Is it just an average of the precision?This article hopes to address these questions and calculate mAP for both object…
Continue Readinginformation
Web Scraping with Beautiful Soup — A Use Case
")The next step is query and retrieve the data for each of the foundation’s URLs. We have to keep in…
Continue ReadingCan you identify me from a crowd?
Clearly it depends on how much data you have shared intentionally or otherwise. So the real question isHow much data…
Continue ReadingText Classification of Freedom of Information Requests: Part I
The python package fuzzywuzzy, developed by SeatGeek, is perfect for this type of fuzzy string matching. The package offers four…
Continue ReadingFundamentals of Machine Learning (Part 3)
Using q instead of p requires H(p, q)-H(x) extra bits. We call this value the relative entropy or Kullback-Leibler (KL)…
Continue ReadingCongress and the Equifax data breach
Dialog from a congressional hearing February 26, 2019. Representative Katie Porter: My question for you is whether you would be…
Continue ReadingFeatures that Maximizes Mutual Information, How do they Look Like?
Features that Maximizes Mutual Information, How do they Look Like?We can create latent features by maximizing mutual information, but how would…
Continue ReadingMy journey to Performance Analysis 2/2 (HAR files)
I wasted 10 mn of my life reading that article!”OK this is fair enough… the problem with HAR file retrieval,…
Continue ReadingInterface as Business Logic — A Better Design of Form Objects
The insight is that the purpose of factoring a Form Object out of a controller is actually factoring the business…
Continue ReadingMissing information anxiety
A recurring theme in math is that you may not need to do what it looks like you need to…
Continue Reading2019 Trends in the World of PHP [interview with Tomas Votruba]
What does this mean?Last year I was picked to speak at PHP. Asia. The talks were great, but the highlight of…
Continue ReadingProbabilisitic Identifiers in CCPA
The CCPA, the California Privacy Protection Act, was passed last year and goes into effect at the beginning of next…
Continue ReadingInformation Flows in You — And Your Friends
An important consideration here is that information theory deals with the limits of communication, thus a given entropy rate and…
Continue ReadingAnalyzing Information Flow within a Twitter (Ego-)Community
In other words, what information is flowing and persisting in these communities?Information Systems and Data Science often come hand in…
Continue ReadingEntropy: How Decision Trees Make Decisions
No. It’s just a metric. It’s not important to know how it came to be. It’s important to know how…
Continue ReadingDecision Tree
Attribute selection is used to determine the splitting criterion which tells us which attribute to test at node N by…
Continue ReadingHow Pew Research Center uses small multiple charts
With that in mind, here are some things researchers and designers at the Center consider when using small multiples to…
Continue ReadingHow to create a Lion King bank application with Spring and Thymeleaf (Coding Bootcamp series)
Consequentially, these weeks also allowed us to revisit HTML and CSS — a nightmare for many but a pleasure for me.In order…
Continue ReadingProtect Application Assets: How to Secure Your Secrets
However important it may be for application secrets to be maintained someplace other than in source code, they aren’t secure…
Continue ReadingImplementing an Amazon Dash Button workflow
If the order is successfully paid for, either because we issued a charge using the customer saved payment information or…
Continue ReadingFinding our way: thoughts about information architecture’s history
Finding our way: thoughts about information architecture’s historyZach LantzBlockedUnblockFollowFollowingDec 4The Great Library of Alexandria“The most common definition [of the word…
Continue Reading