Ever wondered how DNA alignment actually works under the hood? 🧬 We coded the Needleman-Wunsch algorithm from scratch, working through scoring matrices by hand with simple examples like “CAT” vs “CT” before…
Author: 24-7
Davey Johnson, former Mets manager, an early proponent of sabermetrics
Davey Johnson, former baseball player and manager, recently passed away. He was notable in the math and data analysis world for being an early proponent of sabermetrics, the use of statistical…
Installing RStudio and Positron on Manjaro Linux
[This article was first published on pacha.dev/blog, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here…
Step-by-Step Guide to Use RSelenium with Firefox (Linux and Windows)
[This article was first published on pacha.dev/blog, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here…
Some Papua New Guinea data doodles by @ellis2013nz
I wrote a review last week of Struggle, reform, boom and bust: an economic history of Papua New Guinea since independence by Stephen Howes and others. The review was published in the…
Speaking at posit::conf 2025
[This article was first published on tshafer.com, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here…
Ensemble Model for Gold Futures
[This article was first published on DataGeeek, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here…
Step-by-Step Guide to Use R and Selenium on Windows
[This article was first published on pacha.dev/blog, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here…
Automating Security Operations: A Guide to Efficiency
The necessity for robust cybersecurity measures has never been more critical. As cyber threats become increasingly sophisticated and pervasive, organizations are under immense pressure to protect their digital assets and ensure the…
Outsourced Security Operations Center: Build, Buy, or Choose?
Cybersecurity has become a paramount concern for organizations of all sizes. At the heart of any robust cybersecurity strategy lies the Security Operations Center (SOC) – the nerve center responsible for monitoring,…