Archives
- May 07, 2014
- Rejection/Feedback: A play in three acts
- January 17, 2014
- A Geneva Convention for the Language Wars
- January 13, 2014
- Tricked out iterators in Julia
- September 30, 2013
- Pardon the dust
- September 06, 2013
- Machine Learning for Hackers Chapter 8: Principal Components Analysis
- May 11, 2013
- I’ve seen the best minds of my generation destroyed by Matlab …
- February 12, 2013
- Machine Learning for Hackers Chapter 7: Numerical optimization with deterministic and stochastic methods
- February 08, 2013
- Machine Learning for Hackers Chapter 6: Regression models with regularization
- December 28, 2012
- Machine Learning for Hackers Chapter 5: Linear regression (with categorical regressors)
- December 28, 2012
- Machine Learning for Hackers Chapter 4: Priority e-mail ranking
- December 22, 2012
- ARM Chapter 5: Logistic models of well-switching in Bangladesh
- December 21, 2012
- Machine Learning for Hackers Chapter 2, Part 2: Logistic regression with statsmodels
- December 20, 2012
- Machine Learning for Hackers Chapter 3: Naive Bayes Text Classification
- December 05, 2012
- Better typography for IPython notebooks
- May 14, 2012
- How do you speed up 40,000 weighted least squares calculations? Skip 36,000 of them.
- May 01, 2012
- Machine Learning for Hackers Chapter 2, Part 1: Summary stats and density estimators
- April 27, 2012
- Machine Learning for Hackers Chapter 1, Part 5: Trellis graphs.
- April 26, 2012
- Machine Learning for Hackers, Chapter 1, Part 4: Data aggregation and reshaping.
- April 22, 2012
- Shades of Time: I don’t buy it, and that’s why it’s so great.
- April 19, 2012
- Machine Learning for Hackers Chapter 1, Part 3: Simple summaries and plots.
- April 18, 2012
- Machine Learning for Hackers Chapter 1, Part 2: Cleaning date and location data
- April 14, 2012
- Machine Learning for Hackers Chapter 1, Part 1: Loading data