SlideShare uma empresa Scribd logo
1 de 26
Big Data and Data Verification
What does big data mean to Internews?
What is Big Data?
In information technology, big data is a collection of data sets so
large and complex that it becomes difficult to process using
“normal” database management tools or traditional data
processing applications. The challenges of processing this data
include how to capture, to curate, to storage, to search, to
share, to analyze, and to visualize it. The appeal to use larger data
sets is driven by the additional information available from
analysis of a single large set of related data, as compared to
separate smaller sets with the same total amount of
data, allowing correlations to be found to spot trends, determine
quality of research, run preventive analysis, spot
correlations, model risks, and determine real-time impacts of
events.
WHAT DOES BIG DATA HAS TO
DO WITH INTERNEWS?
Data verification
ELECTUA.ORG
Falsifying/Verifying
the context

Falsifying/Verifying
the content

Falsifying/Verifying the
source
Social Media ID
ID of the
Content on the
Social media

Crowdsourcing

Direct
engagement

Media
authentication

Verification
of the
source
Timing

Influence
Location

ID of the
Network

ID of the
trusting
network
Language

Crowdsourcing

Content ID on
Social Network

Pictures/Video

Verification
of the
content
Time and
place

Triangulation

Follow up with
source
Factual
context

Crowdsourcing

Verification
the context

Time and
Location

Global Context
Different technics to verify

1.
2.
3.
4.

Separated Trusted and untrusted sources
Trusted sources verify untrusted sources
Verification protocols and technics
Putting the burden of the verification process
on the user
Falsification is always
possible…

..but so is verification!
+
=
TRUTH….?
The question is not if we can
verify crowdsourced information
or use big data in our work, the
question is how do we make the
verified data
for decision makers
THANK YOU

ANAHI AYALA IACUCCI
AAYALA@INTERNEWS.ORG
@INFO_INNOVATION
@ANAHI_AYALA

Mais conteúdo relacionado

Mais procurados

Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataLeMeniz Infotech
 
Future of text analysis forrester briefing
Future of text analysis   forrester briefingFuture of text analysis   forrester briefing
Future of text analysis forrester briefingStuart Shulman
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerAmit Sheth
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech#TheFraudTube
 
Protecting user data in profile matching social networks
Protecting user data in profile matching social networksProtecting user data in profile matching social networks
Protecting user data in profile matching social networksVenkat Projects
 
Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataieeepondy
 

Mais procurados (6)

Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational data
 
Future of text analysis forrester briefing
Future of text analysis   forrester briefingFuture of text analysis   forrester briefing
Future of text analysis forrester briefing
 
Enhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft PowerEnhancing Soft Power: using cyberspace to enhance Soft Power
Enhancing Soft Power: using cyberspace to enhance Soft Power
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech
 
Protecting user data in profile matching social networks
Protecting user data in profile matching social networksProtecting user data in profile matching social networks
Protecting user data in profile matching social networks
 
Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational data
 

Semelhante a Big Data for Media Development

ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressedFuture Agenda
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Securityijceronline
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsLea Shanley
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...TEWMAGAZINE
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESMicah Altman
 
Global Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletGlobal Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletIBM Danmark
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?John D. Johnson
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Katie Whipkey
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
 
23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunishaShivlal Mewada
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
 
The Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationThe Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationObjectways Technologies
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesKaran Deep Singh
 

Semelhante a Big Data for Media Development (20)

ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressed
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
 
Special report on security
Special report on securitySpecial report on security
Special report on security
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESBROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCES
 
Global Technology Outlook 2012 Booklet
Global Technology Outlook 2012 BookletGlobal Technology Outlook 2012 Booklet
Global Technology Outlook 2012 Booklet
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
Data mining
Data miningData mining
Data mining
 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
 
The Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and DisinformationThe Role of Content Moderation in Combating Misinformation and Disinformation
The Role of Content Moderation in Combating Misinformation and Disinformation
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
 

Mais de Anahi Iacucci

Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systemsAnahi Iacucci
 
Open Data for Development Challenge - Canada
Open Data for Development Challenge - CanadaOpen Data for Development Challenge - Canada
Open Data for Development Challenge - CanadaAnahi Iacucci
 
Anahi Ayala Iacucci - Curriculum Vitae
Anahi Ayala Iacucci - Curriculum VitaeAnahi Ayala Iacucci - Curriculum Vitae
Anahi Ayala Iacucci - Curriculum VitaeAnahi Iacucci
 
New Media for National Broadcasters
New Media for National BroadcastersNew Media for National Broadcasters
New Media for National BroadcastersAnahi Iacucci
 
Listening to the Crowd: verification of Social Media Content
Listening to the Crowd: verification of Social Media ContentListening to the Crowd: verification of Social Media Content
Listening to the Crowd: verification of Social Media ContentAnahi Iacucci
 
Innovative Approaches to M&E and Project Design
Innovative Approaches to M&E and Project DesignInnovative Approaches to M&E and Project Design
Innovative Approaches to M&E and Project DesignAnahi Iacucci
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
 
OpenGeo data for Media Development
OpenGeo data for Media DevelopmentOpenGeo data for Media Development
OpenGeo data for Media DevelopmentAnahi Iacucci
 
Using new technologies to foster information systems in complex emergencies
Using new technologies to foster information systems in complex emergenciesUsing new technologies to foster information systems in complex emergencies
Using new technologies to foster information systems in complex emergenciesAnahi Iacucci
 
Communication with Communities: C4D Unicef Workshop
Communication with Communities: C4D Unicef WorkshopCommunication with Communities: C4D Unicef Workshop
Communication with Communities: C4D Unicef WorkshopAnahi Iacucci
 
Crowdsourcing, Mapping and Verification - PICNIC2012
Crowdsourcing, Mapping and Verification - PICNIC2012Crowdsourcing, Mapping and Verification - PICNIC2012
Crowdsourcing, Mapping and Verification - PICNIC2012Anahi Iacucci
 
Preventing Conflict with the right information - UNDP Workshop
Preventing Conflict with the right information - UNDP WorkshopPreventing Conflict with the right information - UNDP Workshop
Preventing Conflict with the right information - UNDP WorkshopAnahi Iacucci
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyAnahi Iacucci
 
By the People: The Role of Citizen Journalism in the Information Revolution
By the People: The Role of Citizen Journalism in the Information RevolutionBy the People: The Role of Citizen Journalism in the Information Revolution
By the People: The Role of Citizen Journalism in the Information RevolutionAnahi Iacucci
 
Social Media for Public Health during Emergencies
Social Media for Public Health during Emergencies Social Media for Public Health during Emergencies
Social Media for Public Health during Emergencies Anahi Iacucci
 
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppo
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppoICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppo
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppoAnahi Iacucci
 
Why get there early
Why get there early Why get there early
Why get there early Anahi Iacucci
 
Qu’est-ce c’est l’Information humanitaire?
Qu’est-ce c’est l’Information humanitaire?Qu’est-ce c’est l’Information humanitaire?
Qu’est-ce c’est l’Information humanitaire?Anahi Iacucci
 

Mais de Anahi Iacucci (20)

Creating complex information systems
Creating complex information systemsCreating complex information systems
Creating complex information systems
 
Open Data for Development Challenge - Canada
Open Data for Development Challenge - CanadaOpen Data for Development Challenge - Canada
Open Data for Development Challenge - Canada
 
Anahi Ayala Iacucci - Curriculum Vitae
Anahi Ayala Iacucci - Curriculum VitaeAnahi Ayala Iacucci - Curriculum Vitae
Anahi Ayala Iacucci - Curriculum Vitae
 
New Media for National Broadcasters
New Media for National BroadcastersNew Media for National Broadcasters
New Media for National Broadcasters
 
Listening to the Crowd: verification of Social Media Content
Listening to the Crowd: verification of Social Media ContentListening to the Crowd: verification of Social Media Content
Listening to the Crowd: verification of Social Media Content
 
Innovative Approaches to M&E and Project Design
Innovative Approaches to M&E and Project DesignInnovative Approaches to M&E and Project Design
Innovative Approaches to M&E and Project Design
 
Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013Humanitarian emergencies: searching for Open Data - OKCon2013
Humanitarian emergencies: searching for Open Data - OKCon2013
 
OpenGeo data for Media Development
OpenGeo data for Media DevelopmentOpenGeo data for Media Development
OpenGeo data for Media Development
 
Using new technologies to foster information systems in complex emergencies
Using new technologies to foster information systems in complex emergenciesUsing new technologies to foster information systems in complex emergencies
Using new technologies to foster information systems in complex emergencies
 
Communication with Communities: C4D Unicef Workshop
Communication with Communities: C4D Unicef WorkshopCommunication with Communities: C4D Unicef Workshop
Communication with Communities: C4D Unicef Workshop
 
Crowdsourcing, Mapping and Verification - PICNIC2012
Crowdsourcing, Mapping and Verification - PICNIC2012Crowdsourcing, Mapping and Verification - PICNIC2012
Crowdsourcing, Mapping and Verification - PICNIC2012
 
Preventing Conflict with the right information - UNDP Workshop
Preventing Conflict with the right information - UNDP WorkshopPreventing Conflict with the right information - UNDP Workshop
Preventing Conflict with the right information - UNDP Workshop
 
Iccm11
Iccm11Iccm11
Iccm11
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technology
 
By the People: The Role of Citizen Journalism in the Information Revolution
By the People: The Role of Citizen Journalism in the Information RevolutionBy the People: The Role of Citizen Journalism in the Information Revolution
By the People: The Role of Citizen Journalism in the Information Revolution
 
Social Media for Public Health during Emergencies
Social Media for Public Health during Emergencies Social Media for Public Health during Emergencies
Social Media for Public Health during Emergencies
 
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppo
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppoICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppo
ICT4D e applicazioni pratiche di nuove tecnologie per lo sviluppo
 
Why get there early
Why get there early Why get there early
Why get there early
 
Qu’est-ce c’est l’Information humanitaire?
Qu’est-ce c’est l’Information humanitaire?Qu’est-ce c’est l’Information humanitaire?
Qu’est-ce c’est l’Information humanitaire?
 
Flsms partie II
Flsms partie IIFlsms partie II
Flsms partie II
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Big Data for Media Development

Notas do Editor

  1. In the past year Internews has been setting up several crowdsourcing mapping project and working in different countries trying to match information collected through traditional media channels and information collected from the so called crowd. Those projects has been implemented in different type of environments, at times in the humanitarian context, at times in election contexts, at times for transparency and accountability projects.
  2. Today, we are seeing the merging of those verification technics with computing based systems, mechanical turks, automated systems, where the amount of time and human resources needed to implement verification protocols is becoming smaller and the verification itself is becoming cheaper. Those new systems are getting us closer to the truth.