Analytics

Analytics | News, how-tos, features, reviews, and videos

intro ts ai ml by monsitj getty images 2400x1600
data explosion / data streams / volume / velocity

cso ts analytics  by monsitj getty images 2400x1600

How to protect algorithms as intellectual property

Algorithms can now be considered trade secrets or even patent-worthy. Prevent them from being stolen by taking these security steps.

iot security startups hot planets rocket lock security

15 hot tech skills getting hotter -- no certification required

Employers are apt to invest more often in cash premiums for noncertified tech skills compared to certifications. Here are a few they’re coveting the most now and going forward.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

User hands on a laptop keyboard have a digital overlay reflecting data/analytics/tracking.

Securonix SIEM as a service has behavior analytics baked in

Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

ifcr 043 thumb
video

How to add color to your ggplot2 text in R

See how to style your headlines, axis text, and more in your ggplot graphs with the R ggtext package. Download the data from Sharon's associated article:...

ifcr 042 thumb
video

How to code an interactive shiny app to search Twitter: Do More With R bonus video

Learn how to turn code from Episode 41 into an interactive shiny Web app.

ifcr 041 thumb
video

How to search Twitter with R

See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the...

data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.

cloud security / data protection / encryption / security transition

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.

ifcr 040 thumb
video

How to send SMS text messages from R

See how to send a text message directly from an R script with Twilio and the Twilio R package.

ifcr 039 thumb
video

How to use the sf package in R

See how to do GIS calculations in R with this tutorial on finding the ZIP code for a US address.

tt19 060 thumb
video

Machine learning and AI advancements

The hype around artificial intelligence and machine learning is giving way to real use. Join us as InfoWorld’s Serdar Yegulalp and IDG TECHtalk host Ken Mingis discuss how AI and ML have become easier to put into production, how AI...

ifcr 038 thumb
video

How to merge in R

See how to merge data in R three different ways: with base R’s merge function, dplyr’s family of join functions, and the data.table package.

data scientist woman at virtual monitor user interface tools for data science by metamorworks getty

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.

ifcr 037 thumb
video

How to use the dtplyr package

The dtplyr 1.0 package lets you write dplyr R code and access speedy data.table performance. Find out how

ifcr 036 thumb
video

R data.table in 5 minutes

Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

Load More
You Might Also Like