WHITE PAPER:
Visual representations are a fundamental component of human learning and understanding. To study the impact of data visualization, we must first look to the past and see how our ways of shaping and representing data have changed over time. This paper traces the history of visual representation, from cave drawings to the computer revolution.
WHITE PAPER:
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting.
WHITE PAPER:
This IT brief reviews best practices for enhancing interactivity and participation creating a more memorable, engaging presentation experience for you – and your audience.
WHITE PAPER:
Visual analytics is the process of analytical reasoning facilitated by interactive visual interfaces. Its becoming the fastest way for people to explore and understand Business Intelligence data of any size. This paper will introduce you to the seven essential elements of true visual analytics applications.
WHITE PAPER:
Presenting to "the Business" can be one of the most intimidating things that technical IT pros do as part of their standard job. This guide outlines strategies for giving a top-notch presentation.
EZINE:
In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
EZINE:
In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
EZINE:
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.