Dig.ccMixter for Royalty-Free Tunes
April 22, 2020
Here is a resource that makers (and aspiring makers) of video content and games will want to bookmark. CCMixter is an online community where musicians share their work through creative commons licenses. Dig.ccMixter is our search portal into that content, free to download and use even for commercial purposes. Scrolling down reveals three categories: instrumental music for film & video; free music for commercial projects; and music for video games. Clicking the “Dig!” button leads to a keyword search page, where you can search by attributes like genre, mood, and instruments. The site’s About page, titled Yea, But Is It Legal? explains:
“This is a community music remixing site featuring remixes and samples licensed under Creative Commons licenses. Music on this site is licensed under a Creative Commons license. You are free to download and sample from music on this site and share the results with anyone, anywhere, anytime. Some songs might have certain restrictions, depending on their specific licenses. Each submission is marked clearly with the license that applies to it.”
So there you have it—a free source of music for your projects, even ones you intend to profit from. All you have to do is give credit where credit is due.
Interestingly, developers can also access the site’s ccHost Query API. We’re told:
“The ccHost Query API is an open, publicly available interface that is available for public use, especially by 3rd party websites, mobile applications, smart TV appliances and any other network connected device. We here at ccMixter use it to help expose the artists that upload their Creative Commons licensed music to audiences that otherwise would not have access to. The API and software implementation is owned by ArtIsTech Media under a license agreement with Creative Commons. The music itself is owned by the individual artists that uploaded it to the site and agree, through the Creative Commons licenses to share the music through this mechanism.”
Bing, Google, and Yandex are not suited for some types of music search. Enter Dig.cc Mixter. Applause, please.
Cynthia Murrell, April 22, 2020
SAP: Management Simplification Because of a Virus
April 21, 2020
SAP is an interesting company. How many years did it take Westinghouse to implement the SAP system? Right, there is no more Westinghouse, and it is possible that the job was never completed.
That’s a minor matter compared to the information revealed in “SAP Breaks Up Co-CEO Role After Virus Brought Leadership Problem.” (Note: A paywall may be in place for this write up because those run-for-president ads have to be paid for.)
The write up asserts:
SAP had been committed to the co-CEO structure, but when the coronavirus hit, it became clear that having two people in charge was no longer tenable, according to a person with knowledge of the matter.
This begs the question, “Was the co-CEO set up tenable in the first place?”
Well, Ms. Morgan, based in the US, was not in Germany. Yeah, okay. Ms. Morgan was not a close pal with the IBM infused Hasso Platnet. Plus, a very minor factor maybe, Ms. Morgan was not a male.
Several observations:
- This SAP move is almost the equal of the some high school science club management methods in use at Silicon Valley companies
- A GM wizard allegedly observed, “Two objectives is no objective.” SAP’s Board of Director’s appears to have ignored this Sloanism.
- SAP’s financial performance tracks IBM’s performance. The apple does not fall far from der baum. So maybe a bum’s rush?
The management principle seems to be blame corona. Innovative.
Stephen E Arnold, April 21, 2020
IBM Suffers a Setback in South Africa: Datawalk Stomps on Big Blue
April 21, 2020
IBM Analyst’s Notebook at one time enjoyed near total market dominance for investigative software, what I call policeware. IBM owns Analyst Notebook, and it has a sustainable revenue stream from some governments. Once installed — even though there may be no or very few qualified operators who can use the system — the money continues to roll in. Furthermore, IBM has home-grown technology, and Big Blue has acquired smaller firms with particularly valuable technology; for example, CyberTap.
Maybe not in South Africa? Datawalk has strolled into the country’s key integrator and plopped itself down in the cat-bird seat.
Under the original i2 founders’ leadership, losing South Africa was not in the game plan. IBM may have misplaced the three ring binder containing the basic strategy of i2 Ltd. To make matters worse, IBM could have asked its Watson (right, the super smart technology tackling cancer and breaking its digital ankle in a wild play) about the South African account.
Also, affected are downstream, third party products and services. Analyst’s Notebook has been available for more than two decades. There are training and support professionals like Tovek in Prague; there are add ins; there are enhancements which like Sintelix could be considered an out-and-out replacement. What happened?
If the information reported by ISB News is accurate, a company headquartered in Poland captured the account and the money. The article asserts that a key third party reseller doing business as SSG Group and its partner TechFINIUM (a Datawalk partner in South Africa) have stepped away from IBM and SAS. These are, in the view of DarkCyber, old school solutions.
The Datawalk replacement, according to John Smit, president of SSG Group, allegedly said:
“DataWalk is a powerful solution that will allow us to combine all data in one repository and then conduct detailed investigations. We often use unstructured data that we receive from our partners. DataWalk will provide us with the previously unattainable ability to view this data in the full context of our own databases “
Datawalk is characterized as a solution that is “more suited to current challenges.”
According to the article:
DataWalk (formerly PiLab) is a technological entity that … connects billions of objects from many sources, finding application in forensic analytics in the public and financial sectors, including in the fight against crime (US agencies), scams (insurers) and fraud identification (central administration).
These are aggressive assertions. IBM may well ask Watson or maybe a human involved with Analyst’s Notebook sales, “What happened?”
Stephen E Arnold, April 21, 2020
Apple and Google: Teaming Up for a Super Great Reason?
April 21, 2020
In a remarkable virtue signaling action, Apple and Google joined forces to deal with coronavirus. The approach is not the invention of a remedy, although both companies have dabbled in health. The mechanism is surveillance-centric in the view of DarkCyber.
“Google Apple Contact Tracing (GACT): A Wolf in Sheep’s Clothes” provides an interesting opinion about the Google Apple Contact Tracing method. The idea seems to be that there are two wolves amongst the sheep. The sheep cooperate because that’s the nature of sheep. The wolves have the system, data, and methodology to make the sheep better. Are there other uses of the system? It is too soon to tell. But we can consider what the author asserts.
But the bigger picture is this: it creates a platform for contact tracing that works all across the globe for most modern smart phones (Android Marshmallow and up, and iOS 13 capable devices) across both OS platforms.
The write up states:
Whenever a user tests positive, the daily keys his or her devices used the last 14 days can be retrieved by the app through the GACT API, presumably only after an authorised request from the health authorities. How this exactly works, and in particular how a health authority gets authorised to sign such request or generate a valid confirmation code is not clear (yet). The assumption is that these keys are submitted to a central server set up by the contact tracing app. Other instances of the same app on other people’s phones are supposed to regularly poll this central server to see if new daily keys of phones of recently infected people have been uploaded. Another function in the GACT API allows the app to submit these daily keys to the operating system for analysis. The OS then uses these keys to derive all possible proximity identifiers from them, and compares each of these with the proximity identifiers it has stored in the database of identifiers recently received over Bluetooth. Whenever a match is found, the app is informed, and given the duration and time of contact (where the time may be rounded to daily intervals).
The author includes this observation about the procedure:
Google and Apple announced they intend to release the API’s in May and build this functionality into the underlying platforms in the months to follow. This means that at some point in time operating system updates (through Google Play Services updates in the case of Android) will contain the new contact tracing code, ensuring that all users of a modern iPhone or Android smartphone will be tracked as soon as they accept the OS update. (Again, to be clear: this happens already even if you decide not to install a contact tracing app!) It is unclear yet how consent is handled, whether there will be OS settings allowing one to switch on or off contact tracing, what the default will be.
The write up concludes with this statement:
We have to trust Apple and Google to diligently perform this strict vetting of apps, to resist any coercion by governments, and to withstand the temptation of commercial exploitation of the data under their control. Remember: the data is collected by the operating system, whether we have an app installed or not. This is an awful amount of trust….
DarkCyber formulated several observations:
- The system appears to be more accessible than existing specialized services now available to some authorities
- Apple’s and Google’s cooperation seems mature in terms of operational set up. When did work on this method begin?
- Systems operated by private companies on behalf of government agencies rely on existing legal and contractual methods to persist through time; that is, once funded or supported in a fungible manner, the programs operate in an increasingly seamless manner.
Worth monitoring this somewhat rapid and slightly interesting tag team duo defeat their opponent.,
Stephen E Arnold, April 21, 2020
In Cobol News: Cloudflare Gets Interested in Revealing That It Is a Time Sharing Company
April 21, 2020
Legacy systems exist. This is perhaps big news for the recently unemployed Silicon Valley types. Some states are struggling to find Cobol programmers. IBM has rolled out Cobol training.
“Cloudflare Workers Now Support Cobol” reports:
COBOL can now be used to write code for Cloudflare’s serverless platform Workers.
The write up provides a number of historical factoids, including sample code and a Game of Life example.
Quick thought: Has the mainframe returned to offer coding opportunities and a career path to the thumb typing millennials?
What’s next for Cloudflare? Lab coats, glass walls, and elevated floors, sign up sheets for keypunch machines, and greenbar paper?
Has cloud computing become a time shared mainframe?
PS. My first programming project relied on Cobol. That was in 1963. I also used Cobol for the Psychology Today / Intellectual Digest readability work I did in the 1970s. Am I relevant again? I miss JCL too.
Stephen E Arnold, April 18, 2020
Virtue Signaling in a Difficult Time
April 21, 2020
I have noticed a number of stories about companies working to keep the current virus at bay. Some are interesting; for example, Johns Hopkins University rolled out its dashboard early in the game. Interesting, right? The approach illustrates how dashboards of data deliver a bird’s eye view of a data set. The Johns Hopkins’ approach omits some data; for example, the rate of doubling per sector, demographic data, and controls to present the data in different graphs. DarkCyber has some questions about the service, but let’s set those aside. The Johns Hopkins’ dashboard scores a 7 on the virtue signaling scale created by the DarkCyber team in a 10 minute Zoom call. DarkCyber is thorough.
How do other virtue signaling services stack up on our scale, with 1 being the most limited and 10 representing a home run data service.
- Elon Musk and his ventilators. According to the Sacramento Bee, the ventilators never arrived. The PR did, however. Mr. Musk asserts he has delivered. The score is 1.
- Google stepped forward and offered virus donations. Sounds good, and Vox reported the generous offer. But wait! Millions in cash? Nope, ad credits. Virtue signaling score: 2.
- IBM created a variation on the Johns Hopkins’ dashboard. The twist to the IBM service was that as one clicked down to a state and then a country, the Big Blue service does not make it easy to back out and look at other data. There’s a work around, of course, but the mainframe crowd seems to shine when it comes to usability and medical information. Virtue signaling score: 2.
What outfit gets a 10? None so far.
There are other examples of virtue signaling, but the message is clear: Seize an opportunity to promote one’s company.
Here’s a virus test quiz:
- What service provides demographic data about those diagnosed with the virus?
- What service breaks down the demographics of those who died from the subsequent downstream effects of the virus?
- Within clusters of deaths, what are the zip codes of the deceased?
Give up. The big dashboard producers are following Elon Musk’s approach: Don’t do the work.
Virtue signaling is a big PR and marketing trend. Good enough as some say.
Stephen E Arnold, April 21, 2020
Google, Ad Transparency, and Query Relaxation: Should Advertisers Care? Probably
April 20, 2020
You need information about Banjo, a low profile outfit in Utah. Navigate to Google and enter the query Banjo law enforcement. No quotes for this query. Banjo has a Web site, and the phrase law enforcement is reasonably common and specific. (It is what is known as a bound phrase like White House or stock market; that is, the two words go together in US English.)
Here’s what the system displayed to me on April 20, 2020, at 0918 am US Eastern time:
The search results are okay. The ads do not match the query or the user’s intent: Law enforcement is not even close to a $1,000 musical instrument in a retail store.
Notice that the first result is to a Salt Lake Tribune article in March 2020 about Banjo’s allegedly “massive surveillance system.” The second result is from the same newspaper which reports a few days later that the Salt Lake City police won’t share data with Banjo. So far so good. Google is delivering timely, relevant results.
But look at the ads. The query Banjo law enforcement displays to a person wanting information about a policeware company the following for fee, pay to be seen ads in front of a buyer with an interest in Banjo:
These advertisers are betting money that Google can get them relevant clicks when a person search for a banjo. Maybe? But when someone searches for the policeware company Banjo, the advertiser is going to be “surprised.” Do advertisers like surprises?
Here are the advertisers whose for fee ads for people interested in law enforcement software (policeware) had displayed in front of a Google user with a vanishingly low probability of purchasing a stringed instrument whilst researching a specialist software vendor selling almost exclusively to police and screened quangos (quasi non governmental organizations):
- Banjo Ben Clark
- Deering Banjo Company
- Banjo.com (note that our Banjo is Banjo.co)
- Banjo Studio
- Instrument Alley
- Sweetwater
- Guitar Center
These companies paid for ads as a result of query relaxation. Google’s system does not differentiate the Banjo policeware outfit from the music products.
Are there parallels between games in which a person can win money by guessing which cup hides the ball? These games of chance are often confidence operations. In this context confidence means trickery, not trust.
Why? There are url distinctions; that is, Banjo.co versus Banjo.com; there are disambiguation clues in Banjo.co’s Web page; there is the metadata itself with the keyword surveillance a likely index term.
Intelware/Policeware Vendors Face Tough Choices and More Sales Pressure
April 20, 2020
The wild and crazy reports about the size of the lawful intercept market, the policeware market, and the intelware market may have to do some recalculations. Research and Markets’ is offering a for fee report which explains the $8.8 billion lawful interception market. The problem is that the report was issued in March 2020, and it does not address changes in the financing of intelware and policeware companies nor the impact of the coronavirus matter. You can get more information about the report from this link.
As you know, it is 2020. Global investments have trended down. Estimates range from a few percent to double digits. Now there is news from Israel that the funding structures for high technology companies are not just sagging. The investors are seeking different paths and payoffs.
“Post Covid-19, Exits May Seem Like a Distant Dream But Exercising Options May Become Easier” states:
With Israeli tech companies having to cut employees’ salaries by up to 40%, many have turned to repricing stock options as a means of maintaining their talent.
Repricing means that valuations go down.
Gidi Shalom Bendor, founder and CEO of IBI Capital subsidiary S-Cube Financial Consulting, allegedly said:
You can see the valuations of public companies decreasing and can assume private companies are headed the same way,” Shalom Bendor said. Companies that are considering repricing have been around for several years and have a few dozen employees, so even though an exit is not around the corner for them it is still in sight, he explained. “In some cases, these companies have even had acquisition offers made, so options are a substantial issue.
Ayal Shenhav, head of the tech department at Israel-based firm GKH Law Offices, allegedly said:
Pay cuts and the repricing of options go hand in hand.
Let’s step back. What are the implications of repricing, if indeed it becomes a trend that reaches from Israel to Silicon Valley?
First, the long sales cycles for certain specialized software puts more financial pressure on the vendors. Providing access to software is not burdensome. What is expensive is providing the professional support required for proof of concept, training, and system tuning. Larger companies like BAE Systems and Verint will have an advantage over smaller, possibly more flexible alternatives.
Second, the change in compensation is likely to hamper hiring and retaining employees. The work harder, work longer approach in some startups means that the payoffs have to be juicy. Without the tasty cash at the end of a 70 hour work week, the best and brightest may leave the startup and join a more established firm. Thus, innovation can be slowed.
Third, specialized service providers can flourish in regions/countries which operate with a different approach to funding. Stated simply, Chinese intelware and policeware vendors may be able to capture more customers in markets coveted by some Israeli and US companies.
These are major possibilities. Evidence of change can be discerned. In my DarkCyber video for April 14, 2020, I pointed out that Geospark Analytics was doing a podcast. That’s a marketing move of note as was the firm’s publicity about hiring a new female CEO, who was a US Army major, a former SAIC senior manager, and a familiar figure in some government agencies. LookingGlass issues a steady stream of publicity about its webinars. Recorded Future, since its purchase by Insight, has become more vocal in its marketing to the enterprise. The claims of cyber threat vendors about malware, hacks, and stolen data are flowing from companies once content with a zero profile approach to publicity.
Why?
Sales are being made, but according to the DarkCyber research team the deals are taking longer, have less generous terms, and require proofs of concept. Some police departments are particularly artful with proofs of concepts and are able to tap some high value systems for their analysts with repeated proofs of concept.
To sum up, projections about the size of the lawful intercept, intelware, and policeware market will continue to be generated. But insiders know that the market is finite. Governments have to allocate funds, work with planning windows open for months if not a year or more, and then deal with unexpected demands. Example? The spike in coronavirus related fraud, misdirection of relief checks, and growing citizen unrest in some sectors.
Net net: The change in Israel’s financing, the uptick in marketing from what were once invisible firms, and the environment of the pandemic are disruptive factors. No quick resolution is in sight.
Stephen E Arnold, April 21, 2020
Australia: Facebook and Google Will Not Be Allowed to Kill News
April 20, 2020
“Australia to Force Technology Giants Facebook and Google to Pay for News Content” expresses something News Corp’s Rupert Murdoch has long desired: Money for real news.
The write up reports:
Social media giants Facebook and Google will be forced to pay Australian media companies for sharing their content or face sanctions under a landmark decision by the Morrison government. The move comes as the media industry reels from tumbling advertising revenue, already in decline before the Covid 19 coronavirus outbreak collapsed the market.
Several questions may soon be answered:
- Will Facebook and Google tie up the “pay for news” effort in the courts?
- If the invoices are sent, will Facebook and Google pay them or seek to stall, negotiate, or just ignore blandishments?
- Will the law cause Facebook and Google to set up their own news gathering operations and subsidize them via ad revenue; that is, reinvent traditional news. (Remember: Apple and Google have teamed up to deal with coronavirus. The “pay for news” effort may force a similar shotgun marriage.)
- Will other countries like members of the Five Eyes, get with this “pay for news” program?
Net net: Facebook and Google face a management moment that could become “real news.”
Stephen E Arnold, April 20, 2020
Another Specialized Method Revealed
April 20, 2020
This is another example of an article which should not be widely available. Rumors of a method to compromise Android phones have been circulating for months. The major signal that a specialized services firm had developed a way to compromise Android phones was a change in Zerodium’s bounty. Android bounties cratered; iPhone vulnerability values skyrocketed. Why? Android devices could become the house pets of certain entities.
“The Secret Behind Unkillable Android Backdoor Called xHelper Has Been Revealed” explains the procedures followed. If you are interested in what significant research efforts can achieve, read the article.
DarkCyber’s view is that Google’s Android team, like many zip zip development shops, overlook excellence. The pursuit of good enough has paid dividends for Google’s approach to business. However, Googlers make assumptions that their way is THE highway.
That works until it doesn’t.
DarkCyber has little to say about the specialized services which have been able to convert the Android device into a handy dandy information provider.
And what about the cyber security firms selling “security”? Does this minor issue suggest that talk and PR about digital security solutions is hot air?
But Google? Yep, Google. Good enough is not.
Stephen E Arnold, April 20, 2020