ENTRIES TAGGED "text analysis"
Neuromancer Game, Ray Ozzie, Sentiment Analysis, and Open Science Prizes
- Case and Molly, a Game Inspired by Neuromancer (Greg Borenstein) — On reading Neuromancer today, this dynamic feels all too familiar. We constantly navigate the tension between the physical and the digital in a state of continuous partial attention. We try to walk down the street while sending text messages or looking up GPS directions. We mix focused work with a stream of instant message and social media conversations. We dive into the sudden and remote intimacy of seeing a family member’s face appear on FaceTime or Google Hangout. “Case and Molly” uses the mechanics and aesthetics of Neuromancer’s account of cyberspace/meatspace coordination to explore this dynamic.
- Rethinking Ray Ozzie — an inescapable conclusion: Ray Ozzie was right. And Microsoft’s senior leadership did not listen, certainly not at the time, and perhaps not until it was too late. Hear, hear!
- Recursive Deep Models for Semantic Compositionality
Over a Sentiment Treebank (PDF) — apparently it nails sentiment analysis, and will be “open sourced”. At least, according to this GigaOm piece, which also explains how it works.
- PLoS ASAP Award Finalists Announced — with pointers to interviews with the finalists, doing open access good work like disambiguating species names and doing open source drug discovery.
Geeky Primer, Visible CSS, Remote Working, and Raspberry Pi Sentiment Server
- My Little Geek — children’s primer with a geeky bent. A is for Android, B is for Binary, C is for Caffeine …. They have a Kickstarter for two sequels: numbers and shapes.
- Visible CSS Rules — Enter a url to see how the css rules interact with that page.
- How to Work Remotely — none of this is rocket science, it’s all true and things we had to learn the hard way.
- Raspberry Pi Twitter Sentiment Server — step-by-step guide, and github repo for the lazy. (via Jason Bell)
Wikileaks Code, Account Afterlife, Digital in Museums, and Companies and Conferences
- Wikileaks ProjectK Code (Github) — open-sourced map and graph modules behind the Wikileaks code serving Kissinger-era cables. (via Journalism++)
- Plan Your Digital Afterlife With Inactive Account Manager — you can choose to have your data deleted — after three, six, nine or 12 months of inactivity. Or you can select trusted contacts to receive data from some or all of the following services: +1s; Blogger; Contacts and Circles; Drive; Gmail; Google+ Profiles, Pages and Streams; Picasa Web Albums; Google Voice and YouTube. Before our systems take any action, we’ll first warn you by sending a text message to your cellphone and email to the secondary address you’ve provided. (via Chris Heathcote)
- Leo Caillard: Art Games — Caillard’s images show museum patrons interacting with priceless paintings the way someone might browse through slides in a personal iTunes library on a device like an iPhone or MacBook. Playful and thought-provoking. (via Beta Knowledge)
- Lanyrd Pro — helping companies keep track of which events their engineers speak at, so they can avoid duplication and have maximum opportunity to promote it. First paid product from ETecher and Foo Simon Willison’s startup.
Tweet Cred, C64 History, Performance Articles, Return of Manufacturing
- Credibility Ranking of Tweets During High Impact Events (PDF) — interesting research. Situational awareness information is information that leads to gain in the knowledge or update about details of the event, like the location, people affected, causes, etc. We found that on average, 30% content about an event, provides situational awareness information about the event, while 14% was spam. (via BoingBoing)
- The Commodore 64 — interesting that Chuck Peddle (who designed the 6502) and Bob Yannes (who designed the SID chip) are still alive. This article safely qualifies as Far More Than You Ever Thought You Wanted To Know About The C64 but it is fascinating. The BASIC housed in its ROM (“BASIC 2.0″) was painfully antiquated. It was actually the same BASIC that Tramiel had bought from Microsoft for the original PET back in 1977. Bill Gates, in a rare display of naivete, sold him the software outright for a flat fee of $10,000, figuring Commodore would have to come back soon for another, better version. He obviously didn’t know Jack Tramiel very well. Ironically, Commodore did have on hand a better BASIC 4.0 they had used in some of the later PET models, but Tramiel nixed using it in the Commodore 64 because it would require a more expensive 16 K rather than 8 K of ROM chips to house.
- The Performance Calendar — an article each day about speed. (via Steve Souders)
- Mr China Comes to America (The Atlantic) — long piece on the return of manufacturing to America, featuring Foo camper Liam Casey.
What You Do, Wordnik Branches, 5 Whys, and Hardware Hackathon
- You’re Saving Time — can you explain what you do, as well as this? Love the clarity of thought, as well as elegance of expression.
- Related Content, by Wordnik — branching out by offering a widget for websites which recommends other content on your site which is related to the current page. I’ve been keen to see what Wordnik do with their text knowledge.
- How to Run a 5 Whys with Humans, Not Robots (Slideshare) — gold Gold GOLD! (via Hacker News)
- Open Computer Project Hackathon — have never heard of a hardware hackathon before, keen to see how it works out. (via Jim Stogdill)
3D Printed Drones, When Pacemakers Attack, N-Gram Updated, and Deanonymizing Datasets
- Home-made 3D-Printed Drones — if only they used computer-vision to sequence DNA, they’d be the perfect storm of O’Reilly memes :-)
- Hacking Pacemakers For Death — IOActive researcher Barnaby Jack has reverse-engineered a pacemaker transmitter to make it possible to deliver deadly electric shocks to pacemakers within 30 feet and rewrite their firmware.
- Google N-Gram Viewer Updated — now with more books, better OCR, parts of speech, and complex queries. e.g., the declining ratio of sex to drugs. Awesome work by Friend of O’Reilly, Jon Orwant.
- Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel — a set of location traces can be deanonymized given an easily obtained social network graph. [...] Our experiments [on standard datasets] show that 80% of users are identiﬁed precisely, while only 8% are identiﬁed incorrectly, with the remainder mapped to a small set of users. (via Network World)
Search Fail, Recruiter Data, Ed Web, and Enterprise IT Yuks
- WTF — when keyword matching fails.
- The Best Recruiters, Pt II (Elaine Wherry) — almost all these tips are relevant to the cold-call “hey, you don’t know me but …” email messages you’ll have to send at some point in your life. Read, learn, obey.
- Best Websites for Teaching And Learning — as decided by the American Association of School Librarians. Lots of these I didn’t know existed but can see being used in class, e.g. Gamestar Mechanic which walks kids through the process of creating a game, teaching them how to think about games even as they produce one.
- Enterprise IT Adoption Curve — so very very true.