Maryam is a graduate student in Data Analysis and Visualization at the Graduate Center, CUNY. Maryam’s work is focused on digital tools and platforms for creating interactive data-driven stories to address longstanding questions in the social sciences.
Hope you’re all having a good semester so far. On Monday April 11th and Monday April 25th, I’m offering workshops on presenting your work, including a workshop on creating visualizations with Python and an introduction to modern HTML/CSS. Please fill out the below form to register. My thanks to the Publics Lab at the Graduate Center,…[Read more]
This post was originally shared in newsletter form. To receive updates on Patrick’s work on Iota School, along with some thoughts on humanities entrepreneurship and building […]
I wanted to invite CUNY DHers and pythonistas to an event coming up at Columbia on Tuesday: Implementing Historical Algorithms. We have a Python User Group up here that I was inspired to start based on this community at CUNY and it would be great to close the loop and have you visit. The presentation will be by Jeff Binder, a former…[Read more]
I don’t want to give you too many hints, since I think you’re pretty close to a solution here. But this REPL session might give you an idea of what’s happening:
I’ve tried to visualize the data I collected using Excel but I only succeed in visualizing one section. So I am attaching the visualization and the link to the cleaned data here.
Oppression can take many forms. Algorithms of Oppression reveals how modern technology exerts detrimental influence on the oppressed. As is demonstrated in other readings, Algorithms are not a neutral tool […]
Searching algorithm is not only bias,but also misleading.
Compared to Google’s search engine, Baidu, the “Google of China”,is much more revenue-oriented when present the searching results. Its algorithm is prett […]
The inequality discussed in this piece is like that in “Weapons of Math Destruction”, which make unsystematic categories to fit people in. This reading points out a very important danger of using data and alg […]
It is true that big data and artificial intelligence have been used by service providers to protect their customers, for example, banks tracking customers’ transaction habit and detecting anomaly transactions to p […]
In this book, examples are shown to demonstrate various types of risks of privacy posed by technology. The first is the police accessing someone’s data through a list on the phone and making incriminating i […]
Network latency, is an expression of how much time it takes for a packet of data to get from one designated point to another. It exists and varies by distance, media of data traffic runs by and on. The media […]