Tuesday, April 21, 2009

All Things Gibbs

Analyzing Twitter with Excel, Part 3; Less freedom in the new digital world?
Network World logo

All Things Gibbs

NetworkWorld.com | Software Research Center | Update Your Profile


Sponsored by EMC & VMWare
rule

EMC/VMWare: How reliable is your virtual data center?
Create a more efficient virtualized data center by automating your change and configuration management processes. Join us for this live event scheduled for Tuesday, April 28, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Experts will provide real-world tips and recommendations on how to successfully automate your manual, error-prone processes. Register for this Live Webcast now.

rule

Spotlight Story
Analyzing Twitter with Excel, Part 3

Mark Gibbs By Mark Gibbs
This week Mark Gibbs figures out how to grab useful Twitter data despite Twitter's lame API and begins massaging it to make it really useful. Oh, and he shows cURL and grep a little love. Read full story

Mark Gibbs is a consultant, author, journalist and columnist.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Backspin: Less freedom in the new digital world?
Following up on last week's Internet Kill Switch column Mark Gibbs discusses some reader feedback and wonders whether we're being softened up for a brave new digital world.

More Gearhead and Backspin:

Analyzing Twitter with Excel, Part 2
After looking at the update of a product that Mark Gibbs was, to put it mildly, rather critical of, he continues his self-appointed task of using Excel to
analyze Twitter data.

Analyzing Twitter with Excel, Part 1
Mark Gibbs ponders how to analyze Twitter for a specific search term using the Twitter search API and Microsoft Excel.

The Internet Kill Switch
There are some ideas about technology that are simply bad thinking. Sen. Rockefeller's proposal to give the president an Internet Kill Switch is monumentally wrong headed

Owning your own data
There's a lot of data out there about you, but you hardly "own" most of it. What would it mean if you did own it and why does no one care yet?

Aardvark solves my Gmail problem
Mark Gibbs suddenly found that with Firefox on his Mac he couldn't log in to Gmail and there was no obvious reason. After asking his friends he tried asking strangers by using Aardvark, a social search service. Surprise of surprises; he got an answer!

Becoming green or just greenish?
Becoming an environmentally responsible organization isn't easy particularly in IT. It requires seeing the bigger picture and treating effort of becoming green as a comprehensive, strategic issue. So far, not many organizations are doing anything like that.

Keeping IT honest
Just over a week ago Forrester Research posted a blog item titled "Sponsored Conversations: When it's OK to pay bloggers to post."

Generating regexes and Gmail filters
Mark Gibbs is very impressed with a service that generates code for regular expressions and he has found that Gmail now supports importing and exporting filters. His happiness knows no bounds.

Search tools: hardware, an add-on and a service
Gibbs outlines a product awaiting test that searches and captures television programs, raves about a browser search enhancement plug-in he can’t live without, and is quite impressed by a service to help you identify errors.

To Tweet or not to Tweet, that's not an option
I'm writing this column for one simple reason: Once I get it written then the next time someone says to me "I don't get Twitter, it seems kinda stoopid to me. What is it all about?" I can direct them to this polemic and save my breath.

Computers and five kinds of insanity
I wrote last week about New Zealand's insane copyright legislation that would make people accused of content piracy guilty until proven innocent. Over the last few days I've been marveling at how that seems to be consistent with the general level of insanity that surrounds the digital world at present.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by EMC & VMWare
rule

EMC/VMWare: How reliable is your virtual data center?
Create a more efficient virtualized data center by automating your change and configuration management processes. Join us for this live event scheduled for Tuesday, April 28, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Experts will provide real-world tips and recommendations on how to successfully automate your manual, error-prone processes. Register for this Live Webcast now.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/21/09

Today's most-read stories:

  1. Oracle agrees to buy Sun for $7.4B
  2. Buzzblog: Oracle acquires Sun in $7.4B stunner
  3. Adobe's new Flash can stream Internet content to TVs
  4. Microsoft discloses ambitious security strategy
  5. Palm's webOS lives up to hype, early developers say
  6. RSA Conference kicks off on somber note
  7. Cisco reveals aggressive pricing for blade server system
  8. The Incredible International Submarine Cable Systems
  9. PBX killer, Voice CAL coming to OCS in 2010
  10. 802.11n complications are imminent
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news




IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: