Sifting through twitter

volvent
sifting through twitter ruxmon aug 2011
introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
general twitter observations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],the bad the good
the idea ,[object Object],[object Object],[object Object],[object Object],[object Object]
entry point ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
presentation ,[object Object],[object Object],[object Object],[object Object]
similar items and language barriers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
extending userinfo ,[object Object],[object Object],[object Object],[object Object]
demo volvent.org
todo list ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
wrapping up ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1 of 11

Recommended

Bioterrorism Preparedness Project: Streaming Transcribed Video by
Bioterrorism Preparedness Project: Streaming Transcribed VideoBioterrorism Preparedness Project: Streaming Transcribed Video
Bioterrorism Preparedness Project: Streaming Transcribed Videojstirnaman
380 views14 slides
Twitter: In 140 characters or less. by
Twitter: In 140 characters or less.Twitter: In 140 characters or less.
Twitter: In 140 characters or less.Todd Digby
442 views9 slides
Using RSS to Promote Scholarly Publications by
Using RSS to Promote Scholarly PublicationsUsing RSS to Promote Scholarly Publications
Using RSS to Promote Scholarly PublicationsKen Varnum
616 views17 slides
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY by
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYcscpconf
63 views20 slides
Twitterreference by
TwitterreferenceTwitterreference
TwitterreferenceMiranda Lenart
158 views12 slides
Web 2.0 for MA Trustees Association by
Web 2.0 for MA Trustees AssociationWeb 2.0 for MA Trustees Association
Web 2.0 for MA Trustees AssociationBeth Gallaway
369 views22 slides

More Related Content

What's hot

owasp_meetup_12_10 by
owasp_meetup_12_10owasp_meetup_12_10
owasp_meetup_12_10sean_todd
319 views32 slides
A research of software vulnerabilities by
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilitiesAlireza Aghamohammadi
710 views24 slides
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com by
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comSV Ruby on Rails Meetup
1.8K views32 slides
APT Malware & Media by
APT Malware & MediaAPT Malware & Media
APT Malware & Media3S Labs
1.3K views14 slides
hire a hacker by
hire a hackerhire a hacker
hire a hackerhackany1
895 views2 slides
Focus On Twitter by
Focus On TwitterFocus On Twitter
Focus On TwitterMiranda Kral
494 views15 slides

What's hot(17)

owasp_meetup_12_10 by sean_todd
owasp_meetup_12_10owasp_meetup_12_10
owasp_meetup_12_10
sean_todd319 views
APT Malware & Media by 3S Labs
APT Malware & MediaAPT Malware & Media
APT Malware & Media
3S Labs1.3K views
hire a hacker by hackany1
hire a hackerhire a hacker
hire a hacker
hackany1895 views
ELM databases...again by LeAnn
ELM databases...againELM databases...again
ELM databases...again
LeAnn 454 views
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection by IJERA Editor
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
IJERA Editor277 views
Security testing addons by Deepu S Nath
Security testing addonsSecurity testing addons
Security testing addons
Deepu S Nath411 views
Security presentation by Smart Mirror
Security presentationSecurity presentation
Security presentation
Smart Mirror1.6K views
Improving VIVO search through semantic ranking. by Deepak K
Improving VIVO search through semantic ranking.Improving VIVO search through semantic ranking.
Improving VIVO search through semantic ranking.
Deepak K389 views

Viewers also liked

Tiend afinal by
Tiend afinalTiend afinal
Tiend afinalnayeli8a
140 views8 slides
I’m going to go... stalk... Lenny and Carl... by
I’m going to go... stalk... Lenny and Carl...I’m going to go... stalk... Lenny and Carl...
I’m going to go... stalk... Lenny and Carl...volvent
709 views33 slides
Foros vs by
Foros  vsForos  vs
Foros vsnayeli8a
243 views6 slides
Bookreport by
BookreportBookreport
Bookreportnayeli8a
234 views6 slides
Shooting clay pidgins by
Shooting clay pidginsShooting clay pidgins
Shooting clay pidginsvolvent
7.3K views36 slides
Trabajo excel by
Trabajo excelTrabajo excel
Trabajo excelnayeli8a
279 views4 slides

Viewers also liked(7)

Tiend afinal by nayeli8a
Tiend afinalTiend afinal
Tiend afinal
nayeli8a140 views
I’m going to go... stalk... Lenny and Carl... by volvent
I’m going to go... stalk... Lenny and Carl...I’m going to go... stalk... Lenny and Carl...
I’m going to go... stalk... Lenny and Carl...
volvent709 views
Foros vs by nayeli8a
Foros  vsForos  vs
Foros vs
nayeli8a243 views
Bookreport by nayeli8a
BookreportBookreport
Bookreport
nayeli8a234 views
Shooting clay pidgins by volvent
Shooting clay pidginsShooting clay pidgins
Shooting clay pidgins
volvent7.3K views
Trabajo excel by nayeli8a
Trabajo excelTrabajo excel
Trabajo excel
nayeli8a279 views
Microtemicroteach_demo.ESCUDERO-KAREM.ppt by UPLA
Microtemicroteach_demo.ESCUDERO-KAREM.pptMicrotemicroteach_demo.ESCUDERO-KAREM.ppt
Microtemicroteach_demo.ESCUDERO-KAREM.ppt
UPLA580 views

Similar to Sifting through twitter

Information Management Trends 2009 by
Information Management Trends 2009Information Management Trends 2009
Information Management Trends 2009Christopher Eagle
784 views42 slides
IRJET- Tweet Segmentation and its Application to Named Entity Recognition by
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET Journal
45 views3 slides
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re... by
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET Journal
9 views3 slides
Document of presentation(web 3.0)(part 2) by
Document of presentation(web 3.0)(part 2)Document of presentation(web 3.0)(part 2)
Document of presentation(web 3.0)(part 2)Abhishek Roy
1K views10 slides
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci... by
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
21 views4 slides
Spivack Blogtalk 2008 by
Spivack Blogtalk 2008Spivack Blogtalk 2008
Spivack Blogtalk 2008Blogtalk 2008
2.8K views44 slides

Similar to Sifting through twitter(20)

IRJET- Tweet Segmentation and its Application to Named Entity Recognition by IRJET Journal
IRJET- Tweet Segmentation and its Application to Named Entity RecognitionIRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
IRJET Journal45 views
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re... by IRJET Journal
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET- An Experimental Evaluation of Mechanical Properties of Bamboo Fiber Re...
IRJET Journal9 views
Document of presentation(web 3.0)(part 2) by Abhishek Roy
Document of presentation(web 3.0)(part 2)Document of presentation(web 3.0)(part 2)
Document of presentation(web 3.0)(part 2)
Abhishek Roy1K views
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci... by IRJET Journal
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET Journal21 views
Spivack Blogtalk 2008 by Blogtalk 2008
Spivack Blogtalk 2008Spivack Blogtalk 2008
Spivack Blogtalk 2008
Blogtalk 20082.8K views
Week 2 computers, web and the internet by carolyn oldham
Week 2 computers, web and the internetWeek 2 computers, web and the internet
Week 2 computers, web and the internet
carolyn oldham365 views
Analysis Of Hypertext Transfer Protocol, Http by Laurie Gunlicks
Analysis Of Hypertext Transfer Protocol, HttpAnalysis Of Hypertext Transfer Protocol, Http
Analysis Of Hypertext Transfer Protocol, Http
Laurie Gunlicks3 views
Sweeper User Guide v0.3 by Ushahidi
Sweeper User Guide v0.3Sweeper User Guide v0.3
Sweeper User Guide v0.3
Ushahidi3.9K views
Linked Data Generation for the University Data From Legacy Database by dannyijwest
Linked Data Generation for the University Data From Legacy Database  Linked Data Generation for the University Data From Legacy Database
Linked Data Generation for the University Data From Legacy Database
dannyijwest73 views
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING by Emma Burke
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNINGA REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
A REPORT On DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
Emma Burke2 views
Groundhog day: near duplicate detection on twitter by Dan Nguyen
Groundhog day: near duplicate detection on twitterGroundhog day: near duplicate detection on twitter
Groundhog day: near duplicate detection on twitter
Dan Nguyen544 views
Linked Data Workshop Stanford University by Talis Consulting
Linked Data Workshop Stanford University Linked Data Workshop Stanford University
Linked Data Workshop Stanford University
Talis Consulting771 views
Subject information gateway in information technology (sigit) an introduction by kmusthu
Subject information gateway in information technology (sigit) an introductionSubject information gateway in information technology (sigit) an introduction
Subject information gateway in information technology (sigit) an introduction
kmusthu3.9K views
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec by IRJET Journal
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET Journal40 views

Recently uploaded

Evolving the Network Automation Journey from Python to Platforms by
Evolving the Network Automation Journey from Python to PlatformsEvolving the Network Automation Journey from Python to Platforms
Evolving the Network Automation Journey from Python to PlatformsNetwork Automation Forum
13 views21 slides
Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
22 views68 slides
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
19 views49 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
58 views8 slides
PRODUCT PRESENTATION.pptx by
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
15 views1 slide
Voice Logger - Telephony Integration Solution at Aegis by
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
39 views1 slide

Recently uploaded(20)

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views

Sifting through twitter