Trump and Tech: A Question and My Answer

December 18, 2016

I read “So What Attracted Tech Bosses to the Billionaire President-Elect Donald Trump?” The several hundred word write up tackles an obvious question. There is one answer:

Power.

Why use so many words to answer the question? My thoughts:

  1. Author is paid to produce a certain number of words. A one word real journalistic write up is not acceptable.
  2. Author wants to trot out some cute Trumpies; for example, trumpelthinskin
  3. Author wants to amplify the reasons to include greed and money.

Nope. Power. When I was a wee lad, I lived in Washington, DC. When I was a bit older I was detailed to “assist” the elected official who was the chair of the then Joint Committee on Atomic Energy. A bit later I fumbled around on a White House job. Some call it Potomac fever.

Take it from me: Power. One word. The answer. I did like the begging for dollars tack on too.

Stephen E Arnold, December 18, 2016

Creativity for Search Vendors

December 18, 2016

If you scan the marketing collateral from now defunct search giants like Convera, DR LINK, Fulcrum Technologies or similar extinct beasties, you will notice a similarity of features and functions. Let’s face it. Search and retrieval has been stuck in the mud for decades. Some wizards point to the revolution of voice search, emoji based queries, and smart software which knows what you want before you know you need some information.

Typing key words, indexing systems which add concept labels, and shouting at a mobile phone whilst standing between cars on a speeding train returns semi-useful links to what amount to homework: Open link, scan for needed info, close link, and do it again.

Image result for eureka california

Eureka, California is easy to find. Get inspired.

Now there is a solution to search and content processing vendors’ inability to be creative. These methods appear to fuel the fanciful flights of fancy emanating from predictive analytics, Big Data, and semantic search companies.

Navigate to “8 Tried-and-Tested Ways to Unlock Your Creativity.” Now you too can emulate the breakthroughs, insights, and juxtapositions of Leonardo, Einstein, Mozart, and, of course, Facebook’s design team.

Let’s take a look at these 10 ideas.

  1. Set up a moodboard. I have zero idea what a moodboard is. I am not sure it would fit into the work methods of Beethoven. He seemed a bit volatile and prone to “bad” moods.
  2. Talk it out. That’s a great idea for companies engaged in classified projects for nation states. Why not have those conversations in a coffee shop or better yet on an airplane with strangers sitting cheek by jowl.
  3. Brainstorming. My recollectioin of brainstorming is that it can be fun, but without one person who doesn’t get with the program, the “ideas” are often like recycled plastic bottles. Not always, of course. But the donuts can be a motivator.
  4. Mindmapping. Yep, diagrams. These are helpful, particularly when equations are included for the home economics and failed webmasters who wrangle a job at a search or cotnent processing vendor. What’s that pitchfork looking thing mean?
  5. Doodling. Works great. The use of paper and pencils is popular. One can use a Microsoft Surface or a giant iPad thing. Profilers and psychologists enjoy doodles. Venture capitalists who invested in a search and content processing company often sketch some what dark images.
  6. Music. Forget that Mozart and fighter pilot stuff. Go for Gregorian chants, heavy metal, and mindfulness tunes. Here in Harrod’s Creek, we love Muzak featuring the Whites and John Lomax.
  7. Lucid dreaming. This idea is popular among some of the visionaries working at high profile Sillycon Valley companies. Loon balloons, solar powered Internet aircraft, and trips to Mars. Apply that thinking to search and what do you get? Tay, search by sketch, and smart maps which identify pizza joints.
  8. Imagine what a great innovator would do. That works. People sitting on a sofa playing a video game can innovate between button pushes.

Why are search and cotnent processing vendors more creative? Now these folks can go in new directions armed with these tips and the same eight or nine algorithms in wide use. Peak search? Not by a country mile.

Stephen E Arnold, December 18, 2016

Ricochet Software Empowers Whistleblowers to Message Journalists Securely and Anonymously

December 18, 2016

The article titled Ricochet Uses Power of the Dark Web to Help Journalists, Sources Dodge Metadata Laws on The Age announces the completion of a formal security audit that gives would-be users of the software the go-ahead. Ricochet is secure messaging resource intended to enable whistleblowers and human rights activists to communicate with journalists without fear of being exposed. The article explains,

Ricochet… would be able to deliver a level of security and anonymity that isn’t possible with current messaging software, including Wickr — the self-destructing message platform… “The key difference between Ricochet and anything else that’s out there is that it does not use a server. It uses the same technology that ran Silk Road, it uses dark web technology,” Mr Gray said, referring to the notorious online black on which drug dealers thrived until the FBI shut it down in November 2014.

The article does address concerns that software such as this might be useful to terrorist operations in addition to its stated purpose. The makers point out that Ricochet is designed for one-on-one communication, which is not very appealing to the terrorists who have been more focused on reaching many people to coordinate their activities. At the same time, they accept that it might be used by a criminal element and state that such uses don’t negate the positive potential of the software.

Chelsea Kerwin, December 18, 2016

Gallup Survey Shows American Faith in Almost All Institutions Waning Except Military

December 17, 2016

The article on The Washington Examiner titled Fishwrap: Confidence in Newspapers, TV News Hits Bottom relays a Gallup survey that shows Americans trust in media slipping to a new low. The focus of the survey was general loss of confidence in various institutions such as churches, banks, big business, and Congress. The article translates the findings,

Overall, said Gallup’s analysis, “Confidence in banks — which took a hit amid the bursting housing bubble in 2007 and 2008, and dropped further after the ensuing financial crisis — fell the most, plunging from 49% in 2006 to 27% now. Confidence in organized religion, which has felt the effects of the scandals enveloping the Catholic Church, dropped from 52% to 41%, one point below last year’s previous low of 42%.

TV news, print news, and Congress saw the greatest falls of about 10%, perhaps unsurprisingly given the lackluster diplomatic skills of our current Congress and the outright failure of the media to properly vet and address the presumptive Republican nominee. Interestingly, the scandals involving General Petraeus as well as those surrounding the military’s failure to manage sexual assault of its female members over the last few years have done nothing to diminish that institution in the eyes of the public. It stands solid and unshakeable at 73%.

Chelsea Kerwin, December 17, 2016

Yahoot: A Master of Disaster Management

December 16, 2016

I have a Yahoot (sorry, I meant Yahoo) email account. I have refused to change the password in order to see what nefarious behaviors manifest themselves. So far, the only bad guys in the picture are Yahoot’s merrie band of wizards, lead by the Purple Privacy Eater, Marissa Mayer. Ms. Mayer was a Xoogler. Now I am able to paint a mental picture about why she left Googzilla for the outfit Terry Semel tried to convert to a media company. Prescient guy. Get out of online. Do sitcoms.

disaster master

I read “Verizon Demands a Better Deal After Yahoo’s Latest Historic Hack.” The main idea of that write up is that the former Baby Bell wants to do the Trump thing: A better deal. That seems reasonable. Yahoo managed to fumble the security ball, delivering an alleged one billion customers’ details to alleged bad actors. There are even “real” journalists who allege that the Yahooligans’ secrets are for sale on the Dark Web.

And what personal data slipped through the former Googler’s fingers? The write up knows and, therefore, reported:

Yahoo said late on Wednesday [December 14, 2016] that it had uncovered a 2013 cyber attack that compromised data of more than 1 billion user accounts, the largest known breach on record. It said the data stolen may have included names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

Fortune, whose journalists do not surf the Dark Web like the clever folks at the New York Times, used “real” journalistic methods and revealed:

Verizon is said to have threatened to go to court to get out of the deal if it is not repriced.

There you go. Verizon may be rethinking its clever move to buy the Purple Haze machine for about $5 billion. Knock the price down, and maybe the Baby Bell will [a] ante up some cash, [b]  replace the Xoogler with a person who can keep Yahoot from becoming more of a master of disaster than it is, and [c] blend the wizardry of AOL with the Yahooligans’ approach to technology. In my 73 years, I have not previously witnessed the rubble-ization of a publicly traded Sillycon Valley company in quite this way. Business school case study? For sure.

The real news outfit’s write up adds:

The U.S. No. 1 wireless carrier still expects to go through with the deal, but is looking for “major concessions” in light of the most recent breach, according to another person familiar with the situation.

Will Yahoo enter the online security business? The company now has mind share. Governance? Exemplary management team? Technical chops? That’s a $5 billion dollar question from a company that spurned Microsoft’s even more robust offer. Right, the same outfit which fumbled the pay to play for traffic business. Right now Terry Semel looks like a managerial paragon.

Yahoooot!

Stephen E Arnold, December 16, 2016

Cacaphones: A Chapbook for the Cursory Consultant

December 16, 2016

I came across a post consisting of images from a mid tier consulting firm. You know. Mid tier, an azure chip consulting firm. This type of firm is distinct from blue-chip consulting firms like McKinsey, BCG, the “old”, pre spin out Snowden Booz, Allen & Hamilton. Those folks. Another generation’s Google.

You can find (for now) the collection of images at this link. The person posting this link will probably not get hired at the azure chip, mid tier outfit who cooked up the images in “Every Gartner Hype Cycle for Emerging Technologies Since 2000.” That works out to 16 years of “cacaphones”; that is, words which are an emission of jargon, buzzwords, and argot designed to help sell consulting work that benefits consultants.

The blue chip outfits mostly stick with the crazy lingo of MBAs, lawyers, accountants, and engineers who know who Milton and Whitman are.

Here’s a run down by year of the cacaphones. How many of these do you use? How many of these can you define even if you bandy the cacaphones around in meetings, at conferences, or at your favorite Starbuck’s?

Year 2000 Cacaphones (n=20 spoor)

3-D Web
Active Server Pages
Audio mining
Biometrics
Bluetooth
DSL/Cable modems
Digital ink
Enterprise portals
Java language
Jini
Micropayments
Quantum computing
Smart cards
Speech recognition
Synthetic characters
Voice over IP
Voice portals
WAP/Wireless Web
Webtops
XML

Year 2001 Cacaphones (n=19 spoor)

Active server pages
B2B e markets
B2C e business
Bluetooth
Digital signatures
Enterprise instant messaging
Enterprise portals
Head mounted displays
M commerce
PDA phones
Peer to peer
Personal fuel cells
Semantic Web
Synthetic characters
Voice over IP
Web services
Wireless LANs/802.11
Wireless Web/WAP
e payments

Year 2002 Cacaphones (n=21 spoor)

Biometrics
Bluetooth
E payments
E tags
Grid computing
Identity services
Location sensing
Nanocomputing
Natural language search
Peer to peer computing
Personal digital assistant phones
Personal fuel cells
Public key infrastructure
Speech recognition in call centers
Speech recognition on desktops
Text to speech
Virtual private networks
Voice over IP
WAP/Wireless Web
Web services
Wireless LANs/802.11

Year 2003 Cacaphones (n=24  spoor): The Year of the Portal

Advanced Web services in portals
Advanced integration in portals
Basic Web services support in portals
Basic search
Business process fusion
Contextual personalization
Federated portals across vendor families
Federated portals within vendor families
Integrated collaboration
Integrated content management
JSR170
Mobile access to portals
Open source portals
Personal work portals
Portal fabric
Portal ubiquity
Portlets
Process portals
Roll based personalization
SES (possibly the Korean girl musical group)
Virtual content repositories
WSRP and JSR 168
XML based multichannel output and interaction

Year 2004 Cacaphones (n=32 spoor): Revenge of the Portal

Advanced Web services in portals
Advanced integration in portals
Application platform suites
Basic Web services support in portals
Basic search
Business process fusion
Contextual personalization
Desktop portals
Federated portals across vendor families
Federated portals within vendor families
Hosted portals
Integrated collaboration
Integrated content management
Integrated open source content management
JSR168 (a portlet catalog)
JSR170 (content repository)
Micro portals
Mobile access to portals
Offline portals
Open source higher education portals
Open source horizontal portals
Portal fabric
Portal ubiquity
Portlets
Process portals
Rich client portals
Role based personalization
Smart enterpriser suites (maybe the 2003 SES?)
Syndication
Virtual content repositories
Web services for remote portals
XML based multichannel output and interaction

Year 2005 Cacaphones (n=41 spoor): A Bountiful Year of Caca

4G
902.16 2004 Worldwide inter operability for  microwave access
Augmented reality
Biometric identity documents
Biometric user identification
Business process management suites
Business process networks
Business rule engines
Carbon nanotubes
Corporate Semantic Web
Corporate blogging
DNA logic
Desktop search (what?)
Electronic ink/digital paper
Handwriting recognition
Inkjet manufacturing
Internal Web services
Internet micropayments
Linux on desktop for mainstream business users
Location aware applications
Mesh networks Senor
Micro fuel cells (no longer personal)
Model drive approaches
Networked collective intelligence
Organic light emitting devices
Peer to peer VoIP
Podcasting
Prediction markets
Quantum computing
RFID (passive)
Really simple syndication
Services oriented architecture
Software as a Service
Speech recognition for telephony and call centers
Tablet PC
Text mining
Text to speech speech synthesis
Trusted computing group
Videoconferencing
VoIP (listed twice in the 2005 hype cycle)
XBRL

Year 2006 Cacaphones (n=32 spoor): A Year for Remembering Quantum Computing

Augmented reality
Biometric payments
Collective intelligence
Corporate blogging
Corporate Semantic Web
DNA logic
Digital paper/e paper
Enterprise instant messaging
Event driven architecture
Folksonomies
IPv6
Internal Web servicers
Location aware applications
Location aware technology
Mashup
Mesh networks: sensor
Model driven architectures
Offline Ajax
Prediction markets
Quantum computing
RFID
RSS enterprise
Smartphone
Social network analysis
Speech recognition for mobile devices
Speech to speech translation
Tablet PC Mobile phone payments
Telepresence
Tera-architectures
VoIP
Web 2.0
Wikis

Year 2007 Cacaphones (n=34 spoor): VoIP and Digital Fiesta

Bluetooth in automobiles
Broadband video on demand
Consumer telematics
Digital TV (cable and satellite)
Digital terrestrial TV
Digital video recorders
Digital video broadcasting–handheld
Fixed mobile converged voice service
HD Radio
HD optical disc players
HDTV displays
Household Wi-Fi
IPTV
Interactive TV
Legal file sharing / legitimate P2P
Micro projectors
Media distribution via game consoles
Mobile TV broadcasting
Mobile TV streaming
Mobile video on demand
Network DVR
Next generation satellite
OLED TVs
Online game consoles
PC based media center
Portable media players
Portable personality
Residential VoIP
Ultra mobile devices
Video on demand
Video chat over IP
Wire line home networking (coaxial and power line)
Widgets
Wire line home networking / dedicated Ethernet wiring

Year 2008 Cacaphones (n=27 spoor): The Hardware Influence

3D printing
Augmented reality
Basic Web services (Yep, basic)
Behavioral economics
Cloud computing
Context delivery architecture
Corporate blogging
Electronic paper
Erasable paper printing systems (Huh?)
Green IT
Idea management
Location aware applications
Micro blogging
Mobile robots
Public virtual worlds (Oh, boy)
RFID (case/pallet)
Service oriented architecture
Service oriented business applications
Social computing platforms
Social network analysis
Solid state drives
Surface computers (A mid tier person talked to Microsoft)
Tablet PC
Video telepresence
Virtual assistants
Web 2.0
Wikis

Year 2009 Cacaphones (n=35 spoor): Some Weird Stuff

3-D flat panel displays
3-D printing
Augmented reality
Behavioral economics (Someone took a night school course)
Cloud computing
Context delivery architecture
Corporate blogging
Developed markets (What?)
E book readers
Electronic paper
Green IT
Home health monitoring
Human augmentation
Idea management (What?)
Internet TV
Location aware applications
Mesh networks: sensor
Micro blogging
Mobile robots
Online video
Over the air mobile phone payment systems
Public virtual worlds
Quantum computing (Yippy. Back on the list)
RFID (case/pallet)
Services oriented architecture
Social network analysis
Social software suites (Huh?)
Speech recognition
Surface computers (Go, Microsoft)
Tablet PC
Video search (Discovering YouTube and Google Video search perchance)
Video telepresence
Web 2.0
Wikis
Wireless power

Year 2010 Cacaphones (n=32 spoor):The Début of Extreme

3D flat panel TVs and displays
3D printing Speech to speech translation
4G standard
Activity streams
Augmented reality
Autonomous vehicles
Biometric authentication methods
Broadband over power lines
Cloud computing
Cloud/Web platforms
Computer brain interface
Consumer generated media
Context delivery architecture
E book readers
Extreme transaction processing
Gesture recognition
Human augmentations
Idea management (round  up those puppies, partner)
Interactive TV
Internet TV
Internet micropayment systems
Location aware applications
Media tablet
Mesh networks sensor
Micro blogging
Mobile application store
Mobile robots
Pen centric tablet PCs
Predictive analytics
Private cloud computing
Public virtual worlds
Social analytics
Speech recognition
Tangible user interfaces
Terahertz waves
Video search (again!)
Video telepresence
Virtual assistants
Wireless power

Year 2011 Cacaphones (n=41 spoor): A Year in Recycling

3D bio printing
3D printing
Activity streams
Augmented reality
Big Data and extreme processing and management
Biometric authentication  methods
Cloud / Web platforms
Cloud computing
Computer brain interface
Context enriched services
E book readers (hello, Kindle)
Gamification
Gesture recognition
Group buying
Hosted virtual desktops
Human augmentation
Idea management
Image recognition
In memory database management systems
Internet TV
Internet of things
Location aware applications
Machine to machine communication services (ah, ha, a network)
Media table
Mesh networks sensor
Mobile application stores
Mobile robots
NFC payment
Natural language question answering
Predictive analytics
Private cloud computing
QR /color code consumerization
Quantum computing (it’s back again)
Social TV
Social analytics
Speech recognition
Speech to speech translation
Video analytics for customer services
Virtual assistants
Virtual worlds
Wireless power

Year 2012 Cacaphones (n=44 spoor): The Kitchen Sink Era

3D bio printing
3D printing
3D scanners
Activity streams
Application stores
Audio mining / speech analytics
Augmented reality
Automatic content recognition (Huh?)
Autonomous vehicles
Big Data (at last!)
Biometric authentication methods
Bring your own device
Cloud computing
Complex event processing
Consumer telematics
Consumerization
Crowdsourcing
Gamification
Gesture control
HTML5
Home health monitoring
Hosted virtual desktops
Human augmentation
Hybrid cloud computing
Idea management
In memory analytics
In memory database management systems
Internet of things
Machine to machine communication services
Media tablets
Mobile over the air payments
Mobile robots
NFC payment
Natural language question answering
Predictive analytics
Private cloud computing
Quantum computing (a familiar emerging technology)
Silicon anode batteries
Social analytics
Speech recognition
Speech to speech translation
Text analytics
Virtual worlds
Volumetric and holographic displays
Wireless power

Year 2013 Cacaphones (n=43 spoor): Losing the Familiar

3D bio printing
3D scanners
Activity streams
Affective computing
Augmented reality
Autonomous vehicles
Big Data
Bio acoustic sensing
Bio metric authentication methods
Bio chips
Brain computer interface
Cloud computing
Consumer 3D printing
Consumer telematics
Complex event processing
Content analytics
Electro vibration
Enterprise 3D printing
Gamification
Gesture control
Human augmentation
In memory analytics
In memory database management systems
Internet of things
Location intelligence
Machine to machine communication services
Mesh networks sensor
Mobile health monitoring
Mobile robots
Natural Language question answering
Neuro business (huh?)
Near field communication
Predictive analytics (a perennial favorite)
Prescriptive analytics
Quantified self (huh?)
Quantum computing (still an innovation trigger)
Smart dust
Speech recognition
Speech to speech translation
Virtual assistants
Virtual reality
Volumetric and holographic displays
Wearable user interfaces

Year 2014 Cacaphones (n=43 spoor):Time for Affective Computing

3D bio printing systems
3D scanners
Activity streams
Affective computing
Augmented reality
Autonomous vehicles
Big Data
Bio acoustic sensing
Biochips
Brain computer interface
Cloud computing
Complex event processing
Connected home
Consumer 3D printing
Consumer telematics
Content analytics (new jargon for the old jargon text analytics?)
Crypto currencies (the consultants discover Bitcoin)
Data science
Digital security (at last, security)
Enterprise 3D printing
Gamification
Gesture control
Human augmentation
Hybrid cloud computing
In memory analytics
In memory database management systems
Internet of things
Machine to machine communication services
Mobile health monitoring
Natural language question answering
Near field communications
Neuro business
Prescriptive analytics (do what the math says, Mary)
Quantum computing (still an innovation trigger)
Smart advisors
Smart robots (mobile robots have disappeared it seems)
Software defined anything (anything?)
Speech recognition
Speech to speech translation
Virtual personal assistants
Virtual reality
Volumetric and holographic displays
Wearable user interfaces

Year 2015 Cacaphones (n=37 spoor): Not Much Neuro Creativity Evident

3D bio printing systems for organ transplant
Advanced analytics with self service delivery
Affective computing
Augmented reality
Autonomous field vehicles (Isn’t this autonomous vehicles?)
Autonomous vehicles
Bio acoustic sensing
Biochips
Brain computer interface
Citizen data science
Connected home
Consumer 3D printing
Crypto currencies
Crypto currency exchange
Digital dexterity
Digital security
Enterprise 3D printing
Gesture control
Human augmentation
Hybrid cloud computing
Internet of Things
Internet of things platform
Machine learning (finally!)
Micro data centers
Natural language question answering
Neuro business
People literate technology (A first timer)
Quantum computing (still with us)
Smart advisors (who wants a stupid advisor?)
Smart dust
Smart robots
Software defined security (a variation on software defined anything)
Speech to speech translation
Virtual personal assistants
Virtual reality
Volumetric displays
Wearable

Year 2016 Cacaphones (n=33 spoor): Lots of “Smart”

4D printing (another dimension?)
802.11ax
Affective computing (More emotion in that silicon)
Augmented reality (Remember Google Glass)
Autonomous vehicles
Blockchain (A first timer)
Brain computer interface
Cognitive expert advisors
Commercial UAV drones (Go, Amazon)
Connected home
Context brokering (love that context word)
Conversational user interfaces
Data broker Platform as a Service or dbrPssS
Enterprise taxonomy and ontology management (Huh?)
General purpose machine intelligence (Wow!)
Gesture control devices
Internet of Things platform
Machine learning
Micro data centers
Nanotube electronics
Natural language question answering
Neuro morphic hardware (Huh?)
Personal analytics
Quantum computing (Plugging along)
Smart data discovery (Opposite of stupid data discovery?)
Smart dust
Smart robots
Smart workspace
Software defined security
Software defined anything, now SDx
Virtual personal assistants
Virtual reality
Volumetric displays.

Here’s a list of the cacaphones, deduplicated, in alphabetical order:

3-D Web
3-D flat panel displays
3-D printing
3D bio printing
3D flat panel TVs and displays
3D scanners
4D printing (another dimension?)
4G
4G standard
802.11ax
902.16
Active server pages
Activity streams
Advanced Web services in portals
Advanced analytics with self service delivery
Advanced integration in portals
Affective computing
Application platform suites
Application stores
Audio mining
Augmented reality
Automatic content recognition (Huh?)
Autonomous field vehicles
Autonomous vehicles
B2B e markets
B2C e business
Basic Web services
Basic Web services support in portals
Basic search
Behavioral economics
Big Data
Bio acoustic sensing
Biochips
Bio metric authentication  methods
Bio metric identity documents
Bio metric payments
Bio metric user identification
Bio metrics
Blockchain (A first timer)
Bluetooth
Bluetooth in automobiles
Brain computer interface
Bring your own device. BYOB
Broadband over power lines
Broadband video on demand
Business process fusion
Business process management suites
Business process networks
Business rule engines
Carbon nanotubes
Citizen data science
Cloud / Web platforms
Cloud computing
Cloud/Web platforms
Cognitive expert advisers
Collective intelligence
Commercial UAV drones (Go, Amazon)
Complex event processing
Computer brain interface
Connected home
Consumer 3D printing
Consumer generated media
Consumer telematics
Consumerization
Content analytics
Context brokering
Context delivery architecture
Context enriched services
Contextual personalization
Conversational user interfaces
Corporate Semantic Web
Corporate blogging
Crowdsourcing
Crypto currencies
DNA logic
DSL/Cable modems
Data broker Platform as a Service or dbrPssS
Data science
Desktop portals
Desktop search
Developed markets
Digital TV (cable and satellite)
Digital dexterity
Digital ink
Digital paper
Digital security
Digital signatures
Digital terrestrial TV
Digital video recorders
Digital video broadcasting–handheld
E book readers
E payments
E tags
Electronic ink
Electronic paper
Electro vibration
Enterprise 3D printing
Enterprise instant messaging
Enterprise portals
Enterprise taxonomy and ontology management
Erasable paper printing systems
Event driven architecture
Extreme processing
Extreme transaction processing
Federated portals across vendor families
Fixed mobile converged voice service
Folksonomies
Gamification
General purpose machine intelligence (Wow!)
Gesture control devices
Gesture recognition
Green IT
Grid computing
Group buying
HD Radio
HD optical disc players
HDTV displays
HTML5
Handwriting recognition
Head mounted displays
Home health monitoring
Hosted portals
Hosted virtual desktops
Household Wi-Fi
Human augmentation
Hybrid cloud computing
IPTV
IPv6
Idea management
Identity survives
Image recognition
In memory analytics
In memory database management systems
Ink jet manufacturing
Integrated collaboration
Integrated content management
Integrated open source content management
Interactive TV
Internal Web services
Internet TV
Internet micro payment systems
Internet micro payments
Internet of Things
Internet of Things platform
JSR168 (a portlet catalog)
JSR170 (content repository)
Java language
Jini
Legal file sharing / legitimate P2P
Linux on desktop for mainstream business users
Location aware applications
Location intelligence
Location sensing
M commerce
Machine learning
Machine to machine communication services
Mash up
Media distribution via game consoles
Media tablets
Mesh networks sensor
Micro data centers
Micro fuel cells
Micro portals
Micro blogging
Micro payments
Micro projectors
Mobile TV broadcasting
Mobile TV streaming
Mobile access to portals
Mobile application store
Bio metric authentication methods
Mobile application stores
Mobile health monitoring
Mobile over the air payments
Mobile robots
Mobile video on demand
Model drive approaches
Model driven architectures
NFC payment
Nanocomputing
Nanotube electronics
Natural language question answering
Natural language search
Near field communications
Network DVR
Networked collective intelligence
Neuro business
Neuro morphic hardware (Huh?)
Neuro business (huh?)
Next generation satellite
OLED TVs
Offline Ajax
Offline portals
Online game consoles
Online video
Open source higher education portals
Open source horizontal portals
Open source portals
Organic light emitting devices
Over the air mobile phone payment systems
PC based media center
PDA phones
Peer to peer
Peer to peer VoIP
Peer to peer computing
Pen centric tablet PCs
People literate technology (A first timer)
Personal analytics
Personal digital assistant phones
Personal fuel cells
Personal work portals
Podcasting
Portable media players
Portable personality
Portal fabric
Portal ubiquity
Portlets
Prediction markets
Predictive analytics
Prescriptive analytics
Private cloud computing
Process portals
Public key infrastructure
Public virtual worlds
QR /color code consumerization
Quantified self (huh?)
Quantum computing
RFID
RFID (case/pallet)
RFID (passive)
RSS enterprise
Really simple syndication
Residential VoIP
Rich client portals
Role based personalization
SES (possibly the Korean girl musical group)
Semantic Web
Service oriented architecture
Service oriented business applications
Services oriented architecture
Silicon anode batteries
Smart advisers
Smart cards
Smart data discovery
Smart dust
Smart enterprise suites (maybe the 2003 SES?)
Smart robots
Smart workspace
Smart phone
Social TV
Social analytics
Social computing platforms
Social network analysis
Social software suites (Huh?)
Software defined security
Software as a Service
Software defined anything, now SDx
Software defined security (a variation on software defined anything)
Solid state drives
Speech analytics
Speech recognition
Speech recognition for mobile devices
Speech recognition for telephony and call centers
Speech recognition in call centers
Speech recognition on desktops
Speech to speech translation
Speech to speech translation
Speech to speech translation
Surface computers
Syndication
Synthetic characters
Tablet PC
Tablet PC Mobile phone payments
Tangible user interfaces
Telepresence
Tera-architectures
Tera hertz waves
Text analytics
Text mining
Text to speech
Text to speech speech synthesis
Trusted computing group
Ultra mobile devices
Video analytics for customer services
Video chat over IP
Video on demand
Video search
Video telepresence
Videoconferencing
Virtual assistants
Virtual content repositories
Virtual personal assistants
Virtual private networks
Virtual reality
Virtual worlds
VoIP
Voice over IP
Voice portals
Volumetric and holographic displays
Volumetric displays
WAP/Wireless Web
WSRP and JSR 168
Wearable
Wearable user interfaces
Web 2.0
Web services
Web services for remote portals
Webtops
Widgets
Wikis
Wireless LANs/802.11
Wireless Web/WAP
Wireless power
Wire line home networking (coaxial and power line)
Wire line home networking / dedicated Ethernet wiring
Worldwide inter operability for  microwave access (Yes!)
XBRL
XML
XML based multichannel output and interaction

Observations

  1. Each annual list is what appears to be a subjective round up of jargon. Unlike Google Trends, the lists and their relative placement on the hype graph seem subjective.
  2. Some drums are beaten loudly and for years; examples include portal (20 mentions). Other inclusions are pretty darned weird or incomprehensible; for instance, digital dexterity, quantified self, synthetic characters, electro vibration, and behavioral economics.
  3. The lists with their suggestion of what’s coming, what’s here, and what’s going out of style is obviously a marketing exercise. The give away is that collective cacaphones skew to business processes, hot hardware (real or imagined), and network services. My hypothesis is that the mid tier outfit wants to sell bread-and-butter advice along with speculation about the world of Star Wars and Star Trek.
  4. One would expect an entry to appear each year with its location adjusted to reflect the market grip of the “innovation.” That’s not the case. Items appear once like behavior economics and then disappear. I asked myself, “is this annual cacaphone graph prepared over kale and sushi in a brainstorming session with participants Googling for ideas?”

You will be able to divine the future by contemplating these alphabetical lists and doing some poetical extrapolation. Security appears in four different forms, but lags behind the burning hot subject of portlet. Apply your efforts to “neuro business” and thrive or not. By the way, I have absolutely zero idea what to do with my “quantified self” when I use “neuro morphic hardware.” Stupid, right?

Stephen E Arnold, December 16, 2016

Use Google on Itself to Search Your Personal Gmail Account

December 16, 2016

The article titled 9 Secret Google Search Tricks on Field Guide includes a shortcut to checking on your current and recent deliveries, your flight plans, and your hotels. Google provides this information by pulling keywords from your Gmail account inbox. Perhaps the best one for convenience is searching “my bills” and being reminded of upcoming payments. Of course, this won’t work for bills that you receive via snail mail. The article explains,

Google is your portal to everything out there on the World Wide Web…but also your portal to more and more of your personal stuff, from the location of your phone to the location of your Amazon delivery. If you’re signed into the Google search page, and you use other Google services, here are nine search tricks worth knowing. It probably goes without saying but just in case: only you can see these results.

Yes, search is getting easier. Trust Mother Google. She will hold all your information in her hand and you just need to ask for it. Other tricks include searching “I’ve lost my phone.” Google might not be Find My Iphone, but it can tell you the last place you had your phone, given that you phone was linked to your Google account. Hotels, Events, Photos, Google will have your back.

Chelsea Kerwin, December 16, 2016

UN Addresses Dark Web Drug Trade

December 16, 2016

Because individual nations are having spotty success fighting dark-web-based crime, the United Nations is stepping up. DeepDotWeb reports, “UN Trying to Find Methods to Stop the Dark Web Drug Trade.” The brief write-up cites the United Nation’s Office on Drugs and Crime’s (UNODC’s) latest annual report, which reveals new approaches to tackling drugs on the dark web. The article explains why law-enforcement agencies around the world have been having trouble fighting the hidden trade. Though part of the problem is technical, another is one of politics and jurisdiction. We learn:

Since most of the users use Tor and encryption technologies to remain hidden while accessing dark net marketplaces and forums, law enforcement authorities have trouble to identify and locate their IP addresses. …

Police often finds itself trapped within legal boundaries. The most common legal issues authorities are facing in these cases are which jurisdiction should they use, especially when the suspect’s location is unknown. There are problems regarding national sovereignties too. When agencies are hacking a dark net user’s account, they do not really know which country the malware will land to. For this reason, the UNODC sees a major issue when sharing intelligence when it’s not clear where in the world that intelligence would be best used.

The write-up notes that the FBI has been using tricks like hacking Dark Net users and tapping into DOD research. That agency is also calling for laws that would force suspects to decrypt their devices upon being charged. In the meantime, the UNODC supports the development of tools that will enhance each member state’s ability to “collect and exploit digital evidence.” To see the report itself, navigate here, where you will find an overview and a link to the PDF.

Cynthia Murrell, December 16, 2016

Big Data Needs to Go Public

December 16, 2016

Big Data touches every part of our lives and we are unaware.  Have you ever noticed when you listen to the news, read an article, or watch a YouTube video that people say items such as: “experts claim, “science says,” etc.”  In the past, these statements relied on less than trustworthy sources, but now they can use Big Data to back up their claims.  However, popular opinion and puff pieces still need to back up their big data with hard fact.  Nature.com says that transparency is a big deal for Big Data and algorithm designers need to work on it in the article, “More Accountability For Big-Data Algorithms.”

One of the hopes is that big data will be used to bridge the divide between one bias and another, except that he opposite can happen.  In other words, Big Data algorithms can be designed with a bias:

There are many sources of bias in algorithms. One is the hard-coding of rules and use of data sets that already reflect common societal spin. Put bias in and get bias out. Spurious or dubious correlations are another pitfall. A widely cited example is the way in which hiring algorithms can give a person with a longer commute time a negative score, because data suggest that long commutes correlate with high staff turnover.

Even worse is that people and organizations can design an algorithm to support science or facts they want to pass off as the truth.  There is a growing demand for “algorithm accountability,” mostly in academia.  The demands are that data sets fed into the algorithms are made public.  There also plans to make algorithms that monitor algorithms for bias.

Big Data is here to say, but relying too much on algorithms can distort the facts.  This is why the human element is still needed to distinguish between fact and fiction.  Minority Report is closer to being our present than ever before.

Whitney Grace, December 16, 2016

Nobody Really Knows What Goes on over Dark Web

December 16, 2016

While the mainstream media believes that the Dark Web is full of dark actors, research by digital security firms says that most content is legal. It only says one thing; the Dark Web is still a mystery.

The SC Magazine in an article titled Technology Helping Malicious Business on the Dark Web Grow says:

The Dark Web has long had an ominous appeal to Netizens with more illicit leanings and interests. But given a broadening reach and new technologies to access this part of the web and obfuscate dealings here, the base of dark web buyers and sellers is likely growing.

On the other hand, the article also says:

But despite its obvious and well-earned reputation for its more sinister side, at least one researcher says that as the dark web expands, the majority of what’s there is actually legal. In its recent study, intelligence firm Terbium Labs found that nearly 55 percent of all the content on the dark web is legal in nature, meaning that it may be legal pornography, or controversial discussions, but it’s not explicitly illegal by U.S. law.

The truth might be entirely different. The Open Web is equally utilized by criminals for carrying out their illegal activities. The Dark Web, accessible only through Tor Browser allows anyone to surf the web anonymously. We may never fully know if the Dark Web is the mainstay of criminals or of individuals who want to do their work under the cloak of anonymity. Till then, it’s just a guessing game.

Vishal Ingole, December 16, 2016

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta