News

Phone call records, email logs and location data are primary sources for the NSA in constructing “social network diagrams” described by the New York Times as “sophisticated graphs of some ...
Diagrams just for fun are still useful in that they make the concept of graphic sorting and labeling of ... of course, a human. This is an example of an Euler diagram. 4. Social Networking.
Just how the government can mine social network data for where you have been and where you will go can be seen in a video by defense contractor Raytheon that was obtained by The Guardian. An ...
Author’s Email Network. https://immersion.media.mit.edu/ The social network graph becomes even more revealing when combined with the email metadata from each connection in the social graph.
In the immediate aftermath of Saddam Hussein's capture on Dec. 13, 2003, network theory got a brief moment of glory. The Washington Post ran a story about the role of "link diagrams" in Hussein's ...
What kills a social network? A group of internet archeologists have picked over the digital bones of Friendster — the pioneering social networking site that drowned in Facebook’s wake — and ...
How Social Networking Helped Capture Saddam A five-part series running on Slate.com this week illustrates how the capture of Saddam Hussein was the result of some creative intelligence work.