Established 1995 /* Usus magister est optimus. */

ypy 1

R vs Python in Data Science: Python

Developers love debating choice of languages almost as much as they love coding. Data Science is no exception to this and here’s part 2 of a two part series on R vs Python, with this video taking the Python side.  Watch Part 1: The R side.

redshift 0

Migrating Your Data Warehouse to Amazon Redshift

Recently, I had the chance to learn about Matillion ETL and Redshift. It’s an amazing platform, inexpensive, and easy to get started. Check out this video from AWS re:Invent 2016 to learn more.

maker_4ir 0

From the Maker Movement to a New Industrial Revolution

In this video, Chris Anderson explains how the Maker Movement is now scaling up to create a new class of manufacturing entrepreneurship that will create a “Long Tail of Stuff.” He shares his own experience going from a Maker hobbyist to the CEO of 3D Robotics, which has in three...

hmason_innovation 0

Innovating through Data

In this talk from 2015, Hillary Mason talks about the importance of innovating with data science even after you have created a dashboard.

programming2017 0

Top 5 Programming Languages to Learn for 2017

Here’s an interesting video about the top programming languages for 2017. I’m not sure I totally agree with this list, but the term “top programming languages” is hardly objective. Here’s his list and watch the video to see his reasoning. Javascript (NodeJS and ReactJS) SQL (A database query language) Swift...

why_r 1

R vs Python in Data Science: R

Whether it was Java vs .NET, C# vs VB.NET, or RoR vs PHP, it seems like developers love debating choice of languages more than anything else. Data Science is no exception and here’s part 1 of a two part series on R vs Python, with this video taking the R...

malware 0

Fileless Malware Confounds Conventional Scanners

Just when you thought it was safe to use the internet (or any electronic device) comes this article in Wired Magazine about “fileless malware.” So-called fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s random-access memory or kernel, meaning it doesn’t depend on hard drive...