Content by Joe Stanganelli
Joe Stanganelli
Member Since: July 12, 2011
Blog Posts: 20
Posts: 1516

Most Recently Posted

100 items
Comment: Re: IOU for IoT - Joe Stanganelli - 2/20/2017
Comment: Re: Another - Joe Stanganelli - 2/13/2017
Comment: Middle out - Joe Stanganelli - 2/11/2017
Comment: Re: Another - Joe Stanganelli - 2/10/2017
Comment: Another - Joe Stanganelli - 2/9/2017
Comment: Not so bad - Joe Stanganelli - 2/6/2017
Comment: Re: Kaggle - Joe Stanganelli - 2/2/2017
Comment: Re: Kaggle - Joe Stanganelli - 1/26/2017
Comment: Die buzz die - Joe Stanganelli - 1/14/2017
Comment: Kaggle - Joe Stanganelli - 1/11/2017
Comment: Re: IoT - Joe Stanganelli - 12/24/2016
Comment: Re: IoT - Joe Stanganelli - 12/24/2016
Comment: Re: Holiday dreams - Joe Stanganelli - 12/22/2016
Comment: Re: Data Privacy - Joe Stanganelli - 12/22/2016
Comment: Re: 1984 in 2016 - Joe Stanganelli - 12/5/2016
Comment: Buzz of DT - Joe Stanganelli - 12/5/2016
Comment: Re: IoT Frivolity - Joe Stanganelli - 11/30/2016
Comment: Re: IoT - Joe Stanganelli - 11/30/2016
Comment: IoT Frivolity - Joe Stanganelli - 11/29/2016
Comment: Re: 1984 in 2016 - Joe Stanganelli - 11/28/2016
Comment: Morale - Joe Stanganelli - 11/28/2016

Latest Blogs
HIPAA is supposed to protect the privacy of your medical information, but the sale of anonymized medical data and advances in analytics have made it possible for organizations to re-link your name to your private records.
Career prospects are hot for both data analytics pros and cyber security specialists. Now CompTIA is introducing a certification that combines these specialities to apply analytics to cyber security.
There has been plenty of talk about the need for a chief analytics officer or chief data officer. But do you ever wonder what they do for a living?
Visual analytics tools, can enable non-statistician citizen data scientist to create models that use predictive or prescriptive analytics. These professionals can embed their business knowledge into the models they're testing, prototyping, or building.
Are your digital marketers creating gaps in customer privacy? They could be unless they vet tags and third-party app access.  Here's how to do the vetting.
Radio Show
A2 Conversations
Jessica Davis
Data Analysts in Training: Meeting Tomorrow's Demand

3/8/2017   REGISTER   0
Jessica Davis
Our Bodies, Our Data: Medical Records For Sale

2/21/2017  LISTEN   62
Jessica Davis
Energy Analytics: Using Data to Find Savings

2/14/2017  LISTEN   44
Jessica Davis
Sharpen Your Analytics & Data Management Strategy

2/8/2017  LISTEN   74
Jessica Davis
Analytics: Make the Most of Data's Potential in 2017

1/19/2017  LISTEN   19
Jessica Davis
A2 Radio: Can You Trust Your Data?

12/20/2016  LISTEN   70
James M. Connolly
Retail Analytics: See Where Style Meets Statistics

12/6/2016  LISTEN   53
James M. Connolly
Why the IoT Matters to Your Business

11/29/2016  LISTEN   45
James M. Connolly
Will Data and Humans Become Friends in 2017?

11/22/2016  LISTEN   40
James M. Connolly
We Can Build Smarter Cities

10/20/2016  LISTEN   31
James M. Connolly
Visualization: Let Your Data Speak

10/13/2016  LISTEN   70
Information Resources
Quick Poll
Quick Poll
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS