An effort called the Durkheim Project has brought together a collection of big data companies, universities and government agencies that want to predict suicide risks among veterans by analyzing their social… Read more »
A team of Stanford researchers has developed a method for mining the text of doctors’ notes to identify adverse reactions from prescription drugs. The technique could spot problems years before the… Read more »
New research suggests that a phenomenon called biased assimilation makes people view new, inconclusive evidence in ways that support existing biases, leading to increased polarization on topics such as politics or… Read more »
A new research paper shows just how easy it is to identify individuals based on supposedly anonymous mobile-phone data, and this isn’t the first time supposedly anonymous data really wasn’t. But… Read more »
Two Indiana University researchers have developed a computer model they say can identify significantly better and less-expensive treatments than can doctors acting alone. It’s just the latest evidence that big data… Read more »
A group of researchers from an Israeli university used data from Waze to determine the country’s most-accident-prone areas and how they correlate, or not, with a notable police presence. It’s just… Read more »
In the latest case of researchers using the cloud for good, Google is highlighting the six projects to which it awarded grants via its Exacycle for Visiting Faculty program. Ranging from… Read more »
A group of British researchers recently analyzed 2.5 million newspaper articles in order to prove that new data analysis techniques, such as machine learning and natural-language processing, can accurately classify media… Read more »
A new research paper from Google highlights the importance of big data in creating consumer-friendly services such as voice search on smartphones. More data helps train smarter models, which can then… Read more »
A team of Swiss researchers thinks it has created an algorithm capable of tracking almost anything — from computer viruses to terrorist attacks to epidemics — back to the source using… Read more »