Achieving accurate anomaly detection requires more than statistics. Simple assumptions like normal distribution do not work in the real world. Time series data – repres...
At first there were a lot of different opinions, but now, almost everybody agrees that big data was able to take over the whole business world. A lot of businesses are re...
Cybersecurity began with the antivirus. It was the antivirus software that we relied on to secure systems and networks, plus of course endpoint devices too. But today, wi...
Response Modeling Using Machine Learning Techniques with R-Programming (WIP). I have tried to exhibit credit scoring case studies with German Credit Data. This article in...
In the previous post of our Understanding machine learning series, we presented how machines learn through multiple experiences. We also explained how, in some cases, hu...
It is easy to take for granted the technology we have at our disposal. We flick a switch and the lights go on, we turn on the tap and clean water comes out. We don’t ha...
Probably like most people, I tend to recognize data as a stream of values. Notice that I use the term values rather than numbers although in practice I guess that values ...
This article on data visualization tools was written by Jessica Davis. She’s passionate about the practical use of business intelligence, predictive analytics, an...
There is growing demand of data scientists in every organization. For growth of any business enterprise there is need to evaluate data in order to streamline the strategi...
In a prior post I outlined some thoughts on the outlook for the data analytics sector and referenced a database I prepared of analytics companies. At the time the list ...