Digging into Googles Rich Answer Vault
November 4, 2015
Google has evolved from entering precise keywords into the search engine to inputting random questions, complete with question mark. Google has gone beyond answering questions and keyword queries. Directly within search results for over a year now, Google has included content referred to as “rich answers,” meaning answers to search queries without having to click through to a Web site. Stone Temple Consulting was curious how much people were actually using rich answers, how they worked, and how can they benefit their clients. In December 2014 and July 2015, they ran a series of tests and “Rich Answers Are On The Rise!” discusses the results.
Using the same data sets for both trials, Stone Temple Consulting discovered that use of Google rich answers significantly grew in the first half of 2015, as did the use of labeling the rich answers with titles, and using images with them. The data might be a skewed in favor of the actual usage of rich answers, because:
“Bear in mind that the selected query set focused on questions that we thought had a strong chance of generating a rich answer. The great majority of questions are not likely to do so. As a result, when we say 31.2 percent of the queries we tested generated a rich answer, the percentage of all search queries that would do so is much lower.”
After a short discussion about the different type of rich answers Google uses and how those different types of answers grew. One conclusion that can be drawn from the types of rich answers is that people are steadily relying more and more on one tool to find all of their information from a basic research question to buying a plane ticket.
Whitney Grace, November 4, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Journalists Use Dark Web Technology to Protect Source Privacy
November 4, 2015
Canada’s paper the Globe and Mail suggests those with sensitive information to reveal some Dark Web tech: “SecureDrop at the Globe and Mail.” As governments get less squeamish about punishing whistleblowers, those with news the public deserves to know must be increasingly careful how they share their knowledge. The website begins by informing potential SecureDrop users how to securely connect through the Tor network. The visitor is informed:
“The Globe and Mail does not log any of your interactions with the SecureDrop system, including your visit to this page. It installs no tracking cookies or tracking software of any kind on your computer as part of the process. Your identity is not exposed to us during the upload process, and we do not know your unique code phrase. This means that even if a code phrase is compromised, we cannot comply with demands to provide documents that were uploaded by a source with that code phrase. SecureDrop itself is an open-source project that is subject to regular security audits, reducing the risk of bugs that could compromise your information. Information provided through SecureDrop is handled appropriately by our journalists. Journalists working with uploaded files are required to use only computers with encrypted hard drives and follow security best practices. Anonymous sources are a critical element of journalism, and The Globe and Mail has always protected its sources to the best of its abilities.
The page closes with a warning that no communication can be perfectly secure, but that this system is closer than most. Will more papers take measures to ensure folks can speak up without being tracked down?
Cynthia Murrell, November 4, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
It Is Not a Bird in the Law Firm
November 3, 2015
In science-fiction, artificial intelligence is mostly toyed around with in robots and androids. Machines that bear artificial intelligence either try to destroy humanity for their imperfection or coexist with humanity in a manner that results in comedic situations. In reality, artificial intelligence exists in most everyday objects from a mobile phone to a children’s toy. Artificial intelligence is a much more common occurrence than we give our scientists credit for and it has more practical applications than we could imagine. According to PR Newswire one of the top artificial intelligence developers has made a new deal for their popular product, “RAVN Systems’ Artificial Intelligence Platform Is Deployed At Berwin Leighton Paisner.”
RAVN Systems is known for their top of line software in enterprise search, unstructured big data analytics, knowledge management, and, of course, artificial intelligence. The international law firm Berwin Leighton Paisner recently deployed RAVN Systems’s RAVN Applied Cognitive Engine (RAVN ACE). RAVN ACE will work in the law firm’s real estate practice, not as a realtor, but as the UK’s first contract robot. It will use cutting-edge AI to read and interpret information from documents, converting unstructured data into structured output. RAVN ACE will free up attorneys to complete more complex, less menial tasks.
“Matthew Whalley, Head of Legal Risk Consultancy at BLP commented, ‘The robot has fast become a key member of the team. It delivers perfect results every time we use it. Team morale and productivity has benefited hugely, and I expect us to create a cadre of contract robots throughout the firm. If the reaction to our first application is any indication, we will be leading the implementation of AI in the Law for some time to come.’ ”
RAVN ACE has more applications than writing real estate contracts. It can be deployed for financial services, media, telecommunications, and more. Taking over the menial tasks will save on time , allowing organizations to reinvest time into other projects.
Whitney Grace, November 3, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
The Lack of Digital Diversity
October 27, 2015
Tech companies and their products run our lives. Companies like Apple, Google, and Microsoft have made it impossible to function in developed nations without them. They have taken over everything from communication to how we entertain ourselves. While these companies offer a variety of different products and services, they are more similar than different. The Verge explains that “Apple, Google, And Microsoft Are All Solving The Same Problem.”
Google, Apple, and Microsoft are offering similar services and products in their present options with zero to little diversity among them. For example, there are the personal assistants Cortana vs. Google Now vs. Siri, options for entertainment in the car like Apple CarPlay and Android Auto, and seamless accessibility across devices with Chrome browser, Continuity, and Continuum. There are more comparisons between the three tech giants and their business plans for the future, but it is not only them. Social media sites like Facebook and Twitter are starting to resemble each other more too.
Technology companies have borrowed from each and have had healthy competition for years spurring more innovation, but these companies are operating on such similar principles that it is stifling creativity and startups are taking more risks:
“Without the dual pressures of both the consumer and the stock market, and without a historic reputation to uphold, small startups are now the best engine for generating truly new and groundbreaking innovations. Uber and Airbnb are fundamentally altering the economics of renting things, while hardware designers like Pebble and Oculus are inventing cool new technology that isn’t bound to any particular company’s ecosystem. Startups can see a broader range of problems to address because they don’t have to wear the same economic blinkers as established, monolithic companies.”
The article ends on positive thoughts, however. The present is beating along at a consistent pace, but in order to have more diversity companies should not be copying each other on every little item. Tech companies should borrow ideas from the future to create more original ideas.
Whitney Grace, October 27, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
University Partners up with Leidos to Investigate How to Cut Costs in Healthcare with Big Data Usage
October 22, 2015
The article on News360 titled Gulu Gambhir: Leidos Virginia Tech to Research Big Data Usage for Healthcare Field explains the partnership based on researching the possible reduction in healthcare costs through big data. Obviously, healthcare costs in this country have gotten out of control, and perhaps that is more clear to students who grew up watching the cost of single pain pill grow larger and larger without regulation. The article doesn’t go into detail on how the application of big data from electronic health records might ease costs, but Leidos CTO Gulu Gambhir sounds optimistic.
“The company said Thursday the team will utilize technical data from healthcare providers to develop methods that address the sector’s challenges in terms of cost and the quality of care. Gulu Gambhir, chief technology officer and a senior vice president at Leidos, said the company entered the partnership to gain knowledge for its commercial and federal healthcare business.”
The partnership also affords excellent opportunities for Virginia Tech students to gain real-world, hands-on knowledge of data research, hopefully while innovating the healthcare industry. Leidos has supplied funding to the university’s Center for Business Intelligence and Analytics as well as a fellowship program for grad students studying advanced information systems related to healthcare research.
Chelsea Kerwin, October 22, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Vodafone Improves Search Management
October 20, 2015
More than 8,000 call center agents use Vodafone’s internal knowledge management platform dubbed AskVodafone to access client information. AskVodafone’s old system was not performing as well as it used, so the company decided to upgrade to Exorbyte. Motor Traffic runs down Vodafone’s upgrade process in the article, “Exorbyte Matchmaker Managed Over 2 million Searches A Month On The Platform AskVodafone.”
Vodafone wanted to shorten an agent’s processing time on phone calls. The solution required faceted search, keyword suggestions, more accurate search results, and information related to a caller’s issue. Exorbyte created an individualized solution for Vodafone and they were given the job:
“Through the experience with the Exorbyte solutions and, of course, the existing site license used in the company the contract has been awarded directly to Exorbyte. These Andreas Vieth, Product Manager Search: ‘Due to the long and successful collaboration with Exorbyte it was logical for us to continue with them in the modernization of AskVodafone portal and to develop synergies between these and the Exorbyte search on the Vodafone website.’”
The solution indexes over 25,000 Web sites and it has increased the center’s data quality and results relevancy. The end result is that over 8,000 calls and 50,000 searches performed on AskVodafone are resolved faster and with better information.
Whitney Grace, October 20, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Coveo Touts Secure, Intelligent Cloud Search
October 19, 2015
Security is a perpetual concern, especially for those who work in the cloud. Enterprise search firm Coveo want us to know they take security very seriously. Their press release, “Coveo Completes Security Evaluation for cloud-Based Intelligent Search Offerings,” is posted at MarketWatch. The question is, “What does secure mean?” The definition may depend on one’s knowledge of the exploit world.
The write-up states:
“Marking its commitment to be the most secure intelligent search provider in the marketplace, Coveo announced that it has completed a comprehensive evaluation of data security and compliance procedures and processes. Coveo engaged with Brightline CPAs & Associates, which conducted a series of tests to evaluate the effectiveness of operations and controls that address data integrity and security. With data security threats on the rise across various industries and around the world, Coveo recognizes how important it is to provide clients of its cloud, intelligent search offerings with the highest security standards. Over the years, Coveo has implemented a set of industry-standard operations, infrastructure and services to ensure the integrity and privacy of customer data, including:
— SOC II and SOC I examinations
— Strong logical and physical access controls
— Systematic application and source code scanning
— Comprehensive background checks on all employees
— 24/7/365 live, dedicated operations and security teams
— Formal, ongoing 3rd party compliance and security reviews”
We are reminded that Coveo was recently named “most innovative leader” for the second year running in the Gartner Enterprise Search Magic Quadrant, with that report lauding the company’s “unusually rich security functions.” Founded in 2005, Coveo maintains offices in the U.S. (SanMateo, CA), the Netherlands, and Quebec.
Cynthia Murrell, October 19, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Whitepaper: Plan for Holiday Sales Now
October 16, 2015
Marketing pros and retailers take note: semantic tech firm ntent offers a free whitepaper to help you make the most of the upcoming holiday season, titled “Step-By-Step Guide to Holiday Campaign Planning.” All they want in return are your web address, contact info, and the chance to offer you a subscription to their newsletter, blog, and updates. (That checkbox is kindly deselected by default.) The whitepaper’s description states:
“Halloween candy and costumes are already overflowing on retail stores shelves. You know what that means, don’t you? It’s time for savvy marketers to get serious about their online retail planning for the impending holidays, if they haven’t already started. Why is it so important to take the time to coordinate a solid holiday campaign? Because according to the National Retail Federation [PDF] the holiday season can account for more than 20–40% of a retailer’s annual sales. And if that alone isn’t enough to motivate you, Internet Retailer reported that online retail sales this year are predicted to reach $349.06 billion a 14.2% YoY increase—start planning now to get your piece of the pie! Position your business for online success, more sales and more joy as you head into 2016 using these easy-to-follow, actionable tips!”
The paper includes descriptions of tactics and best practices, as well as a monthly to-do list and a planning worksheet. Founded in 2010, ntent leverages their unique semantic search technology to help clients quickly find the information they need. The company currently has several positions open at their Carlsbad, California, office.
Cynthia Murrell, October 16, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Google Declares It Has the Best Cloud Service…Again
October 15, 2015
Google is never afraid to brag about its services and how much better they are compared to their competitors. Google brandishes its supposed superiority with cloud computing on its Google Cloud Platform Blog with the post, “Google Cloud Platform Delivers The Industry’s Best Technical And Differentiated Features.” The first line in the post even comes out as a blanket statement for how Google feels about its cloud platform: “I’ll come right out and say it: Google Cloud Platform is a better cloud.”
One must always take assertations from a company’s Web site as part of its advertising campaign to peddle the service. Google products and services, however, usually have quality written into their programming, but Google defends the above claim saying it has core advantages and technical differentiators in compute, storage, network, and distributed software tiers. Google says this is for two reasons:
“1. Cloud Platform offers features that are very valuable for customers, and very difficult for competitors to emulate.
- The underlying technologies, created and honed by Google over the last 15 years, enable us to offer our services at a much lower price point.”
Next the post explains the different features that make the cloud platform superior: live migration, scaling load balances, forty-five second boot times, three second archive restore, and 680,000 IOPS sustained Local SSD read rate. Google can offer these features, because it claims to have the best technology and software engineers. It does not stop there, because Google also offers its cloud platform at forty percent cheaper than other cloud platforms. It delves into details about why it can offer a better and cheaper service. While the argument is compelling, it is still Google cheerleading itself.
Google is one of the best technology companies, but it is better to test and review other cloud platforms rather than blinding following a blog post.
Whitney Grace, October 15, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph
Business Intelligence and Data Science: There Is a Difference
October 6, 2015
An article at the SmartDataCollective, “The Difference Between Business Intelligence and Real Data Science,” aims to help companies avoid a common pitfall. Writer Brigg Patton explains:
“To gain a competitive business advantage, companies have started combining and transforming data, which forms part of the real data science. At the same time, they are also carrying out Business Intelligence (BI) activities, such as creating charts, reports or graphs and using the data. Although there are great differences between the two sets of activities, they are equally important and complement each other well.
“For executing the BI functions and data science activities, most companies have professionally dedicated BI analysts as well as data scientists. However, it is here that companies often confuse the two without realizing that these two roles require different expertise. It is unfair to expect a BI analyst to be able to make accurate forecasts for the business. It could even spell disaster for any business. By studying the major differences between BI and real data science, you can choose the right candidate for the right tasks in your enterprise.”
So fund both, gentle reader. Patton distinguishes each position’s area of focus, the different ways they use and look at data, and their sources, migration needs, and job processes. If need to hire someone to perform these jobs, check out this handy clarification before you write up those job descriptions.
Cynthia Murrell, October 6, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph