Google Dependence: An Unintended Consequence

April 23, 2015

I read “Study: Googling Gives You an Inflated Sense of Your Own Intelligence.” Let’s assume that the data are statistically significant and good enough to earn the researchers a high mark in Psych 200.

The article reports that Yale University researchers learned that:

The people who had used search engines to look up the answers in the first part of the experiment rated their abilities higher than the people who were given text. In other words, the act of searching the internet made people believe they knew more about everything.

The write up points out:

“If you don’t know the answer to a question, it’s very apparent to you that you don’t know, and it takes time and effort to find the answer,” Matthew Fischer, one of the researchers, told the American Psychological Association. “With the internet, the lines become blurry between what you know and what you think you know.”

I mentioned to a former Gartner consultant that the issue of “you don’t know what you don’t know” is one that leads to some interesting decisions. These range from licensing an enterprise search system and then discovering that users cannot find their documents to investing tens of thousands in a Web site redesign only to discover that Google’s crawler down checks the site because it is not mobile friendly.

You may have your own “you don’t know what you don’t know moment.” I suppose one could search Google and just accept what the ad oracle delivers. On the other hand, one can just guess. I am not sure how many knowledge workers want to do the old fashioned, “learn the hard way” type work. Maybe it is better to ask a Windows Phone? That works really well.

Stephen E Arnold, April 23, 2015

Social Network Demographics by the Numbers

April 23, 2015

The amount of social networking Web sites and their purposes is as diverse as the human population.  Arguably, if you were to use each of the most popular networks and try to keep on top of every piece of information that filters through the feed, one twenty-four hour day would not be enough.

With social media becoming more ingrained in daily life, it makes one wonder who is using what network and for what purpose.  Business Insider discusses a recent BI Intelligence about social media demographics in the article: “Revealed: A Breakdown Of The Demographics For Each Of The Social Networks.”  Here are some of the facts: Facebook is still mostly female and remains the top network.  Twitter leans heavier on the male demographic, while YouTube reaches more adults in 18-34 demographic than cable TV.  Instagram is considered the most important of teenage social networks, but Snapchat has the widest appeal amongst the younger crowd.  This is the most important for professionals:

LinkedIn is actually more popular than Twitter among U.S. adults. LinkedIn’s core demographic are those aged between 30 and 49, i.e. those in the prime of their career-rising years. Not surprisingly, LinkedIn also has a pronounced skew toward well-educated users.”

Facebook still reigns supreme and pictures are popular with the younger sect, while professionals all tend to co-mingle in their LinkedIn area.  Surprising and not so revealing information, but still interesting for the data junkie.  We wonder how social media will change in the coming year?

Whitney Grace, April 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Ignoring Search Updates are a Security Risk

April 23, 2015

Searching is an essential function for basic Internet use and it is a vital function in enterprise systems.  While searching on the Internet with a search engine might not seem like a security risk, the comparable action on enterprise search could be potentially dangerous.  Security Enterprises points out the potential security risks in the article, “SearchBlox Vulnerabilities Underscore Importance Of Updating Enterprise Search Tools.”

Recently the Carnegie Mellon Software Engineering Institute CERT Division compiled a list of all the security risks from SearchBlox’s software.  They included ways for hackers to view private information, upload files, cross-site (XSS) scripting, and cross-site request forgeries.  Enterprise security developers can learn from SearchBlox’s vulnerabilities by being aware and repairing them before a hacker discovers the information leak.

The problem, however, might come from within an organization rather than out:

“Of all the possible threats, the ability for cybercriminals to conduct XSS attacks from within the product’s default search box is likely the most concerning, Threatpost reported. On the other hand, anyone trying to take advantage of such SearchBlox vulnerabilities would need to be an authenticated user, though there is no shortage of stories about insider threats within the enterprise.”

The article alludes that SearchBlox’s vulnerabilities came from day-to-day activities that keep an organization running.  Using SearchBlox as an example, other organizations with enterprise systems will be able to learn where their own products need patches so the same issues don’t happen with them.  So what do you take away: most hackers are probably insiders and look for holes in the ordinary, everyday routines.

Whitney Grace, April 23, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Stalled SharePoint Deployments Do Not Deter Adoption

April 23, 2015

Despite SharePoint’s broad adoption, it suffers from a perceived lack of user commitment. So it becomes a paradox that it is one of the fastest growing software options ever, and shows no signs of slowing down. CMS Wire tells us more in their article, “Businesses Committed to SharePoint, Despite Stalled Deployments.”

The article begins:

“It is little surprise then, that in a recent AIIM survey of 422 organizations respondents described their SharePoint projects as stalled (26 percent) or just not meeting expectations (37 percent). Inadequate user training and a general lack of planning, investment and expertise were the main reason given for this malaise. And the recent talk about how Office365 and cloud fit in with SharePoint has further muddied the waters. And yet support for SharePoint remains strong.”

In recent news, Microsoft has pushed the general availability of SharePoint Server 2016 back. Combine these release delays with the local delays organizations face regarding customization, investment, and expertise, and most deployments face an uphill battle. For most users and managers, staying in touch with the latest news is essential. Stephen E. Arnold of ArnoldIT.com offers an efficient newsfeed regarding all things search. His SharePoint feed is an efficient way to keep an eye on news, tips, tricks, and workarounds that impact all aspects of SharePoint use.

Emily Rae Aldridge, April 23, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Search Updates and Security Issues

April 22, 2015

Searching is an essential function for basic Internet use and it is a vital function in enterprise systems. While searching on the Internet with a search engine might not seem like a security risk, the comparable action on enterprise search could be potentially dangerous. Security Enterprises points out the potential security risks in the article, “SearchBlox Vulnerabilities Underscore Importance Of Updating Enterprise Search Tools.”

Recently the Carnegie Mellon Software Engineering Institute CERT Division compiled a list of all the security risks from SearchBlox’s software. They included ways for hackers to view private information, upload files, cross-site (XSS) scripting, and cross-site request forgeries. Enterprise security developers can learn from SearchBlox’s vulnerabilities by being aware and repairing them before a hacker discovers the information leak.

The problem, however, might come from within an organization rather than out:

“Of all the possible threats, the ability for cybercriminals to conduct XSS attacks from within the product’s default search box is likely the most concerning, Threatpost reported. On the other hand, anyone trying to take advantage of such SearchBlox vulnerabilities would need to be an authenticated user, though there is no shortage of stories about insider threats within the enterprise.”

The article alludes that SearchBlox’s vulnerabilities came from day-to-day activities that keep an organization running. Using SearchBlox as an example, other organizations with enterprise systems will be able to learn where their own products need patches so the same issues don’t happen with them. So what do you take away: most hackers are probably insiders and look for holes in the ordinary, everyday routines.

Whitney Grace, April 1, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBM: QRadar Update

April 22, 2015

I read “IBM builds QRadar Security Intelligence in the Cloud.” The write up presents a new IBM service. I checked my files and the “new” service seems to be based on a 2009 acquisition’s capabilities. I did not include IBM in my CyberOSINT monograph because it struck me as lagging behind Cyveillance and several other outfits’ offerings. I did have one question after reading the article: Does the system trap buzzword anomalies like this one:

This is also powered by IBM QRadar technology, and uses analytics and a hosted, multi-tenant technology to integrate with existing infrastructure, working with real-time correlation and anomaly detection capabilities.

Stephen E Arnold, April 22, 2015

Second CyberOSINT Video Available

April 22, 2015

Xenky.com posted the second part of its interview with Stephen E Arnold. You can view CyberOSINT 2: The Information Factory via YouTube.

Kenny Toth, April 22, 2015

Real Journalism: Be Proud of Professionalism

April 22, 2015

I read “Murdoch’s Circle: The News International Scandal.” graphic is interesting, but it is not the easiest way to get the information. Nevertheless, if you are a fan of “real” journalism, you may find the write up interesting. The yellow icon with the exclamation point means that the real journalism operators in the Murdoch circle have been charged with a legal hoop de do. The red icon with the big “G” in the center means the real journalist or employee of the Murdoch outfit has been found guilty. If you just want to see who has been arrested, the graphic is interactive. Inspiring, is it not? I am just a lowly blogger living in Harrod’s Creek. One reader of my content suggested I took a condescending tone to some younger professionals. No kidding? I thought I included some mocking honks too. No real journalist am I. Sniffle.

Stephen E Arnold, April 22, 2015

The Elusive Video Recognition

April 22, 2015

Pictures and video still remain a challenge for companies like Google, Facebook, Apple, and more.  These companies want to be able to have an algorithm pick up on the video or picture’s content without relying on tags or a description.  The reasons are that tags are sometimes vague or downright incorrect about the content.  VentureBeat reports that Google has invested a lot of funds and energy in a deep learning AI.  The article is called “Watch Google’s Latest Deep Learning System Recognize Sports In YouTube Clips.”

The AI is park of a neural network that is constantly fed data and programmed to make predictions off the received content.  Google’s researchers fed their AI consists of a convolutional neural network and it was tasked with watching sports videos to learn how to recognize objects and motions.

The researchers learned something and wrote a paper about it:

“ ‘We conclude by observing that although very different in concept, the max-pooling and the recurrent neural network methods perform similarly when using both images and optical flow,’ Google software engineers George Toderici and Sudheendra Vijayanarasimhan wrote in a blog post today on their work, which will be presented at the Computer Vision and Pattern Recognition conference in Boston in June.”

In short, Google is on its way to making video and images recognizable with neural networks.  Can it tell the differences between colors, animals, people, gender, and activities yet?

Whitney Grace, April 22, 2015

Stephen E Arnold, Publisher of CyberOSINT at www.xenky.com

Oracle Challenges HP Autonomy Service

April 22, 2015

The article titled Oracle Adds Big Data Integration Tool To Streamline Hadoop Deployments on Silicon Angle discusses the news from Oracle that follows its determination that putting the right tools before users is the only way to allow for success. The Data Integrator for Big Data is meant to create more opportunities to pull data from multiple repositories by treating them the same. The article states,

“It’s an important step the company insists, because Big Data tools like Hadoop and Spark use languages like Java and Python, making them more suitable for programmers rather than database admins (DBAs). But the company argues that most enterprise data analysis is carried out by DBAs and ETL experts, using tools like SQL. Oracle’s Big Data integrator therefore makes any non-Hadoop developer “instantly productive” on Hadoop, added Pollock in an interview with PC World.”

Pollock also spoke to Oracle’s progress, claiming that they are the only company with the capability to generate Hive, Pig and Spark transformations from a solitary mapping. For customers, this means not needing to know how to code in multiple programming languages. HP is also making strides in this line of work with the recent unveiling of the software that integrates Vertica with HP Autonomy IDOL. Excitement ahead!

Chelsea Kerwin, April 22, 2014

Stephen E Arnold, Publisher of CyberOSINT at www.xenky.com

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta