SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Resource Mining
Finding worthwhile resources for
successful research
12/17/2012 SSCRG @ UW Tacoma
Sources of Information
● Blogs
● Twitter
● Facebook
● Reddit/Slashdot/HackerNews
● IRC
● Mailing lists
● Google Groups
● Meetings/Conferences
SSCRG @ UW Tacoma12/17/2012
Skimming Information
Lots of articles aren't worth a complete read -
you can safely skip over / blink / or whatever
entire sections.
If you don't have time to finish it, leave it open
for later or use a "Read it Later" program.
Recording Resources
Use reference management software,
bookmarks, social media feeds, browser
history, etc.
Just make sure it's easy to find things later. You
will want/need them!
Reading Information
Focus on the basics in a field first. Don't worry
about knowing too much about them.
Example: What is DNS?
Answer: resolves hostname <-> ip,
forward/reverse lookups, zones, etc.
Don't worry about too much detail in the short
run.
Detecting False Information
Check the comments - if there are none, check
back later.
Check other posts by the poster.
Search for the title of the article on Google/Bing
and check aggregators.
Create a Identity
Create profiles with the same username, link
them together, and possibly add to resume.
Then create a website and add your elevator
pitch + links to all of these accounts.
Later on, add a blog and keep analytics of what
happens.
Make Connections
Once you have established a place on each one
of the "Sources of Information", follow those
who post information relevant to your field of
research.
"Following" Resources
● Use a RSS reader (Google Reader is great)
● Remain in IRC channels after your question
has been answered.
● Look for related posts to what you found
interesting.
● Bookmarks (including social bookmarks,
pinboard, etc)!
Finding Field Experts
Find the authors of the information you rely on.
● History of wiki pages
● Presenters at Defcon, BlackHat USA, AppSec,
CSA, etc.
IRC
● Most major open source software packages
have an IRC channel
● Find channels on Netsplit.de/SearchIRC
● Idle in the channel to see other people's
questions
Google Alerts: Setup keywords you want to
"watch", and configure a daily report of the
results
Google trends: find popular/relevant keywords
Google Tools
Solve other people's problems
Go to the "unanswered" section on the site.
http://stackoverflow.com/unanswered
Try to construct an answer, or at least think
about it for a while.
Example Problem
How would one keep track of changes on a
Linux server?
What about a Windows one?
What keywords would you use to find an
answer to this problem?
Q&A
SSCRG @ UW Tacoma8/17/2012

Weitere ähnliche Inhalte

Was ist angesagt?

TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2Laksamee Putnam
 
TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1Laksamee Putnam
 
Effective Internet Searching
Effective Internet SearchingEffective Internet Searching
Effective Internet SearchingMaggie Verster
 
Electronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesElectronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesAmy Ferguson
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsJohnBarsaga
 
Google for Research 2015
Google for Research 2015Google for Research 2015
Google for Research 2015Rosalind Hardin
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKris Jacobson
 
Library research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditionLibrary research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditiondirtboy
 
3_crafting_original_content_2014october
3_crafting_original_content_2014october3_crafting_original_content_2014october
3_crafting_original_content_2014octoberRAO Jenkins
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searchingdoverlibrary
 
Info Lit Day 2
Info Lit Day 2Info Lit Day 2
Info Lit Day 2amytaylor
 
Thomas Jefferson Blog Unit
Thomas Jefferson Blog UnitThomas Jefferson Blog Unit
Thomas Jefferson Blog Unittmgriset
 
Google scholar and the academic web
Google scholar and the academic webGoogle scholar and the academic web
Google scholar and the academic webJamie Bisset
 
Beyond wikipedia
Beyond wikipediaBeyond wikipedia
Beyond wikipediacnarshall81
 

Was ist angesagt? (20)

TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2TSEM Spring 2014 Storrs Class 2
TSEM Spring 2014 Storrs Class 2
 
TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1TSEM Fall 2016 McArthur Class 1
TSEM Fall 2016 McArthur Class 1
 
Effective Internet Searching
Effective Internet SearchingEffective Internet Searching
Effective Internet Searching
 
Internet Research
Internet ResearchInternet Research
Internet Research
 
Electronic Research: Sources and Strategies
Electronic Research: Sources and StrategiesElectronic Research: Sources and Strategies
Electronic Research: Sources and Strategies
 
Contextualized online-search-and-research-skills
Contextualized online-search-and-research-skillsContextualized online-search-and-research-skills
Contextualized online-search-and-research-skills
 
Google
GoogleGoogle
Google
 
Google for Research 2015
Google for Research 2015Google for Research 2015
Google for Research 2015
 
Web based information resources
Web based information resourcesWeb based information resources
Web based information resources
 
Keyword Searching: Advanced Techniques
Keyword Searching: Advanced TechniquesKeyword Searching: Advanced Techniques
Keyword Searching: Advanced Techniques
 
Internet search techniques for K12
Internet search techniques for K12Internet search techniques for K12
Internet search techniques for K12
 
Library research skills slideshare version-classroomedition
Library research skills slideshare version-classroomeditionLibrary research skills slideshare version-classroomedition
Library research skills slideshare version-classroomedition
 
3_crafting_original_content_2014october
3_crafting_original_content_2014october3_crafting_original_content_2014october
3_crafting_original_content_2014october
 
Search strategies – subject searching
Search strategies – subject searchingSearch strategies – subject searching
Search strategies – subject searching
 
Info Lit Day 2
Info Lit Day 2Info Lit Day 2
Info Lit Day 2
 
Internet search techniques by zakir hossain
Internet search techniques by zakir hossainInternet search techniques by zakir hossain
Internet search techniques by zakir hossain
 
Search strategy
Search strategySearch strategy
Search strategy
 
Thomas Jefferson Blog Unit
Thomas Jefferson Blog UnitThomas Jefferson Blog Unit
Thomas Jefferson Blog Unit
 
Google scholar and the academic web
Google scholar and the academic webGoogle scholar and the academic web
Google scholar and the academic web
 
Beyond wikipedia
Beyond wikipediaBeyond wikipedia
Beyond wikipedia
 

Ähnlich wie Resource Mining for Effective Research

The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15Cherie Dargan
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" J T "Tom" Johnson
 
Manage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesManage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesJennifer Muilenburg
 
The Big Six Research Skills
The Big Six Research SkillsThe Big Six Research Skills
The Big Six Research SkillsMrsMDXB
 
The Big Six
The Big SixThe Big Six
The Big SixMrsMDXB
 
Skillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSkillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSchool of Data
 
Search Engine Strategies
Search  Engine  StrategiesSearch  Engine  Strategies
Search Engine Strategiesjsotir
 
Step-by-Step to Successful Research
Step-by-Step to Successful ResearchStep-by-Step to Successful Research
Step-by-Step to Successful Researchsusanujkalarson
 
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)madhavi2011
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03E-Mediat
 
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Stan Skrabut, Ed.D.
 
Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10E-Mediat
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An IntroductionAkash Tandon
 
Microformats I: What & Why
Microformats I: What & WhyMicroformats I: What & Why
Microformats I: What & WhyRachael L Moore
 
Digifoot 2012 ppt
Digifoot 2012 pptDigifoot 2012 ppt
Digifoot 2012 ppttpoelzer
 

Ähnlich wie Resource Mining for Effective Research (20)

Web workshop
Web workshopWeb workshop
Web workshop
 
The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15The Basics of Writing in the Digital Era Cherie Dargan CWW15
The Basics of Writing in the Digital Era Cherie Dargan CWW15
 
Academic Research Social Networks 15 Strategy Tools
Academic Research Social Networks 15 Strategy ToolsAcademic Research Social Networks 15 Strategy Tools
Academic Research Social Networks 15 Strategy Tools
 
"Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption" "Using Web 2.0 as a Weapon Against Corruption"
"Using Web 2.0 as a Weapon Against Corruption"
 
Manage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW LibrariesManage Your Data! Navigating Data Services at the UW Libraries
Manage Your Data! Navigating Data Services at the UW Libraries
 
The Big Six Research Skills
The Big Six Research SkillsThe Big Six Research Skills
The Big Six Research Skills
 
The Big Six
The Big SixThe Big Six
The Big Six
 
Library 2.0: A Roadmap
Library 2.0: A RoadmapLibrary 2.0: A Roadmap
Library 2.0: A Roadmap
 
Skillshare - Introduction to Data Scraping
Skillshare - Introduction to Data ScrapingSkillshare - Introduction to Data Scraping
Skillshare - Introduction to Data Scraping
 
Search Engine Strategies
Search  Engine  StrategiesSearch  Engine  Strategies
Search Engine Strategies
 
Step-by-Step to Successful Research
Step-by-Step to Successful ResearchStep-by-Step to Successful Research
Step-by-Step to Successful Research
 
Ias2010
Ias2010Ias2010
Ias2010
 
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
E-Mediat Workshop 2 - Listening and Web Presence (PowerPoint)
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03
 
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
Informal Learning 2: Drinking from a Fire Hydrant - How to Tap into the Infor...
 
Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An Introduction
 
Microformats I: What & Why
Microformats I: What & WhyMicroformats I: What & Why
Microformats I: What & Why
 
2.0 Watch
2.0 Watch2.0 Watch
2.0 Watch
 
Digifoot 2012 ppt
Digifoot 2012 pptDigifoot 2012 ppt
Digifoot 2012 ppt
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Resource Mining for Effective Research

  • 1. Resource Mining Finding worthwhile resources for successful research 12/17/2012 SSCRG @ UW Tacoma
  • 2. Sources of Information ● Blogs ● Twitter ● Facebook ● Reddit/Slashdot/HackerNews ● IRC ● Mailing lists ● Google Groups ● Meetings/Conferences SSCRG @ UW Tacoma12/17/2012
  • 3. Skimming Information Lots of articles aren't worth a complete read - you can safely skip over / blink / or whatever entire sections. If you don't have time to finish it, leave it open for later or use a "Read it Later" program.
  • 4. Recording Resources Use reference management software, bookmarks, social media feeds, browser history, etc. Just make sure it's easy to find things later. You will want/need them!
  • 5. Reading Information Focus on the basics in a field first. Don't worry about knowing too much about them. Example: What is DNS? Answer: resolves hostname <-> ip, forward/reverse lookups, zones, etc. Don't worry about too much detail in the short run.
  • 6. Detecting False Information Check the comments - if there are none, check back later. Check other posts by the poster. Search for the title of the article on Google/Bing and check aggregators.
  • 7. Create a Identity Create profiles with the same username, link them together, and possibly add to resume. Then create a website and add your elevator pitch + links to all of these accounts. Later on, add a blog and keep analytics of what happens.
  • 8. Make Connections Once you have established a place on each one of the "Sources of Information", follow those who post information relevant to your field of research.
  • 9. "Following" Resources ● Use a RSS reader (Google Reader is great) ● Remain in IRC channels after your question has been answered. ● Look for related posts to what you found interesting. ● Bookmarks (including social bookmarks, pinboard, etc)!
  • 10. Finding Field Experts Find the authors of the information you rely on. ● History of wiki pages ● Presenters at Defcon, BlackHat USA, AppSec, CSA, etc.
  • 11. IRC ● Most major open source software packages have an IRC channel ● Find channels on Netsplit.de/SearchIRC ● Idle in the channel to see other people's questions
  • 12. Google Alerts: Setup keywords you want to "watch", and configure a daily report of the results Google trends: find popular/relevant keywords Google Tools
  • 13. Solve other people's problems Go to the "unanswered" section on the site. http://stackoverflow.com/unanswered Try to construct an answer, or at least think about it for a while.
  • 14. Example Problem How would one keep track of changes on a Linux server? What about a Windows one? What keywords would you use to find an answer to this problem?
  • 15. Q&A SSCRG @ UW Tacoma8/17/2012