SlideShare a Scribd company logo
1 of 123
Download to read offline
HACKING JOURNALISM
  Using the Internet to save the world




                                         Dan Schultz
                                           @slifty
The man pulling radishes
   pointed the way
     with a radish


       Kobayashi Issa
My professional life
                                    in 90 seconds




2005   2006   2007           2008    2009           2010   2011   2012   2013


              Carnegie Mellon
              Information Systems
My professional life
                                in 90 seconds




2005   2006   2007       2008    2009           2010      2011   2012   2013


              Carnegie Mellon                   Philly
                                           ColorQuick
                                           Speaker Text
                                                 PBS
My professional life
                                in 90 seconds




2005   2006   2007       2008    2009           2010     2011            2012   2013


              Carnegie Mellon                   Philly            MIT
                                                          Information Ecology
                                                                Civic Media
eco.media.mit.edu
civic.mit.edu
My professional life
                                in 90 seconds




2005   2006   2007       2008    2009           2010     2011         2012          2013


              Carnegie Mellon                   Philly          MIT           OpenNews
                                                                             The Boston Globe
Knight-Mozilla OpenNews is
about building an ecosystem
to help journalism thrive on
the open web.
mozillaopennews.org
Developer




                        Newsroom Developer



Creative Technologist
Hacking is all about building and changing systems.
People




Technology            Process
People




                           Process




     This means hacking is more about
identifying needs and opportunities
   than it is about mastering technology.
How to Hack Anything

  1. Know what’s possible
  2. Identify your goals
  3. Understand your stakeholders
  4. Learn as needed
  5. Make things
The Internet will

    Destroy
      ?

   the world.
How did we fight this kind of stuff before?
It is our responsibility to make sure
well-informed communities continue to exist.
It is our responsibility to make sure
well-informed communities continue to exist.




(notice what this doesn’t say)
Let’s talk about...
think more carefully




remix media content
Step 1: Credibility
Step 1: Credibility

Step 2: Critical Ability
Step 1: Credibility

Step 2: Critical Ability
Step 3: Profit
(your critical ability should be triggering right now.)
Step 1: Credibility

Step 2: Critical Ability
Step 3: Profit
lyladuey.com




You could tie yourself to a bungee cord, close your eyes, and jump
       off a cliff… or you could read the New York Times.
Help the world
hold information to your standards
Confirmation Bias Illusion of Truth Effect
  Fluencey Effect       Enhanced Negation Effect
Limitations of Memory Disconfirmation Bias
    and Cognition
                                 Selective Exposure
   Familiarity Backfire Effect
                              Continued Influence Effect
         Identity and Race
                                    Source Quality
   Belief Perseverance
     Overkill Backfire Effect    Motivated Reasoning
             Motivated Skepticism   Hostile Media Effect
        Information Deficits           Lack of Control
At the end of the day
we are all struggling to protect our identities
            when consuming information
TRUTHTELLER
Explore Sources
Train everyone to
expect a certain experience
Train everyone to
        expect a certain experience


(one that empowers critical ability)
Make sure that experience is either expensive or
 impossible for phonies to replicate
Make sure that experience is either expensive or
 impossible for phonies to replicate


            (anyone that isn’t credible)
Satire
Bias Bashing
Empowerment
A suspected teenage gangbanger,         Jermaine Perry, an 18 year old from
blasted to death in a hail of bullets   Mattapan, was blasted to death in a hail
on his Mattapan doorstep, was           of bullets on his Mattapan doorstep. A
battling to leave behind his troubled   devastated colleague said Jermaine was
youth, a devastated colleague said.     battling to leave behind his youth which
                                        sources suspect may have included
                                        involvement in gang-related activities.
Expose stories that would be overlooked
Continue even after the mainstream forgets
Disrupt consumer biases
Satirize contentious issues
Reframe descriptions of your communities
Back to the light, with

OPENED CAPTIONS
The Problem:
  Writing applications based on what’s
  happening on TV is damn near impossible.
http://www.guardian.co.uk/world/interactive/2012/nov/06/america-elect-graphic-novel
Step 1: Extract
OCR
                            Audio Analysis
          Speech to Text
                             Closed Captioning
Video Analysis
                     Face Recognition
    Fingerprinting
OCR
                            Audio Analysis
          Speech to Text
                             Closed Captioning
Video Analysis
                     Face Recognition
    Fingerprinting
Line 21 Decoding
Step 2: Distribute
Information Flow



Video Feed
Information Flow


             Extract




Video Feed      Opened Captions Server
Information Flow

                                    Distribute
             Extract                             Opened Captions
                                                     Clients


Video Feed      Opened Captions Server
TRADITIONAL WEB
  INTERACTIONS


     Request

     Response
WEBSOCKETS

   Handshake




   Messages
Easy to Code Against
That’s great, but...
How do you hack from the inside?
Simple!
Get good at effective troublemaking.
Rule 1: Ask Obnoxious Questions
Rule 2: Broadcast your Brilliance
That other thing...
   What was it...
    OH RIGHT
Actually talking
Rule 3: Ignore the Food Chain
Rule 4: Shamelessly Create
My Troublemaking MixTape




Side A                      Side B
Learn                       Ruffle Feathers
Observe                     Catalyze
Contribute                  Push Back
Communicate                 Invent
@slifty
FOR INSTANCE....
   Client Says                 Server Responds

Show me the front page of
     the NY Times
                                Sure thing, enjoy reading
                                  glorious journalism!”



 Do I have any new emails?
                             Here are your 423 new emails
                                 you popular netizen



I DEMAND ANIMATED GIFS
                                You got it, boss, I proudly
                             present Obama slicing a salami
                                     with his hands
HOW WOULD YOU SAY...

  Let me know when...

                                 This is awkward.

 Keep me updated with...     I was kind of thinking our
                           relationship would be a “one
                                     time” deal.


  Push me a notice if...
POLLING
                             The Younger Sibling
                                 Approach

Do you have any new tweets?             How bout now?


                         What about now?

     I don’t know if you knew
   this, but I’m looking for new
                tweets
                               I’m betting there are some
                                           now.
       New tweets?
                            You’ll never guess what I’m
                                  about to ask for.         Holy crap. I’m gonna go shut
                                                                    down now.

   It’s been like 10 seconds you
    have to have some by now.
Easy to Modify
Content Forking


Video Feed
Content Forking


Video Feed    Opened Captions Server
Content Forking

                                       Clients


Video Feed    Opened Captions Server
Content Forking

                                               Clients


Video Feed    Opened Captions Server
                                       Content Fork
Content Forking

                                                         Clients


Video Feed    Opened Captions Server
                                                 Content Fork




                                       Clients
Content Forking

                                                             English-speaking clients


Video Feed    Opened Captions Server
                                                          Content Fork
                                                          (Spanish Translation Mod)




                               Spanish-speaking clients
Easy to Set Up
Hacking Journalism: Using the Internet to Save the World

More Related Content

Viewers also liked

2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the YearJeremiah Grossman
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsphanleson
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101nbuchan1
 
Web Hacking Series Part 1
Web Hacking Series Part 1Web Hacking Series Part 1
Web Hacking Series Part 1Aditya Kamat
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive MeasuresShubham Takode
 
The power of Structured Journalism & Hacker Culture in NPR
The power of Structured Journalism & Hacker Culture in NPRThe power of Structured Journalism & Hacker Culture in NPR
The power of Structured Journalism & Hacker Culture in NPRPoderomedia
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Jeremiah Grossman
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrowthRocks
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data managementMohammad Yousri
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data ManagementSung Kuan
 

Viewers also liked (17)

2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
2010: A Web Hacking Odyssey - Top Ten Hacks of the Year
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Travel Hacking 101
Travel Hacking 101Travel Hacking 101
Travel Hacking 101
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Hacking Series Part 1
Web Hacking Series Part 1Web Hacking Series Part 1
Web Hacking Series Part 1
 
Website Hacking and Preventive Measures
Website Hacking and Preventive MeasuresWebsite Hacking and Preventive Measures
Website Hacking and Preventive Measures
 
The power of Structured Journalism & Hacker Culture in NPR
The power of Structured Journalism & Hacker Culture in NPRThe power of Structured Journalism & Hacker Culture in NPR
The power of Structured Journalism & Hacker Culture in NPR
 
Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)Top Ten Web Hacking Techniques (2008)
Top Ten Web Hacking Techniques (2008)
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Web Hacking Intro
Web Hacking IntroWeb Hacking Intro
Web Hacking Intro
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Hacking
HackingHacking
Hacking
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web AppsGrow Hack Athens Pt.1: Growth Hacking For Web Apps
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
 
The what, why, and how of master data management
The what, why, and how of master data managementThe what, why, and how of master data management
The what, why, and how of master data management
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 

Similar to Hacking Journalism: Using the Internet to Save the World

Life in Open Source Communities, ApacheCon US 2009
Life in Open Source Communities, ApacheCon US 2009Life in Open Source Communities, ApacheCon US 2009
Life in Open Source Communities, ApacheCon US 2009Bertrand Delacretaz
 
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...Kenny Lauer
 
PowerPoint 101: What NOT to Do!
PowerPoint 101: What NOT to Do! PowerPoint 101: What NOT to Do!
PowerPoint 101: What NOT to Do! rahkout
 
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)webdagene
 
Designing Login Interfaces for Mobiles
Designing Login Interfaces for MobilesDesigning Login Interfaces for Mobiles
Designing Login Interfaces for MobilesRohit Ashok Khot
 
The Art of Presentation. Following the Zen path
The Art of Presentation. Following the Zen pathThe Art of Presentation. Following the Zen path
The Art of Presentation. Following the Zen pathAlberto de Vega Luna
 
Digitalresearchrenaissancemra 100627222944-phpapp01
Digitalresearchrenaissancemra 100627222944-phpapp01Digitalresearchrenaissancemra 100627222944-phpapp01
Digitalresearchrenaissancemra 100627222944-phpapp01SocialNuggets
 
Digital research renaissance - Social Media Analysis
Digital research renaissance - Social Media AnalysisDigital research renaissance - Social Media Analysis
Digital research renaissance - Social Media AnalysisSerendio Inc.
 
NERCOMP: Web Governance - Planning for Disruption
NERCOMP: Web Governance - Planning for DisruptionNERCOMP: Web Governance - Planning for Disruption
NERCOMP: Web Governance - Planning for DisruptionJay Collier
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly CampusDave Olsen
 
Presentation Redux @ Lanco Infratch
Presentation Redux @ Lanco InfratchPresentation Redux @ Lanco Infratch
Presentation Redux @ Lanco InfratchMohit Chhabra
 
Napier Lecture Social Computing
Napier Lecture Social ComputingNapier Lecture Social Computing
Napier Lecture Social ComputingEwan McIntosh
 
Social Media - Morris County SHRM
Social Media - Morris County SHRMSocial Media - Morris County SHRM
Social Media - Morris County SHRMjessicalevin
 
Demystifying the Media
Demystifying the MediaDemystifying the Media
Demystifying the MediaEphraim Cohen
 

Similar to Hacking Journalism: Using the Internet to Save the World (20)

Opened Captions
Opened CaptionsOpened Captions
Opened Captions
 
Life in Open Source Communities, ApacheCon US 2009
Life in Open Source Communities, ApacheCon US 2009Life in Open Source Communities, ApacheCon US 2009
Life in Open Source Communities, ApacheCon US 2009
 
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...
30 Social Media Ideas in 30 Minutes [ Ragan Social Media Summit - June 11, 20...
 
30 ideas in 30 minutes with Kenny Lauer of GPJ
30 ideas in 30 minutes with Kenny Lauer of GPJ30 ideas in 30 minutes with Kenny Lauer of GPJ
30 ideas in 30 minutes with Kenny Lauer of GPJ
 
PowerPoint 101: What NOT to Do!
PowerPoint 101: What NOT to Do! PowerPoint 101: What NOT to Do!
PowerPoint 101: What NOT to Do!
 
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)
Des Traynor: Slik skriver du mikrotekster (Webdagene 2012)
 
Finding the Center
Finding the CenterFinding the Center
Finding the Center
 
Designing Login Interfaces for Mobiles
Designing Login Interfaces for MobilesDesigning Login Interfaces for Mobiles
Designing Login Interfaces for Mobiles
 
Future of local tv
Future of local tvFuture of local tv
Future of local tv
 
CMMI vs. Zombies: How CMMI-SVC Can Help in the Zombie Apocalypse
CMMI vs. Zombies: How CMMI-SVC Can Help in the Zombie ApocalypseCMMI vs. Zombies: How CMMI-SVC Can Help in the Zombie Apocalypse
CMMI vs. Zombies: How CMMI-SVC Can Help in the Zombie Apocalypse
 
The Art of Presentation. Following the Zen path
The Art of Presentation. Following the Zen pathThe Art of Presentation. Following the Zen path
The Art of Presentation. Following the Zen path
 
Digitalresearchrenaissancemra 100627222944-phpapp01
Digitalresearchrenaissancemra 100627222944-phpapp01Digitalresearchrenaissancemra 100627222944-phpapp01
Digitalresearchrenaissancemra 100627222944-phpapp01
 
Digital research renaissance - Social Media Analysis
Digital research renaissance - Social Media AnalysisDigital research renaissance - Social Media Analysis
Digital research renaissance - Social Media Analysis
 
NERCOMP: Web Governance - Planning for Disruption
NERCOMP: Web Governance - Planning for DisruptionNERCOMP: Web Governance - Planning for Disruption
NERCOMP: Web Governance - Planning for Disruption
 
The Future Friendly Campus
The Future Friendly CampusThe Future Friendly Campus
The Future Friendly Campus
 
Presentation Redux @ Lanco Infratch
Presentation Redux @ Lanco InfratchPresentation Redux @ Lanco Infratch
Presentation Redux @ Lanco Infratch
 
Napier Lecture Social Computing
Napier Lecture Social ComputingNapier Lecture Social Computing
Napier Lecture Social Computing
 
Hello!
Hello!Hello!
Hello!
 
Social Media - Morris County SHRM
Social Media - Morris County SHRMSocial Media - Morris County SHRM
Social Media - Morris County SHRM
 
Demystifying the Media
Demystifying the MediaDemystifying the Media
Demystifying the Media
 

More from Daniel Schultz

More from Daniel Schultz (6)

Civic Innovation
Civic InnovationCivic Innovation
Civic Innovation
 
Prove It.
Prove It.Prove It.
Prove It.
 
2012 10-05 socketio
2012 10-05 socketio2012 10-05 socketio
2012 10-05 socketio
 
NewsJack (Civic 2012)
NewsJack (Civic 2012)NewsJack (Civic 2012)
NewsJack (Civic 2012)
 
Civic Ignite - 18x15
Civic Ignite - 18x15Civic Ignite - 18x15
Civic Ignite - 18x15
 
Crit Day Presentation (Truth Goggles)
Crit Day Presentation (Truth Goggles)Crit Day Presentation (Truth Goggles)
Crit Day Presentation (Truth Goggles)
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Hacking Journalism: Using the Internet to Save the World