Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


You must login to ask question.

Please briefly explain why you feel this answer should be reported.

Discy Latest Articles

Amazon Redshift COPY command cheatsheet

Amazon Redshift COPY command cheatsheet

Although it’s getting easier, ramping up on the COPY command to import tables into Redshift can become very tricky and error-prone.   Following the accordion-like hyperlinked Redshift documentation to get a complete command isn’t always straighforward, either. Treasure Data got in ...

Investigating Data Scientists, their Skills and Team Makeup

Investigating Data Scientists, their Skills and Team Makeup

A new survey of 490 data professionals from small to large companies, conducted by AnalyticsWeek in partnership with Business Over Broadway, provides a look into the field of data science. Download the free Executive Summary of the report, Optimizing your Data Science ...

Redshift Data Loading Simplified

As the Big Data scene emerges, one of the most common problems experienced by data engineers and data scientists alike involves getting data from one system to import nicely into (and export from) another. Often times, these are NoSQL systems ...

Data Science 101: Interactive Analysis with Jupyter and Pandas

Data Science 101: Interactive Analysis with Jupyter and Pandas

This article was originally published on Treasure Data blog. In case you were wondering, the next time you overhear a data scientist talking excitedly about “Pandas on Jupyter”, s/he’s not citing the latest 2-bit sci-fi from the orthographically challenged! There ...

Data Sources for Cool Data Science Projects: Part 2

Data Sources for Cool Data Science Projects: Part 2

At The Data Incubator, we run a free six week data science fellowship to help our Fellows land industry jobs. Our hiring partners love considering Fellows who don’t mind getting their hands dirty with data.  That’s why our Fellows work ...

Data Sources for Cool Data Science Projects: Part 1

Data Sources for Cool Data Science Projects: Part 1

At The Data Incubator, we run a free six week data science fellowship to help our Fellows land industry jobs. Our hiring partners love considering Fellows who don’t mind getting their hands dirty with data.  That’s why our Fellows work ...

Can Police Use Data Science to Prevent Deadly Encounters?

Can Police Use Data Science to Prevent Deadly Encounters?

Several high-profile cases of law enforcement officers using deadly force against civilians within the past year have politicians, police and researchers looking for ways to prevent such incidents. This search includes a closer look at the computerized early warning systems ...

A CS Degree for Data Science — Part I, Efficient Numerical Computation

A CS Degree for Data Science — Part I, Efficient Numerical Computation

At The Data Incubator, we get tons of interest from PhDs looking to attend our free fellowship, which trains PhDs to join industry as quants and data scientists.  A lot of them have asked what they can do to make themselves stronger ...

Processing Data like a Pro(fessional Data Scientist)

Processing Data like a Pro(fessional Data Scientist)

At The Data Incubator, we run a free six week data science fellowship to help transition our Fellows from Academia to Industry. This post runs through some of the toolsets you’ll need to know to kickstart your Data Science Career.  If you’re ...

Creating Your Own Threat Intel Through ‘Hunting’ & Visualization

Creating Your Own Threat Intel Through ‘Hunting’ & Visualization

How security analysts armed with a visual interface can use data science to find hidden attacks and the ‘unknown unknowns.’ As ‘cyber defenders’ we can no longer work with external threat intelligence alone. We have to stop relying on how ...