Background knowledge attack uses quasi-identifier attributes of a dataset and reduce the possible values of output sensitive information. A well-known example about background knowledge attack… Read More »Data Privacy: Protecting Confidentiality with Differential Privacy
What is the best way for getting started in Statistics for Programmers/Data Science? I am often asked this question: What’s the best way for getting… Read More »What's the best way to get started in Statistics for Programmers/Data Science?
The first prediction is that data and analytics will continue to grow at an astounding pace and with increased velocity This is no big surprise… Read More »5 predictions for 2016 on data, analytics and machine learning
This applies to many tech job interviews. But here we provide specific advice for data scientists and other professionals with a similar background. More advice… Read More »19 Worst Mistakes at Data Science Job Interviews
You have gathered gigabytes or terabytes of unstructured text, for instance scraping the Internet, or pieces of email from your employees or users, or tweets,… Read More »4 Easy Steps to Structure Highly Unstructured Big Data, via Automated Indexation
And creates the first legit, private lottery company. The winning numbers, to be published each week, are just as random and unpredictable (if not more)… Read More »Data Scientist Breaks State Monopoly on Lotteries
If you are a start-up director in 2016, not a week goes by without someone talking to you about unicorns. It is difficult to imagine… Read More »The Challenge Facing Cloudera and Hortonworks: Making Big Data Work
Every January, mighty crowds of electronics and IT professionals descend on Las-Vegas, Nevada to attend the annual Consumer Electronics Show. CES 2016 has just wrapped… Read More »At CES 2016 no Clear Path to Unified Automated Home Future