Kaizen-R

    • About Us
    • Attribution
    • Cookie policy (EU)
    • Home
    • legal-notice
Illustration of a bird flying.
  • Reading in JSON – Example with MITRE ATT&CK

    Moving away from CSV for a second As it turns out, I am TOO used to reading in and working with CSV. It’s only natural, it’s kind of the same thing as a data.frame (or the basis for it). So I thought I would write a demo with another input format. Another common format to…

    November 9, 2020
  • Demo: Interactive Visualization of Projects Risks

    Intro I’ve mentioned a couple of times in the past the words “Shiny” and “Dashboard”. I think it’s high time we demo it and some of its capacities. Disclaimer: One could use Excel to the what’s detailed here. But this Blog is about R programming mostly, so… We won’t be doing that today. So I’ve…

    October 11, 2020
  • Generalizing the “Ransomware approach” to other data

    No code for today. I am busy with other personal stuff, and this blog is only my “weekend hobby” after all. But I make a point of trying to write something every week, and if you’ll allow me, this week will not be about “R Programming”, but about concepts, of “applications of Anomaly Detection” and…

    October 4, 2020
←Previous Page
1 … 37 38 39 40 41 … 44
Next Page→

Kaizen-R

Proudly powered by WordPress

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}