{"id":2806,"date":"2014-09-30T22:38:20","date_gmt":"2014-10-01T03:38:20","guid":{"rendered":"http:\/\/blogs.terrorware.com\/geoff\/?p=2806"},"modified":"2014-09-30T22:42:51","modified_gmt":"2014-10-01T03:42:51","slug":"cleaner-data","status":"publish","type":"post","link":"http:\/\/blogs.terrorware.com\/geoff\/2014\/09\/30\/cleaner-data\/","title":{"rendered":"Cleaner Data"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.terrorware.com\/geoff\/files\/2014\/09\/11899178333_3a4781efb9_h-575x575.jpg\" alt=\"11899178333_3a4781efb9_h\" width=\"575\" height=\"575\" class=\"alignnone size-medium wp-image-2807\" srcset=\"http:\/\/blogs.terrorware.com\/geoff\/files\/2014\/09\/11899178333_3a4781efb9_h-575x575.jpg 575w, http:\/\/blogs.terrorware.com\/geoff\/files\/2014\/09\/11899178333_3a4781efb9_h-128x128.jpg 128w, http:\/\/blogs.terrorware.com\/geoff\/files\/2014\/09\/11899178333_3a4781efb9_h-1024x1024.jpg 1024w, http:\/\/blogs.terrorware.com\/geoff\/files\/2014\/09\/11899178333_3a4781efb9_h.jpg 1600w\" sizes=\"auto, (max-width: 575px) 100vw, 575px\" \/><\/p>\n<p>Along with <a href=\"http:\/\/recoveredfactory.net\/\">David Eads<\/a>, I gave a talk on cleaning data based on my experience working with <a href=\"https:\/\/github.com\/sc3\/cook-convictions-data\/\">convictions<\/a> and <a href=\"https:\/\/github.com\/openelections\/core\">elections<\/a> data at the <a href=\"http:\/\/www.chicagoschoolofdata.com\/conference\">Chicago School of Data Conference<\/a>.  The session detail page is <a href=\"http:\/\/www.chicagoschoolofdata.com\/conference\/cleaning-data\">here<\/a> and my slides are <a href=\"http:\/\/ghing.github.io\/cleaner-data\/\">here<\/a>.  You might find my speaker notes helpful.  They&#8217;re in the <a href=\"https:\/\/github.com\/ghing\/cleaner-data\">GitHub repo for the slide deck<\/a>.<\/p>\n<p>Image: <a href=\"http:\/\/flickr.com\/photos\/caveman_92223\/11899178333\">Mud Volcanos<\/a> creative commons licensed (BY-ND) flickr photo by \u201cCaveman Chuck\u201d Coker<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Along with David Eads, I gave a talk on cleaning data based on my experience working with convictions and elections data at the Chicago School of Data Conference. The session detail page is here and my slides are here. You might find my speaker notes helpful. They&#8217;re in the GitHub repo for the slide deck.&hellip; <a class=\"more-link\" href=\"http:\/\/blogs.terrorware.com\/geoff\/2014\/09\/30\/cleaner-data\/\">Continue reading <span class=\"screen-reader-text\">Cleaner Data<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21274],"tags":[21276,20645,21275,779],"class_list":["post-2806","post","type-post","status-publish","format-standard","hentry","category-talks","tag-chidata","tag-data","tag-presentation","tag-talk","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wnIz-Jg","_links":{"self":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/2806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/comments?post=2806"}],"version-history":[{"count":2,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/2806\/revisions"}],"predecessor-version":[{"id":2810,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/2806\/revisions\/2810"}],"wp:attachment":[{"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/media?parent=2806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/categories?post=2806"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/tags?post=2806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}