article thumbnail

Power & Light: Russell Lee’s Coal Survey Exhibit

Unwritten Record

I’m pleased to announce the recent opening of a new exhibit at the National Archives Building, Power & Light: Russell Lee’s Coal Survey , which will run until July 6, 2025. To read more about the survey and Russell Lee, check out this newly posted blog by National Archives Historian Jessie Kratz. June 13, 1946.

Mining 42
article thumbnail

Leveraging user-generated social media content with text-mining examples

IBM Big Data Hub

One of the best ways to take advantage of social media data is to implement text-mining programs that streamline the process. What is text mining? When used strategically, text-mining tools can transform raw data into real business intelligence , giving companies a competitive edge. How does text mining work?

Mining 53
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Archive-It Partner News, October 2023

Archive-It

Register here Community News 2023 NDSA Preservation Storage Infrastructure Survey The NDSA Preservation Storage Infrastructure Working Group is back again, with their latest iteration of the NSDA Preservation Storage Infrastructure survey.

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. For a more cybersecurity-centric document you should look at the. bitcoin prices.

Mining 107
article thumbnail

Snapshot: College and University Retention Schedules

Brandeis Records Manager

Searching the Web with different browsers for published CU schedules, I built a document linking to over 40 CU schedules from various institutions. If your CU retention schedule is published online and missing from this list, please send me a current link (gdespres@brandeis.edu), and I will be happy add it to, and improve, our document.

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. Adversarial inputs include malicious documents designed to evade antivirus, and emails attempting to evade spam filters. For a more cybersecurity-centric document you should look at the. bitcoin prices.

Mining 91
article thumbnail

Reflecting on Pragmatic Ethnography

ChiefTech

Sometimes we use surveys (including social network analysis) or other analytical methods, but our preference for employing a design thinking orientated approach tends to counterbalance this with a desire to be immersed in the physical and human context of the work. This isn't without its challenges.