article thumbnail

This is the old ChiefTech blog.: Just for fun - a SNA map in Many Eyes of my blog

ChiefTech

How does you blog neighborhood compare to mine? Technorati tags: SNA , Many Eyes , ChiefTech Blog , Social Network Analysis , Google at 11:42 AM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment. What other patterns can you see?

Mining 40
article thumbnail

This is the old ChiefTech blog.: SNA Map of my blog - second edition

ChiefTech

Monday, 9 April 2007 SNA Map of my blog - second edition My blog social network analysis (SNA) map (really an egonet map ) from a few days ago was ok, but I wasnt completely satisfied. Your blogroll includes a lot of same names as mine. Please seek advice for specific circumstances.

Mining 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

ARMA defines information as “Data that has been given value through analysis, interpretation, or compilation in a meaningful form” (ARMA 2016, p 28). 16 ZB (zettabytes) of data in 2006, then 2.83 DT is creating real-time data that can be “mined” to uncover information about products, customers, market trends, and financial risks.

article thumbnail

This is the old ChiefTech blog.: 100 people wanted, to lose 100MB of email in 6 weeks

ChiefTech

I think the same lessons will apply to RSS , but there are new opportunities with this particular communication technology to help reduce information overload through a combination of more open communication styles, content filtering, and content mining (look at Yahoo! Pipes for the possibilities).

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Mine was 2000. But from my perspective, since I already had a background in and you know, building exploits, analyzing those things, I was big on you know, protocol analysis when it came to forensics, the the analysis workflow for doing forensics and investigations in general wasn't that much different.

IT 40
article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

This type of rootkit was developed as a proof of concept in 2006, but in 2017, researcher Joseph Connelly designed nested virtual machine rootkit CloudSkulk as part of his Masters degree work at Boise State University. The rootkit does not have to modify the kernel to subvert the operating system.