Shadow

Recent Posts

R Shiny Application Split Into Multiple Files

R Shiny Application Split Into Multiple Files

Blog, Data Science, Recent Posts
A R Shiny application can be completely made of just one file that includes your UI and server code. Depending on the application you're creating this can get messy as the number of lines grows. Splitting the app across multiple files also helps with debugging and being able to reuse code for another project. Separating the files for a Shiny Application also helps with version control For this post, the actual code and what it's doing will not be covered. The code is more of a placeholder and this is creating a project framework to start Shiny applications. Creating a new project The best practice is to create a new project for each application. This is simple with RStudio and using the "File" dropdown to select "New Project" Select "New Directory" Choose "Shiny We...
NSA warns Microsoft of severe Windows 10 bug

NSA warns Microsoft of severe Windows 10 bug

Recent Posts, Software, Windows
Windows Patch Tuesday gets Exciting On the last day of support for Windows 7 news breaks of a severe Windows 10 bug. The bug was so severe the NSA told Microsoft once it was found, or did they? https://techcrunch.com/2020/01/14/microsoft-critical-certificates-bug/ This bug was related to digital signatures, which is used as a defense against users downloading malware disguised as a typical program. However, due to the bug an attacker could include a digital signature from a trusted provider on any files they wanted. Once an unsuspecting user downloads those files their system could be compromised because of the digital signature Windows 10 would believe its safe. Below is a tweet from the NSA "Strongly" encouraging users to update their Windows 10 OS https://twitter.com/...
What is Data Science?

What is Data Science?

Recent Posts, Data Science
The data science field encompasses a wide scope, ranging from collecting data to data management, analysis, and visualization. Pulling all these areas together, a data scientist can gather information from obtained data and create visualizations to communicate results. Collect and organize data The collection and organization of data is arguably the most important factor within the data science field. You cannot do anything without having data to work with, so you must have a method of collecting data. This can be done independently/on your own, for example scraping the web or applications or even conducting a survey for respondents to take. You may also have access to data that has already been collected either by open source repositories, or sites such as Kaggle. You may get the d...
Prepare for Rumors of War

Prepare for Rumors of War

Recent Posts, Blog, Linux
The news is ramping up on the potential for bad things happening. This not great timing for many computer users out there, whether it be for professional or amateur users currently in the middle of upgrading operating systems. With malware, viruses and ransomware in the media lately the addition of potential increases in cyber-attacks adds even more stress to the task of 24/7 system maintenance. On a user level, good housekeeping is essential, along with prudent patching, basic firewall and antivirus updating including routine monitoring. I have a little more confidence in my Linux systems, but Windows OS can be secured and protected if you put some time into basic system upkeep. Having a good backup procedure and preparation for system restore are always a priority for any true system...
Technology is BLOATED

Technology is BLOATED

Recent Posts, Blog
The internet has answers to all that you ask, it might be correct, or it might not, how do you know? Should you just look it up and believe what you read is true? This is the issue that comes with being so well connected to all and everything, 24/7 news cycle and social media. Big exciting news or an interesting technological breakthrough spreads rapidly through networks, but when it’s found to be the work of a photoshopped image or quote taken in the wrong context that will never reach the same amount of points in the network.  This is dangerous and we now see how people can be influenced by others, even worse is realizing it and now not knowing who or what to trust.  Recently this has been a major subject in news, entertainment, and politics. You can even see similar iss...