SlideShare uma empresa Scribd logo
1 de 74
Using data for investigations

VVOJ 2013
Jennifer LaFleur, Center for Investigative Reporting
Why data?
It takes you beyond the anecdote
It’s easier than counting sheets of paper
Why data?
Contrasts are in the data
Caution: This slide contains extreme nerdiness
Why Computer-Assisted Reporting?
Contrasts are in the data
Your most powerful figures are in the data
Source: California
Health Dept. data,
Medicare billing data
Findings: Some
hospitals had
“alarming rates of a
Third World nutritional
disorder among its
Medicare patients.”
Why data?
Contrasts are in the data
Your most powerful figures are in the data
You can make connections you might not be
able to make otherwise
Data: Youth
prison workers,
criminal
convictions and
grievance data
Findings:
Employees with
criminal
backgrounds
were more likely
to be accused of
abusing inmates.
Data: Federal
bridge
inspections and
stimulus funding.
Findings: Some
of the nation’s
worst bridges did
not get stimulus
funds.
Why data?
Contrasts are in the data
Your most powerful figures are in the data
You can make connections you might not be
able to make otherwise
You can test assumptions
Source: NHTSA
complaint data
Findings:
“…unintended
acceleration has
been a problem
across the auto
industry.”
Collecting the data
Where’s the data?
If something is inspected
Licensed
Enforced or
Purchased
…There probably is a database
Where’s the data?
If there is a report
Or a form
There probably is a database
Where’s the data?
Sometimes data is readily available
online for download
Source: Medicaid nursing home
survey data and finance data,
housing data
Findings: “…a shortage of places
for the disabled to live outside a
nursing home and regulations
that critics say make it hard to
qualify for home services mean
many who want out continue to
receive expensive nursing care.”
Where’s the data?
Sometimes you have to scrape it.
That usually involves programs
that automate searching tasks on
Web sites.
Where’s the data?
More often you need to go to an
agency to get the data
This can be tricky if an agency
doesn’t want to release it. (Stay
tuned for more on that…)
Source: School district
credit card purchases

Findings: District card
holders made
questionable
purchases with their
cards.
Sometimes, there is no data.
But it’s okay because there are
techniques for sampling and building
a database.

(more about that tomorrow)
Sometimes data
enhances a story
But most of the time
it’s the base that a
story is built on
Stories don’t end at
the data – we must
find people to tell the
stories
Source: City Budget
Findings: Some neighborhoods suffer
more than others as mayor cuts budgets
Source: Salary data
and other charter
school records
Findings: Reporters
Found nepotism in
charter schools and
administrators
earning six-figure
salaries to run
schools with only a
few hundred or a
couple of thousand
students
Source: Dept. of Ed data and surveys of campus crisis clinics
Findings: Many campuses had lax enforcement and reporting loop holes
mean problems go unchecked.
The tools
Spreadsheets
Databases
Mapping
Statistics
SOURCE: Local health department
inspection reports
FINDINGS: At 28% of the venues,
more than half of the concession
stands or restaurants had been cited
for at least one "critical" or "major"
health violation.
Source: EPA and state data on hazardous chemical locations
Findings: Dallas County has 900+ sites that store hazardous chemicals
Source: Medicaid
outcomes data for
dialysis facilities
Findings: A CMS
online tool did not
tell the whole story
about facilities. In
some counties the
gap in measures,
such as survival
rate were vast.
KING-TV Seattle
DATA: Payroll records, time sheets and
other data and documents from Washington
State Ferries.
FINDINGS: The rolling investigation
uncovered serious problems within the
country's largest ferry system - the
Washington State Ferries. State employees
ignored millions of taxpayer dollars in
questionable spending. There was
practically no internal review or
accountability.
DATA: workplace safety inspections

FINDINGS: Workers in many dangerous industries get a small fraction of the
attention from inspectors that construction workers do.
Two of Washington's
most injury–prone
industries get
Almost no attention
from workplace
safety
inspectors:
Nursing homes and
Hospitals
SOURCE: voter rolls, school staff list
FINDINGS: teachers living in Lee County, Florida didn't turn out
as expected for the Lee County Supervisor of Election. 48% of
staff vs. 53% voter turnout
Source: Washington Health Department data
Findings: “MRSA has been quietly killing in hospitals for
decades.” But no one had tracked it until this story.
Source: Dam
inspection data
from Texas and
federal government
Findings: Dam
records had not
been updated to
account for
population growth
Source: Illinois health data, police data
Findings: Dangerous systemic failed to protect elderly patients in
Illinois nursing homes that also house mentally ill younger residents,
including murderers, sex offenders, and armed robbers.
Source: ICE referrals
Findings: Somerville
police referred nine
individuals to federal
immigration officials
between January 2009
and April 2010 for
offenses ranging from
prostitution to narcotics
trafficking to possession
of stolen property.
Disparities in water
usage
“Water use highest in
poor areas of the city”
Mapping and statistical
analysis
Source: Federal jobs
data
Findings: When Tories
took power, the
percentage of females
began to drop.
Source: 311 calls for downed trees
Findings: After a tornado swept across New York City, 311
calls for downed trees helps trace its path
Just another way of saying no

Huge costs
Delay tactics
“Oh you silly little journalist”
Sending you the wrong thing
“Your request was unclear”
Our database is on a
mainframe and it’s
very complicated,
Missy
That uses
proprietary
software.
We don’t keep
that on
computer
That
information is
protected by
law
Jennifer LaFleur
jlafleur@cironline.org
@j_la28
www.cironline.org

Mais conteúdo relacionado

Mais procurados

Mais procurados (6)

Internet Partner Notification
Internet Partner NotificationInternet Partner Notification
Internet Partner Notification
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
Washington State - Drug Mortalities at the County Level
Washington State - Drug Mortalities at the County LevelWashington State - Drug Mortalities at the County Level
Washington State - Drug Mortalities at the County Level
 
Data Journalism for Business Reporting by Jaimi Dowdell and Mark Horvit
Data Journalism for Business Reporting by Jaimi Dowdell and Mark HorvitData Journalism for Business Reporting by Jaimi Dowdell and Mark Horvit
Data Journalism for Business Reporting by Jaimi Dowdell and Mark Horvit
 
Fair Share John Wayne Brochure
Fair Share John Wayne BrochureFair Share John Wayne Brochure
Fair Share John Wayne Brochure
 
Medicaid Fraud Database Structures
Medicaid Fraud Database StructuresMedicaid Fraud Database Structures
Medicaid Fraud Database Structures
 

Semelhante a VVOJ Intro to data journalism

Page 579Assess the Constituent Data. What is included Omi.docx
Page 579Assess the Constituent Data. What is included Omi.docxPage 579Assess the Constituent Data. What is included Omi.docx
Page 579Assess the Constituent Data. What is included Omi.docxbunyansaturnina
 
How to Use Data to Get Grants
How to Use Data to Get GrantsHow to Use Data to Get Grants
How to Use Data to Get Grants4Good.org
 
Finding Community Data
Finding Community DataFinding Community Data
Finding Community DataNicoleBranch
 
AMDIS CHIME Fall Symposium
AMDIS CHIME Fall SymposiumAMDIS CHIME Fall Symposium
AMDIS CHIME Fall SymposiumDale Sanders
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperMichelle Brown
 
Peer Review FormComplete the form by inserting your answer.docx
Peer Review FormComplete the form by inserting your answer.docxPeer Review FormComplete the form by inserting your answer.docx
Peer Review FormComplete the form by inserting your answer.docxtemplestewart19
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy- Mark - Fullbright
 
4 Big Data Challenges In Healthcare
4 Big Data Challenges In Healthcare4 Big Data Challenges In Healthcare
4 Big Data Challenges In HealthcareHPC Asia
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0Jmschwietz1
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
WSDM2015Tutorial.pdf
WSDM2015Tutorial.pdfWSDM2015Tutorial.pdf
WSDM2015Tutorial.pdfssuser2c7393
 
How Machine Learning Can Detect Medicare Fraud
How Machine Learning Can Detect Medicare FraudHow Machine Learning Can Detect Medicare Fraud
How Machine Learning Can Detect Medicare Fraudvenkatvajradhar1
 
Risk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationRisk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationHal Amens
 
Federal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp WestFederal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp Westbradstenger
 
Explanations of the Medicaid Undercount and the Factors Associated with Measu...
Explanations of the Medicaid Undercount and the Factors Associated with Measu...Explanations of the Medicaid Undercount and the Factors Associated with Measu...
Explanations of the Medicaid Undercount and the Factors Associated with Measu...soder145
 
Written Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docxWritten Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docxodiliagilby
 

Semelhante a VVOJ Intro to data journalism (20)

ACP Digging Deeper
ACP Digging DeeperACP Digging Deeper
ACP Digging Deeper
 
Page 579Assess the Constituent Data. What is included Omi.docx
Page 579Assess the Constituent Data. What is included Omi.docxPage 579Assess the Constituent Data. What is included Omi.docx
Page 579Assess the Constituent Data. What is included Omi.docx
 
Mendelson: Driving daily enterprise coverage
Mendelson: Driving daily enterprise coverageMendelson: Driving daily enterprise coverage
Mendelson: Driving daily enterprise coverage
 
How to Use Data to Get Grants
How to Use Data to Get GrantsHow to Use Data to Get Grants
How to Use Data to Get Grants
 
Finding Community Data
Finding Community DataFinding Community Data
Finding Community Data
 
AMDIS CHIME Fall Symposium
AMDIS CHIME Fall SymposiumAMDIS CHIME Fall Symposium
AMDIS CHIME Fall Symposium
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research Paper
 
Peer Review FormComplete the form by inserting your answer.docx
Peer Review FormComplete the form by inserting your answer.docxPeer Review FormComplete the form by inserting your answer.docx
Peer Review FormComplete the form by inserting your answer.docx
 
Third Annual Study on Patient Privacy
Third Annual Study on Patient PrivacyThird Annual Study on Patient Privacy
Third Annual Study on Patient Privacy
 
4 Big Data Challenges In Healthcare
4 Big Data Challenges In Healthcare4 Big Data Challenges In Healthcare
4 Big Data Challenges In Healthcare
 
Background Screening Webinar 1.0
Background Screening Webinar 1.0Background Screening Webinar 1.0
Background Screening Webinar 1.0
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Counting Women
Counting WomenCounting Women
Counting Women
 
WSDM2015Tutorial.pdf
WSDM2015Tutorial.pdfWSDM2015Tutorial.pdf
WSDM2015Tutorial.pdf
 
How Machine Learning Can Detect Medicare Fraud
How Machine Learning Can Detect Medicare FraudHow Machine Learning Can Detect Medicare Fraud
How Machine Learning Can Detect Medicare Fraud
 
Risk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare InformationRisk & Opportunities: Healthcare Information
Risk & Opportunities: Healthcare Information
 
Federal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp WestFederal Statistical System, Transparency Camp West
Federal Statistical System, Transparency Camp West
 
Explanations of the Medicaid Undercount and the Factors Associated with Measu...
Explanations of the Medicaid Undercount and the Factors Associated with Measu...Explanations of the Medicaid Undercount and the Factors Associated with Measu...
Explanations of the Medicaid Undercount and the Factors Associated with Measu...
 
Data analytics: Are U.S. hospitals late to the party?
Data analytics: Are U.S. hospitals late to the party?Data analytics: Are U.S. hospitals late to the party?
Data analytics: Are U.S. hospitals late to the party?
 
Written Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docxWritten Response Submission FormYour Name First and last.docx
Written Response Submission FormYour Name First and last.docx
 

Mais de Jennifer LaFleur

Mais de Jennifer LaFleur (12)

How drawing exercises your brain
How drawing exercises your brainHow drawing exercises your brain
How drawing exercises your brain
 
Brain flipping ire17
Brain flipping ire17Brain flipping ire17
Brain flipping ire17
 
Investigating Disabiity Issues
Investigating Disabiity IssuesInvestigating Disabiity Issues
Investigating Disabiity Issues
 
Cats stats
Cats statsCats stats
Cats stats
 
Getting it the rightest
Getting it the rightestGetting it the rightest
Getting it the rightest
 
ACP Getting the Goods
ACP Getting the GoodsACP Getting the Goods
ACP Getting the Goods
 
Crunching the numbers NR14
Crunching the numbers NR14Crunching the numbers NR14
Crunching the numbers NR14
 
Data journalism at Techraking 6
Data journalism at Techraking 6Data journalism at Techraking 6
Data journalism at Techraking 6
 
Mind the Gap NICAR14 (holes in data)
Mind the Gap NICAR14 (holes in data)Mind the Gap NICAR14 (holes in data)
Mind the Gap NICAR14 (holes in data)
 
Data journalism without data
Data journalism without dataData journalism without data
Data journalism without data
 
Diagnosing dirty data_ire2013
Diagnosing dirty data_ire2013Diagnosing dirty data_ire2013
Diagnosing dirty data_ire2013
 
Transparency ire13
Transparency ire13Transparency ire13
Transparency ire13
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

VVOJ Intro to data journalism