Shay Pal
  • Female
  • Chicago , IL
  • United States
Share on Facebook

Gifts Received


Shay Pal has not received any gifts yet

Give a Gift


Shay Pal's Page

Profile Information

Job Title:
Data Scientist

Shay Pal's Blog

Machine learning or laughing? Amazon’s Alexa is freaking people out with unprovoked chuckle

Posted on March 14, 2018 at 2:39pm 0 Comments

Echo Dot

It’s one thing to believe that Amazon’s Alexa is constantly listening to us, but quite another to worry that she’s laughing at what she hears.

Users of Alexa-enabled devices such as the Echo and the Dot have reported hearing the tech giant’s ubiquitous voice emit a very real-sounding and unprompted laugh of late. Tweets and reports about the artificial intelligence gone rogue have labeled it creepy and scary, and we can see why.

Short of little Carol Anne…


Using Analytics to Improve Customer Engagement

Posted on February 7, 2018 at 2:30pm 1 Comment

Here is a guest blog from MIT SMR by Sam Ransbotham. Organizations that turn data into insights are gaining competitive advantage through improved connections with consumers.

The 2018 Data & Analytics Global Executive Study and Research Report by MIT Sloan Management Review finds that innovative, analytically mature organizations make use of data from multiple sources: customers, vendors, regulators, and even competitors. The…


Star Wars: The Audience Turns to the Dark Side

Posted on December 15, 2017 at 3:30pm 0 Comments

Here is a guest post from George McIntire

George McIntire


George McIntire is a data science writer, educator and mentor in Thinkful's Los Angeles coding bootcamp. He's interested in using the power of data science to educate the public and make better sense of our world.…


How Biometric Authentication Works

Posted on November 15, 2017 at 3:53pm 0 Comments

Here is a guest post from Rowena Bonnette  on How Biometric Authentication works - 

Biometrics are the ultimate security protocol. Using security coding that is unique to each individual, you can be confident in the authenticator’s identity. We’ve seen biometric securities in science fiction movies, and we use fingerprint authentication daily on our smartphones. Now, let’s break down all of the different kinds of biometric authentication and discover how they work.…


Comment Wall

You need to be a member of Data Science Central to add comments!

Join Data Science Central

  • No comments yet!

© 2021   TechTarget, Inc.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service