

{"id":2510,"date":"2013-05-24T07:31:35","date_gmt":"2013-05-24T12:31:35","guid":{"rendered":"http:\/\/rud.is\/b\/?p=2510"},"modified":"2013-05-24T07:31:35","modified_gmt":"2013-05-24T12:31:35","slug":"re-imagining-panda_securitys-q1-2013-report-pie-charts","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","title":{"rendered":"Re-imagining  @panda_security&#8217;s Q1 2013 Report Pie Charts"},"content":{"rendered":"<p>We infosec folk eat up industry reports and most of us have no doubt already gobbled up @panda_security&#8217;s recently released [Q1 2013 Report](http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2010\/05\/PandaLabs-Quaterly-Report.pdf) [PDF]. It&#8217;s a good read (so go ahead and read it, we&#8217;ll still be here!) and I was really happy to see a nicely stylized chart in the early pages:<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2522\" data-permalink=\"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/screenshot_5_24_13_8_14_am\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?fit=628%2C498&amp;ssl=1\" data-orig-size=\"628,498\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Screenshot_5_24_13_8_14_AM\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?fit=510%2C404&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?resize=510%2C404&#038;ssl=1\" alt=\"Screenshot_5_24_13_8_14_AM\" width=\"510\" height=\"404\" class=\"aligncenter size-large wp-image-2522\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?resize=530%2C420&amp;ssl=1 530w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?resize=150%2C118&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?resize=300%2C237&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?resize=535%2C424&amp;ssl=1 535w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?w=628&amp;ssl=1 628w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/p>\n<p>However, I quickly became a <code>#sadpanda<\/code> when I happened across some explosive 3D pie charts later on. Rather than deride, I thought a re-imagining would be a better use of time and let you decide which visualizations both communicate better and are more appealing.<\/p>\n<p>I chose to use @Datawrapper to showcase how easy it is to build and publish pleasing and informative visualizations without even leaving your browser.<\/p>\n<p><strong>Figure 4, Original<\/strong>:<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2511\" data-permalink=\"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/screenshot_5_24_13_7_39_am\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?fit=519%2C303&amp;ssl=1\" data-orig-size=\"519,303\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Panda Labs Q1 2013 Report Fig 5 (Orig)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?fit=510%2C298&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?resize=510%2C298&#038;ssl=1\" alt=\"Panda Labs Q1 2013 Report Fig 5 (Orig)\" width=\"510\" height=\"298\" class=\"aligncenter size-full wp-image-2511\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?w=519&amp;ssl=1 519w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?resize=150%2C87&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_7_39_AM.png?resize=300%2C175&amp;ssl=1 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/p>\n<p><strong>Figure 4, Alternative<\/strong>:<\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/s3.datawrapper.de\/BBgN1\/\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"allowfullscreen\" webkitallowfullscreen=\"webkitallowfullscreen\" mozallowfullscreen=\"mozallowfullscreen\" oallowfullscreen=\"oallowfullscreen\" msallowfullscreen=\"msallowfullscreen\" width=\"500\" height=\"400\"><\/iframe><\/p>\n<p><strong>Figure 5, Original<\/strong><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2518\" data-permalink=\"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/screenshot_5_24_13_8_07_am\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?fit=515%2C329&amp;ssl=1\" data-orig-size=\"515,329\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Fig 4: New malware strains In Q1 2013, by Type (orig)\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?fit=510%2C326&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?resize=510%2C326&#038;ssl=1\" alt=\"Fig 4: New malware strains In Q1 2013, by Type (orig)\" width=\"510\" height=\"326\" class=\"aligncenter size-full wp-image-2518\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?w=515&amp;ssl=1 515w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?resize=150%2C95&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_07_AM.png?resize=300%2C191&amp;ssl=1 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/p>\n<p><strong>Figure 5, Alternative<\/strong> (horizontal vs vertical, just to mix it up a bit):<\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/s3.datawrapper.de\/Mf3eK\/\" frameborder=\"0\" allowtransparency=\"true\" allowfullscreen=\"allowfullscreen\" webkitallowfullscreen=\"webkitallowfullscreen\" mozallowfullscreen=\"mozallowfullscreen\" oallowfullscreen=\"oallowfullscreen\" msallowfullscreen=\"msallowfullscreen\" width=\"500\" height=\"400\"><\/iframe><\/p>\n<p>If the charts had been closer together in the report, I would have opted for vertical design for both and probably kept malware-type ordering vs sort by highest percentage.<\/p>\n<p>How would you re-imagine the pie charts? Post a link to your creations in the comments and I&#8217;ll make sure they show up embedded with the post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We infosec folk eat up industry reports and most of us have no doubt already gobbled up @panda_security&#8217;s recently released [Q1 2013 Report](http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2010\/05\/PandaLabs-Quaterly-Report.pdf) [PDF]. It&#8217;s a good read (so go ahead and read it, we&#8217;ll still be here!) and I was really happy to see a nicely stylized chart in the early pages: However, I [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[24,678,673,674,670,3,76],"tags":[],"class_list":["post-2510","post","type-post","status-publish","format-standard","hentry","category-charts-graphs","category-data-visualization","category-datavis-2","category-dataviz","category-infographics","category-information-security","category-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Re-imagining @panda_security&#039;s Q1 2013 Report Pie Charts - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Re-imagining @panda_security&#039;s Q1 2013 Report Pie Charts - rud.is\" \/>\n<meta property=\"og:description\" content=\"We infosec folk eat up industry reports and most of us have no doubt already gobbled up @panda_security&#8217;s recently released [Q1 2013 Report](http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2010\/05\/PandaLabs-Quaterly-Report.pdf) [PDF]. It&#8217;s a good read (so go ahead and read it, we&#8217;ll still be here!) and I was really happy to see a nicely stylized chart in the early pages: However, I [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-24T12:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM-530x420.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Re-imagining @panda_security&#8217;s Q1 2013 Report Pie Charts\",\"datePublished\":\"2013-05-24T12:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/\"},\"wordCount\":214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2013\\\/05\\\/Screenshot_5_24_13_8_14_AM-530x420.png\",\"articleSection\":[\"Charts &amp; Graphs\",\"Data Visualization\",\"DataVis\",\"DataViz\",\"infographics\",\"Information Security\",\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/\",\"name\":\"Re-imagining @panda_security's Q1 2013 Report Pie Charts - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2013\\\/05\\\/Screenshot_5_24_13_8_14_AM-530x420.png\",\"datePublished\":\"2013-05-24T12:31:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2013\\\/05\\\/Screenshot_5_24_13_8_14_AM.png?fit=628%2C498&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2013\\\/05\\\/Screenshot_5_24_13_8_14_AM.png?fit=628%2C498&ssl=1\",\"width\":628,\"height\":498},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/05\\\/24\\\/re-imagining-panda_securitys-q1-2013-report-pie-charts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Re-imagining @panda_security&#8217;s Q1 2013 Report Pie Charts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Re-imagining @panda_security's Q1 2013 Report Pie Charts - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","og_locale":"en_US","og_type":"article","og_title":"Re-imagining @panda_security's Q1 2013 Report Pie Charts - rud.is","og_description":"We infosec folk eat up industry reports and most of us have no doubt already gobbled up @panda_security&#8217;s recently released [Q1 2013 Report](http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2010\/05\/PandaLabs-Quaterly-Report.pdf) [PDF]. It&#8217;s a good read (so go ahead and read it, we&#8217;ll still be here!) and I was really happy to see a nicely stylized chart in the early pages: However, I [&hellip;]","og_url":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","og_site_name":"rud.is","article_published_time":"2013-05-24T12:31:35+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM-530x420.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Re-imagining @panda_security&#8217;s Q1 2013 Report Pie Charts","datePublished":"2013-05-24T12:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/"},"wordCount":214,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM-530x420.png","articleSection":["Charts &amp; Graphs","Data Visualization","DataVis","DataViz","infographics","Information Security","Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","url":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/","name":"Re-imagining @panda_security's Q1 2013 Report Pie Charts - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM-530x420.png","datePublished":"2013-05-24T12:31:35+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?fit=628%2C498&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2013\/05\/Screenshot_5_24_13_8_14_AM.png?fit=628%2C498&ssl=1","width":628,"height":498},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2013\/05\/24\/re-imagining-panda_securitys-q1-2013-report-pie-charts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Re-imagining @panda_security&#8217;s Q1 2013 Report Pie Charts"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-Eu","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1705,"url":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","url_meta":{"origin":2510,"position":0},"title":"Putting Cybercrime [Infographics] Behind Bars","author":"metricshulk","date":"2012-10-22","format":false,"excerpt":"HP & the Ponemon Institute have released their third annual \"Cost of Cybercrime\" report and the web wizards at HP have given us an infographic from it: (You can see the full size one at the above link) While some designers may think that infographic visualizations are not subject to\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1213,"url":"https:\/\/rud.is\/b\/2012\/06\/07\/slopegraphs-in-python-log-scales-spam-data-analysis\/","url_meta":{"origin":2510,"position":1},"title":"Slopegraphs in Python \u2013 Log Scales &#038; Spam Data Analysis","author":"hrbrmstr","date":"2012-06-07","format":false,"excerpt":"Given the focus on actual development of the PySlopegraph tool in most of the blog posts of late, folks may be wondering why an infosec\/inforisk guy is obsessing so much on a tool and not talking security. Besides the fixation on filling a void and promoting an underused visualization tool,\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3340,"url":"https:\/\/rud.is\/b\/2015\/03\/20\/fixing-colors-proportions-in-jerusalem-post-election-graphics\/","url_meta":{"origin":2510,"position":2},"title":"Fixing Colors &#038; Proportions in Jerusalem Post Election Graphics","author":"hrbrmstr","date":"2015-03-20","format":false,"excerpt":"Vis expert Naomi Robbins did an excellent [critique](http:\/\/www.forbes.com\/sites\/naomirobbins\/2015\/03\/19\/color-problems-with-figures-from-the-jerusalem-post\/) of the [graphics](http:\/\/www.jpost.com\/Israel-Elections\/Analysis-The-Israel-election-decided-by-one-vote-394229) that went along with an article on Israeli election in the Jerusalem Post. Non-uniform and color-blind-unfriendly categorical colors and disproportionate arc sizes are definitely three substantial issues in that series of visualizations. We can rectify all of them with\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3325,"url":"https:\/\/rud.is\/b\/2015\/03\/18\/making-waffle-charts-in-r-with-the-new-waffle-package\/","url_meta":{"origin":2510,"position":3},"title":"Making waffle charts in R (with the new &#8216;waffle&#8217; package)","author":"hrbrmstr","date":"2015-03-18","format":false,"excerpt":"NOTE: The waffle package (sans JavaScript-y goodness) is up on CRAN so you can do an install.packages(\"waffle\") and library(waffle) vs the devtools dance. My disdain for pie charts is fairly well-known, but I do concede that there are times one needs to communicate parts of a whole graphically verses using\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1545,"url":"https:\/\/rud.is\/b\/2012\/08\/06\/just-when-you-thought-it-was-safe-to-make-a-slopegraph\/","url_meta":{"origin":2510,"position":4},"title":"Just When You Thought It Was Safe To Make A Slopegraph","author":"hrbrmstr","date":"2012-08-06","format":false,"excerpt":"Thanks to a nice call-out post link on Flowing Data in my RSS feeds this morning, I found Naomi Robbins' Effective Graphs Forbes blog, perused the archives a bit and came across her post on arrow charts. She presented a nice comparison between (ugh) pie charts, arrow charts and slopegraphs.\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3806,"url":"https:\/\/rud.is\/b\/2015\/12\/13\/fear-of-wapo-using-bad-pie-charts-has-increased-since-last-year\/","url_meta":{"origin":2510,"position":5},"title":"Fear of WaPo Using Bad Pie Charts Has Increased Since Last Year","author":"hrbrmstr","date":"2015-12-13","format":false,"excerpt":"I woke up this morning to a [headline story from the Washington Post](https:\/\/www.washingtonpost.com\/news\/the-fix\/wp\/2015\/12\/10\/to-many-christian-terrorists-arent-true-christians-but-muslim-terrorists-are-true-muslims\/) on _\"Americans are twice as willing to distance Christian extremists from their religion as Muslims_\". This post is not about the content of the headline or story. It _is_ about the horrible pie chart WaPo led the\u2026","rel":"","context":"In &quot;Data Visualization&quot;","block_context":{"text":"Data Visualization","link":"https:\/\/rud.is\/b\/category\/data-visualization\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/12\/unnamed-chunk-1-1.png?fit=1200%2C877&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/12\/unnamed-chunk-1-1.png?fit=1200%2C877&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/12\/unnamed-chunk-1-1.png?fit=1200%2C877&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/12\/unnamed-chunk-1-1.png?fit=1200%2C877&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/12\/unnamed-chunk-1-1.png?fit=1200%2C877&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=2510"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2510\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=2510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=2510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=2510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}