In some applications, using the standard precision in your programming language of choice, may not be enough, and can lead to disastrous errors. In some cases, you work w...
I recently had another client conversation about optimizing their data warehouse and Business Intelligence (BI) environment. The client had lots of pride in their existin...
Artificial Intelligence on the Horizon The Future of Healthcare (Second in a Series) Discussed much more thoroughly in the last article AI in Banking, Artificial Intell...
Introduction This post is designed show the internal changes of an Artificial Neural Network (ANN/NN), it shows the outputs of the neurons from the beginning of a Backpro...
Handbook of Statistical Analysis and Data Mining Applications, Second Edition, is a comprehensive professional reference book that guides business analysts, scientists, ...
This is Google’s dictionary on machine learning. Very interesting, with more than 100 entries, but clearly biased towards what Google thinks machine learning is. Th...
Yet another one of these One Picture tutorials, and in some ways, in the same old-fashioned style as our Type I versus Type II Errors in One Picture. DSC Resources Servic...
Here is a guest post from Rowena Bonnette on How Biometric Authentication works – Biometrics are the ultimate security protocol. Using security coding that is...
The AE (Algorithm Economy) is explained as companies maintaining a competitive advantage by being technically and culturally driven by data, analytics, and action. The AE...
This article was written by Jon Krohn. At untapt, all of our models involve Natural Language Processing (NLP) in one way or another. Our algorithms consider the natural...