Tuesday, April 14, 2009

All Things Gibbs

Analyzing Twitter with Excel, Part 2; The Internet Kill Switch
Network World logo

All Things Gibbs

NetworkWorld.com | Software Research Center | Update Your Profile


Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

Spotlight Story
Analyzing Twitter with Excel, Part 2

Mark Gibbs By Mark Gibbs
After looking at the update of a product that Mark Gibbs was, to put it mildly, rather critical of, he continues his self-appointed task of using Excel to analyze Twitter data. Read full story

Mark Gibbs is a consultant, author, journalist and columnist.

Related News:

Backspin: The Internet Kill Switch
There are some ideas about technology that are simply bad thinking. Sen. Rockefeller's proposal to give the president an Internet Kill Switch is monumentally wrong headed

More Gearhead and Backspin:

Analyzing Twitter with Excel, Part 1
Mark Gibbs ponders how to analyze Twitter for a specific search term using the Twitter search API and Microsoft Excel.

Owning your own data
There's a lot of data out there about you, but you hardly "own" most of it. What would it mean if you did own it and why does no one care yet?

Aardvark solves my Gmail problem
Mark Gibbs suddenly found that with Firefox on his Mac he couldn't log in to Gmail and there was no obvious reason. After asking his friends he tried asking strangers by using Aardvark, a social search service. Surprise of surprises; he got an answer!

Becoming green or just greenish?
Becoming an environmentally responsible organization isn't easy particularly in IT. It requires seeing the bigger picture and treating effort of becoming green as a comprehensive, strategic issue. So far, not many organizations are doing anything like that.

Keeping IT honest
Just over a week ago Forrester Research posted a blog item titled "Sponsored Conversations: When it's OK to pay bloggers to post."

Generating regexes and Gmail filters
Mark Gibbs is very impressed with a service that generates code for regular expressions and he has found that Gmail now supports importing and exporting filters. His happiness knows no bounds.

Search tools: hardware, an add-on and a service
Gibbs outlines a product awaiting test that searches and captures television programs, raves about a browser search enhancement plug-in he can’t live without, and is quite impressed by a service to help you identify errors.

To Tweet or not to Tweet, that's not an option
I'm writing this column for one simple reason: Once I get it written then the next time someone says to me "I don't get Twitter, it seems kinda stoopid to me. What is it all about?" I can direct them to this polemic and save my breath.

Computers and five kinds of insanity
I wrote last week about New Zealand's insane copyright legislation that would make people accused of content piracy guilty until proven innocent. Over the last few days I've been marveling at how that seems to be consistent with the general level of insanity that surrounds the digital world at present.

Wrapping up TiddlyWiki
The excitement is coming to an end...Mark Gibbs has covered TiddlyWiki up one side and down the other and is still amazed with the application.

New Zealand gets insane copyright law
A law has just been passed in New Zealand that allows for alleged online copyright infringers to have their Internet access cut off before being proved guilty.

TiddlyWiki macros and plugins
Continuing with his exploration of TiddlyWiki wiki technology, Mark Gibbs looks at the system's macros and plugins that modify and extend the how and what the software can do.

IT's glass - full, empty or too big?
In times of economic chaos and budget cuts you need to check your perspective. You know the old saw: A pessimist sees the glass as half empty; the optimist sees it as half full. These are both wrong ways of looking at the problem. The realist's perspective, the right way, recognizes that when there's space above the contents the glass is simply too big.

Exploring TiddlyWiki
Mark Gibbs discusses some reader feedback on TiddlyWiki and then starts to break down the TiddlyWiki system. Will the excitement never end?

Fixing the privacy joke
The whole idea of privacy has become a joke. On one hand we have consumers who will give away their personal details to random Web sites (as well as to Mrs. Sikiratu Seki Adam, "a widow to Late Saheed Baba Adams") at the drop of a virtual hat, and on the other we have businesses losing personally identifiable information and transaction data with wild abandon … yes, I'm talking about you Heartland Payment Systems. (Heartland lost data on more than 100 million transactions although it is hardly alone — check out the data loss database at the Open Security Foundation).

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/14/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Responsible for building a resilient data center

Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit http://www.nww.com/rpgx.jsp?c=XU1PHA1813Z4303.

IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: