After Equifax’s massive data breach – social security number, date of birth, and address from 143 million Americans stolen by cyber criminals – the que...
Summary: With only slight tongue in cheek about the road ahead we report on the just passed House of Representative’s new “Federal Automated Vehicle Policy” as we...
Data Visualization is not new, it has been around in various forms for more than thousands of years. Ancient Egyptians used symbolic paintings, drawn on walls &...
Data Visualization is not new, it has been around in various forms for more than thousands of years. Ancient Egyptians used symbolic paintings, drawn on walls & pot...
Functions are used to simplify a series of calculations. For instance, let us suppose that there exists an array of numbers which we wish to add to another variable. Inst...
The images on this blog are from an algorithmic environment that I first developed about 15 years ago – rendered using a graphical system that I wrote in Java. A ...
This is one of the riskiest decisions that any organization will ever face, that said – level of risk exposure is directly opposite with amount of research, and due...
Recently, question of value derived by data science is being raised more and more frequently. Even Harward Business Review is on it: click here to read their articl...
This article was written by Madison from PeopleMaven I came across this piece that talks about interesting articles that might be helpful for data scientists looking to s...
When talking to clients about their business goals, most business executives are pretty clear as to what they want to accomplish, such as reducing customer churn or reduc...