/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

UNC

3 articles falling
Articles
3
mentions
Velocity
-50.0%
growth rate
Acceleration
0.000
velocity change
Sources
3
publications

Coverage Timeline

2025-01-11
Axios 37 related

Memo: Meta terminates major DEI programs, including for hiring, training, and procurement, citing a changed “legal and policy landscape” around DEI in the US

Meta is ending its DEI programs Bradley Cortright / New York Sun : Meta Abandons its DEI Programs Days Ahead of Trump's Inauguration Edith Olmsted / New Republic : Mark Zuckerberg Goes Full MAGA With ...

2020-04-03
Zoom Blog 25 related

Zoom apologizes for security failures, says it has 200M+ DAUs vs. 10M in Dec., and plans to freeze development of new features to focus on security and privacy

And An FBI Warning Brian Krebs / Krebs on Security : ‘War Dialing’ Tool Exposes Zoom's Password Problems Kari Paul / The Guardian : ‘Zoom is malware’: why experts worry about the video conferencing pl...

2020-04-01
BleepingComputer 55 related

A vulnerability in Zoom's Windows client could let attackers steal Windows login credentials of users who click on malicious links in chat messages

The Zoom Windows client is vulnerable to UNC path injection in the client's chat feature that could allow attackers to steal the Windows credentials of users who click on the link.

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...