Startup Semantic Machines Scores Funding

February 26, 2016

A semantic startup looks poised for success with experienced  executives and a hefty investment, we learn from “Artificial Intelligence Startup Semantic Machines Raises $12.3 Million” at VentureBeat. Backed by investors from Bain Capital Ventures and General Catalyst Partners, the enterprise focuses on deep learning and improved speech recognition. The write-up reveals:

“Last year, Semantic Machines named Larry Gillick as its chief technology officer. Gillick was previously chief speech scientist for Siri at Apple. Now Semantic Machines is looking to go further than Siri and other personal digital assistants currently on the market. ‘Semantic Machines is developing technology that goes beyond understanding commands, to understanding conversations,’ the startup says on its website. ‘Our Conversational AI represents a powerful new paradigm, enabling computers to communicate, collaborate, understand our goals, and accomplish tasks.’ The startup is building tools that third-party developers will be able to use.”

Launched in 2014, Semantic Machines is based in Newton, Massachusetts, with offices in Berkeley and Boston. The startup is also seeking to hire a few researchers and engineers, in case anyone is interested.

 

Cynthia Murrell, February 26, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

More Hacked US Voter Data Appears on the Dark Web

February 25, 2016

From HackRead comes a piece called More US Voters Data Circulating on the Dark Net, which points to the lack of protection surrounding data on US voters. This data was leaked on the site The Hell on Dark Web. No reports yet suggest how this data was hacked. While no social security numbers or highly sensitive information was released, records include name, date of birth, voter registration dates, voting records, political affiliation and address. Continuing the explanation of implications, the article’s author writes,

“However, it provides any professional hacker substantial information to initiate and plan a phishing attack in the next election which takes place in the US. Recent discoveries, news and speculations have exposed the role of nation-state actors and cyber criminals in planning, instigating and initiating hacking attacks aimed at maligning the upcoming US elections. While social media has emerged as one of the leading platforms adopted by politicians when they wish to spread a certain message or image, cyber criminals and non-state actors are also utilizing the online platform to plan and initiate their hacking attacks on the US election.”

As the article reminds us, this is the not first instance of voter records leaking. Such leaks call into question how this keeps happening and makes us wonder about any preventative measures. The last thing needed surrounding public perception of voting is that it puts one at risk for cyber attacks. Aren’t there already enough barriers in place to keep individuals from voting?

 

Megan Feil, February 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

monograph

Brown Dog Fetches Buried Data

February 25, 2016

Outdated file formats, particularly those with no metadata, are especially difficult to search and utilize. The National Science Foundation (NSF) reports on a new search engine designed to plumb the unstructured Web in, “Brown Dog: A Search Engine for the Other 99 Percent (ofData).” With the help of a $10 million award from the NSF, a team at the University of Illinois-based National Center for Supercomputing Application (NCSA) has developed two complementary services. Writer Aaron Dubrow explains:

“The first service, the Data Access Proxy (DAP), transforms unreadable files into readable ones by linking together a series of computing and translational operations behind the scenes. Similar to an Internet gateway, the configuration of the Data Access Proxy would be entered into a user’s machine settings and then forgotten. From then on, data requests over HTTP would first be examined by the proxy to determine if the native file format is readable on the client device. If not, the DAP would be called in the background to convert the file into the best possible format….

“The second tool, the Data Tilling Service (DTS), lets individuals search collections of data, possibly using an existing file to discover other similar files in the data. Once the machine and browser settings are configured, a search field will be appended to the browser where example files can be dropped in by the user. Doing so triggers the DTS to search the contents of all the files on a given site that are similar to the one provided by the use….  If the DTS encounters a file format it is unable to parse, it will use the Data Access Proxy to make the file accessible.”

See the article for more on these services, which NCSA’s Kenton McHenry likens to a DNS for data. Brown Dog conforms to NSF’s Data Infrastructure Building Blocks program, which supports development work that advances the field of data science.

 

Cynthia Murrell, February 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

CyberSpark Billed as New Cybersecurity Capital for Israel

February 24, 2016

Beersheba, a city in Israel with a population of about 200,000 has become the site of several connected academic and technological influences, led by government and industry, which may position it to be the cyber capital of the country. The article Israel’s Cyber Sector Blooms in the Desert article from Security Week covers Beersheba’s industrial park, CyberSpark. A project leader for the Israeli National Cyber Bureau is quoted explaining how this area is primed to become a leader in cyber security. The report describes CyberSpark’s projected growth,

“Two more complexes comprising 27 buildings are to be added, and the municipality expects the population to grow by 100,000 in the next 10 years. About 30,000 soldiers, including 7,000 career officers, will move in the coming years to bases and a technology campus to be built on 100 hectares (250 acres) near CyberSpark and around Beersheba. As a lure from the bustle of cosmopolitan Tel Aviv, the government plans a bonus of $18,000 for single officers and $50,000 for families who spend at least five years in Beersheba.”

More often than not, we hear about cybercriminals taking the initiative while law enforcement, intelligence and others attempt to catch up. While the article frames CyberSpark as a case of proactive collaboration with necessary partners for the sake of forwarding the cyber security industry and protecting citizens, we are not sure it can be called proactive. Let’s not forget, as the article mentions, Israel may be the most heavily targeted country in the world with reports suggesting as many as a thousand web attacks per minute.

 

Megan Feil, February 24, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Fun with Google Search Delivers Fun for Google

February 24, 2016

The article on Value Walk titled Top 10 Ways to Have Fun With Google Search invites readers to enjoy a few of the “Easter Eggs” that those nutball programmers over at Google have planted in the search engine. Some are handy, like the spinning coin that gives you a heads or tail result when you type “flip a coin” into Google. Others are just funny, like the way the page tilts if you enter the word “askew.” Others are pure in their nerd factor, as the article explains,

“When you type “Zerg rush” into the search box and hit enter you get a wave of little Google “o”s swarming across and eating the text on your page. Of note, Zerg rush was a tactic used by Zerg players in the late 90s video game StarCraft, which meant the sending many waves of inexpensive units to overwhelm an opponent. Typing “Atari Breakout”…leads to a nostalgic flashback for most people older than 45…”

Speaking of nostalgia, if you type in “Google in 1998” the page reverts to the old layout of the search engine’s early days. In general, the “Easter Eggs” are kind of like watching your uncle’s magic tricks. You aren’t really all that impressed, but every now and then a little surprise makes you smile. And you are definitely going to make him do them again in front of your parents later.

 

Chelsea Kerwin, February 24, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Google to Combat Terrorist Messages with Counter Narrative AdWords

February 22, 2016

Governments are not alone in the fight against terrorism. Google Will Show ‘Counter-Narrative’ AdWords To Users Searching For Terrorist Websites from Tech Week Europe explains how Google is playing a role in containing terrorist messages. In effort to prove their commitment to anti-terrorist initiatives to UK members of parliament, Google will employ a counter narrative strategy using Google AdWords as a marketing channel for their anti-extremist messages. According to the article,

“Users searching for words and websites associated with religious extremism that is linked to terrorism will be shown the ‘counter-narrative’ via Google AdWords, the sponsored links that appear at the top of a search results page. Dr House also told MPs at the Common’s home affairs select committee that Google had removed 14 million videos from YouTube in 2014 for reasons that include terrorist content, according to the Telegraph. Google reportedly offers AdWords grants to NGOs, so that their ‘counter-narrative’ websites can appear on search results for queries such as ‘join Isis’, reported The Telegraph.”

In the article’s concluding remarks, the author raises several questions regarding censorship, freedom of speech and user control; the saying with great power comes great responsibility comes to mind. Developments related to Google’s counter narratives will be important to follow as the bigger-picture conversation unfolds.

 

Megan Feil, February 22, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Pros and Cons of Data Silos When It Comes to Data Analysis and Management

February 22, 2016

The article on Informatica Blog titled Data Silos Are the Death of Analytics. Here’s the Fix explores the often overlooked need for a thorough data management vision and strategy at any competitive business. The article is plugging for an eBook guide to data analytics, but it does go into some detail on the early stages of streamlining the data management approach, summarized by the advice to avoid data silos. The article explains,

“It’s vital to pursue a data management architecture that works across any type of data, BI tool, or storage technology. If the move to add Hadoop or NoSQL demands entirely different tools to manage the data, you’re at risk of creating another silo…When you’ve got different tools for your traditional data warehouse versus your cloud setup, and therefore different skill sets to hire for, train for, and maintain, you’re looking at a real mess.”

The suggestions for streamlined processes and analysis certainly make sense, but the article does not defend the reasonable purposes of data silos, such as power, control, and secrecy. Nor do they consider that in some cases a firm is required to create data silos to comply with a government contract. But it is a nice thought: one big collection of data, one comprehensive data strategy. Maybe.

 
Chelsea Kerwin, February 22, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Recommind Enables Easier Oversight into E-Discovery for Legal Industry

February 19, 2016

A recent article, entitled Recommind Adds Muscle to Cloud e-Discovery from CMS Wire, highlights an upgrade to Recommind’s Axcelerate e-discovery platform. This information intelligence and governance provider for the legal industry has upped their offering by adding a new efficiency scoring feature to enable “extensive visibility into the overall e-discovery review process.” Recommind make the updated based on polling their clients and finding 80 percent do not have oversight in regards to the technological competency of their outside counsel:

“Citing the same survey, he added that 72 percent of respondents pointed to insufficient visibility into the discovery practices of their outside counsel — legal professionals working with them but outside the firm — as a major concern. Axcelerate Cloud also eliminates the cost unpredictability that arises with traditional hosting charges with cloud-based e-discovery tools providers and the infrastructure maintenance required for on-premises solutions.”

When insights from big data is what a company is after, stronger cloud-based functionality is often the first step. Reminds us of enterprise search firm Autonomy which was eventually sold to HP. What will be next for Recommind?

 

Megan Feil, February 19, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Search Vendor RAVN Systems Embraces Buzzwords

February 19, 2016

The article titled RAVN Systems Releases RAVN ACE for Automated Data Extraction of ISDA Documents Using Artificial Intelligence on BobsGuide details the needs of banks and other members of the derivatives market. Risk mitigation leads to ongoing negotiations that result in major documentation issues to keep up with the changes. The article explains how RAVN has met these challenges,

“RAVN ACE can extract the structure of the agreement, the clauses and sub-clauses, which can be very useful for subsequent re-negotiation purposes. It then further extracts the key definitions from the contract, including collateral data from tabular formats within the credit support annexes. All this data is made available for input to contract or collateral management and margining systems or can simply be provided as an Excel or XML output for analysis.”

Not only does RAVN ACE do the work in a fraction of the amount of time it would take a person, the output is also far more accurate, always good news when handling legal documents. The service also includes an audit service that compares terms from the documents with the manual abstraction. By doing so, RAVN ACE is able to analyze the risks and even estimate the amount of negotiating necessary to complete the contract.

Chelsea Kerwin, February 19, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

I Left My NoSQL Heart at the MarkLogic Conference

February 18, 2016

MarkLogic is a headlining company in the field of NoSQL enterprise databases, allowing companies to process, search, scale through massive data stores as well as build Web applications to handle the onslaught.  As a respected enterprise leader, MarkLogic occasionally holds a conference to teach IT professionals as well as potential customers about its software benefits.  This year MarkLogic will host the MarkLogic World 2016 US in San Francisco, California from May 9-12 at the Park Central Hotel.

The conference is described as:

“We kick the week off on Monday with three different hands-on workshops to choose from and end our week Thursday afternoon with our traditional closing keynote with our Founder and Chief Architect, Christopher Lindblad. New this year, we are including a special Partner Track, exclusive to MarkLogic partners and those interested in becoming one. If you are developing with MarkLogic, transitioning from RDBMS to MarkLogic, building apps on MarkLogic, or if you are just starting out on MarkLogic, this is the event for you. Sessions span from MarkLogic basics to technical deep dives covering data modeling, semantics, much & more.”

A Partner Track?  That is a new feature at the MarkLogic convention, but what is its purpose?  Will it be a daylong event where MarkLogic partners advertise their services or wares otherwise known as a commercial seminar without a free lunch?  Will it be an informative explanation about how MarkLogic partners are shaping the NoSQL enterprise industry and combining their talents to advance the field?  Maybe it is just a mix and mingle for networking?

The only way to know is to sign up for the conference and if you use the promo code “MLEMJAN” you can get in for free.  It is also an excuse to visit San Francisco and ride the cable cars. 

 

Whitney Grace, February 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta