Uncategorized

Carl Farrell 2
Best practices in cybersecurity

“Give us 50K in bitcoin or you'll never access any of your data again.” Cybercriminals have many ways to hijack your data, and ransom schemes like the one above are just one trick of many. These “geeks gone wrong” are a real threat to customers and brands, and everyone knows

Russ Albright 5
Focusing your Text Mining with Search Queries

Recently, I have been thinking about how search can play more of a part in discovery and exploration with SAS Text Miner. Unsupervised text discovery usually begins with a look at the frequent or highly weighted terms in the collection, perhaps includes some edits to the synonym and stop lists,

Leo Sadovy 2
Tell me something I don’t know

What is information? The lack of a working definition plagued both science and the emerging telecommunications industry until the arrival of Claude Shannon and his famous 1948 paper, “A Mathematical Theory of Communication”, based on his cryptography work during WWII while at Bell Labs.  The landmark article is considered the

1 87 88 89 90 91 149