Many Eyes : Survey on Income and Living Conditions in Ireland 2010

Visualizations : Survey on Income and Living Conditions in Ireland 2010

I bought the book visualize this written by Nathan Yau creator of the website Flowingdata (one of my favorite data visualization websites).

Below is one of the coolest tools I found on the program Many Eyes, I was playing around trying to program a tool like this. I knew options existed. But Many Eyes just does it so elegantly.

via Many Eyes : Survey on Income and Living Conditions in Ireland 2010.

Word Co-occurrence

Lets say we have a database table called responses, each row contains a word.

responses Table:

id positive response
1 true I have a great experience. I was treated very well. The person was very nice
2 false I had a terrible experience. I was not treated very well. I thought person was very mean.

We map give each word an id on one table. Lets call it the words table.

words Table:

id positive word count
1 true experience 1
2 false experience 1
3 true I 2
4 false I 3

We go to each row, we get all the words, if the word does not exist in the words table we add the word. (A new id will be created associated with that word)

Then we get every combination of 2 words in that paragraph and add it to a occurrences table.

occurrences Table:

word1_id word2_id count
1 3 2
2 4 3

Question: Do we want to count the same word in the same sentence more than once in relationships? The word ‘I’ and ‘experience’ occur three times together in that second sentence?

Basically we than get all the true occurrences and rank them by count. Same with false occurrences and we can present them however we want.
Blogs / Pictures (of what I might want)

High Resolution Maps of Science

Algorithms extracting linguistic relations and their evaluation

Text Algorithms 

Text Mining

Rapid Miner – open source data mining, java based, has filtering options.

Kind of Related But Very Interesting

Visual Thesaurus – We could do something similar to this but you also pick a minimum threshold and it shows all the word related that meet it. 

Concepts in Programming Languages – University of Cambridge Course

The following are all copy and pasted from a University of Cambridge course link to the website below. It was accessible by public, so I figured I should dump it here. Maybe I can read some of this when I have a vacation.

Lecture slides

  • Introduction and motivation.
    Additional reading material:
  • K. ZusePlankalkul.
  • The first procedural language: FORTRAN (1954-58).
    Additional reading material:
  • Fortran.
  • The first declarative language: LISP (1958-62).
    Additional reading material:
  • J. McCarthyRecursive functions of symbolic expressions and their computation by machine.
    Communications of the ACM, 3(4):184-195, 1960.
  • Block-structured procedural languages: Algol (1958-68) and Pascal (1970).
    AppendixBCPL (1967) and C (1971-78)
    Additional reading material:
  • D. E. KnuthThe remaining trouble spots in ALGOL 60.
    Communications of the ACM, Volume 10, Issue 10, pages 611-618, 1967.
  • B. KerninghanWhy Pascal is not my favorite programming language.
    AT&T Bell Laboratories. Computing Science Technical Report No. 100, 1981.
  • Object-oriented languages — Concepts and origins: SIMULA (1964-67) and Smalltalk (1971-80).
    SML codeObjects in SML!?
    Programming languageSqueak.
    Additional reading material:
  • A. C. KayThe early history of Smalltalk.
    ACM SIGPLAN Notices, Volume 28, No. 3, 1993.
  • P. WegnerConcepts and Paradigms of Object-Oriented Programming
    Expansion of OOPSLA-89 Keynote Talk.
  • B. StroustrupWhat is Object-Oriented Programming? (1991 revised version).
    Proc. 1st European Software Festival. February, 1991.
  • Types in programming languages: ML (1973-1978).
    Additional reading material:
  • A. Koenig. An anecdote about ML type inference.
    USENIX Symp. on Very High Level Languages, 1994.
  • Data abstraction and modularity: SML Modules (1984-97).
    Additional reading material:
  • M. TofteFour Lectures on Standard ML.
    LFCS Report Series ECS-LFCS-89-73, 1989.
  • The state of the art: Scala (2004-2006).
    Programming languageScala.
    Additional reading material:
  • M. Odersky et alAn overview of the Scala programming language.
    Technical Report LAMP-REPORT-2006-001, Second Edition, 2006.
  • M. Odersky et alA Tour of the Scala Programming Language.
    Programming Methods Laboratory, EPFL, 2007.
  • M. OderskyScala By Example.
    Programming Methods Laboratory, EPFL, 2008.
  • Books

  • Main:
  • M. ScottProgramming Language Pragmatics (2nd edition).
    Morgan Kaufmann, 2006.
  • J.C. MitchellConcepts in programming languages.
    Cambridge University Press, 2003.
  • T.W.Pratt and M.V.ZelkowitzProgramming Languages: Design and implementation (3rd edition).
    Prentice Hall, 1999.
  • Other:
  • R. L. Wexelblat (ed.). History of Programming Languages.
    ACM Monograph Series, 1981.
  • N. Metropolis, J. Howlett, G.-C. Rota (eds.). A History of Computing in the Twentieth Century: A Colletion of Essays.
    Academic Press, 1980.
  • T.J. Bergin and R. G. Gibson (eds.). History of programming languages – II.
    ACM Press, 1996.
  • [Actual Course Website]

    Lightweight Directory Access Protocol

    I need to learn to use LDAP for an upcoming project, so I will start to keep some notes here. A lot of this post will be copy and pasted and Wikipedia and other sources.

    A client starts LDAP session by connection to an LDAP server, called a Directory System Agent (DSA).
    The default port is TCP port 389. The client sends an operation request to server and server responds. Client can start sending more requests before responses, however the server may send responses in any oreder.

    Protocal Overview: 

    • StartTLS — use the LDAPv3 Transport Layer Security (TLS) extension for a secure connection
    • Bind — authenticate and specify LDAP protocol version
    • Search — search for and/or retrieve directory entries
    • Compare — test if a named entry contains a given attribute value
    • Add a new entry
    • Delete an entry
    • Modify an entry
    • Modify Distinguished Name (DN) — move or rename an entry
    • Abandon — abort a previous request
    • Extended Operation — generic operation used to define other operations
    • Unbind — close the connection (not the inverse of Bind)

    Directory Structure

    • A entry in the Directory can contain a set of attributes
    • An attribute has a name and possibly multiple values — the attributes are defined in a schema 
    • Each entry has a unique identifier: its Distinguished Name (DN). This consists of its Relative Distinguished Name (RDN), constructed from some attribute(s) in the entry, followed by the parent entry’s DN. Think of the DN as the full file path and the RDN as its relative filename in its parent folder (e.g. if /foo/bar/myfile.txt were the DN, then myfile.txt would be the RDN).


    The option I am most interested in currently is

    Bind (authenticate)

    The Bind operation establishes the authentication state for a connection.

    Simple Bind can send the user’s DN and password in plaintext, so the connection should be protected usingTransport Layer Security (TLS). The server typically checks the password against the userPassword attribute in the named entry.

    Anonymous Bind (with empty DN and password) resets the connection to anonymous state.

    SASL (Simple Authentication and Security Layer) Bind provides authentication services through a wide range of mechanisms, e.g. Kerberos or the client certificate sent with TLS.

    Bind also sets the LDAP protocol version. The version is an integer and at present must be either 2 (two) or 3 (three), although the standard supports integers between 1 and 127 (inclusive) in the protocol. If the client requests a version that the server does not support, the server must set the result code in the bind response to the code for a protocol error. Normally clients should use LDAPv3, which is the default in the protocol but not always in LDAP libraries.

    Bind had to be the first operation in a session in LDAPv2, but is not required in LDAPv3 (the current LDAP version).

    [wiki link]

    Other links for my reading on this:


    LDAP tutorial


    How Doctors Die

    Almost all medical professionals have seen what we call “futile care” being performed on people. That’s when doctors bring the cutting edge of technology to bear on a grievously ill person near the end of life. The patient will get cut open, perforated with tubes, hooked up to machines, and assaulted with drugs. All of this occurs in the Intensive Care Unit at a cost of tens of thousands of dollars a day. What it buys is misery we would not inflict on a terrorist. I cannot count the number of times fellow physicians have told me, in words that vary only slightly, “Promise me if you find me like this that you’ll kill me.” They mean it. Some medical personnel wear medallions stamped “NO CODE” to tell physicians not to perform CPR on them. I have even seen it as a tattoo...

    The article goes on to explain why the doctors at times “enable” decision makers to choose to attempt to save a loved ones life — although they may not want the same for themselves.

    It’s actually a great read and not that long.

    Link to actual article: click here.

    Posted from WordPress for Android

    Music can be shiny

    Any-who-bobble  in no particular order:

    Skrillex – Kill EVERYBODY
    I just love the drop on this one, I think there were days I just played this on repeat as the only song. Awesome to work out too as well. Actually all the Dubstep below is pretty fun to workout too.

    Chrispy – Inspector Gadget
    This is one is just plain fun. Chrispy has some really good stuff. I feel that Skrillex is pretty much known to all my friends, but not too many people that I know are aware of Chrispy. Look em up.

    Paris is Burning – Ladyhawke (HavocNdeeD Remix)
    Dubstep with female lyrics almost always sounds good. Haha, On the topic of women that reminds of another song I’ll post after this one.

    Pornstep feat. the Highbury Whore – Dodge, Fuski
    Not Safe For Work – Sounds (aka Moans)
    Now keep an open mind before you hit play and hear it out for a bit. The drop is good, and aside from the embrassment it may cause you to play this in a work place, you have to agree it takes talent to remix something like this.

    We Don’t Eat – James Vincent McMorrow (Adventure Club Remix)
    I usually don’t like men rapping or singing with my dubstep — but this one turned out well. Adventure Club has some good stuff, I need to remind myself to get more of their tracks.

    I shall add more later.

    Installed a few scripts

    So I installed a few things I wanted to play with using simple scripts. Simple scripts is an option available on my cpanel that allowed to me add scripts where I want and set up an admin account for them.

    I added the following

    A survey script  using limesurveys,

    A project management script using phpprojekt,

    and A forum script using phpbb

    It offers a ton of options but unless you read the users manual a lot of it doesnt make sense, also its not very intuitive.

    I can’t figure out how to make other users… seriously. I spent like a good 30 seconds looking, I shouldn’t need to spend more. But the options it has looks very cool.

    EDIT: I found it like a minute after I wrote this — I had to Google it. It tells you how in their wiki…

    I have used it before, I know its solid.

    I will probably write more on the scripts above once I get a chance to play with them more.

    It’s all about the SCRUM Master hat.

    This is a great video that explains scrum development. It is something I want to use personally when my current programming team gets a little bigger.

    This following is the introduction to Scrum Development on Wikipedia:

    Scrum is an iterative, incremental framework for project management often seen in agile software development, a type of software engineering.

    Although the Scrum approach was originally suggested for managing product development projects, its use has focused on the management of software development projects, and it can be used to run software maintenance teams or as a general project/program management approach.