article thumbnail

New Format for The Bar Chart Reference Page

The Data Visualisation Catalogue

User Modeling and User-Adapted Interaction , 16(1), 1–30. Eurographics Conference on Visualization (EuroVis) , 34. Bar charts and box plots. Streit, M., & Gehlenborg, N. Nature Methods, 11 (2), 117. Four Experiments on the Perception of Bar Charts. Setlur, V., & Anand, A. Carberry, S., & Hoffman, J. Zacks, J., & Tversky, B.

article thumbnail

#Clouderalife Volunteer Spotlight: Glaucia Esppenchutz

Cloudera

Glaucia volunteers with Free Code Camp , an organization founded in 2014 that helps aspiring technicians learn to code for free. . Through the creation and publication of videos, articles, and interactive coding lessons — all freely available to the public — Free Code Camp is able to reach and train millions of people annually.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Run Trino queries 2.7 times faster with Amazon EMR 6.15.0

AWS Big Data

Trino is an open source distributed SQL query engine designed for interactive analytic workloads. He has been focusing in the big data analytics space since 2014. When you use Trino on Amazon EMR or Athena, you get the latest open source community innovations along with proprietary, AWS developed optimizations.

article thumbnail

The current state of data storytelling and its analytical requirements

BI-Survey

Compared to BARC’s 2014 survey on Information Culture, a greater proportion of respondents in 2016 agreed with all but one of the statements in Figure 1. Interactive Analytical Storytelling Report. Request the free report now × Interactive Storytelling Report. The Last Mile of Analytics.

article thumbnail

Protecting Your Supply Chain with Data-Aware Security

CIO Business Intelligence

One need only look at the infamous Target breach of 2014 , which exposed the data of nearly 110 million individuals due to a backdoor that a contractor inadvertently created, to realize that an organization is only as secure as the weakest link in its supply chain.

Risk 105
article thumbnail

Announcement: Domino is fully Kubernetes native

Domino Data Lab

Second, we aren’t merely using k8s to install our platform services — we went deep: we rebuilt our whole compute grid to leverage k8s to distribute data science workloads, including model training jobs, interactive notebook sessions, hosting apps and deploying production models.

article thumbnail

Encryption Importance in the Age of Data Breaches

Smart Data Collective

However, unsecured connections , interactions, and sites continue to haunt users. It was found in 2014 that even the HTTPS protocol has certain limitations. It’s an indication that the page you’re on has reached you through HTTPS, the secure web protocol, different from the plain HTTP of old times. The loopholes.