Posts

Showing posts from August, 2019

Improving patient care in Canada with Amazon Comprehend Medical

Amazon Comprehend Medical is a natural language processing (NLP) service that simplifies the use of machine learning (ML) to extract relevant medical information from unstructured text often found in clinical charts or doctor’s notes. Since the service launched in the AWS Canada (Central) Region in June 2019, it opened up possibilities for Canadian healthcare organizations to better serve patients. By understanding and analyzing the insights and relationships that are “trapped” in free-form medical text, including hospital admission notes and a patient’s medical history, doctors and clinical researchers can improve patient care. Amazon Comprehend Medical quickly and accurately gathers information, such as a patient’s medical condition, medication, dosage, strength, and frequency from a variety of sources like doctors’ notes, clinical trial reports, and patient health records. Bringing this service to the Canadian Region allows hospitals to develop advanced computing technologies

Deep Dive Into Data Commercialization At Forrester’s Data Strategy & Insights 2018 Forum

Data is, without a doubt, valuable. But when stored in vaults and locked down, it is not. As the American inventor Thomas Edison asserted, “The value of an idea lies in the using of it.” That sentiment was rephrased in modern terms when Christina Ho, deputy assistant secretary for accounting policy and financial transparency for the U.S. Department of the Treasury, said, “Data + use = value.” It isn’t until you know how the data will be used that you can determine its value. Demand For External Data Is Growing Insights professionals seek external data to enrich analysis Insights-driven companies derive value from their data. They systematically use data to deliver better customer experiences, improve operations, and create competitive differentiation — all of which adds to the bottom line. And increasingly, these organizations are looking for external data to augment their internal resources — enriching analytics models and delivering better insights: 56% of firms are expa

Virtual Kubernetes Clusters

In the technology domain, virtualization implies the creation of a software-defined or “virtual” form of a physical resource e.g. compute, network or storage. Users of the virtual resource should see no significant differences from users of the actual physical resource. Virtualized resources are typically subject to restrictions on how the underlying physical resource is shared. The most commonly used form of virtualization is server virtualization, where the physical server is divided into multiple virtual servers. Server virtualization is implemented by a software layer called a virtual machine manager (VMM) or hypervisor.   There are two types of hypervisors: Type 1 Hypervisor: a hypervisor that runs directly on a physical server and coordinates the sharing of resources for the server. Each virtual machine (VM) will have its own OS. Type 2 Hypervisor: a hypervisor that runs on an operating system (the Host OS) and coordinates the sharing of resources of the server. Each VM

An Introduction to Docker for R Users

What is Docker? Docker is “a computer program that performs operating-system-level virtualization, also known as ‘containerization’” Wikipedia. As any first line of a Wikipedia article about tech, this sentence is obscure to anyone not already familiar with the content of the article. So, to put it more simply, Docker is a program that allows to manipulate (launch and stop) multiple operating systems (called containers) on your machine (your machine will be called the host). Just imagine having 10 RaspberryPi with different flavors of Linux, each focused on doing one simple thing, that you can turn on and off whenever you need to ; but all of this happens on your computer. Why Docker & R? Docker is designed to enclose environments inside an image / a container. What this allows, for example, is to have a Linux machine on a Macbook, or a machine with R 3.3 when your main computer has R 3.5. Also, this means that you can use older versions of a

The Pursuit Of ROI In UX: A Mini UX Audit For A University Website

Let’s talk about return on investment of user experience. We are almost always asked to prove our “essentialness” in a way, explicitly or implicitly, to external or internal stakeholders as UX practitioners. So, below is a UX audit for Leicester University’s website from the usability perspective. One way or another, every one of us faced with the ugly truth of getting buy-in from someone superior for something we believe. It’s painful to explain something so obvious to someone, for the millionth time, and hard to muster all the patience needed to give them time while they’re trying to figure out what you propose. Moreover, once you receive a follow-up question aimed at the value of your approach, it’s not even something like: Hey, what you propose is pure logic, its sheer rationality impressed us deeply. But, how do you plan to measure the effort you put it in design? No, it’s not like this. However, it almost sounds like: Why do we do that instead of spending m

Real Time Projects based Core Java Training and Certification

JAVA applications today dominate the various devices all over the world. This is because of its adaptive feature to run easily on any of the devices. Its wide usage for developing applications forms a career pathway for those looking forward to making their career as a JAVA developer. The JAVA programmers are offered lucrative salary packages too. Java is one among the most widely used and admired programming languages and the Java professionals are paid heavily. A Java professional works extensively through the dynamic codes as well as applications. Java is one of the most widely accepted programming languages used for development of websites as well as other applications. Core Java is the initial stage of java programming, where you can learn all the concepts that are used in the programming paradigm. It is the fundamental of java whereas advance java deals with the execution of the basic concepts. Thus it is important to learn core Java first in order to learn advanced java f

Demystifying containers, Docker, and Kubernetes

Modern application infrastructure is being transformed by containers. The question is: How do you get started? Understanding what problems containers, Docker, and Kubernetes solve is essential if you want to build modern cloud-native apps or if you want to modernize your existing legacy applications. In this post, we’ll go through what they are and how you can learn more to advance to the next level. What are containers? Containers effectively virtualize the host operating system (or kernel) and isolate an application’s dependencies from other containers running on the same machine. Before containers, if you had multiple applications deployed on the same virtual machine (VM), any changes to shared dependencies could cause strange things to happen—so the tendency was to have one application per virtual machine. The solution of one application per VM solved the isolation problem for conflicting dependencies, but it wasted a lot of resources (CPU and memory). This is because a

How Big Data and Automation Keep Malwarebytes Ahead of the Bad Guys

Darren Chinen: Our CEO and founder, Marcin Kleczynski, was 14 years old, playing video games, and caught a virus on his computer, didn’t want to tell his parents about it, and he went searching on the Internet for some people that could help him clean his machine. And so, at the ripe old age of 14, with the help of some people he now calls heroes who are actually still working at this company, he was able to write his first Malwarebytes program, and that kind of evolved. And eventually, by the time he was 18 years old, he was able to found Malwarebytes. And really, our mission has stayed the same from the very beginning. We absolutely can’t stand malware. We imagine a world without malware. And what I think is the best thing about what we do is we always talk about — our goal is to put ourselves out of business. There’s no malware in the world, there’s no reason to be in existence anymore. Joe: Could you maybe give us a little bit of a description about the role of that team

Find and Fix Docker Doomsday with BMC

That quote is true today just like it was in the 1700’s, and while he was actually talking about fire safety (some believe he was referring to staying healthy – not true), Mr. Franklin could just as easily have been talking about protecting against security vulnerabilities, including a new and very dangerous one, Docker Doomsday. What is Docker Doomsday? The Docker Doomsday vulnerability affects almost any organization using Docker and containers. Here’s a quick look at what it does. First, an attacker infects a container with a malicious program. The malicious code exploits a flaw in runc, which is the container runtime utility for Docker and Kubernetes. Next, the malicious code breaks out and infects the entire container host, and spreads to potentially thousands of other containers running on that host. This is a Doomsday scenario because the attack can ultimately affect many interconnected, production systems. How bad is Docker Doomsday? Well, it’s CVE 2019-5736 and ha

Why machine learning is primarily written in Python

This is the second part in a beginner-to-beginner blog series, a series from a developer new to artificial intelligence and machine learning to other beginners seeking to learn more about artificial intelligence. The very first line of code I ever wrote was a classic print (“Hello, World!”) in Python. While it was a new and difficult frontier to me then, I look back now knowing a few more languages and am still grateful Python was my first. It is a simple and elegant language that allowed me to use it to do what I wanted relatively quickly. As my interests in programming expanded to machine learning (ML), I was both surprised and pleased to realize ML is primarily done in Python. However, the reasons behind the popularity of Python were not immediately obvious to me. What exactly about Python makes it one of the best options for a system to learn from data and identify existing patterns, the goal of machine learning? Simplicity Python is known as a high-level, extremely re

How to Choose the Exemplary Fonts for Your Logo

Communication is essential for every business. Whether you are a fresh startup trying to build a reputation in the business and marketing worlds or you run a recognized brand, without establishing stable relations with your targeted audience and potential business prospects, communication unlocks the doors to ultimate business success. The importance of communication becomes quite evident when it comes to logo designing. Since the chief purpose of designing logos is to convey the complex messages in a simplified way. Where color psychology plays a pivotal role in giving an aesthetic touch to the logos, the association with different fonts and typefaces evokes powerful emotions and ideas. Where choosing the right colors helps in incorporating an appealing look, the right font and typeface help in enhancing your brand’s personality. Whether you choose a sober and sophisticated typeface for a corporate business organization or a retro-contemporary and edgy typeface for a not-