Inclusivity for the greater good
Ajey Gore explains why GO-JEK is focusing its attention beyond urban Indonesia to help people across the country’s rural areas.
Ajey Gore explains why GO-JEK is focusing its attention beyond urban Indonesia to help people across the country’s rural areas.
Seth Stephens-Davidowitz explains how to use Google searches to uncover behaviors or attitudes that may be hidden from traditional surveys.
CSS Quirks, Knitting Meshes, Hardware is Hard, and Invisible Systems
Watch highlights covering machine learning, business intelligence, data privacy, and more. From the Strata Data Conference in San Jose 2018.
Li Fan shows how Pinterest is using AI to predict what’s in an image, what a user wants, and what they’ll want next.
Ben Lorica explores emerging security best practices for business intelligence, machine learning, and mobile computing products.
Nancy Lublin and Bob Filbin explore findings from crisis data.
Natalie Evans Harris discusses the Community Principles on Ethical Data Practices (CPEDP), a code of ethics for data collection, sharing, and utilization.
Alex Smola shares lessons learned from AWS SageMaker, an integrated framework for handling all stages of analysis.
Continuous Delivery, Diagram Editor, Robot Algorithms, and Twitter Linguistics
Demanding Better, Management Expectations, HR Robots, and Voice Cloning
Face Recognition, HR and Automation, Sustainable Software Development, and Interaction Analysis
Sentence Space, SQL Parser, AMP Considered Harmful, and CD over Kubernetes
Forensic Fantasies, Virtual Citizenship, Concurrent Programming, and Image Editor
Adrian Cockcroft outlines the architectural principles of chaos engineering and shares methods engineers can use to exercise failure modes in safety and business-critical systems
Kevin Stewart explores the people, processes, and cultural aspects that complement the cloud-native computing stack.
Winning Atari, Explaining Algorithms, Code for America Summit, and Historic AI Book
Cornelia Davis explains how an event-driven approach addresses the fallacies of distributed computing.