Two hundred billion DVDs.
Yottabyte (YB) – 1 trillion Terrabytes.
9. 9
Structured vs. Unstructured - Defined
Data is classified as either Structured or Unstructured.
• Structured Data refers to information that resides in a
traditional row-column database—like Excel.
• Unstructured Data refers to information that doesn't
reside in a traditional row-column database.
NOTE: Experts estimate that 80 to 90 percent of the data in
any organization is unstructured.
10. 10
Examples of Structured Data
Structured Data usually refers to information that resides in
a traditional row-column database—like Excel. Here the
data is stored in fields in a database
11. 11
Examples of Unstructured Data
Unstructured Data files often include text and multimedia content.
Examples include email messages, word docs, videos, photos, audio
files, presentations, etc. This data doesn't fit neatly in a database.
12. 12
Consumer Insights
Today’s systems can structure the unstructured, then correlate key internal data
with the relevant social media universe – revealing new, actionable insights.
13. 13
Implementing Unstructured Data
Big Data Tools
Software like Hadoop or Oracle Endeca can process both unstructured and
structured data that are extremely large, very complex and changing rapidly.
Data Integration Tools
Combine data from disparate sources to be analyzed from a single application &
the capability to unify structured and unstructured data.
Search and Indexing Tools
These tools retrieve information from unstructured data files such as documents,
Web pages and photos
15. 15
Social Media Influencers
A Social Influencer is one who:
• Has the maximum followers
• Can influence others easily
• Creates and shares content regularly
Benefits of identifying Social Influencer:
• Leverage 3rd-Party credibility (others)
• Expand the message & the business
How to Identify the Influencers:
• Scores like “Klout” score are available to measure the influence of
someone in social media
16. 16
The Klout Score
• Klout is a digital service that uses social media analytics to rank its users
according to online social influence via the "Klout Score“
• Klout measures influence by using data points from various sites
– Twitter, Facebook, Google+, LinkedIn, Instagram etc., and Klout itself.
– Count, follower count, retweets, list memberships, influential follower
retweets unique mentions. Information is blended with data from other
social network followings & interactions to come up with the Klout Score.
17. 17
Identifying Social Media Influencers
When developing an influencer outreach campaign, make
sure you’ve got a good “READ” on the situation!
18. 18
Measuring Influencer Value
Several Key Performance Indicators (KPIs) can be combined into meaningful
ratios to help measure audience activity and engagement.
• Sentiment
• Re-tweets
• Forward to a friend
• Social media sharing
• Comments
• Like or rate something
• Reviews
• Contributors and active contributors
• Page views
• Unique visitors
• Traffic from social networking sites
• Time spent on site
• Response time
19. 19
Identifying Racing Data
• Wagering volumes, on-track/off-track/on-line
• Loyalty program information
• Attendance
• Non-wagering revenues (F&B, Parking, Merchandise)
• Social Media sites, racing blogs
• Odds
• Race quality/types
• Results
• Handicapping data
• Performance history
• Wager types: win, place, show, exotics
• Weather
• Seasonality
• Track condition
• Special events
20. 20
Key Takeaways
• Marketing Analytics is the primary opportunity-driver of business growth
going forward.
• “Dip your toe in the water now!”
• Unstructured data will reveal new value and actionable insights.
• Operators need to take the long-view and invest to grow the sport.
22. 22
Social Media – Behavioural Segments
Depending on the Goal, one can select the specific segment of users.
Social Analytics Tools help to identify the following from Social Data:
• Influencers
• Recommenders
• Detractors
The above combined with customer and transaction data would give
necessary insights into customer behavior.
The social users can also be segmented by demographics, geographies,
which would provide information that might not be captured in CRM.
23. 23
Social Communication Metrics
• Alerts (register and response rates / by channel / post
click activity)
• Bookmarks
• Comments
• Downloads
• Email subscriptions
• Fans (become a fan of something / someone)
• Favorites (add an item to favorites)
• Feedback (via the site)
• Followers (follow something / someone)
• Forward to a friend
• Groups (create / join / total number of groups / group
activity)
• Install widget (on a blog page, Facebook, etc)
• Invite / Refer (a friend)
• Key page activity (post-activity)
• Love / Like this (a simpler form of rating something)
• Messaging (onsite)
• Personalization (pages, display, theme)
• Posts
• Profile (e.g. update avatar, bio, links, email,
customization, etc)
• Print page
• Ratings Registered users (new / total / active / dormant
/ churn)
• Report spam / abuse Reviews Settings Social media
sharing / participation (activity on key social media
sites, e.g. Facebook, Twitter, Digg, etc)
• Tagging (user-generated metadata)
• Testimonials
• Time spent on key pages
• Time spent on site (by source / by entry page)
• Total contributors (and % active contributors)
• Uploads (add an item, e.g. articles, links, images,
videos)
• Views (videos, ads, rich images)
• Widgets (number of new widgets users / embedded
widgets)
• Wish lists (save an item to wish list)
24. 24
Sentiment Analysis
Sentiment Analysis – uses natural language processing, text
analysis and computational linguistics to identify and extract
subjective information in source materials. It aims to determine the
attitude of a writer with respect to some topic or the overall
contextual polarity of a document.
25. 25
Sentiment KPI’s
• Total Conversation about a topic, activity or initiative
• Number of Positive Conversations about topic, activity or initiative
• Number of Negative Conversations about a topic, activity or initiative
• Ratio or Percentage of Negative Conversations/Total Conversation
• Ratio or Percentage of Positive Conversations/Total Conversations
26. 26
Data Source Gnip DataSift Description
Twitter √ √ Microblog site
Facebook √ √ Social networking site
Sina Weibo √ Chinese microblog site
WordPress √ √ Open-source blog tool & CMS
Intense Debate √ √ Blog comments & host
Tumblr √ √ Multimedia microblog
Foursquare √ Social network for mobile
Yammer √ Enterprise social network
LexisNexis √ Legal & public records database
Google+ √ √ Social network & authorship tool
YouTube √ √ Video sharing website
Bitly √ √ URL shortening service
Instagram √ √ Photo & video sharing
NewsCred √ Content & syndication platform
Reddit √ √ Entertainment & news website
Wikipedia √ Collaboratively edited internet encyclopedia
Daily Motion √ √ French video sharing website
Topix √ Tokyo stock price index
IMDb √ Internet movie database
Disqus √ Blog comment hosting
Estimize √ Community of stock analysts & traders
Sitrion √ Social & collaboration software
Flickr √ Image & video hosting
MetaCafe √ Video sharing – short form
Panoramio √ Geolocation photosharing
Photobucket √ Image & video hosting
Plurk √ Social network microblog
Stackoverflow √ Q&A site for computer programming
Vimeo √ Video sharing website
VK √ Russian social network
Stocktwits √ Social media sharing for investors & traders
SocialMediaDataAggregators
Evaluating, monitoring and field-adjusting (in real-time) is essential to exploiting the influencer—and his value/credibility to the broader target
Access to fact-driven predictive insights in real-time, and driven by business needs, is key to ensuring an optimal balance between preventative and corrective actions.
Predictive Analytics enables organizations to
monitor your environment by including a wide variety of data across multiple sources
detect suspicious behavior to identify threats, information breaches, crime fraud
And then control outcomes to deliver the best response to reduce exposure or loss and maximize the impact of any action taken
Predictive risk and threat management is about using analytics proactively to reduce exposure and minimize negative impact
Behavior analytics require the ingestion of all sources of data both structured and unstructured. These are just a sampling of the sources that will uncover the key nuggets of actionable insights..
Access to fact-driven predictive insights in real-time, and driven by business needs, is key to ensuring an optimal balance between preventative and corrective actions.
Predictive Analytics enables organizations to
monitor your environment by including a wide variety of data across multiple sources
detect suspicious behavior to identify threats, information breaches, crime fraud
And then control outcomes to deliver the best response to reduce exposure or loss and maximize the impact of any action taken
Predictive risk and threat management is about using analytics proactively to reduce exposure and minimize negative impact