Difference between revisions of "Finding Paul Revere"

From
Jump to: navigation, search
Line 18: Line 18:
 
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner...
 
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner...
  
http://kieranhealy.org/files/misc/revere-closeup.png
+
https://kieranhealy.org/files/misc/revere-closeup.png
  
 
<youtube>qOVz_dVbTrE</youtube>
 
<youtube>qOVz_dVbTrE</youtube>

Revision as of 06:42, 16 July 2019

YouTube search... ...Google search

London, 1772.

I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects. This is in connection with the discussion of the role of “metadata” in certain recent events and the assurances of various respectable parties that the government was merely “sifting through this so-called metadata” and that the “information acquired does not include the content of any communications”. I will show how we can use this “metadata” to find key persons involved in terrorist groups operating within the Colonies at the present time. I shall also endeavour to show how these methods work in what might be called a relational manner...

revere-closeup.png

Helpful Items

1. Obtain a Colaboratory account; Note: Open to recent files 2. Download Kieran Healy files for reference from Github 3. Download from GitHub Mark Bernnico's cloned files 4. Upload to your Google Drive Boston - 1776.ipynb and PaulRevereAppD.csv

How to upload from a local file on your computer