Machine learning: How to create a recommendation engine

Email not displaying correctly? View it in your browser.

InfoWorld Daily

Aug 17, 2018
Featured Image

Interview: Brendan Eich on JavaScript’s blessing and curse

Eich readily admits to JavaScript’s flaws and talks frankly about what he might have done better, while touching on JavaScript’s improvements over its 23-year lifespan Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Machine learning: How to create a recommendation engine
Review: 13 Python web frameworks compared
Why there are no shortcuts to machine learning
Introducing the Kubernetes Operator for TiDB
For cloud deployments, ‘it works’ is not good enough
Oracle and Intel seek to build a Java API for SIMD support

White Paper: Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy. Read More

Thumbnail Image
INSIDER

Machine learning: How to create a recommendation engine

In this excerpt from the book “Pragmatic AI,” learn how to code recommendation engines based on machine learning in AWS, Azure, and Google Cloud Read More

Thumbnail Image
INSIDER

Review: 13 Python web frameworks compared

Python programmers have many excellent options for creating web apps and APIs; Django, Weppy, Bottle, and Flask lead the way Read More

Thumbnail Image
INSIDER

Why there are no shortcuts to machine learning

As long as companies understand that good data science takes time in an enterprise, and give these people room to learn and grow, they won’t need shortcuts Read More

Thumbnail Image

Introducing the Kubernetes Operator for TiDB

Learn how to use the TiDB Operator to deploy, monitor, and manage the distributed, MySQL-compatible, TiDB database on Kubernetes clusters Read More

Thumbnail Image

For cloud deployments, ‘it works’ is not good enough

The phrase “Well, it works, doesn’t it?” puts fear into my heart—and it should do the same for you as well. Here’s why Read More

Thumbnail Image

Oracle and Intel seek to build a Java API for SIMD support

The Java Vector API aims to provide a mechanism to write complex vector algorithms in Java Read More

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content: in-depth articles available only to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.