Mining the Mother of all Data Dumps We now have a relatively massive haul of digital data from the OBL strike. There are several forensic toolkits in use by the private (commercially available) and public sector as well as open-source. Best practices include inventorying all the sources, cloning the sources so as to not damage pristine data, recovering any partial or damaged content, making the cloned sources read-only, adhering to legally-admissible tools standards, and documenting everything. There is an excellent source titled Digital Forensics and Born-Digital Content from the Council on Library and Information Resources [pdf, Resource Shelf]. But what to do next*? [more inside]
posted by rzklkng
on May 4, 2011 -
Google set up a sting operation to prove that rival Microsoft search engine Bing is cheating, using Internet Explorer to track users' Google search results and mining that data to improve Bing. Here's the proof.
posted by 2bucksplus
on Feb 1, 2011 -