background preloader


Facebook Twitter


Google. Privatisation. MapMaker Interactive. YouTube Help The URL to a YouTube video must be the full length url.

MapMaker Interactive

To ensure you are using the correct URL, visit your video on SoundManager 2: A Javascript Sound API - MPC Demo. Smashing Pumpkins Tour Dates 2012 — Smashing Pumpkins Concert Dates and Tickets. Localiser mes amis. Glee Karaoke. App Cloud Studio. GeoData Blog: Spot 5 fait parler de lui dans le journal gratuit METRO. UT on Rails. Python Programming in your Browser: PythonAnywhere.

EveryBlock. - Accurate MMA / UFC fight outcome predictions - 83% accuracy! - Powered by Django. Ebcode - Source code of Free and Enterprise API Management and Infrastructure. Kevin Systrom, Instagram - Mike Krieger, Instagram - Optimize for People, Not Valuation. Mapper. LittleSis - Profiling the powers that be.

Research Toolkits. Research Toolkits: An Introduction to Research Justice aims to build the capacity of grassroots organizers and community members and better equip marginalized communities to reclaim, own, and wield all forms of knowledge and information.

Research Toolkits

With strategic support, the knowledge and information generated by these communities can be used as political leverage to advance their own agendas for change.The toolkit effectively: Explores the theory of Research Justice – a strategic framework that seeks to transform structural inequities in knowledge production Advances community-driven research as a powerful tool to build grassroots power Helps participants choose which research methods will prove most effective for their campaigns and organizing objectives Employs popular-education techniques to encourage leadership development Data Feud is tool used to share statistics, survey results and quantitative data in a fun and engaging way.

Revealing Economic Terrorists: a Slumlord Conspiracy. "Sunlight is the best disinfectant" - U.S.

Revealing Economic Terrorists: a Slumlord Conspiracy

Supreme Court Justice Louis Brandeis A client of ours -- a small, not-for-profit, economic justice organization [EJO] -- used social network analysis [SNA] to assist their city attorney in convicting a group of "slumlords" of various housing violations that the real estate investors had been side-stepping for years. The housing violations, in multiple buildings, included: raw sewage leaks multiple tenant children with high lead levels eviction of complaining tenants utility liens of six figures The EJO had been working with local tenants in run-down properties and soon started to notice some patterns. Visualize This: The FlowingData Guide to Design, Visualization, and Statistics. SocialAction.

SocialAction is a social network analysis tool that integrates visualization and statistics to improve the analytical process.


A journal article about SocialAction was recently published in IEEE Computer Graphics and Applications. See the full details in the papers below. A visual exploration on mapping complex networks. Inxight Federal Systems. SAP Overhypes Its Hana Sentiment Analysis - Software - Business Intelligence. SAP's rapid-deployment offering promises 'big data' analytics results in less than six weeks.

SAP Overhypes Its Hana Sentiment Analysis - Software - Business Intelligence

I don't buy it. 10 Tips For Tapping Consumer Sentiment On Social Networks (click image for larger view and for slideshow) Space: SAP HANA Developer Center. Create A Free Website From Scratch. Hot Spot Analysis – An ArcGIS Tutorial. MAPS: Geospatial Tools. CrimeStat Spatial Statistics Program - Version 3.0. About. Student Crime Statistics. Statistics for crimes most likely to affect students – burglary, robbery and violent crime, near university campuses for England and Wales, and separately for London.

Student Crime Statistics

You can also see the crime statistics by region. Click on the institution name to see a map illustrating crime hot spots.Find out about Staying Safe and Secure while at university, and read our Top Tips to Stay Safe.These statistics are not specific to students but related to the whole population of the defined area.We list the annual reported incidents per thousand residents, May 2012–April 2013, within wards or electoral divisions of which parts are within 3 miles of the main campus.Comparable data for Scotland and Northern Ireland are not available. Rankings for cities and towns in England, Northern Ireland, Scotland and Wales with two or more universities are available – see How Safe is Your City? UK Crime Statistics An app that uses the UK crime data to display and compare statistics between postcodes, universities and football stadiums.

View this appopens in a new window Local Crime Map This app displays a map of the most recent crimes in a given location. Apprenez à programmer en C ! - C. Visualize your check-ins. LockCon - Toool. The dates for LockCon 2013 are 22/23/24 November! Index. Open Test Search [BETA] English Wikipedia as html files This set consists of all articles in the English Wikipedia marked as ether featured or good articles, converted into standalone html files. set Enron files With a total of 43 426 files, and a good mix of typical enterprise files like .pdf, .word, .xls, images etc, the Enron file set is a good resource to simulate a file server.

Open Test Search [BETA]

This data set contains files send as email attachments from about 150 users, mostly senior management of Enron. Full English Wikipedia as html files This set consists of all articles in English Wikipedia converted into standalone html files. Enron email. Enron Email Dataset. This dataset was collected and prepared by the CALO Project (A Cognitive Assistant that Learns and Organizes).

Enron Email Dataset

It contains data from about 150 users, mostly senior management of Enron, organized into folders. The corpus contains a total of about 0.5M messages. This data was originally made public, and posted to the web, by the Federal Energy Regulatory Commission during its investigation. SQL Injections – Demonstration « gr00ve_hack3r. Offensive Security Community Projects. The Metasploit Unleashed free online training course was created to fill a gap in quality documentation on the practical usage of the popular and versatile Metasploit Framework.

Offensive Security Community Projects

In keeping with the open-source nature of Metasploit, this resource is provided at no charge. More Information The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered from various sources. The Google Hacking Database (GHDB) is the authoritative source for querying the ever-widening reach of the Google search engine.

Ushahidi. Crowdmap allows you to set up your own deployment of the Ushahidi Platform without having to install it on your own web server. Crowdmap is the fastest, simplest installation of the Ushahidi platform. Within minutes you'll be up and running with your own installation, mapping reports events and visualizing information. Things You Can Do With Crowdmap Monitor Elections. Movity Blog. The emerging market that could kill the iPhone. By Francesca Robin, contributor FORTUNE -- Internet users have heard plenty about third-party aggregators filching their data, spying on them via all manner of cookies and selling Web surfing data to unscrupulous marketers.

Much less has been said about what users can do to control their personal information, let alone have a say in who can snoop around, poke into or use it. Until now. Realtime - a bitly labs experiment. It's an HTTParty and Everyone Is Invited! So I’ve made a boatload of gems that consume web services (twitter, lastfm, magnolia, delicious, google reader, google analytics). Each time I get a bit better at it and learn something new. I pretty much am only interested in consuming restful api’s and over time I’ve started to see a pattern. The other day I thought, wouldn’t it be nice if that pattern were wrapped up as a present for me (and others) to use?

Gemware. Education Resources. Software. VAST Challenge 2012. Maltego 3. Security Visualization. AttributeMagic: Software to change any property of file, folder, image, rename files. Is a new, revolutionary web and mobile service - Personal. Marketing affiliate Program : Home24.