background preloader

Monitor Website Changes for Free ← Versionista

Monitor Website Changes for Free ← Versionista

Batch geocoder for journalists 5 Tools to Improve Your Idea Before You Write a Line of Code In my last post on ReadWriteStart, I talked about how, in many cases, it wasn't an advantage to build your start-up in stealth mode. As a continuation of that theme, I thought it would be interesting to explore five tools you can use to iterate and improve your startup idea before writing one line of code. There is nothing worse than building a tool no one is interested in, so I'd encourage you to consider these options before starting down the path of building your next startup. Specifically, these five tools can help you do three critical activities before starting to write a line of code: create a wireframe, get feedback from the target market and test value proposition through multiple landing pages. iMockups for Wireframing Concepts If a picture is worth 1,000 words, then a good mockup is worth 1,000 lines of code. Feedback on Concept from Target Market Once you've got a concept put together, it's often valuable to get some early feedback from your target market. Conclusion

Hauptseite – Lobbypedia Navigation Navigation Themenportale Mitmachen Aus Lobbypedia Wechseln zu: Navigation, Suche Aktuelles Bundestag: Nebeneinkünfte veröffentlicht Endlich wurden die Nebeneinkünfte der Bundestagsabgeordneten veröffentlicht. Finanzierung der Parteien weiter intransparent Die Rechenschaftsberichte der Parteien für das Jahr 2012 zeigen erneut, wie unzureichenden die Veröffentlichungspflichten für Parteispenden sind. Aktion: Keine Lobbyjobs für (Ex-)Politiker – Karenzzeit jetzt! Ronald Pofalla oder Eckart von Klaeden - immer wieder versilbern Spitzenpolitiker ihr Wissen und ihre Kontakte als Lobbyisten. Das wollen wir nicht länger zulassen! Wir müssen jetzt dafür sorgen, dass dieses Vorhaben nicht in der Schublade verschwindet. Hier den LobbyControl-Appell unterzeichnen: Weitere Meldungen Über Lobbypedia Die Lobbypedia beleuchtet den Einfluss von Lobbyisten auf Politik und Medien. Letzte Änderungen Newsletter Jetzt den LobbyControl-Newsletter bestellen! Bbb E.

Treeverse/README.md at master · paulgb/Treeverse Interactive Experiments Focused on HTML5 Who posted what? REST API - Evri Table of Contents 1 Introduction 2 Registration and API Use Limits 2 URIs and Response Types 3 Versioning 4 Resources 5 Core Concepts 6 Example Scenarios 7 Code Samples 8 Feedback and Troubleshooting 9 Known Issues Introduction The Evri API gives you programmatic access to Evri’s rich mapping of the entity web, or the web of people, places and things connected to one another via language itself. Entities located in an article or body of text Popular entities on the entity web broken down by various categories like politician , actor or film . Structured information about an entity including things like birth date , death date , universities attended , children , etc. How entities are related including the news, blog, or web language that links them on the entity web How entities or combinations of entities are related to documents, images and video found on the web Media recommendations for entities, or combinations of entities, based on a specific news, blog, or web article mention. Versioning Resources

DocumentCloud Twlets | Twitter to Excel Enterprise HLR Lookup Platform and API ’s Invitation Is Waiting For Your Response: An Investigative Guide To LinkedIn Whether you’re investigating a company purporting to have damning information on Robert Mueller or conducting research on anti-Islamic State foreign fighters in Iraq and Syria, LinkedIn can serve as a useful resource for online researchers across a wide variety of subjects. This guide aims to provide helpful tools and techniques for identifying LinkedIn profiles and for extracting information that will then allow you to pivot to other social media profiles belonging to the target. Some of the useful information you might glean from the social network for professionals include: Biographical details, including employment history, education and other affiliationsPersonal and work contact information Approximate locationProfile photoUsername Personal websiteEmployer’s websiteMembers of an individual’s social network Lock Your Profile Down Before beginning an investigation, there are a few steps you should take so that you can access as much content as possible and ensure your anonymity. Summary

A Guide to Open Source Intelligence (OSINT) Photo|Adobe Stock Introduction: Peering Behind the Mask Open source intelligence, which researchers and security services style OSINT, is one of the most valuable tools to a contemporary reporter, because of the vast amount of publicly available online information. Reporters conducting OSINT-based research should aspire to use the information they gather online to peer behind the superficial mask of the internet—the anonymous avatars on Twitter, for example, or the filtered photographs on Instagram—and tell the story of the real, flesh-and-blood human beings on the other side of our screens. Every time we go online, we give up part of our identity. The following guide is written to provide a basic foundation not only for doing that work, but also for verifying the information, archiving findings, and interacting with hostile communities online. Sign up for CJR's One: The Difference between Open and Closed Networks Open Networks Examples of Open Networks: Reporting on Public-Facing Content Maps

Finding emails when they don’t want to be found Hey there, reporters! Hope you liked J.C.’s guest post last week. This time I’m revisiting a tool I recommended a year ago. Initially, I only recommended their LinkedIn plugin, because their claims to find people’s emails addresses seemed a little… ambitious. But! Hunter’s shtick is that it will dig up emails on a certain domain – house.gov, for example. You can search for a certain person, but I didn’t have much success with that. Here’s my usual routine: Look for an official’s email address with the Finder tool. In all seriousness, this process works way better than I thought it would, which is why I’m recommending it now. Using Phone Contact Book Apps For Digital Research Popular apps such as TrueCaller or GetContact advertise the ability to see who is really calling you, even if you do not know the number, and alert the app user of spam or scam calls. However, the way that these apps gather information to determine the name of an unknown caller is not as broadly advertised. With many of these apps, this information comes as the result of vacuuming up the contact books of its users, then cross-referencing the data with other instances of the same number being used as well as with Facebook profiles that list a number. Most of these apps are smart enough to figure out that “Mom” or “Dad” is not a useful name to display for an incoming unknown number, but will often refer to the literal name given in a contact book, which can be incomplete, derogatory, or mnemonic. A fourth suspect traveled with a passport bearing the name of another member of the royal guard, Muhammed Saad Alzahrani. Getting Your Research Device Ready Phone Contact Book Apps GetContact Free?

Related: