Analytics | News, how-tos, features, reviews, and videos

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

ifcr 042 thumb

How to code an interactive shiny app to search Twitter: Do More With R bonus video

Learn how to turn code from Episode 41 into an interactive shiny Web app.

ifcr 041 thumb

How to search Twitter with R

See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the...

data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.

cloud security / data protection / encryption / security transition

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.

ifcr 040 thumb

How to send SMS text messages from R

See how to send a text message directly from an R script with Twilio and the Twilio R package.

ifcr 039 thumb

How to use the sf package in R

See how to do GIS calculations in R with this tutorial on finding the ZIP code for a US address.

tt19 060 thumb

Machine learning and AI advancements

The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI...

ifcr 038 thumb

How to merge in R

See how to merge data in R three different ways: with base R’s merge function, dplyr’s family of join functions, and the data.table package.

data scientist woman at virtual monitor user interface tools for data science by metamorworks getty

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.

ifcr 037 thumb

How to use the dtplyr package

The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how

ifcr 036 thumb

R data.table in 5 minutes

Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

ifcr 034 thumb

How to export to Excel with R

See how to save a data frame from R to Excel – with styling or multiple tabs.

Let's Encrypt automated encryption gears

SOAPA vs. SOAR: How these security terms differ

SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA).

ifcr 033 thumb

How to get API data with R

No R package for an API you’d like to use? No problem! See how to write your own R code to pull data from an API using API key authentication.

data analytics algorythym chart progress digital solarseven getty

Security analytics: It’s all about the data

More security data drives the need for data modeling, data management, and data discipline

ifcr 031 thumb

How to make your own ggplot2 functions

See how easy it is to make your own functions using ggplot2, dplyr, and other tidyverse package functions – without worrying about quoted and unquoted column names! Thanks to the latest version of the rlang package, tidy evaluation is...

6 network packet analysis data binary world

Network traffic analysis tools must include these 6 capabilities

Organizations want advanced analytics, threat intelligence integration, and IoT support among other things in network traffic analysis (NTA) tools.

Load More
You Might Also Like