Tuesday, April 28, 2009

All Things Gibbs

Analyzing Twitter with Excel, Part 4; Security: The ugly business
Network World logo

All Things Gibbs

NetworkWorld.com | Software Research Center | Update Your Profile


Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Spotlight Story
Analyzing Twitter with Excel, Part 4

Mark Gibbs By Mark Gibbs
This week Mark Gibbs wraps up his quest to analyze Twitter data using Excel gets results despite loads of "gotchas". Ugly results it is true but results nonetheless. Read full story

Mark Gibbs is a consultant, author, journalist and columnist.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Backspin: Security: The ugly business
Security problems usually don't have elegant solutions. A report from Commonwealth Bank concerning serious ATM vulnerabilities illustrates the issues perfectly.

More Gearhead and Backspin:

Analyzing Twitter with Excel, Part 3
This week Mark Gibbs figures out how to grab useful Twitter data despite Twitter’s lame API and begins massaging it to make it really useful. Oh, and he
shows cURL and grep a little love.

Analyzing Twitter with Excel, Part 2
After looking at the update of a product that Mark Gibbs was, to put it mildly, rather critical of, he continues his self-appointed task of using Excel to
analyze Twitter data.

Analyzing Twitter with Excel, Part 1
Mark Gibbs ponders how to analyze Twitter for a specific search term using the Twitter search API and Microsoft Excel.

Less freedom in the new digital world?
Following up on last week's Internet Kill Switch column Mark Gibbs discusses some reader feedback and wonders whether we're being softened up for a brave new digital world.

The Internet Kill Switch
There are some ideas about technology that are simply bad thinking. Sen. Rockefeller's proposal to give the president an Internet Kill Switch is monumentally wrong headed

Owning your own data
There's a lot of data out there about you, but you hardly "own" most of it. What would it mean if you did own it and why does no one care yet?

Aardvark solves my Gmail problem
Mark Gibbs suddenly found that with Firefox on his Mac he couldn't log in to Gmail and there was no obvious reason. After asking his friends he tried asking strangers by using Aardvark, a social search service. Surprise of surprises; he got an answer!

Becoming green or just greenish?
Becoming an environmentally responsible organization isn't easy particularly in IT. It requires seeing the bigger picture and treating effort of becoming green as a comprehensive, strategic issue. So far, not many organizations are doing anything like that.

Keeping IT honest
Just over a week ago Forrester Research posted a blog item titled "Sponsored Conversations: When it's OK to pay bloggers to post."

Generating regexes and Gmail filters
Mark Gibbs is very impressed with a service that generates code for regular expressions and he has found that Gmail now supports importing and exporting filters. His happiness knows no bounds.

Search tools: hardware, an add-on and a service
Gibbs outlines a product awaiting test that searches and captures television programs, raves about a browser search enhancement plug-in he can’t live without, and is quite impressed by a service to help you identify errors.

To Tweet or not to Tweet, that's not an option
I'm writing this column for one simple reason: Once I get it written then the next time someone says to me "I don't get Twitter, it seems kinda stoopid to me. What is it all about?" I can direct them to this polemic and save my breath.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber …and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/28/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: