background preloader

Visual Business Intelligence

Visual Business Intelligence
We typically think of quantitative scales as linear, with equal quantities from one labeled value to the next. For example, a quantitative scale ranging from 0 to 1000 might be subdivided into equal intervals of 100 each. Linear scales seem natural to us. Logarithms and their scales are quite useful in mathematics and at times in data analysis, but they are only useful for presenting data on those relatively rare cases when addressing an audience that consists of those who have been trained to think in logarithms. For my own analytical purposes, I use logarithmic scales primarily for a single task: to compare rates of change. I decided to write this blog piece when I ran across the following graph in Steven Pinker’s new book Enlightenment Now: The darkest line, which represents the worldwide distribution of per capita income in 2015, is highlighted as the star of this graph. Why didn’t Pinker use a linear scale? This provides a cozy sense of bell-shaped equity, which isn’t truthful. Related:  Data VisualizationsInfoVis

The Functional Art Gun Deaths In America This interactive graphic is part of our project exploring the more than 33,000 annual gun deaths in America and what it would take to bring that number down. See our stories on suicides among middle-age men, homicides of young black men and accidental deaths, or explore the menu for more coverage. Methodology The data in this interactive graphic comes primarily from the Centers for Disease Control and Prevention’s Multiple Cause of Death database, which is derived from death certificates from all 50 states and the District of Columbia and is widely considered the most comprehensive estimate of firearm deaths. In keeping with the CDC’s practice, deaths of non-U.S. residents that take place in the U.S. The “homicides” category includes deaths by both assault and legal intervention (primarily shootings by police officers). For shootings of police officers, we used the FBI’s count of law enforcement officers “feloniously killed” by firearms in the line of duty.

Blog >> We Should All Have Something To Hide The programs of the past can be characterized as “proximate” surveillance, in which the government attempted to use technology to directly monitor communication themselves. The programs of this decade mark the transition to “oblique” surveillance, in which the government more often just goes to the places where information has been accumulating on its own, such as email providers, search engines, social networks, and telecoms. Both then and now, privacy advocates have typically come into conflict with a persistent tension, in which many individuals don’t understand why they should be concerned about surveillance if they have nothing to hide. It’s even less clear in the world of “oblique” surveillance, given that apologists will always frame our use of information-gathering services like a mobile phone plan or GMail as a choice. We’re All One Big Criminal Conspiracy Estimates of the current size of the body of federal criminal law vary. As Supreme Court Justice Breyer elaborates: Compromise

swissmiss Junk Charts This post is part 2 of an appreciation of the chart project by Google Newslab, advised by Alberto Cairo, on the gender and racial diversity of the newsroom. Part 1 can be read here. In the previous discussion, I left out the following scatter bubble plot. This plot is available in two versions, one for gender and one for race. The story appears to be a happy one: in many newsrooms, the leadership roughly reflects the staff in terms of gender distribution (even though both parts of the whole compare disfavorably to the gender ratio in the neighborhoods, as we saw in the previous post.) Unfortunately, there are a few execution problems with this scatter plot. First, take a look at the vertical axis labels on the right side. I find this decision confounding. The horizontal axis? Here is the same chart with improved axis labels: Re-labeling serves up a new issue. The solution, as shown below, is to shift the vertical gridlines by 5% so that the 45-degree line bisects every grid cell it touches.

FlowingData Violence as a Source of Trust in Mafia-type Organizations Criminals have great difficulty in trusting each other – they often have conflicting interests (and may sometimes have incentives to inform on each other) but have no very good equivalent of the state to enforce contracts. One traditional solution is to rely on family members, who are presumably more trustworthy. But there are others – scholars such as Thomas Schelling and Diego Gambetta have speculated that shared information about violent acts might help to cement cooperation. If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each other that we might threaten to use if relations go sour (Schelling notes that one of the most valuable rights in business relations is the right to be sued – this is a functional equivalent). Kinship does indeed have a statistically significant effect in the Camorra clan: the frequency of contacts between two associates increases when both are near-relatives of the boss.

Design et Recherche - Data Underload Most Common Occupation by Age As we get older, job options shift — along with experience, education, and wear on our bodies. Waiting For a Table A simulation to estimate how long until you are seated at a restaurant. How Different Income Groups Spend Money After living expenses, where does the money go, and how does it change when you have more cash available? The Demographics of Others I think we can all benefit from knowing a little more about others these days. Constructed Career Paths from Job Switching Data Shifting from one occupation to another can take a swing in the career path. Switching Jobs When people move to different jobs, here's where they go. Percentage of People Who Married, Given Your Age Or, given your age, the percentage of fish left in the sea. American Daily Routine Sleep. In 2017, No More than Five Days Without a Mass Shooting Unfortunately, while of varying magnitude, mass shootings are somewhat regular in the United States. Who Earns More Income in American Households?

One Dataset, Visualized 25 Ways “Let the data speak.” It’s a common saying for chart design. The premise — strip out the bits that don’t help patterns in your data emerge — is fine, but people often misinterpret the mantra to mean that they should make a stripped down chart and let the data take it from there. You have to guide the conversation though. You must help the data focus and get to the point. To show you what I mean, I present you with twenty-five charts below, all based on the same dataset. Click images for the full size charts. Looks like spaghetti Shows countries separately so that lines don’t overlap No surprises Shows change over time with bars, would probably benefit from sorting Focus on the the difference between the two sexes, with comparison across countries Focus on difference between male and female over time A focus the change between two time periods instead of the fluctuations Comparison between the two, in a more compact space Shows changes over time, although not super clear with this dataset Focus

4 Alternatives That May Be Better Than Pastebin On the Internet, we go through a lot of phases. That’s especially true for web services. I remember years ago when image hosts like TinyPic and Imageshack were all the rage. New and free image hosts were popping up everywhere, and as the smoke finally cleared, it was Imgur that came out on top. The paste-and-share model is a relatively new and popular one. Tinypaste Tinypaste is incredibly easy to use. One feature that Tinypaste has over many other alternatives is paste formatting. Syntax highlighting can be toggled on or off and seems to support HTML and PHP. You can see an example paste on Tinypaste here. Hastebin Hastebin is probably the most visually-appealing alternative that I’ve seen. The buttons in the right-hand corner, from leftmost, allow you to save your paste, create a new paste, duplicate and edit your paste, view raw text, and share your paste on Twitter (all of which have keyboard shortcuts assigned to them). Chop Like our last example, Chop is very nice on the eyes. Snipt

Best of the visualization web At the end of each month I pull together a collection of links to some of the most relevant, interesting or thought-provoking web content I've come across during the previous month. Here's the latest collection from January 2018. Visualisations & Infographics Includes static and interactive visualisation examples, infographics and galleries/collections of relevant imagery. SRF | 'Roger Federer: 20 Years, 20 Titles' Mapping Police Violence | '2017 Police Violence Report... collected data on over 1,100 killings by police in 2017.' SCMP | '2017: the safest skies record' SCMP | ... and here's a photo of the print version Economics | 'All the president’s tweets' Pixel Mixer | 'Anatomy of a Viz - The Level is in the Details' Mike Vizneros | 'A Chamber Divided: What We Can Learn By Using BioFabric Charts' Taylor Baldwin | 'Audiofabric' Guardian | 'Bussed out: How America moves its homeless' Twitter | 'A climate change cross stitch' Guardian | 'How the NHS winter beds crisis is hitting patient care'

IEEE VIS 2017 Overview - bletchley - A collection of practical application cryptanalysis tools Here you will find a brief overview of the tools and libraries provided by Bletchley. For further details, see the individual tool usage statements, pydoc documentation, and of course the source code. Contents See: INSTALL bletchley-analyze Analyzes samples of encrypted data in an attempt to decode samples to binary and identify patterns useful in cryptanalysis. bletchley-analyze currently performs two primary functions: iterative encoding detection and ciphertext-only block analysis. bletchley-analyze can read from stdin or from a file. As an example, several tokens were encrypted using ECB mode and encoded using base64, and then percent (URL) encoded: zRW5bHxcRYHHqi0nriqOzg%3D%3DmeU8SyxVHE3Hqi0nriqOzg%3D%3DvTA9eA4hhbFlktsbYI4hIg%3D%3DmeU8SyxVHE1lktsbYI4hIg%3D%3D These tokens were then fed to bletchley-analyze: 1. bletchley-encode A simple tool to encode arbitrary data using a specified encoding chain. bletchley-decode A simple tool to decode data using a specified encoding chain. blobtools

Related: