No confidential information is revealed in this section.
At ATC, I led the creation of TruthNest, an innovative tool in the field of data journalism. Its aim is to verify news as they emerge on social networks before they hit the mainstream media headlines. For this purpose, a wide range of quantitative and semantic metrics are presented to the user through informative multidimensional visualisations.
My main role at ATC was to be TruthNest’s product owner, leading its development process, from its birth to releases. This involved research, technical and functional design, user experience and visualisations and agile project management.
ATC partnered with Deutsche Welle and received funding from Google’s Digital News Initiative for developing TruthNest further and building relevant tools around it. TruthNest also became a finalist for the European Union’s Innovation Radar Prize.
Here is TruthNest’s website which contains an overview of the tool and the technologies that we developed (written by me). And here are two articles on social media news verification that discuss TruthNest: On Journalism.co.uk and on Poynter.
No confidential information is revealed in any part of this section. It is a high-level discussion aiming to demonstrate innovation and the high quality of technical analysis. Sample material is uploaded with Checkout’s permission.
Checkout.com is one of the exciting fintech companies that revolutionise e-commerce and disrupt the financial sector. I was the head of data-driven risk management technologies. One of the cool things I did at Checkout was to design an innovative Device Fingerprinting method as part of the larger fraud detection project, for which I was responsible.
Device fingerprinting is a new technology that allows websites to track users on the fine-grained level of their device rather than their IP address. The aim is to be able to tell whether a particular device has been associated with fraud in the past.
As part of our vision at Checkout to build an advanced fraud-detection platform, I developed a method that produces a device fingerprint, which is:
- Non-invasive: It collects no user data and it does not violate the user’s privacy in any way.
- Cross-browser: It detects the device even if the user is accessing from different browsers.
- Stable: It remains usable even when the user updates her system.
Here is a sample first pages from my technical report, that analyses the state-of-the-art of the technology. The new algorithm is confidential and the part that describes it is omitted from this sample. So is any part that contains any kind of crucial information.
I love education. Both on the offering and receiving end. I myself am a lifelong learner. Here is a glimpse in my work as a Computer Science lecturer.
A sample first pages from the notes I created for teaching the course “Networks Security and Cryptography” at Deree College. It is quite creative and in the showcased initial pages I tried to set the foundations of cryptotheory in a historical context so as for the students to develop an understanding of the requirements for the modern, highly technical cryptosystems (this initial part of the notes is influenced by Simon Singh’s The Code Book). This presentation style is obviously appropriate only for educational purposes but it nevertheless demonstrates that one can find constructive ways to communicate effectively even the most highly technical subjects. The course contained stream and block ciphers, cryptographic modes, symmetric and public key cryptography, DES, AES, Diffie-Hellman, RSA, El-Gamal, digital signatures etc. and a crash course on modulo arithmetics.
Sample pages from the notes I created for teaching the course “Computer Communications and Networks” to undergraduate students at the British Hellenic College. Again, the aim of the presentation and writing style is to make this highly technical subject as accessible as possible.
A series of ten short lectures given online, as a bonus material additional to the syllabus, to British Hellenic College MSc students: On the Model-View-Controller pattern with the use of CodeIgniter PhP framework. Unfortunately it was recorded in Greek language but hopefully you get the picture. In the series, I gradually become more comfortable with speaking to my laptop 🙂 and so the first lecture has easily the worst flow.
An introductory presentation from the Java course I have taught at Imperial College London.